Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- _____ _____ _ _ _ _
- | __ \ / ____| | | | | | | |
- | | | |_ __ __ _ __ _ ___ _ __ | (___ __ _ _ _ __ _ __| | |__| | __ _ ___| | _____ _ __
- | | | | '__/ _` |/ _` |/ _ \| '_ \ \___ \ / _` | | | |/ _` |/ _` | __ |/ _` |/ __| |/ / _ \ '__|
- | |__| | | | (_| | (_| | (_) | | | |____) | (_| | |_| | (_| | (_| | | | | (_| | (__| < __/ |
- |_____/|_| \__,_|\__, |\___/|_| |_|_____/ \__, |\__,_|\__,_|\__,_|_| |_|\__,_|\___|_|\_\___|_|
- __/ | | |
- |___/ |_|
- Database coming soon
- @ItsCyberMask | @Anc_Phantom | @opkillbeast
- ===========================================================================================================================================================
- 181.215.237.159
- 10.65.10.5
- http://www.rappidd.co
- DNS: rivalserver.com
- ----------------------------------------------------------------------
- Name server ns1.uswhss.org (205.251.197.192) answers queries over UDP.
- Name server ns1.uswhss.org (205.251.197.192) answers queries over TCP.
- Name server ns1.uswhss.org (205.251.197.192) is not recursive.
- Name server ns1.uswhss.org (205.251.197.192) authoritative for www.rappidd.co.
- Name server ns1.uswhss.org (205.251.197.192) closed for zone transfer of www.rappidd.co.
- Name server ns2.uswhss.com (205.251.193.207) answers queries over UDP.
- Name server ns2.uswhss.com (205.251.193.207) answers queries over TCP.
- Name server ns2.uswhss.com (205.251.193.207) is not recursive.
- Name server ns2.uswhss.com (205.251.193.207) authoritative for www.rappidd.co.
- Name server ns2.uswhss.com (205.251.193.207) closed for zone transfer of www.rappidd.co.
- Name server ns3.uswhss.co.uk (205.251.199.226) answers queries over UDP.
- Name server ns3.uswhss.co.uk (205.251.199.226) answers queries over TCP.
- Name server ns3.uswhss.co.uk (205.251.199.226) is not recursive.
- Name server ns3.uswhss.co.uk (205.251.199.226) authoritative for www.rappidd.co.
- Name server ns3.uswhss.co.uk (205.251.199.226) closed for zone transfer of www.rappidd.co.
- Name server ns4.uswhss.net (205.251.194.156) answers queries over UDP.
- Name server ns4.uswhss.net (205.251.194.156) answers queries over TCP.
- Name server ns4.uswhss.net (205.251.194.156) is not recursive.
- Name server ns4.uswhss.net (205.251.194.156) authoritative for www.rappidd.co.
- Name server ns4.uswhss.net (205.251.194.156) closed for zone transfer of www.rappidd.co.
- ----------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 26/tcp open rsftp
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- 3306/tcp open mysql
- ---------------------------------------------
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- | ssl-cert: Subject: commonName=*.rivalserver.com
- | Subject Alternative Name: DNS:*.rivalserver.com, DNS:rivalserver.com
- | Issuer: commonName=AlphaSSL CA - SHA256 - G2/organizationName=GlobalSign nv-sa/countryName=BE
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2016-04-05T14:59:33
- | Not valid after: 2019-05-31T14:49:09
- | MD5: 9eee 7387 f8ca 9374 0969 136e 7d21 89d7
- |_SHA-1: a3fd f22e 24fd 000f dd8d 159a 601a afe8 05d6 d87b
- |_ssl-date: 2017-03-16T16:07:14+00:00; +1s from scanner time.
- 22/tcp open ssh OpenSSH 6.6.1 (protocol 2.0)
- | ssh2-enum-algos:
- | kex_algorithms: (8)
- | curve25519-sha256@libssh.org
- | ecdh-sha2-nistp256
- | ecdh-sha2-nistp384
- | ecdh-sha2-nistp521
- | diffie-hellman-group-exchange-sha256
- | diffie-hellman-group-exchange-sha1
- | diffie-hellman-group14-sha1
- | diffie-hellman-group1-sha1
- | server_host_key_algorithms: (3)
- | ssh-rsa
- | ecdsa-sha2-nistp256
- | ssh-ed25519
- | encryption_algorithms: (16)
- | aes128-ctr
- | aes192-ctr
- | aes256-ctr
- | arcfour256
- | arcfour128
- | aes128-gcm@openssh.com
- | aes256-gcm@openssh.com
- | chacha20-poly1305@openssh.com
- | aes128-cbc
- | 3des-cbc
- | blowfish-cbc
- | cast128-cbc
- | aes192-cbc
- | aes256-cbc
- | arcfour
- | rijndael-cbc@lysator.liu.se
- | mac_algorithms: (19)
- | hmac-md5-etm@openssh.com
- | hmac-sha1-etm@openssh.com
- | umac-64-etm@openssh.com
- | umac-128-etm@openssh.com
- | hmac-sha2-256-etm@openssh.com
- | hmac-sha2-512-etm@openssh.com
- | hmac-ripemd160-etm@openssh.com
- | hmac-sha1-96-etm@openssh.com
- | hmac-md5-96-etm@openssh.com
- | hmac-md5
- | hmac-sha1
- | umac-64@openssh.com
- | umac-128@openssh.com
- | hmac-sha2-256
- | hmac-sha2-512
- | hmac-ripemd160
- | hmac-ripemd160@openssh.com
- | hmac-sha1-96
- | hmac-md5-96
- | compression_algorithms: (2)
- | none
- |_ zlib@openssh.com
- 26/tcp open smtp Exim smtpd 4.88
- | banner: 220-eve.rivalserver.com ESMTP Exim 4.88 #1 Thu, 16 Mar 2017 09:
- |_06:51 -0700 \x0D\x0A220-We do not authorize the use of this system t...
- | smtp-commands: eve.rivalserver.com Hello nmap.scanme.org [169.244.131.207], SIZE 52428800, 8BITMIME, PIPELINING, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=*.rivalserver.com
- | Subject Alternative Name: DNS:*.rivalserver.com, DNS:rivalserver.com
- | Issuer: commonName=AlphaSSL CA - SHA256 - G2/organizationName=GlobalSign nv-sa/countryName=BE
- | Public Key type: rsa
- | Public Key bits: 204
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2016-04-05T14:59:33
- | Not valid after: 2019-05-31T14:49:09
- | MD5: 9eee 7387 f8ca 9374 0969 136e 7d21 89d7
- |_SHA-1: a3fd f22e 24fd 000f dd8d 159a 601a afe8 05d6 d87b
- 53/tcp open domain ISC BIND 9.9.4
- 110/tcp open pop3 Dovecot pop3d
- | banner: -ERR concurrent connection limit in Avast exceeded(pass:0, proc
- |_esses:nmap.exe[50])
- 143/tcp open imap Dovecot imapd
- | banner: * BYE concurrent connection limit in Avast exceeded(pass:0, pro
- |_cesses:nmap.exe[50])
- |_imap-capabilities: CAPABILITY
- 465/tcp open tcpwrapped
- |_smtp-commands: Couldn't establish connection on port 465
- 587/tcp open submission?
- | banner: 421 concurrent connection limit in Avast exceeded(pass:0, proce
- |_sses:nmap.exe[48])
- | fingerprint-strings:
- | DNSStatusRequest, DNSVersionBindReq, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Hello, Help, LPDString, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, X11Probe:
- | 421 concurrent connection limit in Avast exceeded(pass:0, processes:nmap.exe[50])
- | NULL:
- |_ 421 concurrent connection limit in Avast exceeded(pass:0, processes:nmap.exe[48])
- |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
- 993/tcp open tcpwrapped
- 995/tcp open tcpwrapped
- 3306/tcp open mysql MySQL 5.6.35
- | banner: J\x00\x00\x00\x0A5.6.35\x00\xC5\xA3\xC4\x03zAo0=#8-\x00\xFF\xF7
- |_\x08\x02\x00\x7F\x80\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y>gl...
- | mysql-info:
- | Protocol: 10
- | Version: 5.6.35
- | Thread ID: 63218633
- | Capabilities flags: 63487
- | Some Capabilities: Speaks41ProtocolOld, SupportsCompression, DontAllowDatabaseTableColumn, FoundRows, Support41Auth, ConnectWithDatabase, SupportsLoadDataLocal, IgnoreSpaceBeforeParenthesis, IgnoreSigpipes, LongColumnFlag, InteractiveClient, ODBCClient, SupportsTransactions, Speaks41ProtocolNew, LongPassword, SupportsMultipleResults, SupportsMultipleStatments, SupportsAuthPlugins
- | Status: Autocommit
- | Salt: <i}Z+c6}:D'7|0stmEPD
- |_ Auth Plugin Name: 79
- 53/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-38.el7_3.2
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port587-TCP:V=7.40%I=7%D=3/16%Time=58CAAB02%P=i686-pc-windows-windows%r
- SF:(NULL,53,"421\x20concurrent\x20connection\x20limit\x20in\x20Avast\x20ex
- SF:ceeded\(pass:0,\x20processes:nmap\.exe\[48\]\)\r\n")%r(GenericLines,53,
- SF:"421\x20concurrent\x20connection\x20limit\x20in\x20Avast\x20exceeded\(p
- SF:ass:0,\x20processes:nmap\.exe\[50\]\)\r\n")%r(Hello,53,"421\x20concurre
- SF:nt\x20connection\x20limit\x20in\x20Avast\x20exceeded\(pass:0,\x20proces
- SF:ses:nmap\.exe\[50\]\)\r\n")%r(Help,53,"421\x20concurrent\x20connection\
- SF:x20limit\x20in\x20Avast\x20exceeded\(pass:0,\x20processes:nmap\.exe\[50
- SF:\]\)\r\n")%r(GetRequest,53,"421\x20concurrent\x20connection\x20limit\x2
- SF:0in\x20Avast\x20exceeded\(pass:0,\x20processes:nmap\.exe\[50\]\)\r\n")%1
- SF:r(HTTPOptions,53,"421\x20concurrent\x20connection\x20limit\x20in\x20Ava
- SF:st\x20exceeded\(pass:0,\x20processes:nmap\.exe\[50\]\)\r\n")%r(RTSPRequ
- SF:est,53,"421\x20concurrent\x20connection\x20limit\x20in\x20Avast\x20exce
- SF:eded\(pass:0,\x20processes:nmap\.exe\[50\]\)\r\n")%r(RPCCheck,53,"421\x
- SF:20concurrent\x20connection\x20limit\x20in\x20Avast\x20exceeded\(pass:0,
- SF:\x20processes:nmap\.exe\[50\]\)\r\n")%r(DNSVersionBindReq,53,"421\x20co
- SF:ncurrent\x20connection\x20limit\x20in\x20Avast\x20exceeded\(pass:0,\x20
- SF:processes:nmap\.exe\[50\]\)\r\n")%r(DNSStatusRequest,53,"421\x20concurr
- SF:ent\x20connection\x20limit\x20in\x20Avast\x20exceeded\(pass:0,\x20proce
- SF:sses:nmap\.exe\[50\]\)\r\n")%r(SSLSessionReq,53,"421\x20concurrent\x20c
- SF:onnection\x20limit\x20in\x20Avast\x20exceeded\(pass:0,\x20processes:nma
- SF:p\.exe\[50\]\)\r\n")%r(TLSSessionReq,53,"421\x20concurrent\x20connectio
- SF:n\x20limit\x20in\x20Avast\x20exceeded\(pass:0,\x20processes:nmap\.exe\[
- SF:50\]\)\r\n")%r(SMBProgNeg,53,"421\x20concurrent\x20connection\x20limit\
- SF:x20in\x20Avast\x20exceeded\(pass:0,\x20processes:nmap\.exe\[50\]\)\r\n"
- SF:)%r(X11Probe,53,"421\x20concurrent\x20connection\x20limit\x20in\x20Avas
- SF:t\x20exceeded\(pass:0,\x20processes:nmap\.exe\[50\]\)\r\n")%r(FourOhFou
- SF:rRequest,53,"421\x20concurrent\x20connection\x20limit\x20in\x20Avast\x2
- SF:0exceeded\(pass:0,\x20processes:nmap\.exe\[50\]\)\r\n")%r(LPDString,53,
- SF:"421\x20concurrent\x20connection\x20limit\x20in\x20Avast\x20exceeded\(p
- SF:ass:0,\x20processes:nmap\.exe\[50\]\)\r\n");
- No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
- TCP/IP fingerprint:
- OS:SCAN(V=7.40%E=4%D=3/16%OT=21%CT=20%CU=%PV=N%DS=17%DC=T%G=Y%TM=58CAB88C%P
- OS:=i686-pc-windows-windows)SEQ(SP=102%GCD=1%ISR=102%TI=Z%II=I%TS=A)SEQ(II=
- OS:I)OPS(O1=M5B4ST11NW7%O2=M5B4ST11NW7%O3=M5B4NNT11NW7%O4=M5B4ST11NW7%O5=M5
- OS:B4ST11NW7%O6=M5B4ST11)WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=712
- OS:0)ECN(R=Y%DF=Y%TG=40%W=7210%O=M5B4NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%TG=40%S=O%A
- OS:=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=N)T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=A
- OS:R%O=%RD=0%Q=)T6(R=N)T7(R=N)U1(R=N)IE(R=Y%DFI=N%TG=40%CD=S)
- -----------------------------------------------------------
- ssh-hostkey:
- 2048 1e:7e:93:da:3d:25:27:92:76:c5:13:04:60:c1:9c:37 (RSA)
- 256 e0:7a:16:e0:43:2f:7b:15:8c:36:57:0d:01:42:df:f3 (ECDSA)
- -----------------------------------------------------------
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement