Advertisement
Guest User

humanleather.co.uk

a guest
Feb 20th, 2015
788
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.33 KB | None | 0 0
  1.  
  2. Starting Nmap 6.47 ( http://nmap.org ) at 2015-02-19 00:45 UTC
  3. NSE: Loaded 118 scripts for scanning.
  4. NSE: Script Pre-scanning.
  5. Initiating Ping Scan at 00:45
  6. Scanning humanleather.co.uk (97.74.3.73) [4 ports]
  7. Completed Ping Scan at 00:45, 0.04s elapsed (1 total hosts)
  8. Initiating Parallel DNS resolution of 1 host. at 00:45
  9. Completed Parallel DNS resolution of 1 host. at 00:45, 0.43s elapsed
  10. Initiating SYN Stealth Scan at 00:45
  11. Scanning humanleather.co.uk (97.74.3.73) [1000 ports]
  12. Discovered open port 513/tcp on 97.74.3.73
  13. Discovered open port 80/tcp on 97.74.3.73
  14. Discovered open port 21/tcp on 97.74.3.73
  15. Discovered open port 443/tcp on 97.74.3.73
  16. Increasing send delay for 97.74.3.73 from 0 to 5 due to 11 out of 26 dropped probes since last increase.
  17. Discovered open port 514/tcp on 97.74.3.73
  18. Completed SYN Stealth Scan at 00:45, 25.43s elapsed (1000 total ports)
  19. Initiating Service scan at 00:45
  20. Scanning 5 services on humanleather.co.uk (97.74.3.73)
  21. Service scan Timing: About 80.00% done; ETC: 00:48 (0:00:33 remaining)
  22. Completed Service scan at 00:47, 131.19s elapsed (5 services on 1 host)
  23. Initiating OS detection (try #1) against humanleather.co.uk (97.74.3.73)
  24. Retrying OS detection (try #2) against humanleather.co.uk (97.74.3.73)
  25. Initiating Traceroute at 00:48
  26. Completed Traceroute at 00:48, 0.01s elapsed
  27. NSE: Script scanning 97.74.3.73.
  28. Initiating NSE at 00:48
  29. Completed NSE at 00:48, 31.25s elapsed
  30. Nmap scan report for humanleather.co.uk (97.74.3.73)
  31. Host is up (0.00029s latency).
  32. rDNS record for 97.74.3.73: ip-97-74-3-73.ip.secureserver.net
  33. Not shown: 984 filtered ports
  34. PORT STATE SERVICE VERSION
  35. 21/tcp open ftp?
  36. | ssl-cert: Subject: commonName=p3slhssl30.shr.phx3.secureserver.net/organizationName=GoDaddy Software Inc./stateOrProvinceName=Arizona/countryName=US
  37. | Issuer: commonName=p3slhssl30.shr.phx3.secureserver.net/organizationName=GoDaddy Software Inc./stateOrProvinceName=Arizona/countryName=US
  38. | Public Key type: rsa
  39. | Public Key bits: 2048
  40. | Not valid before: 2014-05-22T21:15:04+00:00
  41. | Not valid after: 2028-01-29T21:15:04+00:00
  42. | MD5: a279 5a09 c441 2a09 6405 e59a 6981 63e6
  43. |_SHA-1: 5788 8bf2 c720 a12b 73e4 4f0b 2af9 d0c5 97d7 9ee8
  44. |_ssl-date: 2015-02-20T19:50:06+00:00; +1d19h02m04s from local time.
  45. 80/tcp open http?
  46. |_http-favicon: Unknown favicon MD5: 57F95F51E52501A6ABBE5D1DEAE19B88
  47. |_http-methods: OPTIONS GET HEAD POST
  48. |_http-title: Human Leather Exclusive Products - Exquisite Wallets, Belts, S...
  49. 143/tcp closed imap
  50. 211/tcp closed 914c-g
  51. 443/tcp open https?
  52. |_http-favicon: Unknown favicon MD5: 57F95F51E52501A6ABBE5D1DEAE19B88
  53. |_http-methods: OPTIONS GET HEAD POST
  54. |_http-title: Human Leather Exclusive Products - Exquisite Wallets, Belts, S...
  55. | ssl-cert: Subject: commonName=www.mightygadgets.co.uk/organizationName=www.mightygadgets.co.uk
  56. | Issuer: commonName=Go Daddy Secure Certification Authority/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
  57. | Public Key type: rsa
  58. | Public Key bits: 1024
  59. | Not valid before: 2008-08-25T08:20:33+00:00
  60. | Not valid after: 2010-08-25T08:20:33+00:00
  61. | MD5: 334c 565e b193 fdf7 ebcb bb29 0835 d89f
  62. |_SHA-1: 6168 c37f 2c14 e152 f5e5 67e8 852a dbf1 073d a420
  63. 445/tcp closed microsoft-ds
  64. 513/tcp open login?
  65. 514/tcp open shell?
  66. 666/tcp closed doom
  67. 880/tcp closed unknown
  68. 912/tcp closed apex-mesh
  69. 987/tcp closed unknown
  70. 1001/tcp closed unknown
  71. 50300/tcp closed unknown
  72. 50389/tcp closed unknown
  73. 50500/tcp closed unknown
  74. Device type: general purpose|media device
  75. Running (JUST GUESSING): QEMU (96%), Sling embedded (87%)
  76. OS CPE: cpe:/o:qemu:qemu cpe:/h:slingmedia:slingbox_av
  77. Aggressive OS guesses: QEMU user mode network gateway (96%), Slingmedia Slingbox AV TV over IP gateway (87%)
  78. No exact OS matches for host (test conditions non-ideal).
  79. Network Distance: 1 hop
  80. TCP Sequence Prediction: Difficulty=17 (Good luck!)
  81. IP ID Sequence Generation: Incremental
  82.  
  83. TRACEROUTE (using port 80/tcp)
  84. HOP RTT ADDRESS
  85. 1 0.20 ms ip-97-74-3-73.ip.secureserver.net (97.74.3.73)
  86.  
  87. NSE: Script Post-scanning.
  88. Read data files from: /usr/bin/../share/nmap
  89. OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  90. Nmap done: 1 IP address (1 host up) scanned in 194.19 seconds
  91. Raw packets sent: 2019 (93.528KB) | Rcvd: 1084 (75.024KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement