Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-26 08:40 Pacific Daylight Time
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 08:40
- Completed NSE at 08:40, 0.00s elapsed
- Initiating NSE at 08:40
- Completed NSE at 08:40, 0.00s elapsed
- Initiating ARP Ping Scan at 08:40
- Scanning 255 hosts [1 port/host]
- Completed ARP Ping Scan at 08:40, 3.55s elapsed (255 total hosts)
- Initiating Parallel DNS resolution of 255 hosts. at 08:41
- Completed Parallel DNS resolution of 255 hosts. at 08:41, 13.05s elapsed
- Nmap scan report for 10.2.0.0 [host down]
- Nmap scan report for 10.2.0.3 [host down]
- Nmap scan report for 10.2.0.4 [host down]
- Nmap scan report for 10.2.0.10 [host down]
- Nmap scan report for 10.2.0.11 [host down]
- Nmap scan report for 10.2.0.12 [host down]
- Nmap scan report for 10.2.0.13 [host down]
- Nmap scan report for 10.2.0.14 [host down]
- Nmap scan report for 10.2.0.15 [host down]
- Nmap scan report for 10.2.0.16 [host down]
- Nmap scan report for 10.2.0.17 [host down]
- Nmap scan report for 10.2.0.18 [host down]
- Nmap scan report for 10.2.0.19 [host down]
- Nmap scan report for 10.2.0.20 [host down]
- Nmap scan report for 10.2.0.21 [host down]
- Nmap scan report for 10.2.0.22 [host down]
- Nmap scan report for 10.2.0.23 [host down]
- Nmap scan report for 10.2.0.24 [host down]
- Nmap scan report for 10.2.0.25 [host down]
- Nmap scan report for 10.2.0.26 [host down]
- Nmap scan report for 10.2.0.27 [host down]
- Nmap scan report for 10.2.0.28 [host down]
- Nmap scan report for 10.2.0.29 [host down]
- Nmap scan report for 10.2.0.30 [host down]
- Nmap scan report for 10.2.0.31 [host down]
- Nmap scan report for 10.2.0.32 [host down]
- Nmap scan report for 10.2.0.33 [host down]
- Nmap scan report for 10.2.0.34 [host down]
- Nmap scan report for 10.2.0.35 [host down]
- Nmap scan report for 10.2.0.36 [host down]
- Nmap scan report for 10.2.0.37 [host down]
- Nmap scan report for 10.2.0.38 [host down]
- Nmap scan report for 10.2.0.39 [host down]
- Nmap scan report for 10.2.0.40 [host down]
- Nmap scan report for 10.2.0.41 [host down]
- Nmap scan report for 10.2.0.42 [host down]
- Nmap scan report for 10.2.0.43 [host down]
- Nmap scan report for 10.2.0.44 [host down]
- Nmap scan report for 10.2.0.45 [host down]
- Nmap scan report for 10.2.0.46 [host down]
- Nmap scan report for 10.2.0.47 [host down]
- Nmap scan report for 10.2.0.48 [host down]
- Nmap scan report for 10.2.0.49 [host down]
- Nmap scan report for 10.2.0.50 [host down]
- Nmap scan report for 10.2.0.51 [host down]
- Nmap scan report for 10.2.0.52 [host down]
- Nmap scan report for 10.2.0.53 [host down]
- Nmap scan report for 10.2.0.54 [host down]
- Nmap scan report for 10.2.0.55 [host down]
- Nmap scan report for 10.2.0.56 [host down]
- Nmap scan report for 10.2.0.57 [host down]
- Nmap scan report for 10.2.0.58 [host down]
- Nmap scan report for 10.2.0.59 [host down]
- Nmap scan report for 10.2.0.60 [host down]
- Nmap scan report for 10.2.0.61 [host down]
- Nmap scan report for 10.2.0.62 [host down]
- Nmap scan report for 10.2.0.63 [host down]
- Nmap scan report for 10.2.0.64 [host down]
- Nmap scan report for 10.2.0.65 [host down]
- Nmap scan report for 10.2.0.66 [host down]
- Nmap scan report for 10.2.0.67 [host down]
- Nmap scan report for 10.2.0.68 [host down]
- Nmap scan report for 10.2.0.69 [host down]
- Nmap scan report for 10.2.0.70 [host down]
- Nmap scan report for 10.2.0.71 [host down]
- Nmap scan report for 10.2.0.72 [host down]
- Nmap scan report for 10.2.0.73 [host down]
- Nmap scan report for 10.2.0.74 [host down]
- Nmap scan report for 10.2.0.75 [host down]
- Nmap scan report for 10.2.0.76 [host down]
- Nmap scan report for 10.2.0.77 [host down]
- Nmap scan report for 10.2.0.78 [host down]
- Nmap scan report for 10.2.0.79 [host down]
- Nmap scan report for 10.2.0.80 [host down]
- Nmap scan report for 10.2.0.81 [host down]
- Nmap scan report for 10.2.0.82 [host down]
- Nmap scan report for 10.2.0.83 [host down]
- Nmap scan report for 10.2.0.84 [host down]
- Nmap scan report for 10.2.0.85 [host down]
- Nmap scan report for 10.2.0.86 [host down]
- Nmap scan report for 10.2.0.87 [host down]
- Nmap scan report for 10.2.0.88 [host down]
- Nmap scan report for 10.2.0.89 [host down]
- Nmap scan report for 10.2.0.90 [host down]
- Nmap scan report for 10.2.0.91 [host down]
- Nmap scan report for 10.2.0.92 [host down]
- Nmap scan report for 10.2.0.93 [host down]
- Nmap scan report for 10.2.0.94 [host down]
- Nmap scan report for 10.2.0.95 [host down]
- Nmap scan report for 10.2.0.96 [host down]
- Nmap scan report for 10.2.0.97 [host down]
- Nmap scan report for 10.2.0.98 [host down]
- Nmap scan report for 10.2.0.99 [host down]
- Nmap scan report for 10.2.0.100 [host down]
- Nmap scan report for 10.2.0.101 [host down]
- Nmap scan report for 10.2.0.102 [host down]
- Nmap scan report for 10.2.0.103 [host down]
- Nmap scan report for 10.2.0.104 [host down]
- Nmap scan report for 10.2.0.105 [host down]
- Nmap scan report for 10.2.0.106 [host down]
- Nmap scan report for 10.2.0.107 [host down]
- Nmap scan report for 10.2.0.108 [host down]
- Nmap scan report for 10.2.0.109 [host down]
- Nmap scan report for 10.2.0.110 [host down]
- Nmap scan report for 10.2.0.111 [host down]
- Nmap scan report for 10.2.0.112 [host down]
- Nmap scan report for 10.2.0.113 [host down]
- Nmap scan report for 10.2.0.114 [host down]
- Nmap scan report for 10.2.0.115 [host down]
- Nmap scan report for 10.2.0.116 [host down]
- Nmap scan report for 10.2.0.117 [host down]
- Nmap scan report for 10.2.0.118 [host down]
- Nmap scan report for 10.2.0.119 [host down]
- Nmap scan report for 10.2.0.120 [host down]
- Nmap scan report for 10.2.0.121 [host down]
- Nmap scan report for 10.2.0.122 [host down]
- Nmap scan report for 10.2.0.123 [host down]
- Nmap scan report for 10.2.0.124 [host down]
- Nmap scan report for 10.2.0.125 [host down]
- Nmap scan report for 10.2.0.126 [host down]
- Nmap scan report for 10.2.0.127 [host down]
- Nmap scan report for 10.2.0.128 [host down]
- Nmap scan report for 10.2.0.129 [host down]
- Nmap scan report for 10.2.0.130 [host down]
- Nmap scan report for 10.2.0.131 [host down]
- Nmap scan report for 10.2.0.132 [host down]
- Nmap scan report for 10.2.0.133 [host down]
- Nmap scan report for 10.2.0.134 [host down]
- Nmap scan report for 10.2.0.135 [host down]
- Nmap scan report for 10.2.0.136 [host down]
- Nmap scan report for 10.2.0.137 [host down]
- Nmap scan report for 10.2.0.138 [host down]
- Nmap scan report for 10.2.0.139 [host down]
- Nmap scan report for 10.2.0.140 [host down]
- Nmap scan report for 10.2.0.141 [host down]
- Nmap scan report for 10.2.0.142 [host down]
- Nmap scan report for 10.2.0.143 [host down]
- Nmap scan report for 10.2.0.144 [host down]
- Nmap scan report for 10.2.0.145 [host down]
- Nmap scan report for 10.2.0.146 [host down]
- Nmap scan report for 10.2.0.147 [host down]
- Nmap scan report for 10.2.0.148 [host down]
- Nmap scan report for 10.2.0.149 [host down]
- Nmap scan report for 10.2.0.150 [host down]
- Nmap scan report for 10.2.0.151 [host down]
- Nmap scan report for 10.2.0.152 [host down]
- Nmap scan report for 10.2.0.153 [host down]
- Nmap scan report for 10.2.0.154 [host down]
- Nmap scan report for 10.2.0.155 [host down]
- Nmap scan report for 10.2.0.156 [host down]
- Nmap scan report for 10.2.0.157 [host down]
- Nmap scan report for 10.2.0.158 [host down]
- Nmap scan report for 10.2.0.159 [host down]
- Nmap scan report for 10.2.0.160 [host down]
- Nmap scan report for 10.2.0.161 [host down]
- Nmap scan report for 10.2.0.162 [host down]
- Nmap scan report for 10.2.0.163 [host down]
- Nmap scan report for 10.2.0.164 [host down]
- Nmap scan report for 10.2.0.165 [host down]
- Nmap scan report for 10.2.0.166 [host down]
- Nmap scan report for 10.2.0.167 [host down]
- Nmap scan report for 10.2.0.168 [host down]
- Nmap scan report for 10.2.0.169 [host down]
- Nmap scan report for 10.2.0.170 [host down]
- Nmap scan report for 10.2.0.171 [host down]
- Nmap scan report for 10.2.0.172 [host down]
- Nmap scan report for 10.2.0.173 [host down]
- Nmap scan report for 10.2.0.174 [host down]
- Nmap scan report for 10.2.0.175 [host down]
- Nmap scan report for 10.2.0.176 [host down]
- Nmap scan report for 10.2.0.177 [host down]
- Nmap scan report for 10.2.0.178 [host down]
- Nmap scan report for 10.2.0.179 [host down]
- Nmap scan report for 10.2.0.180 [host down]
- Nmap scan report for 10.2.0.181 [host down]
- Nmap scan report for 10.2.0.182 [host down]
- Nmap scan report for 10.2.0.183 [host down]
- Nmap scan report for 10.2.0.184 [host down]
- Nmap scan report for 10.2.0.185 [host down]
- Nmap scan report for 10.2.0.186 [host down]
- Nmap scan report for 10.2.0.187 [host down]
- Nmap scan report for 10.2.0.188 [host down]
- Nmap scan report for 10.2.0.189 [host down]
- Nmap scan report for 10.2.0.190 [host down]
- Nmap scan report for 10.2.0.191 [host down]
- Nmap scan report for 10.2.0.192 [host down]
- Nmap scan report for 10.2.0.193 [host down]
- Nmap scan report for 10.2.0.194 [host down]
- Nmap scan report for 10.2.0.195 [host down]
- Nmap scan report for 10.2.0.196 [host down]
- Nmap scan report for 10.2.0.197 [host down]
- Nmap scan report for 10.2.0.198 [host down]
- Nmap scan report for 10.2.0.199 [host down]
- Nmap scan report for 10.2.0.200 [host down]
- Nmap scan report for 10.2.0.201 [host down]
- Nmap scan report for 10.2.0.202 [host down]
- Nmap scan report for 10.2.0.203 [host down]
- Nmap scan report for 10.2.0.204 [host down]
- Nmap scan report for 10.2.0.205 [host down]
- Nmap scan report for 10.2.0.206 [host down]
- Nmap scan report for 10.2.0.207 [host down]
- Nmap scan report for 10.2.0.208 [host down]
- Nmap scan report for 10.2.0.209 [host down]
- Nmap scan report for 10.2.0.210 [host down]
- Nmap scan report for 10.2.0.211 [host down]
- Nmap scan report for 10.2.0.212 [host down]
- Nmap scan report for 10.2.0.213 [host down]
- Nmap scan report for 10.2.0.214 [host down]
- Nmap scan report for 10.2.0.215 [host down]
- Nmap scan report for 10.2.0.216 [host down]
- Nmap scan report for 10.2.0.217 [host down]
- Nmap scan report for 10.2.0.218 [host down]
- Nmap scan report for 10.2.0.219 [host down]
- Nmap scan report for 10.2.0.220 [host down]
- Nmap scan report for 10.2.0.221 [host down]
- Nmap scan report for 10.2.0.222 [host down]
- Nmap scan report for 10.2.0.223 [host down]
- Nmap scan report for 10.2.0.224 [host down]
- Nmap scan report for 10.2.0.225 [host down]
- Nmap scan report for 10.2.0.226 [host down]
- Nmap scan report for 10.2.0.227 [host down]
- Nmap scan report for 10.2.0.228 [host down]
- Nmap scan report for 10.2.0.229 [host down]
- Nmap scan report for 10.2.0.230 [host down]
- Nmap scan report for 10.2.0.231 [host down]
- Nmap scan report for 10.2.0.232 [host down]
- Nmap scan report for 10.2.0.233 [host down]
- Nmap scan report for 10.2.0.234 [host down]
- Nmap scan report for 10.2.0.235 [host down]
- Nmap scan report for 10.2.0.236 [host down]
- Nmap scan report for 10.2.0.237 [host down]
- Nmap scan report for 10.2.0.238 [host down]
- Nmap scan report for 10.2.0.239 [host down]
- Nmap scan report for 10.2.0.240 [host down]
- Nmap scan report for 10.2.0.241 [host down]
- Nmap scan report for 10.2.0.242 [host down]
- Nmap scan report for 10.2.0.243 [host down]
- Nmap scan report for 10.2.0.244 [host down]
- Nmap scan report for 10.2.0.245 [host down]
- Nmap scan report for 10.2.0.246 [host down]
- Nmap scan report for 10.2.0.247 [host down]
- Nmap scan report for 10.2.0.248 [host down]
- Nmap scan report for 10.2.0.249 [host down]
- Nmap scan report for 10.2.0.250 [host down]
- Nmap scan report for 10.2.0.251 [host down]
- Nmap scan report for 10.2.0.252 [host down]
- Nmap scan report for 10.2.0.253 [host down]
- Nmap scan report for 10.2.0.254 [host down]
- Nmap scan report for 10.2.0.255 [host down]
- Initiating Parallel DNS resolution of 1 host. at 08:41
- Completed Parallel DNS resolution of 1 host. at 08:41, 13.05s elapsed
- Initiating SYN Stealth Scan at 08:41
- Scanning 6 hosts [1000 ports/host]
- Discovered open port 21/tcp on 10.2.0.5
- Discovered open port 21/tcp on 10.2.0.6
- Discovered open port 21/tcp on 10.2.0.7
- Discovered open port 22/tcp on 10.2.0.6
- Discovered open port 22/tcp on 10.2.0.5
- Discovered open port 22/tcp on 10.2.0.9
- Discovered open port 139/tcp on 10.2.0.5
- Discovered open port 139/tcp on 10.2.0.7
- Discovered open port 80/tcp on 10.2.0.5
- Discovered open port 80/tcp on 10.2.0.7
- Discovered open port 80/tcp on 10.2.0.9
- Discovered open port 3306/tcp on 10.2.0.5
- Discovered open port 443/tcp on 10.2.0.9
- Discovered open port 8080/tcp on 10.2.0.5
- Discovered open port 445/tcp on 10.2.0.7
- Discovered open port 445/tcp on 10.2.0.5
- Discovered open port 135/tcp on 10.2.0.7
- Discovered open port 3389/tcp on 10.2.0.7
- Discovered open port 111/tcp on 10.2.0.5
- Discovered open port 8181/tcp on 10.2.0.5
- Discovered open port 10010/tcp on 10.2.0.5
- Discovered open port 631/tcp on 10.2.0.5
- Discovered open port 53/tcp on 10.2.0.2
- Discovered open port 6667/tcp on 10.2.0.5
- Completed SYN Stealth Scan against 10.2.0.5 in 2.00s (5 hosts left)
- Completed SYN Stealth Scan against 10.2.0.6 in 2.02s (4 hosts left)
- Completed SYN Stealth Scan against 10.2.0.7 in 2.11s (3 hosts left)
- Completed SYN Stealth Scan against 10.2.0.1 in 6.53s (2 hosts left)
- Completed SYN Stealth Scan against 10.2.0.9 in 6.72s (1 host left)
- Completed SYN Stealth Scan at 08:41, 6.75s elapsed (6000 total ports)
- Initiating Service scan at 08:41
- Scanning 24 services on 6 hosts
- Completed Service scan at 08:42, 86.24s elapsed (24 services on 6 hosts)
- Initiating OS detection (try #1) against 6 hosts
- Retrying OS detection (try #2) against 5 hosts
- Retrying OS detection (try #3) against 2 hosts
- Retrying OS detection (try #4) against 2 hosts
- Retrying OS detection (try #5) against 2 hosts
- NSE: Script scanning 6 hosts.
- Initiating NSE at 08:43
- NSE: [ftp-bounce] Couldn't resolve scanme.nmap.org, scanning 10.0.0.1 instead.
- NSE: [ftp-bounce] PORT response: 501 Server cannot accept argument.
- NSE: [ftp-bounce] PORT response: 500 Illegal PORT command.
- Completed NSE at 08:43, 38.51s elapsed
- Initiating NSE at 08:43
- Completed NSE at 08:43, 1.07s elapsed
- Nmap scan report for 10.2.0.1
- Host is up (0.00s latency).
- All 1000 scanned ports on 10.2.0.1 are filtered
- MAC Address: 02:E7:3E:A5:18:70 (Unknown)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 1 hop
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.00 ms 10.2.0.1
- Nmap scan report for 10.2.0.2
- Host is up (0.00s latency).
- Not shown: 999 filtered ports
- PORT STATE SERVICE VERSION
- 53/tcp open domain (unknown banner: EC2 DNS)
- | dns-nsid:
- | id.server: prod-pdx1-cell00-i-01d5626c8c626dd65
- |_ bind.version: EC2 DNS
- | fingerprint-strings:
- | DNSVersionBindReqTCP:
- | version
- |_ bind
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port53-TCP:V=7.70%I=7%D=4/26%Time=5CC326B5%P=i686-pc-windows-windows%r(
- SF:DNSVersionBindReqTCP,34,"\x002\0\x06\x81\x80\0\x01\0\x01\0\0\0\0\x07ver
- SF:sion\x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x08\x07EC2\x20
- SF:DNS");
- MAC Address: 02:E7:3E:A5:18:70 (Unknown)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: PBX
- Running (JUST GUESSING): Vodavi embedded (86%)
- OS CPE: cpe:/h:vodavi:xts-ip
- Aggressive OS guesses: Vodavi XTS-IP PBX (86%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 91.643 days (since Thu Jan 24 16:17:29 2019)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=255 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.00 ms 10.2.0.2
- Nmap scan report for 10.2.0.5
- Host is up (0.00014s latency).
- Not shown: 988 closed ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD 1.3.5
- 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.11 (Ubuntu Linux; protocol 2.0)
- | ssh-hostkey:
- | 1024 b9:07:bc:1e:21:f8:aa:09:7a:f3:66:c9:4c:1e:93:82 (DSA)
- | 2048 41:1c:56:97:4e:77:d2:3a:c5:fc:e1:e8:bb:52:c7:58 (RSA)
- | 256 6f:3a:67:21:7c:1c:cc:71:f3:f2:33:58:ba:ea:17:0f (ECDSA)
- |_ 256 31:0c:79:ba:be:a8:ef:8f:0a:f6:bb:45:70:97:b3:9b (ED25519)
- 80/tcp open http Apache httpd 2.4.7
- | http-ls: Volume /
- | SIZE TIME FILENAME
- | - 2018-07-29 13:18 chat/
- | - 2011-07-27 20:17 drupal/
- | 1.7K 2018-07-29 13:18 payroll_app.php
- | - 2013-04-08 12:06 phpmyadmin/
- |_
- | http-methods:
- |_ Supported Methods: POST OPTIONS GET HEAD
- |_http-server-header: Apache/2.4.7 (Ubuntu)
- |_http-title: Index of /
- 111/tcp open rpcbind 2-4 (RPC #100000)
- | rpcinfo:
- | program version port/proto service
- | 100000 2,3,4 111/tcp rpcbind
- | 100000 2,3,4 111/udp rpcbind
- | 100024 1 41410/udp status
- |_ 100024 1 45659/tcp status
- 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
- 445/tcp open netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP)
- 631/tcp open ipp CUPS 1.7
- | http-methods:
- | Supported Methods: GET HEAD OPTIONS POST PUT
- |_ Potentially risky methods: PUT
- | http-robots.txt: 1 disallowed entry
- |_/
- |_http-server-header: CUPS/1.7 IPP/2.1
- |_http-title: Home - CUPS 1.7.2
- 3306/tcp open mysql MySQL (unauthorized)
- 6667/tcp open irc UnrealIRCd
- | irc-info:
- | users: 1
- | servers: 1
- | lusers: 1
- | lservers: 0
- |_ server: irc.TestIRC.net
- 8080/tcp open http Jetty 8.1.7.v20120910
- |_http-favicon: Unknown favicon MD5: ED7D5C39C69262F4BA95418D4F909B10
- |_http-server-header: Jetty(8.1.7.v20120910)
- |_http-title: Error 404 - Not Found
- 8181/tcp open http WEBrick httpd 1.3.1 (Ruby 2.3.7 (2018-03-28))
- | http-methods:
- |_ Supported Methods: GET HEAD
- |_http-server-header: WEBrick/1.3.1 (Ruby/2.3.7/2018-03-28)
- |_http-title: Site doesn't have a title (text/html;charset=utf-8).
- 10010/tcp open rxapi?
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.0 404 Not Found
- | Date: Fri, 26 Apr 2019 15:42:04 GMT
- | Content-Length: 19
- | Content-Type: text/plain; charset=utf-8
- | 404: Page Not Found
- | GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SIPOptions, SSLSessionReq, TLSSessionReq:
- | HTTP/1.1 400 Bad Request
- | Content-Type: text/plain; charset=utf-8
- | Connection: close
- | Request
- | GetRequest, HTTPOptions:
- | HTTP/1.0 404 Not Found
- | Date: Fri, 26 Apr 2019 15:41:39 GMT
- | Content-Length: 19
- | Content-Type: text/plain; charset=utf-8
- |_ 404: Page Not Found
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port10010-TCP:V=7.70%I=7%D=4/26%Time=5CC326B3%P=i686-pc-windows-windows
- SF:%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:
- SF:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20
- SF:Bad\x20Request")%r(GetRequest,8F,"HTTP/1\.0\x20404\x20Not\x20Found\r\nD
- SF:ate:\x20Fri,\x2026\x20Apr\x202019\x2015:41:39\x20GMT\r\nContent-Length:
- SF:\x2019\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\n\r\n404:\x20
- SF:Page\x20Not\x20Found")%r(HTTPOptions,8F,"HTTP/1\.0\x20404\x20Not\x20Fou
- SF:nd\r\nDate:\x20Fri,\x2026\x20Apr\x202019\x2015:41:39\x20GMT\r\nContent-
- SF:Length:\x2019\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\n\r\n4
- SF:04:\x20Page\x20Not\x20Found")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad
- SF:\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnect
- SF:ion:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.1\x2040
- SF:0\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\
- SF:nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SSLSessionReq,67
- SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x2
- SF:0charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r
- SF:(TLSSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\
- SF:x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20B
- SF:ad\x20Request")%r(Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCo
- SF:ntent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n
- SF:\r\n400\x20Bad\x20Request")%r(FourOhFourRequest,8F,"HTTP/1\.0\x20404\x2
- SF:0Not\x20Found\r\nDate:\x20Fri,\x2026\x20Apr\x202019\x2015:42:04\x20GMT\
- SF:r\nContent-Length:\x2019\r\nContent-Type:\x20text/plain;\x20charset=utf
- SF:-8\r\n\r\n404:\x20Page\x20Not\x20Found")%r(LPDString,67,"HTTP/1\.1\x204
- SF:00\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r
- SF:\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(LDAPSearchReq,6
- SF:7,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x
- SF:20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%
- SF:r(SIPOptions,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x2
- SF:0text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad
- SF:\x20Request");
- MAC Address: 02:1B:6B:4E:2A:46 (Unknown)
- No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
- TCP/IP fingerprint:
- OS:SCAN(V=7.70%E=4%D=4/26%OT=21%CT=1%CU=39155%PV=Y%DS=1%DC=D%G=Y%M=021B6B%T
- OS:M=5CC32739%P=i686-pc-windows-windows)SEQ(SP=FD%GCD=1%ISR=10A%TI=Z%CI=I%I
- OS:I=I%TS=8)OPS(O1=M2301ST11NW6%O2=M2301ST11NW6%O3=M2301NNT11NW6%O4=M2301ST
- OS:11NW6%O5=M2301ST11NW6%O6=M2301ST11)WIN(W1=68DF%W2=68DF%W3=68DF%W4=68DF%W
- OS:5=68DF%W6=68DF)ECN(R=Y%DF=Y%T=40%W=6903%O=M2301NNSNW6%CC=Y%Q=)T1(R=Y%DF=
- OS:Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%
- OS:F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y
- OS:%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%R
- OS:D=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)I
- OS:E(R=Y%DFI=N%T=40%CD=S)
- Uptime guess: 0.004 days (since Fri Apr 26 08:38:34 2019)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=253 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Hosts: 127.0.0.1, PUMPPLC, irc.TestIRC.net; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
- Host script results:
- | nbstat: NetBIOS name: PUMPPLC, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
- | Names:
- | PUMPPLC<00> Flags: <unique><active>
- | PUMPPLC<03> Flags: <unique><active>
- | PUMPPLC<20> Flags: <unique><active>
- | \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
- | WORKGROUP<00> Flags: <group><active>
- | WORKGROUP<1d> Flags: <unique><active>
- |_ WORKGROUP<1e> Flags: <group><active>
- | smb-os-discovery:
- | OS: Windows 6.1 (Samba 4.3.11-Ubuntu)
- | Computer name: pumpplc
- | NetBIOS computer name: PUMPPLC\x00
- | Domain name: \x00
- | FQDN: pumpplc
- |_ System time: 2019-04-26T15:43:15+00:00
- | smb-security-mode:
- | account_used: guest
- | authentication_level: user
- | challenge_response: supported
- |_ message_signing: disabled (dangerous, but default)
- | smb2-security-mode:
- | 2.02:
- |_ Message signing enabled but not required
- | smb2-time:
- | date: 2019-04-26 08:43:15
- |_ start_date: N/A
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.14 ms 10.2.0.5
- Nmap scan report for 10.2.0.6
- Host is up (0.00013s latency).
- Not shown: 998 closed ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp vsftpd 3.0.3
- |_ftp-anon: Anonymous FTP login allowed (FTP code 230)
- | ftp-syst:
- | STAT:
- | FTP server status:
- | Connected to ::ffff:10.2.0.8
- | Logged in as ftp
- | TYPE: ASCII
- | No session bandwidth limit
- | Session timeout in seconds is 300
- | Control connection is plain text
- | Data connections will be plain text
- | At session startup, client count was 2
- | vsFTPd 3.0.3 - secure, fast, stable
- |_End of status
- 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4 (Ubuntu Linux; protocol 2.0)
- | ssh-hostkey:
- | 2048 9d:d4:27:04:e1:02:c6:7f:79:6e:6f:33:ce:3b:55:3c (RSA)
- | 256 2f:c7:80:78:b6:3e:40:03:3a:89:78:c7:e3:9d:67:9f (ECDSA)
- |_ 256 31:31:c7:4a:63:03:b1:db:88:e3:20:30:99:c6:72:66 (ED25519)
- MAC Address: 02:26:FB:EB:44:0A (Unknown)
- No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
- TCP/IP fingerprint:
- OS:SCAN(V=7.70%E=4%D=4/26%OT=21%CT=1%CU=41773%PV=Y%DS=1%DC=D%G=Y%M=0226FB%T
- OS:M=5CC32739%P=i686-pc-windows-windows)SEQ(SP=106%GCD=1%ISR=106%TI=Z%CI=I%
- OS:II=I%TS=8)OPS(O1=M2301ST11NW7%O2=M2301ST11NW7%O3=M2301NNT11NW7%O4=M2301S
- OS:T11NW7%O5=M2301ST11NW7%O6=M2301ST11)WIN(W1=68DF%W2=68DF%W3=68DF%W4=68DF%
- OS:W5=68DF%W6=68DF)ECN(R=Y%DF=Y%T=40%W=6903%O=M2301NNSNW7%CC=Y%Q=)T1(R=Y%DF
- OS:=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z
- OS:%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=
- OS:Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%
- OS:RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
- OS:IE(R=Y%DFI=N%T=40%CD=S)
- Uptime guess: 0.004 days (since Fri Apr 26 08:37:54 2019)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.13 ms 10.2.0.6
- Nmap scan report for 10.2.0.7
- Host is up (0.0073s latency).
- Not shown: 994 closed ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Microsoft ftpd
- | ftp-anon: Anonymous FTP login allowed (FTP code 230)
- | 04-26-19 08:34AM 1024 .rnd
- | 05-19-18 06:09AM <DIR> inetpub
- | 06-15-17 11:31PM <DIR> ISSA_TOOLS
- | 09-12-16 04:34AM <DIR> Logs
- | 07-16-16 06:23AM <DIR> PerfLogs
- | 05-19-18 06:09AM <DIR> Program Files
- | 05-19-18 06:09AM <DIR> Program Files (x86)
- | 01-17-17 12:19AM <DIR> Users
- | 10-17-18 03:23AM <DIR> Windows
- |_06-15-17 09:14PM 645 wod.log
- | ftp-syst:
- |_ SYST: Windows_NT
- 80/tcp open http Microsoft IIS httpd 10.0
- | http-methods:
- | Supported Methods: OPTIONS TRACE GET HEAD POST
- |_ Potentially risky methods: TRACE
- |_http-server-header: Microsoft-IIS/10.0
- |_http-title: City Water Treatment System
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
- 445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
- 3389/tcp open ms-wbt-server Microsoft Terminal Services
- | ssl-cert: Subject: commonName=WEB01
- | Issuer: commonName=WEB01
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-04-25T15:34:09
- | Not valid after: 2019-10-25T15:34:09
- | MD5: 8f9f e3f6 de07 fddc 9586 6a41 ad67 02f1
- |_SHA-1: 152e 4364 c3a1 b72d cfbb 505b 14c4 4ba8 6cf5 7042
- |_ssl-date: 2019-04-26T15:43:15+00:00; -1s from scanner time.
- MAC Address: 02:EB:30:E3:1F:2A (Unknown)
- Device type: general purpose
- Running: Microsoft Windows 2016
- OS CPE: cpe:/o:microsoft:windows_server_2016
- OS details: Microsoft Windows Server 2016 build 10586 - 14393
- Uptime guess: 0.007 days (since Fri Apr 26 08:33:22 2019)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=253 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
- Host script results:
- |_clock-skew: mean: -1s, deviation: 0s, median: -1s
- | nbstat: NetBIOS name: WEB01, NetBIOS user: <unknown>, NetBIOS MAC: 02:eb:30:e3:1f:2a (unknown)
- | Names:
- | WORKGROUP<00> Flags: <group><active>
- | WEB01<00> Flags: <unique><active>
- |_ WEB01<20> Flags: <unique><active>
- | smb-security-mode:
- | authentication_level: user
- | challenge_response: supported
- |_ message_signing: disabled (dangerous, but default)
- | smb2-security-mode:
- | 2.02:
- |_ Message signing enabled but not required
- | smb2-time:
- | date: 2019-04-26 08:43:16
- |_ start_date: 2019-04-26 08:34:06
- TRACEROUTE
- HOP RTT ADDRESS
- 1 7.26 ms 10.2.0.7
- Nmap scan report for 10.2.0.9
- Host is up (0.00022s latency).
- Not shown: 997 filtered ports
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
- | ssh-hostkey:
- | 2048 20:18:a2:ac:89:6f:e8:10:14:f7:c4:6d:d1:0d:93:db (RSA)
- | 256 01:41:52:c1:17:65:aa:77:1b:0f:f1:29:ae:f5:95:3e (ECDSA)
- |_ 256 a9:99:e0:c3:be:b5:8e:e1:2a:ad:e6:d4:fa:b9:8d:b0 (ED25519)
- 80/tcp open http nginx
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: nginx
- |_http-title: Did not follow redirect to https://10.2.0.9/
- 443/tcp open ssl/http nginx
- | http-methods:
- | Supported Methods: GET HEAD POST PUT DELETE OPTIONS
- |_ Potentially risky methods: PUT DELETE
- |_http-server-header: nginx
- |_http-title: Site doesn't have a title (text/html; charset=utf-8).
- | ssl-cert: Subject: commonName=guaws.local
- | Issuer: commonName=guaws.local
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-09-27T16:49:27
- | Not valid after: 2028-09-24T16:49:27
- | MD5: 35f1 9b98 ed9d 2122 85ac 1ce9 cd6f 246f
- |_SHA-1: fceb 8e25 839c 8ff9 10d8 8a19 3a54 9c75 02f1 0186
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- |_ http/1.1
- | tls-nextprotoneg:
- |_ http/1.1
- MAC Address: 02:C6:88:FC:45:B4 (Unknown)
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|PBX
- Running (JUST GUESSING): Linux 3.X (95%), Vodavi embedded (87%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/h:vodavi:xts-ip
- Aggressive OS guesses: Linux 3.10 - 3.13 (95%), Linux 3.8 (88%), Vodavi XTS-IP PBX (87%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 9.857 days (since Tue Apr 16 12:09:32 2019)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE
- HOP RTT ADDRESS
- 1 0.22 ms 10.2.0.9
- Initiating SYN Stealth Scan at 08:43
- Scanning 10.2.0.8 [1000 ports]
- Discovered open port 139/tcp on 10.2.0.8
- Discovered open port 445/tcp on 10.2.0.8
- Discovered open port 135/tcp on 10.2.0.8
- Discovered open port 3389/tcp on 10.2.0.8
- Completed SYN Stealth Scan at 08:43, 1.31s elapsed (1000 total ports)
- Initiating Service scan at 08:43
- Scanning 4 services on 10.2.0.8
- Completed Service scan at 08:44, 11.03s elapsed (4 services on 1 host)
- Initiating OS detection (try #1) against 10.2.0.8
- Retrying OS detection (try #2) against 10.2.0.8
- Retrying OS detection (try #3) against 10.2.0.8
- Retrying OS detection (try #4) against 10.2.0.8
- Retrying OS detection (try #5) against 10.2.0.8
- NSE: Script scanning 10.2.0.8.
- Initiating NSE at 08:44
- Completed NSE at 08:44, 30.12s elapsed
- Initiating NSE at 08:44
- Completed NSE at 08:44, 0.00s elapsed
- Nmap scan report for 10.2.0.8
- Host is up (0.00s latency).
- Not shown: 996 closed ports
- PORT STATE SERVICE VERSION
- 135/tcp open msrpc Microsoft Windows RPC
- 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
- 445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
- 3389/tcp open ms-wbt-server Microsoft Terminal Services
- | ssl-cert: Subject: commonName=TARGETWINDOWS01
- | Issuer: commonName=TARGETWINDOWS01
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-04-25T15:34:01
- | Not valid after: 2019-10-25T15:34:01
- | MD5: 6ad1 20ca 3c9f a7dd 023f fd4a d85b 23f4
- |_SHA-1: e45d 7fbf f510 ee05 7f06 b057 c2ea 91d5 61c1 7422
- |_ssl-date: 2019-04-26T15:44:17+00:00; 0s from scanner time.
- No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
- TCP/IP fingerprint:
- OS:SCAN(V=7.70%E=4%D=4/26%OT=135%CT=1%CU=32420%PV=Y%DS=0%DC=L%G=Y%TM=5CC327
- OS:6F%P=i686-pc-windows-windows)SEQ(SP=FF%GCD=1%ISR=108%TI=I%CI=I%II=I%SS=S
- OS:%TS=A)SEQ(SP=100%GCD=1%ISR=108%TI=I%CI=I%II=I%TS=A)OPS(O1=M5B4NW8ST11%O2
- OS:=M5B4NW8ST11%O3=M5B4NW8NNT11%O4=M5B4NW8ST11%O5=M5B4NW8ST11%O6=M5B4ST11)W
- OS:IN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=2000)ECN(R=Y%DF=Y%T=80%W=2
- OS:000%O=M5B4NW8NNS%CC=Y%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+%F=AS%RD=0%Q=)T2(R=Y%D
- OS:F=Y%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T=80%W=0%S=Z%A=O%F=AR%O
- OS:=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=80%W
- OS:=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)
- OS:T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=80%IPL=164%U
- OS:N=0%RIPL=G%RID=G%RIPCK=Z%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=80%CD=Z)
- Uptime guess: 0.008 days (since Fri Apr 26 08:33:21 2019)
- Network Distance: 0 hops
- TCP Sequence Prediction: Difficulty=256 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
- Host script results:
- | smb-security-mode:
- | authentication_level: user
- | challenge_response: supported
- |_ message_signing: disabled (dangerous, but default)
- | smb2-security-mode:
- | 2.02:
- |_ Message signing enabled but not required
- | smb2-time:
- | date: 2019-04-26 08:44:20
- |_ start_date: 2019-04-26 08:33:58
- NSE: Script Post-scanning.
- Initiating NSE at 08:44
- Completed NSE at 08:44, 0.00s elapsed
- Initiating NSE at 08:44
- Completed NSE at 08:44, 0.00s elapsed
- Post-scan script results:
- | clock-skew:
- | 0s:
- | 10.2.0.5
- |_ 10.2.0.8
- Read data files from: C:\Program Files (x86)\Nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 256 IP addresses (7 hosts up) scanned in 241.38 seconds
- Raw packets sent: 11013 (502.748KB) | Rcvd: 7784 (347.619KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement