Advertisement
tsester

nmap 40000-54000

Nov 16th, 2015
138
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.55 KB | None | 0 0
  1. nmap -p 40000-54000 -T4 -A -v 192.168.1.1
  2. Starting Nmap 6.47 ( http://nmap.org ) at 2015-11-16 22:57 EET
  3. NSE: Loaded 118 scripts for scanning.
  4. NSE: Script Pre-scanning.
  5. Initiating ARP Ping Scan at 22:57
  6. Scanning 192.168.1.1 [1 port]
  7. Completed ARP Ping Scan at 22:57, 0.03s elapsed (1 total hosts)
  8. Initiating Parallel DNS resolution of 1 host. at 22:57
  9. Completed Parallel DNS resolution of 1 host. at 22:57, 0.08s elapsed
  10. Initiating SYN Stealth Scan at 22:57
  11. Scanning 192.168.1.1 [14001 ports]
  12. Completed SYN Stealth Scan at 22:58, 24.90s elapsed (14001 total ports)
  13. Initiating Service scan at 22:58
  14. Initiating OS detection (try #1) against 192.168.1.1
  15. Retrying OS detection (try #2) against 192.168.1.1
  16. NSE: Script scanning 192.168.1.1.
  17. Initiating NSE at 22:58
  18. Completed NSE at 22:58, 0.00s elapsed
  19. Nmap scan report for 192.168.1.1
  20. Host is up (0.026s latency).
  21. All 14001 scanned ports on 192.168.1.1 are closed
  22. MAC Address: 00:22:6B:FC:6E:EB (Cisco-Linksys)
  23. Too many fingerprints match this host to give specific OS details
  24. Network Distance: 1 hop
  25.  
  26. TRACEROUTE
  27. HOP RTT ADDRESS
  28. 1 25.74 ms 192.168.1.1
  29.  
  30. NSE: Script Post-scanning.
  31. Read data files from: /usr/bin/../share/nmap
  32. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  33. Nmap done: 1 IP address (1 host up) scanned in 29.03 seconds
  34. Raw packets sent: 15024 (662.372KB) | Rcvd: 14544 (582.872KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement