Advertisement
Guest User

Anxy-Powered.info

a guest
Jul 25th, 2015
1,188
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 69.00 KB | None | 0 0
  1. ####################################
  2. # Uniscan project #
  3. # http://uniscan.sourceforge.net/ #
  4. ####################################
  5. V. 6.2
  6.  
  7.  
  8. Scan date: 30-6-2015 17:49:30
  9. ===================================================================================================
  10. | Domain: http://modsforsale.at.ua/
  11. | Server: uServ/3.2.2
  12. | IP: 213.174.157.140
  13. ===================================================================================================
  14. ===================================================================================================
  15. | Looking for Drupal plugins/modules
  16. |
  17. ===================================================================================================
  18. | WEB SERVICES
  19. |
  20. ===================================================================================================
  21. | FAVICON.ICO
  22. |
  23. ===================================================================================================
  24. | ERROR INFORMATION
  25. |
  26. | HTTP 404 Resource not found Create a website for free Free Website Builder Error Page not foundBack The page does not seem to exist! You can try one of the following: - go back to the website home page; - check the spelling of the entered address in the address bar; - use the Web search and find what you were looking for: About uCoz About Top Sites Pricing Community Forum Facebook Twitter Help FAQ Textbook Legal information Terms of Use Privacy Policy
  27. |
  28. 400 Bad Request
  29.  
  30. 400 Bad Request
  31. uServ/3.2.2
  32.  
  33.  
  34.  
  35. ===================================================================================================
  36. | TYPE ERROR
  37. |
  38. ===================================================================================================
  39. | SERVER MOBILE
  40. |
  41. ===================================================================================================
  42. | LANGUAGE
  43. |
  44. ===================================================================================================
  45. | INTERESTING STRINGS IN HTML
  46. |
  47. | a href="https://twitter.com/" class="soc-tw" target="_blank">
  48. | a href="https://www.facebook.com/" class="soc-fc" target="_blank">
  49. | !-- function uSocialLogin(t){ var params = { 'facebook':{ 'width':950, 'height':520 }, 'google':{ 'width':700, 'height':600 }, 'twitter':{ 'width':800, 'height':400 } }; var ref = escape(location.protocol + '//' + ('modsforsale.at.ua' || location.hostname) + location.pathname + ((location.hash ? ( location.search ? location.search + '&' : '?' ) + 'rnd=' + Date.now() + location.hash : ( location.search || '' )))); // var ref = escape(location.href); window.open('/'+t+'?ref='+ref,'conwin','width='+params[t].width+',height='+params[t].height+',status=1,resizable=1,left='+parseInt((screen.availWidth/2)-(params[t].width/2))+',top='+parseInt((screen.availHeight/2)-(params[t].height/2)-20)+'screenX='+parseInt((screen.availWidth/2)-(params[t].width/2))+',screenY='+parseInt((screen.availHeight/2)-(params[t].height/2)-20)); return false; } //-->
  50. | a href="javascript://" onclick="window.open('http://login.uid.me/?site=2modsforsale&ref='+escape(location.protocol + '//' + ('modsforsale.at.ua' || location.hostname) + location.pathname + ((location.hash ? ( location.search ? location.search + '&' : '?' ) + 'rnd=' + Date.now() + location.hash : ( location.search || '' )))),'unetLoginWnd','width=500,height=350,resizable=yes,titlebar=yes');return false;" class="login-with uid" title="Log in with uID" rel="nofollow">
  51. | a href="javascript://" onclick="return uSocialLogin('facebook');" class="login-with facebook" title="Log in with Facebook" rel="nofollow">
  52. | a href="javascript://" onclick="return uSocialLogin('google');" class="login-with google" title="Log in with Google+" rel="nofollow">
  53. | a href="javascript://" onclick="return uSocialLogin('twitter');" class="login-with twitter" title="Log in with Twitter" rel="nofollow">
  54. ===================================================================================================
  55. | WHOIS
  56. |
  57. | % request from 209.76.180.154
  58. |
  59. | % This is the Ukrainian Whois query server #B.
  60. |
  61. | % The Whois is subject to Terms of use
  62. |
  63. | % See https://hostmaster.ua/services/
  64. |
  65. | %
  66. |
  67. |
  68. |
  69. | Invalid request.
  70. |
  71. |
  72. |
  73. ===================================================================================================
  74. | BANNER GRABBING:
  75. ===================================================================================================
  76. ===================================================================================================
  77. | PING
  78. |
  79. | PING modsforsale.at.ua (213.174.157.140) 56(84) bytes of data.
  80. | 64 bytes from dev140.ucoz.net (213.174.157.140): icmp_req=1 ttl=128 time=141 ms
  81. | 64 bytes from dev140.ucoz.net (213.174.157.140): icmp_req=2 ttl=128 time=66.6 ms
  82. | 64 bytes from dev140.ucoz.net (213.174.157.140): icmp_req=3 ttl=128 time=50.6 ms
  83. | 64 bytes from dev140.ucoz.net (213.174.157.140): icmp_req=4 ttl=128 time=52.2 ms
  84. |
  85. | --- modsforsale.at.ua ping statistics ---
  86. | 4 packets transmitted, 4 received, 0% packet loss, time 3010ms
  87. | rtt min/avg/max/mdev = 50.632/77.855/141.911/37.506 ms
  88. ===================================================================================================
  89. | TRACEROUTE
  90. |
  91. | traceroute to modsforsale.at.ua (213.174.157.140), 30 hops max, 60 byte packets
  92. | 1 192.168.198.2 (192.168.198.2) 13.688 ms 13.583 ms 13.518 ms
  93. | 2 * * *
  94. | 3 * * *
  95. | 4 * * *
  96. | 5 * * *
  97. | 6 * * *
  98. | 7 * * *
  99. | 8 * * *
  100. | 9 * * *
  101. | 10 * * *
  102. | 11 * * *
  103. | 12 * * *
  104. | 13 * * *
  105. | 14 * * *
  106. | 15 * * *
  107. | 16 * * *
  108. | 17 * * *
  109. | 18 * * *
  110. | 19 * * *
  111. | 20 * * *
  112. | 21 * * *
  113. | 22 * * *
  114. | 23 * * *
  115. | 24 * * *
  116. | 25 * * *
  117. | 26 * * *
  118. | 27 * * *
  119. | 28 * * *
  120. | 29 * * *
  121. | 30 * * *
  122. ===================================================================================================
  123. | NSLOOKUP
  124. |
  125. | Server: 192.168.198.2
  126. | Address: 192.168.198.2#53
  127. |
  128. | Non-authoritative answer:
  129. | *** Can't find modsforsale.at.ua: No answer
  130. | Authoritative answers can be found from:
  131. | at.ua
  132. | origin = ns1.ucoz.ru
  133. | mail addr = dnsadmin.ucoz.ru
  134. | serial = 2015070101
  135. | refresh = 10800
  136. | retry = 900
  137. | expire = 2592000
  138. | minimum = 10800
  139. | Name: modsforsale.at.ua
  140. | Address: 213.174.157.140
  141. ===================================================================================================
  142. | NMAP
  143. |
  144. |
  145. | Starting Nmap 6.47 ( http://nmap.org ) at 2015-06-30 17:50 CDT
  146. | NSE: Loaded 118 scripts for scanning.
  147. | NSE: Script Pre-scanning.
  148. | Initiating Ping Scan at 17:50
  149. | Scanning modsforsale.at.ua (213.174.157.140) [4 ports]
  150. | Completed Ping Scan at 17:50, 0.02s elapsed (1 total hosts)
  151. | Initiating Parallel DNS resolution of 1 host. at 17:50
  152. | Completed Parallel DNS resolution of 1 host. at 17:50, 0.36s elapsed
  153. | Initiating SYN Stealth Scan at 17:50
  154. ####################################
  155. # Uniscan project #
  156. # http://uniscan.sourceforge.net/ #
  157. ####################################
  158. V. 6.2
  159.  
  160.  
  161. Scan date: 30-6-2015 17:52:16
  162. ===================================================================================================
  163. | Domain: http://http/
  164. ####################################
  165. # Uniscan project #
  166. # http://uniscan.sourceforge.net/ #
  167. ####################################
  168. V. 6.2
  169.  
  170.  
  171. | IP:
  172. Scan date: 30-6-2015 17:52:19
  173. ===================================================================================================
  174. ===================================================================================================
  175. | Domain: http://http/
  176. ===================================================================================================
  177. Scan end date: 30-6-2015 17:52:21
  178.  
  179.  
  180.  
  181. HTML report saved in: report/http.html
  182. ####################################
  183. # Uniscan project #
  184. # http://uniscan.sourceforge.net/ #
  185. ####################################
  186. V. 6.2
  187.  
  188.  
  189. | IP:
  190. Scan date: 30-6-2015 17:52:30
  191. ####################################
  192. # Uniscan project #
  193. # http://uniscan.sourceforge.net/ #
  194. ####################################
  195. V. 6.2
  196.  
  197.  
  198. Scan date: 30-6-2015 17:52:31
  199. ===================================================================================================
  200. | Domain: http://http/
  201. ===================================================================================================
  202. | Domain: http://http/
  203. ===================================================================================================
  204. ===================================================================================================
  205. Scan end date: 30-6-2015 17:52:32
  206.  
  207.  
  208.  
  209. HTML report saved in: report/http.html
  210. | IP:
  211. | IP:
  212. ===================================================================================================
  213. ===================================================================================================
  214. Scan end date: 30-6-2015 17:52:35
  215.  
  216.  
  217.  
  218. HTML report saved in: report/http.html
  219. ===================================================================================================
  220. ===================================================================================================
  221. Scan end date: 30-6-2015 17:52:36
  222.  
  223.  
  224.  
  225. HTML report saved in: report/http.html
  226. ####################################
  227. # Uniscan project #
  228. # http://uniscan.sourceforge.net/ #
  229. ####################################
  230. V. 6.2
  231.  
  232.  
  233. Scan date: 30-6-2015 17:53:48
  234. ===================================================================================================
  235. | Domain: http://www.psnmodz.net/
  236. | Server: Microsoft-IIS/7.0
  237. | IP: 184.168.152.3
  238. ===================================================================================================
  239. ===================================================================================================
  240. | Looking for Drupal plugins/modules
  241. |
  242. ===================================================================================================
  243. | WEB SERVICES
  244. |
  245. ===================================================================================================
  246. | FAVICON.ICO
  247. |
  248. ===================================================================================================
  249. | ERROR INFORMATION
  250. |
  251. ===================================================================================================
  252. | TYPE ERROR
  253. |
  254. | http://www.psnmodz.net/S*cq!V>w{qUTvNi(H.d9.php responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .php doesn't exist! any results from this server may be void
  255. | http://www.psnmodz.net/z>GUn5$$k*_\7K)k@2!.html responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .html doesn't exist! any results from this server may be void
  256. | http://www.psnmodz.net/qZMk00sWK!U^LEV4!0'`.htm responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .htm doesn't exist! any results from this server may be void
  257. | http://www.psnmodz.net/]3+L<Epz6"|XEu48MZ'G.asp responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .asp doesn't exist! any results from this server may be void
  258. | http://www.psnmodz.net/_bUi;d$M0K6+x;V@{,<_.jsp responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .jsp doesn't exist! any results from this server may be void
  259. | http://www.psnmodz.net/p\c]Gk=.rXT|;]IB`T7h.cgi responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .cgi doesn't exist! any results from this server may be void
  260. ===================================================================================================
  261. | SERVER MOBILE
  262. |
  263. ===================================================================================================
  264. | LANGUAGE
  265. |
  266. ===================================================================================================
  267. | INTERESTING STRINGS IN HTML
  268. |
  269. | meta name='description' content='Playstation 3 Modding Website! Mainly known for our PS3 personal account modding services &amp; modded accounts. We have been running strong for a year and have now surpassed +5000 accounts modded, and hope to continue providing a fast, reliable service!' />
  270. | meta name='keywords' content='PS3 Modding Services, PS3 Modded Accounts, PS3 Mods, PS3 USB Modding Website, PSNModz, PSNModz.NET, PSN, Modz, Store, PSNModz Services' />
  271. | a href='accounts.html' >
  272. | span class='wsite-menu-title'>Accounts
  273. | a href='view-all-accounts.html' >
  274. | span class='wsite-menu-title'>View All Accounts
  275. | a href='account-types.html' >
  276. | span class='wsite-menu-title'>Account Types
  277. | /a> to see the available services we offer for modding personal playstation accounts. &nbsp;Also check out the
  278. | a href="accounts.html" title="">Account Shop
  279. | /a>, which features hundreds of unique modded Playstation 3 Accounts at your finger tips!
  280. | strong>Official PSNModz.NET Twitter Account created, check it out
  281. | strong>Account Shop Restocked
  282. | font color="#818181">Services / Account Shop Last Official Month, More Updates Soon.
  283. | a class='wsite-social-item wsite-social-twitter' href='http://twitter.com/PSNModz' target='_blank'>
  284. | a href="http://twitter.com/PSNModz" target="_blank" title="">here
  285. | a class="twitter-timeline" href="https://twitter.com/PSNModz" data-widget-id="474271715371925504">Tweets by @PSNModz
  286. | script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");
  287. | a class='wsite-social-item wsite-social-facebook' href='http://facebook.com/PSNMods' target='_blank'>
  288. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1459480800961621&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  289. | a href="https://www.facebook.com/photo.php?fbid=1459480800961621&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  290. | a href="https://www.facebook.com/PSNMods">PSNModz
  291. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1458601957716172&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  292. | a href="https://www.facebook.com/photo.php?fbid=1458601957716172&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  293. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1456312901278411&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  294. | a href="https://www.facebook.com/photo.php?fbid=1456312901278411&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  295. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1455658584677176&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  296. | a href="https://www.facebook.com/photo.php?fbid=1455658584677176&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  297. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1454140991495602&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  298. | a href="https://www.facebook.com/photo.php?fbid=1454140991495602&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  299. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1452887341620967&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  300. | a href="https://www.facebook.com/photo.php?fbid=1452887341620967&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  301. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1450456991864002&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  302. | a href="https://www.facebook.com/photo.php?fbid=1450456991864002&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  303. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1451897655053269&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  304. | a href="https://www.facebook.com/photo.php?fbid=1451897655053269&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  305. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1449898738586494&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  306. | a href="https://www.facebook.com/photo.php?fbid=1449898738586494&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  307. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1449596901950011&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  308. | a href="https://www.facebook.com/photo.php?fbid=1449596901950011&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  309. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1449343985308636&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  310. | a href="https://www.facebook.com/photo.php?fbid=1449343985308636&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  311. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1448749995368035&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  312. | a href="https://www.facebook.com/photo.php?fbid=1448749995368035&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  313. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1447852412124460&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  314. | a href="https://www.facebook.com/photo.php?fbid=1447852412124460&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  315. | div class="fb-post" data-href="https://www.facebook.com/photo.php?fbid=1447578542151847&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1" data-width="466">
  316. | a href="https://www.facebook.com/photo.php?fbid=1447578542151847&amp;set=a.1423540624555639.1073741827.1422879344621767&amp;type=1">Post
  317. | strong>Logins, Forums, and moarrr.
  318. ===================================================================================================
  319. | WHOIS
  320. |
  321. |
  322. |
  323. | Whois Server Version 2.0
  324. |
  325. |
  326. |
  327. |
  328. |
  329. |
  330. |
  331. |
  332. |
  333. |
  334. |
  335. | No match for "WWW.PSNMODZ.NET".
  336. |
  337. | >>> Last update of whois database: Tue, 30 Jun 2015 22:53:25 GMT <<<
  338. |
  339. |
  340. |
  341. |
  342. |
  343. |
  344. |
  345. |
  346. |
  347. |
  348. |
  349. |
  350. |
  351. |
  352. |
  353. |
  354. |
  355. |
  356. |
  357. |
  358. |
  359. | Registrars.
  360. |
  361. |
  362. |
  363. | For more information on Whois status codes, please visit
  364. |
  365. | https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en.
  366. |
  367. ===================================================================================================
  368. | BANNER GRABBING:
  369. ===================================================================================================
  370. ===================================================================================================
  371. | PING
  372. |
  373. | PING psnmodz.net (184.168.152.3) 56(84) bytes of data.
  374. | 64 bytes from p3nw8shg276.shr.prod.phx3.secureserver.net (184.168.152.3): icmp_req=1 ttl=128 time=179 ms
  375. | 64 bytes from p3nw8shg276.shr.prod.phx3.secureserver.net (184.168.152.3): icmp_req=2 ttl=128 time=87.9 ms
  376. | 64 bytes from p3nw8shg276.shr.prod.phx3.secureserver.net (184.168.152.3): icmp_req=3 ttl=128 time=135 ms
  377. | 64 bytes from p3nw8shg276.shr.prod.phx3.secureserver.net (184.168.152.3): icmp_req=4 ttl=128 time=75.8 ms
  378. |
  379. | --- psnmodz.net ping statistics ---
  380. | 4 packets transmitted, 4 received, 0% packet loss, time 3005ms
  381. | rtt min/avg/max/mdev = 75.841/119.800/179.937/41.265 ms
  382. ===================================================================================================
  383. | TRACEROUTE
  384. |
  385. | traceroute to www.psnmodz.net (184.168.152.3), 30 hops max, 60 byte packets
  386. | 1 192.168.198.2 (192.168.198.2) 0.772 ms 0.558 ms 0.437 ms
  387. | 2 * * *
  388. | 3 * * *
  389. | 4 * * *
  390. | 5 * * *
  391. | 6 * * *
  392. | 7 * * *
  393. | 8 * * *
  394. | 9 * * *
  395. | 10 * * *
  396. | 11 * * *
  397. | 12 * * *
  398. | 13 * * *
  399. | 14 * * *
  400. | 15 * * *
  401. | 16 * * *
  402. | 17 * * *
  403. | 18 * * *
  404. | 19 * * *
  405. | 20 * * *
  406. | 21 * * *
  407. | 22 * * *
  408. | 23 * * *
  409. | 24 * * *
  410. | 25 * * *
  411. | 26 * * *
  412. | 27 * * *
  413. | 28 * * *
  414. | 29 * * *
  415. | 30 * * *
  416. ===================================================================================================
  417. | NSLOOKUP
  418. |
  419. | Server: 192.168.198.2
  420. | Address: 192.168.198.2#53
  421. |
  422. | Non-authoritative answer:
  423. | www.psnmodz.net canonical name = psnmodz.net.
  424. | psnmodz.net mail exchanger = 10 mailstore1.secureserver.net.
  425. | psnmodz.net mail exchanger = 0 smtp.secureserver.net.
  426. | Authoritative answers can be found from:
  427. | psnmodz.net
  428. | origin = ns77.domaincontrol.com
  429. | mail addr = dns.jomax.net
  430. | serial = 2014060300
  431. | refresh = 28800
  432. | retry = 7200
  433. | expire = 604800
  434. | minimum = 600
  435. | psnmodz.net nameserver = ns78.domaincontrol.com.
  436. | psnmodz.net nameserver = ns77.domaincontrol.com.
  437. | Name: psnmodz.net
  438. | Address: 184.168.152.3
  439. | psnmodz.net text = "google-site-verification=ejdx_6cahzjTvFrMJ009ZKzhTrNcjTI_EiZnNQOUujg"
  440. ===================================================================================================
  441. | NMAP
  442. |
  443. |
  444. | Starting Nmap 6.47 ( http://nmap.org ) at 2015-06-30 17:54 CDT
  445. | NSE: Loaded 118 scripts for scanning.
  446. | NSE: Script Pre-scanning.
  447. | Initiating Ping Scan at 17:54
  448. | Scanning www.psnmodz.net (184.168.152.3) [4 ports]
  449. | Completed Ping Scan at 17:54, 0.01s elapsed (1 total hosts)
  450. | Initiating Parallel DNS resolution of 1 host. at 17:54
  451. | Completed Parallel DNS resolution of 1 host. at 17:54, 0.09s elapsed
  452. | Initiating SYN Stealth Scan at 17:54
  453. | Scanning www.psnmodz.net (184.168.152.3) [1000 ports]
  454. | Discovered open port 80/tcp on 184.168.152.3
  455. | Discovered open port 443/tcp on 184.168.152.3
  456. | Discovered open port 21/tcp on 184.168.152.3
  457. | Discovered open port 3128/tcp on 184.168.152.3
  458. | Discovered open port 1028/tcp on 184.168.152.3
  459. | Increasing send delay for 184.168.152.3 from 0 to 5 due to 11 out of 26 dropped probes since last increase.
  460. | SYN Stealth Scan Timing: About 59.33% done; ETC: 17:55 (0:00:30 remaining)
  461. | Increasing send delay for 184.168.152.3 from 5 to 10 due to 11 out of 11 dropped probes since last increase.
  462. | SYN Stealth Scan Timing: About 63.17% done; ETC: 17:56 (0:00:45 remaining)
  463. | Discovered open port 1248/tcp on 184.168.152.3
  464. | Discovered open port 1311/tcp on 184.168.152.3
  465. | Completed SYN Stealth Scan at 17:56, 96.95s elapsed (1000 total ports)
  466. | Initiating Service scan at 17:56
  467. | Scanning 7 services on www.psnmodz.net (184.168.152.3)
  468. | Completed Service scan at 17:57, 60.48s elapsed (7 services on 1 host)
  469. | Initiating OS detection (try #1) against www.psnmodz.net (184.168.152.3)
  470. | Initiating Traceroute at 17:57
  471. | Completed Traceroute at 17:57, 0.04s elapsed
  472. | Initiating Parallel DNS resolution of 2 hosts. at 17:57
  473. | Completed Parallel DNS resolution of 2 hosts. at 17:57, 0.05s elapsed
  474. | NSE: Script scanning 184.168.152.3.
  475. | Initiating NSE at 17:57
  476. | NSE Timing: About 44.12% done; ETC: 17:58 (0:00:39 remaining)
  477. | Completed NSE at 17:58, 93.94s elapsed
  478. | Nmap scan report for www.psnmodz.net (184.168.152.3)
  479. | Host is up (0.021s latency).
  480. | rDNS record for 184.168.152.3: p3nw8shg276.shr.prod.phx3.secureserver.net
  481. | Not shown: 993 filtered ports
  482. | PORT STATE SERVICE VERSION
  483. | 21/tcp open ftp Microsoft ftpd
  484. | |_ftp-bounce: no banner
  485. | 80/tcp open http Microsoft IIS httpd 7.0
  486. | 443/tcp open https?
  487. | 1028/tcp open msrpc Microsoft Windows RPC
  488. | 1248/tcp open nsclient Netsaint Windows Client
  489. | 1311/tcp open rxmon?
  490. | 3128/tcp open msrpc Microsoft Windows RPC
  491. | Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  492. | Device type: general purpose
  493. | Running: Linux 3.X, Microsoft Windows 7|XP
  494. | OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:microsoft:windows_7:::enterprise cpe:/o:microsoft:windows_xp::sp3
  495. | OS details: Linux 3.2, Microsoft Windows 7 Enterprise, Microsoft Windows XP SP3
  496. | Network Distance: 2 hops
  497. | TCP Sequence Prediction: Difficulty=255 (Good luck!)
  498. | IP ID Sequence Generation: Incremental
  499. | Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  500. |
  501. | TRACEROUTE (using port 80/tcp)
  502. | HOP RTT ADDRESS
  503. | 1 0.61 ms 192.168.198.2
  504. | 2 0.65 ms p3nw8shg276.shr.prod.phx3.secureserver.net (184.168.152.3)
  505. |
  506. | NSE: Script Post-scanning.
  507. | Read data files from: /usr/bin/../share/nmap
  508. | OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  509. | Nmap done: 1 IP address (1 host up) scanned in 261.09 seconds
  510. | Raw packets sent: 3079 (137.388KB) | Rcvd: 1573 (63.146KB)
  511. ===================================================================================================
  512. |
  513. | Directory check:
  514. | Skipped because http://www.psnmodz.net/uniscan802/ did not return the code 404
  515. ===================================================================================================
  516. |
  517. | File check:
  518. | Skipped because http://www.psnmodz.net/uniscan263/ did not return the code 404
  519. ===================================================================================================
  520. |
  521. | Check robots.txt:
  522. |
  523. | Check sitemap.xml:
  524. ===================================================================================================
  525. |
  526. | Crawler Started:
  527. | Plugin name: phpinfo() Disclosure v.1 Loaded.
  528. | Plugin name: Code Disclosure v.1.1 Loaded.
  529. | Plugin name: E-mail Detection v.1.1 Loaded.
  530. | Plugin name: FCKeditor upload test v.1 Loaded.
  531. | Plugin name: External Host Detect v.1.2 Loaded.
  532. | Plugin name: Upload Form Detect v.1.1 Loaded.
  533. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  534. | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
  535. | [+] Crawling finished, 1 URL's found!
  536. |
  537. | PHPinfo() Disclosure:
  538. |
  539. | Source Code Disclosure:
  540. |
  541. | E-mails:
  542. |
  543. | FCKeditor File Upload:
  544. |
  545. | External hosts:
  546. |
  547. | File Upload Forms:
  548. |
  549. | Timthumb:
  550. |
  551. | Web Backdoors:
  552. |
  553. | Ignored Files:
  554. ===================================================================================================
  555. | Dynamic tests:
  556. | Plugin name: Learning New Directories v.1.2 Loaded.
  557. | Plugin name: FCKedior tests v.1.1 Loaded.
  558. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  559. | Plugin name: Find Backup Files v.1.2 Loaded.
  560. | Plugin name: Blind SQL-injection tests v.1.3 Loaded.
  561. | Plugin name: Local File Include tests v.1.1 Loaded.
  562. | Plugin name: PHP CGI Argument Injection v.1.1 Loaded.
  563. | Plugin name: Remote Command Execution tests v.1.1 Loaded.
  564. | Plugin name: Remote File Include tests v.1.2 Loaded.
  565. | Plugin name: SQL-injection tests v.1.2 Loaded.
  566. | Plugin name: Cross-Site Scripting tests v.1.2 Loaded.
  567. | Plugin name: Web Shell Finder v.1.3 Loaded.
  568. | [+] 0 New directories added
  569. |
  570. |
  571. | FCKeditor tests:
  572. | Skipped because http://www.psnmodz.net/testing123 did not return the code 404
  573. |
  574. |
  575. | Timthumb < 1.33 vulnerability:
  576. |
  577. |
  578. | Backup Files:
  579. | Skipped because http://www.psnmodz.net/testing123 did not return the code 404
  580. |
  581. |
  582. | Blind SQL Injection:
  583. |
  584. |
  585. | Local File Include:
  586. |
  587. |
  588. | PHP CGI Argument Injection:
  589. |
  590. |
  591. | Remote Command Execution:
  592. |
  593. |
  594. | Remote File Include:
  595. |
  596. |
  597. | SQL Injection:
  598. |
  599. |
  600. | Cross-Site Scripting (XSS):
  601. |
  602. |
  603. | Web Shell Finder:
  604. ===================================================================================================
  605. | Static tests:
  606. | Plugin name: Local File Include tests v.1.1 Loaded.
  607. | Plugin name: Remote Command Execution tests v.1.1 Loaded.
  608. | Plugin name: Remote File Include tests v.1.1 Loaded.
  609. |
  610. |
  611. | Local File Include:
  612. |
  613. |
  614. | Remote Command Execution:
  615. |
  616. |
  617. | Remote File Include:
  618. ####################################
  619. # Uniscan project #
  620. # http://uniscan.sourceforge.net/ #
  621. ####################################
  622. V. 6.2
  623.  
  624.  
  625. Scan date: 4-7-2015 23:26:46
  626. ===================================================================================================
  627. | Domain: http://unwantedforums.net/
  628. | Server: Apache
  629. | IP: 31.170.160.239
  630. ===================================================================================================
  631. ===================================================================================================
  632. | Looking for Drupal plugins/modules
  633. |
  634. | GET,HEAD,POST,OPTIONS
  635. ===================================================================================================
  636. ===================================================================================================
  637. | WEB SERVICES
  638. |
  639. ===================================================================================================
  640. | FAVICON.ICO
  641. |
  642. ===================================================================================================
  643. | ERROR INFORMATION
  644. |
  645. ===================================================================================================
  646. | TYPE ERROR
  647. |
  648. | http://unwantedforums.net/`/reaksys];/s@SoGEU.php responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .php doesn't exist! any results from this server may be void
  649. | http://unwantedforums.net/EpM!tDCt"6K>:a8{!C.html responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .html doesn't exist! any results from this server may be void
  650. | http://unwantedforums.net/j0M]Lqu8e[Z9P"22C@HB.htm responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .htm doesn't exist! any results from this server may be void
  651. | http://unwantedforums.net/iGtba+(|]x`/oe3k>v]6.aspx responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .aspx doesn't exist! any results from this server may be void
  652. | http://unwantedforums.net/$wZ:3.-9Ar"Bj`mNBMSy.asp responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .asp doesn't exist! any results from this server may be void
  653. | http://unwantedforums.net/e%/ZK0Se`/k(qPZ,9UI.jsp responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .jsp doesn't exist! any results from this server may be void
  654. | http://unwantedforums.net/vl_cbLs'2@'>|_{361.cgi responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .cgi doesn't exist! any results from this server may be void
  655. ===================================================================================================
  656. | SERVER MOBILE
  657. |
  658. | index page reqested with an Iphone UserAgent is diferent then with a regular UserAgent. This Host may have a mobile site
  659. ===================================================================================================
  660. | LANGUAGE
  661. |
  662. | xml:lang="en"
  663. | lang="en"
  664. ===================================================================================================
  665. | INTERESTING STRINGS IN HTML
  666. |
  667. | strong>Password:
  668. | input name="quick_password" id="quick_login_password" type="password" value="" class="textbox" />
  669. | a href="http://www.unwantedforums.net/member.php?action=lostpw" class="lost_password">Lost Password?
  670. | a href="http://www.unwantedforums.net/member.php?action=login" onclick="$('#quick_login').modal({ fadeDuration: 250, keepelement: true }); return false;" class="login">Login
  671. | div class="modal" id="quick_login" style="display: none;">
  672. | input name="action" type="hidden" value="do_login" />
  673. | input name="quick_login" type="hidden" value="1" />
  674. | strong>Login
  675. | input name="quick_username" id="quick_login_username" type="text" value="" class="textbox initial_focus" />
  676. | input name="quick_remember" id="quick_login_remember" type="checkbox" value="yes" class="checkbox" checked="checked" />
  677. | label for="quick_login_remember">Remember me
  678. | input name="submit" type="submit" class="button" value="Login" />
  679. | script type="text/javascript"> $("#quick_login input[name='url']").val($(location).attr('href'));
  680. ===================================================================================================
  681. | WHOIS
  682. |
  683. |
  684. |
  685. | Whois Server Version 2.0
  686. |
  687. |
  688. |
  689. |
  690. |
  691. |
  692. |
  693. |
  694. |
  695. |
  696. |
  697. | Domain Name: UNWANTEDFORUMS.NET
  698. |
  699. | Registrar: ENOM, INC.
  700. |
  701. | Sponsoring Registrar IANA ID: 48
  702. |
  703. | Whois Server: whois.enom.com
  704. |
  705. | Referral URL: http://www.enom.com
  706. |
  707. | Name Server: NS01.000WEBHOST.COM
  708. |
  709. | Name Server: NS02.000WEBHOST.COM
  710. |
  711. | Status: ok http://www.icann.org/epp#OK
  712. |
  713. | Updated Date: 24-feb-2015
  714. |
  715. | Creation Date: 20-feb-2015
  716. |
  717. | Expiration Date: 20-feb-2016
  718. |
  719. |
  720. |
  721. | >>> Last update of whois database: Sun, 05 Jul 2015 04:26:24 GMT <<<
  722. |
  723. |
  724. |
  725. |
  726. |
  727. |
  728. |
  729. |
  730. |
  731. |
  732. |
  733. |
  734. |
  735. |
  736. |
  737. |
  738. |
  739. |
  740. |
  741. |
  742. |
  743. | Registrars.
  744. |
  745. |
  746. |
  747. | For more information on Whois status codes, please visit
  748. |
  749. | https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en.
  750. |
  751. |
  752. |
  753. |
  754. |
  755. | Domain Name: UNWANTEDFORUMS.NET
  756. |
  757. | Registry Domain ID: 1904442357_DOMAIN_NET-VRSN
  758. |
  759. | Registrar WHOIS Server: whois.enom.com
  760. |
  761. | Registrar URL: www.enom.com
  762. |
  763. | Updated Date: 2015-02-20T14:48:49.00Z
  764. |
  765. | Creation Date: 2015-02-20T22:48:00.00Z
  766. |
  767. | Registrar Registration Expiration Date: 2016-02-20T22:48:00.00Z
  768. |
  769. | Registrar: ENOM, INC.
  770. |
  771. | Registrar IANA ID: 48
  772. |
  773. | Reseller: NAMECHEAP.COM
  774. |
  775. | Domain Status: ok https://www.icann.org/epp#ok
  776. |
  777. | Registry Registrant ID:
  778. |
  779. | Registrant Name: WHOISGUARD PROTECTED
  780. |
  781. | Registrant Organization: WHOISGUARD, INC.
  782. |
  783. | Registrant Street: P.O. BOX 0823-03411
  784. |
  785. | Registrant City: PANAMA
  786. |
  787. | Registrant State/Province: PANAMA
  788. |
  789. | Registrant Postal Code: 00000
  790. |
  791. | Registrant Country: PA
  792. |
  793. | Registrant Phone: +507.8365503
  794. |
  795. | Registrant Phone Ext:
  796. |
  797. | Registrant Fax: +51.17057182
  798. |
  799. | Registrant Fax Ext:
  800. |
  801. | Registrant Email: 103B1EFD838140069EFAF753F7ACCBD0.PROTECT@WHOISGUARD.COM
  802. |
  803. | Registry Admin ID:
  804. |
  805. | Admin Name: WHOISGUARD PROTECTED
  806. |
  807. | Admin Organization: WHOISGUARD, INC.
  808. |
  809. | Admin Street: P.O. BOX 0823-03411
  810. |
  811. | Admin City: PANAMA
  812. |
  813. | Admin State/Province: PANAMA
  814. |
  815. | Admin Postal Code: 00000
  816. |
  817. | Admin Country: PA
  818. |
  819. | Admin Phone: +507.8365503
  820. |
  821. | Admin Phone Ext:
  822. |
  823. | Admin Fax: +51.17057182
  824. |
  825. | Admin Fax Ext:
  826. |
  827. | Admin Email: 103B1EFD838140069EFAF753F7ACCBD0.PROTECT@WHOISGUARD.COM
  828. |
  829. | Registry Tech ID:
  830. |
  831. | Tech Name: WHOISGUARD PROTECTED
  832. |
  833. | Tech Organization: WHOISGUARD, INC.
  834. |
  835. | Tech Street: P.O. BOX 0823-03411
  836. |
  837. | Tech City: PANAMA
  838. |
  839. | Tech State/Province: PANAMA
  840. |
  841. | Tech Postal Code: 00000
  842. |
  843. | Tech Country: PA
  844. |
  845. | Tech Phone: +507.8365503
  846. |
  847. | Tech Phone Ext:
  848. |
  849. | Tech Fax: +51.17057182
  850. |
  851. | Tech Fax Ext:
  852. |
  853. | Tech Email: 103B1EFD838140069EFAF753F7ACCBD0.PROTECT@WHOISGUARD.COM
  854. |
  855. | Name Server: NS01.000WEBHOST.COM
  856. |
  857. | Name Server: NS02.000WEBHOST.COM
  858. |
  859. | DNSSEC: unSigned
  860. |
  861. | Registrar Abuse Contact Email: abuse@enom.com
  862. |
  863. | Registrar Abuse Contact Phone: +1.4252982646
  864. |
  865. | URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
  866. |
  867. | Last update of WHOIS database: 2015-02-20T14:48:49.00Z
  868. |
  869. |
  870. |
  871. |
  872. |
  873. |
  874. |
  875. |
  876. |
  877. | Version 6.3 4/3/2002
  878. |
  879. ===================================================================================================
  880. | BANNER GRABBING:
  881. ===================================================================================================
  882. ===================================================================================================
  883. | PING
  884. |
  885. | PING unwantedforums.net (31.170.160.239) 56(84) bytes of data.
  886. | 64 bytes from 31.170.160.239: icmp_req=1 ttl=128 time=52.0 ms
  887. | 64 bytes from 31.170.160.239: icmp_req=2 ttl=128 time=47.0 ms
  888. | 64 bytes from 31.170.160.239: icmp_req=3 ttl=128 time=51.9 ms
  889. | 64 bytes from 31.170.160.239: icmp_req=4 ttl=128 time=56.0 ms
  890. |
  891. | --- unwantedforums.net ping statistics ---
  892. | 4 packets transmitted, 4 received, 0% packet loss, time 3133ms
  893. | rtt min/avg/max/mdev = 47.096/51.779/56.040/3.181 ms
  894. ===================================================================================================
  895. | TRACEROUTE
  896. |
  897. | traceroute to unwantedforums.net (31.170.160.239), 30 hops max, 60 byte packets
  898. | 1 192.168.198.2 (192.168.198.2) 2.479 ms 2.263 ms 2.038 ms
  899. | 2 * * *
  900. | 3 * * *
  901. | 4 * * *
  902. | 5 * * *
  903. | 6 * * *
  904. | 7 * * *
  905. | 8 * * *
  906. | 9 * * *
  907. | 10 * * *
  908. | 11 * * *
  909. | 12 * * *
  910. | 13 * * *
  911. | 14 * * *
  912. | 15 * * *
  913. | 16 * * *
  914. | 17 * * *
  915. | 18 * * *
  916. | 19 * * *
  917. | 20 * * *
  918. | 21 * * *
  919. | 22 * * *
  920. | 23 * * *
  921. | 24 * * *
  922. | 25 * * *
  923. | 26 * * *
  924. | 27 * * *
  925. | 28 * * *
  926. | 29 * * *
  927. | 30 * * *
  928. ===================================================================================================
  929. | NSLOOKUP
  930. |
  931. | Server: 192.168.198.2
  932. | Address: 192.168.198.2#53
  933. |
  934. | Non-authoritative answer:
  935. | unwantedforums.net mail exchanger = 0 aspmx.l.google.com.
  936. | Authoritative answers can be found from:
  937. | *** Can't find unwantedforums.net: No answer
  938. | unwantedforums.net
  939. | origin = ns01.000webhost.com
  940. | mail addr = freehosting.000webhost.com
  941. | serial = 2015022401
  942. | refresh = 172800
  943. | retry = 7200
  944. | expire = 3600000
  945. | minimum = 172800
  946. | unwantedforums.net nameserver = ns01.000webhost.com.
  947. | unwantedforums.net nameserver = ns02.000webhost.com.
  948. | Name: unwantedforums.net
  949. | Address: 31.170.160.239
  950. ===================================================================================================
  951. | NMAP
  952. |
  953. ####################################
  954. # Uniscan project #
  955. # http://uniscan.sourceforge.net/ #
  956. ####################################
  957. V. 6.2
  958.  
  959.  
  960. Scan date: 4-7-2015 23:29:50
  961. ===================================================================================================
  962. | Domain: http://www.unwantedforums.net/
  963. | Server: Apache
  964. | IP: 31.170.160.239
  965. ===================================================================================================
  966. ===================================================================================================
  967. | Looking for Drupal plugins/modules
  968. |
  969. | GET,HEAD,POST,OPTIONS
  970. ===================================================================================================
  971. ===================================================================================================
  972. | WEB SERVICES
  973. |
  974. ===================================================================================================
  975. | FAVICON.ICO
  976. |
  977. ===================================================================================================
  978. | ERROR INFORMATION
  979. |
  980. ===================================================================================================
  981. | TYPE ERROR
  982. |
  983. | http://www.unwantedforums.net/iTB"yR4>_Z7snTUQ[F_V.php responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .php doesn't exist! any results from this server may be void
  984. | http://www.unwantedforums.net/V)Z"")WEh2NN0HCz$`23.html responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .html doesn't exist! any results from this server may be void
  985. | http://www.unwantedforums.net/goj-t@f7F[d-XBm|NXv.htm responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .htm doesn't exist! any results from this server may be void
  986. | http://www.unwantedforums.net/Ch=>H+vL{EPtvVl-3"\Y.aspx responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .aspx doesn't exist! any results from this server may be void
  987. | http://www.unwantedforums.net/z1{R7RDTa*q-IwH1%*"v.asp responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .asp doesn't exist! any results from this server may be void
  988. | http://www.unwantedforums.net/a}(.-sbav%K2L24To2F.jsp responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .jsp doesn't exist! any results from this server may be void
  989. | http://www.unwantedforums.net/elc($C"l\SGxf>=i<El7.cgi responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .cgi doesn't exist! any results from this server may be void
  990. ===================================================================================================
  991. | SERVER MOBILE
  992. |
  993. | index page reqested with an Iphone UserAgent is diferent then with a regular UserAgent. This Host may have a mobile site
  994. ===================================================================================================
  995. | LANGUAGE
  996. |
  997. | xml:lang="en"
  998. | lang="en"
  999. ===================================================================================================
  1000. | INTERESTING STRINGS IN HTML
  1001. |
  1002. | strong>Password:
  1003. | input name="quick_password" id="quick_login_password" type="password" value="" class="textbox" />
  1004. | a href="http://www.unwantedforums.net/member.php?action=lostpw" class="lost_password">Lost Password?
  1005. | a href="http://www.unwantedforums.net/member.php?action=login" onclick="$('#quick_login').modal({ fadeDuration: 250, keepelement: true }); return false;" class="login">Login
  1006. | div class="modal" id="quick_login" style="display: none;">
  1007. | input name="action" type="hidden" value="do_login" />
  1008. | input name="quick_login" type="hidden" value="1" />
  1009. | strong>Login
  1010. | input name="quick_username" id="quick_login_username" type="text" value="" class="textbox initial_focus" />
  1011. | input name="quick_remember" id="quick_login_remember" type="checkbox" value="yes" class="checkbox" checked="checked" />
  1012. | label for="quick_login_remember">Remember me
  1013. | input name="submit" type="submit" class="button" value="Login" />
  1014. | script type="text/javascript"> $("#quick_login input[name='url']").val($(location).attr('href'));
  1015. ===================================================================================================
  1016. | WHOIS
  1017. |
  1018. |
  1019. |
  1020. | Whois Server Version 2.0
  1021. |
  1022. |
  1023. |
  1024. |
  1025. |
  1026. |
  1027. |
  1028. |
  1029. |
  1030. |
  1031. |
  1032. | No match for "WWW.UNWANTEDFORUMS.NET".
  1033. |
  1034. | >>> Last update of whois database: Sun, 05 Jul 2015 04:29:38 GMT <<<
  1035. |
  1036. |
  1037. |
  1038. |
  1039. |
  1040. |
  1041. |
  1042. |
  1043. |
  1044. |
  1045. |
  1046. |
  1047. |
  1048. |
  1049. |
  1050. |
  1051. |
  1052. |
  1053. |
  1054. |
  1055. |
  1056. | Registrars.
  1057. |
  1058. |
  1059. |
  1060. | For more information on Whois status codes, please visit
  1061. |
  1062. | https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en.
  1063. |
  1064. ===================================================================================================
  1065. | BANNER GRABBING:
  1066. ===================================================================================================
  1067. ===================================================================================================
  1068. | PING
  1069. |
  1070. |
  1071. | Starting Nmap 6.47 ( http://nmap.org ) at 2015-07-04 23:27 CDT
  1072. | NSE: Loaded 118 scripts for scanning.
  1073. | NSE: Script Pre-scanning.
  1074. | Initiating Ping Scan at 23:28
  1075. | Scanning unwantedforums.net (31.170.160.239) [4 ports]
  1076. | Completed Ping Scan at 23:28, 0.17s elapsed (1 total hosts)
  1077. | Initiating Parallel DNS resolution of 1 host. at 23:28
  1078. | Completed Parallel DNS resolution of 1 host. at 23:28, 0.37s elapsed
  1079. | Initiating SYN Stealth Scan at 23:28
  1080. | Scanning unwantedforums.net (31.170.160.239) [1000 ports]
  1081. | Discovered open port 21/tcp on 31.170.160.239
  1082. | Discovered open port 3306/tcp on 31.170.160.239
  1083. | Discovered open port 80/tcp on 31.170.160.239
  1084. | Increasing send delay for 31.170.160.239 from 0 to 5 due to 11 out of 36 dropped probes since last increase.
  1085. | Completed SYN Stealth Scan at 23:29, 89.86s elapsed (1000 total ports)
  1086. | Initiating Service scan at 23:29
  1087. | Scanning 3 services on unwantedforums.net (31.170.160.239)
  1088. | Completed Service scan at 23:29, 6.33s elapsed (3 services on 1 host)
  1089. | Initiating OS detection (try #1) against unwantedforums.net (31.170.160.239)
  1090. | Retrying OS detection (try #2) against unwantedforums.net (31.170.160.239)
  1091. | Initiating Traceroute at 23:30
  1092. | Completed Traceroute at 23:30, 0.02s elapsed
  1093. | Initiating Parallel DNS resolution of 2 hosts. at 23:30
  1094. | Completed Parallel DNS resolution of 2 hosts. at 23:30, 0.42s elapsed
  1095. | NSE: Script scanning 31.170.160.239.
  1096. | Initiating NSE at 23:30
  1097. | Completed NSE at 23:30, 6.99s elapsed
  1098. | Nmap scan report for unwantedforums.net (31.170.160.239)
  1099. | Host is up (0.014s latency).
  1100. | Not shown: 996 filtered ports
  1101. | PORT STATE SERVICE VERSION
  1102. | 20/tcp closed ftp-data
  1103. | 21/tcp open ftp Pure-FTPd
  1104. | 80/tcp open http Apache httpd
  1105. | |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  1106. | |_http-title: Unwanted Forums
  1107. | 3306/tcp open mysql MySQL (unauthorized)
  1108. | Device type: general purpose|storage-misc
  1109. | Running (JUST GUESSING): Linux 2.4.X|3.X (99%), Microsoft Windows XP|7 (94%), BlueArc embedded (90%)
  1110. | OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:3 cpe:/o:microsoft:windows_xp::sp3 cpe:/o:microsoft:windows_7:::enterprise cpe:/h:bluearc:titan_2100
  1111. | PING unwantedforums.net (31.170.160.239) 56(84) bytes of data.
  1112. | 64 bytes from 31.170.160.239: icmp_req=1 ttl=128 time=117 ms
  1113. | 64 bytes from 31.170.160.239: icmp_req=2 ttl=128 time=46.3 ms
  1114. | 64 bytes from 31.170.160.239: icmp_req=3 ttl=128 time=62.1 ms
  1115. | 64 bytes from 31.170.160.239: icmp_req=4 ttl=128 time=46.5 ms
  1116. |
  1117. | --- unwantedforums.net ping statistics ---
  1118. | Aggressive OS guesses: DD-WRT v24-sp2 (Linux 2.4.37) (99%), Linux 3.2 (99%), Microsoft Windows XP SP3 (94%), Microsoft Windows 7 Enterprise (93%), BlueArc Titan 2100 NAS device (90%)
  1119. | 4 packets transmitted, 4 received, 0% packet loss, time 3017ms
  1120. | rtt min/avg/max/mdev = 46.321/68.110/117.384/29.165 ms
  1121. ===================================================================================================
  1122. | TRACEROUTE
  1123. | No exact OS matches for host (test conditions non-ideal).
  1124. |
  1125. | Network Distance: 2 hops
  1126. | TCP Sequence Prediction: Difficulty=260 (Good luck!)
  1127. | IP ID Sequence Generation: Busy server or unknown class
  1128. |
  1129. | TRACEROUTE (using port 80/tcp)
  1130. | HOP RTT ADDRESS
  1131. | 1 0.21 ms 192.168.198.2
  1132. | 2 0.08 ms 31.170.160.239
  1133. |
  1134. | NSE: Script Post-scanning.
  1135. | Read data files from: /usr/bin/../share/nmap
  1136. | OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  1137. | Nmap done: 1 IP address (1 host up) scanned in 153.84 seconds
  1138. | Raw packets sent: 3099 (139.524KB) | Rcvd: 1166 (81.527KB)
  1139. ===================================================================================================
  1140. |
  1141. | Directory check:
  1142. | Skipped because http://unwantedforums.net/uniscan123/ did not return the code 404
  1143. ===================================================================================================
  1144. |
  1145. | File check:
  1146. | Skipped because http://unwantedforums.net/uniscan101/ did not return the code 404
  1147. ===================================================================================================
  1148. |
  1149. | Check robots.txt:
  1150. |
  1151. | Check sitemap.xml:
  1152. ===================================================================================================
  1153. |
  1154. | Crawler Started:
  1155. | Plugin name: phpinfo() Disclosure v.1 Loaded.
  1156. | Plugin name: Code Disclosure v.1.1 Loaded.
  1157. | Plugin name: E-mail Detection v.1.1 Loaded.
  1158. | Plugin name: FCKeditor upload test v.1 Loaded.
  1159. | Plugin name: External Host Detect v.1.2 Loaded.
  1160. | Plugin name: Upload Form Detect v.1.1 Loaded.
  1161. | Plugin name: Timthumb <= 1.32 vulnerability v.1 Loaded.
  1162. | Plugin name: Web Backdoor Disclosure v.1.1 Loaded.
  1163. | traceroute to www.unwantedforums.net (31.170.160.239), 30 hops max, 60 byte packets
  1164. | 1 192.168.198.2 (192.168.198.2) 0.219 ms 0.414 ms 0.197 ms
  1165. | 2 * * *
  1166. | 3 * * *
  1167. | 4 * * *
  1168. | 5 * * *
  1169. | 6 * * *
  1170. | 7 * * *
  1171. | 8 * * *
  1172. | 9 * * *
  1173. | 10 * * *
  1174. | 11 * * *
  1175. | 12 * * *
  1176. | 13 * * *
  1177. | 14 * * *
  1178. | 15 * * *
  1179. | 16 * * *
  1180. | 17 * * *
  1181. | 18 * * *
  1182. | 19 * * *
  1183. | 20 * * *
  1184. | 21 * * *
  1185. | 22 * * *
  1186. | 23 * * *
  1187. | 24 * * *
  1188. | 25 * * *
  1189. | 26 * * *
  1190. | 27 * * *
  1191. | 28 * * *
  1192. | 29 * * *
  1193. | 30 * * *
  1194. ===================================================================================================
  1195. | NSLOOKUP
  1196. |
  1197. | Server: 192.168.198.2
  1198. | Address: 192.168.198.2#53
  1199. |
  1200. | Non-authoritative answer:
  1201. | www.unwantedforums.net canonical name = unwantedforums.net.
  1202. | unwantedforums.net mail exchanger = 0 aspmx.l.google.com.
  1203. | Authoritative answers can be found from:
  1204. | unwantedforums.net
  1205. | origin = ns01.000webhost.com
  1206. | mail addr = freehosting.000webhost.com
  1207. | serial = 2015022401
  1208. | refresh = 172800
  1209. | retry = 7200
  1210. | expire = 3600000
  1211. | minimum = 172800
  1212. | unwantedforums.net nameserver = ns02.000webhost.com.
  1213. | unwantedforums.net nameserver = ns01.000webhost.com.
  1214. | Name: unwantedforums.net
  1215. | Address: 31.170.160.239
  1216. | *** Can't find www.unwantedforums.net: No answer
  1217. ===================================================================================================
  1218. | NMAP
  1219. |
  1220. ####################################
  1221. # Uniscan project #
  1222. # http://uniscan.sourceforge.net/ #
  1223. ####################################
  1224. V. 6.2
  1225.  
  1226.  
  1227. |
  1228. | Starting Nmap 6.47 ( http://nmap.org ) at 2015-07-04 23:31 CDT
  1229. | NSE: Loaded 118 scripts for scanning.
  1230. | NSE: Script Pre-scanning.
  1231. | Initiating Ping Scan at 23:32
  1232. | Scanning www.unwantedforums.net (31.170.160.239) [4 ports]
  1233. | Completed Ping Scan at 23:32, 0.14s elapsed (1 total hosts)
  1234. | Initiating Parallel DNS resolution of 1 host. at 23:32
  1235. | Completed Parallel DNS resolution of 1 host. at 23:32, 0.38s elapsed
  1236. | Initiating SYN Stealth Scan at 23:32
  1237. | Scanning www.unwantedforums.net (31.170.160.239) [1000 ports]
  1238. | Discovered open port 80/tcp on 31.170.160.239
  1239. | Discovered open port 21/tcp on 31.170.160.239
  1240. | Discovered open port 3306/tcp on 31.170.160.239
  1241. | Increasing send delay for 31.170.160.239 from 0 to 5 due to 11 out of 17 dropped probes since last increase.
  1242. | SYN Stealth Scan Timing: About 48.75% done; ETC: 23:33 (0:00:33 remaining)
  1243. | Increasing send delay for 31.170.160.239 from 5 to 10 due to 11 out of 11 dropped probes since last increase.
  1244. | Increasing send delay for 31.170.160.239 from 10 to 20 due to 11 out of 11 dropped probes since last increase.
  1245. | Completed SYN Stealth Scan at 23:33, 74.41s elapsed (1000 total ports)
  1246. | Initiating Service scan at 23:33
  1247. | Scanning 3 services on www.unwantedforums.net (31.170.160.239)
  1248. | Completed Service scan at 23:33, 6.18s elapsed (3 services on 1 host)
  1249. | Initiating OS detection (try #1) against www.unwantedforums.net (31.170.160.239)
  1250. ####################################
  1251. # Uniscan project #
  1252. # http://uniscan.sourceforge.net/ #
  1253. ####################################
  1254. V. 6.2
  1255.  
  1256.  
  1257. Scan date: 4-7-2015 23:34:36
  1258. ===================================================================================================
  1259. | Domain: http://www.unwantedforums.net/
  1260. | Server: Apache
  1261. | IP: 31.170.160.239
  1262. ===================================================================================================
  1263. ===================================================================================================
  1264. | Looking for Drupal plugins/modules
  1265. |
  1266. | GET,HEAD,POST,OPTIONS
  1267. ===================================================================================================
  1268. ===================================================================================================
  1269. | WEB SERVICES
  1270. |
  1271. ===================================================================================================
  1272. | FAVICON.ICO
  1273. |
  1274. ===================================================================================================
  1275. | ERROR INFORMATION
  1276. |
  1277. ===================================================================================================
  1278. | TYPE ERROR
  1279. |
  1280. | http://www.unwantedforums.net/N-QurSEqGk6$YCq*dt^t.php responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .php doesn't exist! any results from this server may be void
  1281. | http://www.unwantedforums.net/kP<q%|j5A}2XnYsw8r[e.html responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .html doesn't exist! any results from this server may be void
  1282. | http://www.unwantedforums.net/*>[pj]N,7=_DE\t6=If.htm responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .htm doesn't exist! any results from this server may be void
  1283. | http://www.unwantedforums.net/b1EjFnN}^zrD*/rEOB*.aspx responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .aspx doesn't exist! any results from this server may be void
  1284. | http://www.unwantedforums.net/(hGLP0gdQ@-Fgx2Rky-{.asp responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .asp doesn't exist! any results from this server may be void
  1285. | http://www.unwantedforums.net/zR\3rbr'c@V2|]w(A.jsp responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .jsp doesn't exist! any results from this server may be void
  1286. | http://www.unwantedforums.net/A//>dR@N^h`Q}`AzH2c.cgi responded with code: 200 the server might just responde with this code even when the dir, file, or Extention: .cgi doesn't exist! any results from this server may be void
  1287. ===================================================================================================
  1288. | SERVER MOBILE
  1289. |
  1290. | index page reqested with an Iphone UserAgent is diferent then with a regular UserAgent. This Host may have a mobile site
  1291. ===================================================================================================
  1292. | LANGUAGE
  1293. |
  1294. | xml:lang="en"
  1295. | lang="en"
  1296. ===================================================================================================
  1297. | INTERESTING STRINGS IN HTML
  1298. |
  1299. | strong>Password:
  1300. | input name="quick_password" id="quick_login_password" type="password" value="" class="textbox" />
  1301. | a href="http://www.unwantedforums.net/member.php?action=lostpw" class="lost_password">Lost Password?
  1302. | a href="http://www.unwantedforums.net/member.php?action=login" onclick="$('#quick_login').modal({ fadeDuration: 250, keepelement: true }); return false;" class="login">Login
  1303. | div class="modal" id="quick_login" style="display: none;">
  1304. | input name="action" type="hidden" value="do_login" />
  1305. | input name="quick_login" type="hidden" value="1" />
  1306. | strong>Login
  1307. | input name="quick_username" id="quick_login_username" type="text" value="" class="textbox initial_focus" />
  1308. | input name="quick_remember" id="quick_login_remember" type="checkbox" value="yes" class="checkbox" checked="checked" />
  1309. | label for="quick_login_remember">Remember me
  1310. | input name="submit" type="submit" class="button" value="Login" />
  1311. | script type="text/javascript"> $("#quick_login input[name='url']").val($(location).attr('href'));
  1312. ===================================================================================================
  1313. | WHOIS
  1314. |
  1315. |
  1316. |
  1317. | Whois Server Version 2.0
  1318. |
  1319. |
  1320. |
  1321. |
  1322. |
  1323. |
  1324. |
  1325. |
  1326. |
  1327. |
  1328. |
  1329. | No match for "WWW.UNWANTEDFORUMS.NET".
  1330. |
  1331. | >>> Last update of whois database: Sun, 05 Jul 2015 04:34:13 GMT <<<
  1332. |
  1333. |
  1334. |
  1335. |
  1336. |
  1337. |
  1338. |
  1339. |
  1340. |
  1341. |
  1342. |
  1343. |
  1344. |
  1345. |
  1346. |
  1347. |
  1348. |
  1349. |
  1350. |
  1351. |
  1352. |
  1353. | Registrars.
  1354. |
  1355. |
  1356. |
  1357. | For more information on Whois status codes, please visit
  1358. |
  1359. | https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en.
  1360. |
  1361. ===================================================================================================
  1362. | BANNER GRABBING:
  1363. ===================================================================================================
  1364. ===================================================================================================
  1365. | PING
  1366. |
  1367. | PING unwantedforums.net (31.170.160.239) 56(84) bytes of data.
  1368. | 64 bytes from 31.170.160.239: icmp_req=1 ttl=128 time=44.0 ms
  1369. | 64 bytes from 31.170.160.239: icmp_req=2 ttl=128 time=45.5 ms
  1370. | 64 bytes from 31.170.160.239: icmp_req=3 ttl=128 time=44.2 ms
  1371. | 64 bytes from 31.170.160.239: icmp_req=4 ttl=128 time=55.6 ms
  1372. |
  1373. | --- unwantedforums.net ping statistics ---
  1374. | 4 packets transmitted, 4 received, 0% packet loss, time 3019ms
  1375. | rtt min/avg/max/mdev = 44.073/47.383/55.674/4.823 ms
  1376. ===================================================================================================
  1377. | TRACEROUTE
  1378. |
  1379. | traceroute to www.unwantedforums.net (31.170.160.239), 30 hops max, 60 byte packets
  1380. | 1 192.168.198.2 (192.168.198.2) 14.657 ms 14.534 ms 14.419 ms
  1381. | 2 * * *
  1382. | 3 * * *
  1383. | 4 * * *
  1384. | 5 * * *
  1385. | 6 * * *
  1386. | 7 * * *
  1387. | 8 * * *
  1388. | 9 * * *
  1389. | 10 * * *
  1390. | 11 * * *
  1391. | 12 * * *
  1392. | 13 * * *
  1393. | 14 * * *
  1394. | 15 * * *
  1395. | 16 * * *
  1396. | 17 * * *
  1397. | 18 * * *
  1398. | 19 * * *
  1399. | 20 * * *
  1400. | 21 * * *
  1401. | 22 * * *
  1402. | 23 * * *
  1403. | 24 * * *
  1404. | 25 * * *
  1405. | 26 * * *
  1406. | 27 * * *
  1407. | 28 * * *
  1408. | 29 * * *
  1409. | 30 * * *
  1410. ===================================================================================================
  1411. | NSLOOKUP
  1412. |
  1413. | Server: 192.168.198.2
  1414. | Address: 192.168.198.2#53
  1415. |
  1416. | Non-authoritative answer:
  1417. | www.unwantedforums.net canonical name = unwantedforums.net.
  1418. | unwantedforums.net mail exchanger = 0 aspmx.l.google.com.
  1419. | Authoritative answers can be found from:
  1420. | unwantedforums.net
  1421. | origin = ns01.000webhost.com
  1422. | mail addr = freehosting.000webhost.com
  1423. | serial = 2015022401
  1424. | refresh = 172800
  1425. | retry = 7200
  1426. | expire = 3600000
  1427. | minimum = 172800
  1428. | unwantedforums.net nameserver = ns02.000webhost.com.
  1429. | unwantedforums.net nameserver = ns01.000webhost.com.
  1430. | Name: unwantedforums.net
  1431. | Address: 31.170.160.239
  1432. ===================================================================================================
  1433. | NMAP
  1434. |
  1435. ####################################
  1436. # Uniscan project #
  1437. # http://uniscan.sourceforge.net/ #
  1438. ####################################
  1439. V. 6.2
  1440.  
  1441.  
  1442. New version 6.3 is avaliable
  1443. More details in http://uniscan.sourceforge.net/
  1444.  
  1445.  
  1446. | [*] Uniscan has updated to newest version
  1447. ####################################
  1448. # Uniscan project #
  1449. # http://uniscan.sourceforge.net/ #
  1450. ####################################
  1451. V. 6.3
  1452.  
  1453.  
  1454. Scan date: 25-7-2015 22:16:3
  1455. ===================================================================================================
  1456. | Domain: http://anxy-powered.info/
  1457. | Server: cloudflare-nginx
  1458. | IP: 104.27.191.243
  1459. ===================================================================================================
  1460. ===================================================================================================
  1461. | Looking for Drupal plugins/modules
  1462. |
  1463. ===================================================================================================
  1464. | WEB SERVICES
  1465. |
  1466. ===================================================================================================
  1467. | FAVICON.ICO
  1468. |
  1469. | Web service Found (favicon.ico): Invision Power Services IP.Board
  1470. ===================================================================================================
  1471. | ERROR INFORMATION
  1472. |
  1473. | Just a moment... Please turn JavaScript on and reload the page. Checking your browser before accessing anxy-powered.info. This process is automatic. Your browser will redirect to your requested content shortly. Please allow up to 5 seconds&hellip; DDoS protection by CloudFlare Ray ID: 20bcf18fdcfd0a00
  1474. | Just a moment... Please turn JavaScript on and reload the page. Checking your browser before accessing anxy-powered.info. This process is automatic. Your browser will redirect to your requested content shortly. Please allow up to 5 seconds&hellip; DDoS protection by CloudFlare Ray ID: 20bcf1902d090a00
  1475. ===================================================================================================
  1476. | TYPE ERROR
  1477. |
  1478. ===================================================================================================
  1479. | SERVER MOBILE
  1480. |
  1481. | index page reqested with an Iphone UserAgent is diferent then with a regular UserAgent. This Host may have a mobile site
  1482. ===================================================================================================
  1483. | LANGUAGE
  1484. |
  1485. | lang="en-US"
  1486. ===================================================================================================
  1487. | INTERESTING STRINGS IN HTML
  1488. |
  1489. ===================================================================================================
  1490. | WHOIS
  1491. |
  1492. | Domain Name:ANXY-POWERED.INFO
  1493. |
  1494. | Domain ID: D54505318-LRMS
  1495. |
  1496. | Creation Date: 2015-02-06T22:47:52Z
  1497. |
  1498. | Updated Date: 2015-07-18T21:44:16Z
  1499. |
  1500. | Registry Expiry Date: 2016-02-06T22:47:52Z
  1501. |
  1502. | Sponsoring Registrar:Crazy Domains FZ-LLC (R559-LRMS)
  1503. |
  1504. | Sponsoring Registrar IANA ID: 1291
  1505. |
  1506. | WHOIS Server:
  1507. |
  1508. | Referral URL:
  1509. |
  1510. | Domain Status: ok -- http://www.icann.org/epp#ok
  1511. |
  1512. | Registrant ID:R-019525766-SN
  1513. |
  1514. | Registrant Name:Luke Floyd
  1515. |
  1516. | Registrant Organization:
  1517. |
  1518. | Registrant Street: 69 The Shiz Lane
  1519. |
  1520. | Registrant City:Soton
  1521. |
  1522. | Registrant State/Province:SA
  1523. |
  1524. | Registrant Postal Code:blah bla
  1525. |
  1526. | Registrant Country:GB
  1527. |
  1528. | Registrant Phone:+44.7123456789
  1529. |
  1530. | Registrant Phone Ext:
  1531. |
  1532. | Registrant Fax:
  1533. |
  1534. | Registrant Fax Ext:
  1535. |
  1536. | Registrant Email:moreemodz@gmail.com
  1537. |
  1538. | Admin ID:C-007353477-SN
  1539. |
  1540. | Admin Name:Bulldogz Modz
  1541. |
  1542. | Admin Organization:
  1543. |
  1544. | Admin Street: 69 The Shiz Lane
  1545. |
  1546. | Admin City:Soton
  1547. |
  1548. | Admin State/Province:SA
  1549. |
  1550. | Admin Postal Code:blah bla
  1551. |
  1552. | Admin Country:GB
  1553. |
  1554. | Admin Phone:+44.7123456789
  1555. |
  1556. | Admin Phone Ext:
  1557. |
  1558. | Admin Fax:
  1559. |
  1560. | Admin Fax Ext:
  1561. |
  1562. | Admin Email:moreemodz@gmail.com
  1563. |
  1564. | Billing ID:C-007353477-SN
  1565. |
  1566. | Billing Name:Bulldogz Modz
  1567. |
  1568. | Billing Organization:
  1569. |
  1570. | Billing Street: 69 The Shiz Lane
  1571. |
  1572. | Billing City:Soton
  1573. |
  1574. | Billing State/Province:SA
  1575. |
  1576. | Billing Postal Code:blah bla
  1577. |
  1578. | Billing Country:GB
  1579. |
  1580. | Billing Phone:+44.7123456789
  1581. |
  1582. | Billing Phone Ext:
  1583. |
  1584. | Billing Fax:
  1585. |
  1586. | Billing Fax Ext:
  1587. |
  1588. | Billing Email:moreemodz@gmail.com
  1589. |
  1590. | Tech ID:C-007353477-SN
  1591. |
  1592. | Tech Name:Bulldogz Modz
  1593. |
  1594. | Tech Organization:
  1595. |
  1596. | Tech Street: 69 The Shiz Lane
  1597. |
  1598. | Tech City:Soton
  1599. |
  1600. | Tech State/Province:SA
  1601. |
  1602. | Tech Postal Code:blah bla
  1603. |
  1604. | Tech Country:GB
  1605. |
  1606. | Tech Phone:+44.7123456789
  1607. |
  1608. | Tech Phone Ext:
  1609. |
  1610. | Tech Fax:
  1611. |
  1612. | Tech Fax Ext:
  1613. |
  1614. | Tech Email:moreemodz@gmail.com
  1615. |
  1616. | Name Server:DILBERT.NS.CLOUDFLARE.COM
  1617. |
  1618. | Name Server:ETTA.NS.CLOUDFLARE.COM
  1619. |
  1620. | Name Server:
  1621. |
  1622. | Name Server:
  1623. |
  1624. | Name Server:
  1625. |
  1626. | Name Server:
  1627. |
  1628. | Name Server:
  1629. |
  1630. | Name Server:
  1631. |
  1632. | Name Server:
  1633. |
  1634. | Name Server:
  1635. |
  1636. | Name Server:
  1637. |
  1638. | Name Server:
  1639. |
  1640. | Name Server:
  1641. |
  1642. | DNSSEC:Unsigned
  1643. |
  1644. |
  1645. |
  1646. | Access to AFILIAS WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Afilias registry database. The data in this record is provided by Afilias Limited for informational purposes only, and Afilias does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient's own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Afilias By submitting this query, you agree to abide by this policy. For more information on Whois status codes, please visit https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en.
  1647. |
  1648. |
  1649. |
  1650. |
  1651. |
  1652. ===================================================================================================
  1653. | BANNER GRABBING:
  1654. | Refresh: 8;URL=/cdn-cgi/l/chk_jschl?pass=1437880569.269-Y2uoqrpJyP
  1655. ===================================================================================================
  1656. ===================================================================================================
  1657. | PING
  1658. |
  1659. | PING anxy-powered.info (104.27.190.243) 56(84) bytes of data.
  1660. | 64 bytes from 104.27.190.243: icmp_req=1 ttl=128 time=40.5 ms
  1661. | 64 bytes from 104.27.190.243: icmp_req=2 ttl=128 time=37.5 ms
  1662. | 64 bytes from 104.27.190.243: icmp_req=3 ttl=128 time=48.0 ms
  1663. | 64 bytes from 104.27.190.243: icmp_req=4 ttl=128 time=47.7 ms
  1664. |
  1665. | --- anxy-powered.info ping statistics ---
  1666. | 4 packets transmitted, 4 received, 0% packet loss, time 3009ms
  1667. | rtt min/avg/max/mdev = 37.520/43.460/48.049/4.555 ms
  1668. ===================================================================================================
  1669. | TRACEROUTE
  1670. |
  1671. | traceroute to anxy-powered.info (104.27.190.243), 30 hops max, 60 byte packets
  1672. | 1 192.168.198.2 (192.168.198.2) 0.405 ms 0.277 ms 0.118 ms
  1673. | 2 * * *
  1674. | 3 * * *
  1675. | 4 * * *
  1676. | 5 * * *
  1677. | 6 * * *
  1678. | 7 * * *
  1679. | 8 * * *
  1680. | 9 * * *
  1681. | 10 * * *
  1682. | 11 * * *
  1683. | 12 * * *
  1684. | 13 * * *
  1685. | 14 * * *
  1686. | 15 * * *
  1687. | 16 * * *
  1688. | 17 * * *
  1689. | 18 * * *
  1690. | 19 * * *
  1691. | 20 * * *
  1692. | 21 * * *
  1693. | 22 * * *
  1694. | 23 * * *
  1695. | 24 * * *
  1696. | 25 * * *
  1697. | 26 * * *
  1698. | 27 * * *
  1699. | 28 * * *
  1700. | 29 * * *
  1701. | 30 * * *
  1702. ===================================================================================================
  1703. | NSLOOKUP
  1704. |
  1705. | Server: 192.168.198.2
  1706. | Address: 192.168.198.2#53
  1707. |
  1708. | Non-authoritative answer:
  1709. | anxy-powered.info mail exchanger = 0 dc-c3d9683e.anxy-powered.info.
  1710. | Authoritative answers can be found from:
  1711. | *** Can't find anxy-powered.info: No answer
  1712. | anxy-powered.info
  1713. | origin = dilbert.ns.cloudflare.com
  1714. | mail addr = dns.cloudflare.com
  1715. | serial = 2018909036
  1716. | refresh = 10000
  1717. | retry = 2400
  1718. | expire = 604800
  1719. | minimum = 3600
  1720. | anxy-powered.info nameserver = etta.ns.cloudflare.com.
  1721. | anxy-powered.info nameserver = dilbert.ns.cloudflare.com.
  1722. | Name: anxy-powered.info
  1723. | Address: 104.27.190.243
  1724. | Address: 104.27.191.243
  1725. | anxy-powered.info text = "v=spf1 +a +mx +ip4:27.124.120.1 include:_spf.syrahost.com ?all"
  1726. | anxy-powered.info text = "Zone hosted on webcloud45.au.syrahost.com"
  1727. | anxy-powered.info has AAAA address 2400:cb00:2048:1::681b:bff3
  1728. | anxy-powered.info has AAAA address 2400:cb00:2048:1::681b:bef3
  1729. ===================================================================================================
  1730. | NMAP
  1731. |
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement