Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@javanese:~# nmap -v -A suksesbersamammm.com
- Starting Nmap 6.47 ( http://nmap.org ) at 2014-09-06 02:06 WIB
- NSE: Loaded 118 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating Ping Scan at 02:06
- Scanning suksesbersamammm.com (192.254.232.73) [4 ports]
- Completed Ping Scan at 02:06, 0.17s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 02:06
- Completed Parallel DNS resolution of 1 host. at 02:06, 16.50s elapsed
- Initiating SYN Stealth Scan at 02:06
- Scanning suksesbersamammm.com (192.254.232.73) [1000 ports]
- Discovered open port 993/tcp on 192.254.232.73
- Discovered open port 8080/tcp on 192.254.232.73
- Discovered open port 143/tcp on 192.254.232.73
- Discovered open port 587/tcp on 192.254.232.73
- Discovered open port 80/tcp on 192.254.232.73
- Discovered open port 995/tcp on 192.254.232.73
- Discovered open port 3306/tcp on 192.254.232.73
- Discovered open port 21/tcp on 192.254.232.73
- Discovered open port 110/tcp on 192.254.232.73
- Discovered open port 443/tcp on 192.254.232.73
- Discovered open port 53/tcp on 192.254.232.73
- Discovered open port 2222/tcp on 192.254.232.73
- Discovered open port 465/tcp on 192.254.232.73
- Discovered open port 26/tcp on 192.254.232.73
- Completed SYN Stealth Scan at 02:06, 14.97s elapsed (1000 total ports)
- Initiating Service scan at 02:06
- Scanning 14 services on suksesbersamammm.com (192.254.232.73)
- Completed Service scan at 02:07, 33.06s elapsed (14 services on 1 host)
- Initiating OS detection (try #1) against suksesbersamammm.com (192.254.232.73)
- Retrying OS detection (try #2) against suksesbersamammm.com (192.254.232.73)
- WARNING: OS didn't match until try #2
- Initiating Traceroute at 02:07
- Completed Traceroute at 02:07, 0.03s elapsed
- Initiating Parallel DNS resolution of 4 hosts. at 02:07
- Completed Parallel DNS resolution of 4 hosts. at 02:07, 16.50s elapsed
- NSE: Script scanning 192.254.232.73.
- Initiating NSE at 02:07
- Completed NSE at 02:10, 150.62s elapsed
- Nmap scan report for suksesbersamammm.com (192.254.232.73)
- Host is up (0.12s latency).
- Not shown: 952 closed ports, 34 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- 26/tcp open smtp Exim smtpd 4.82
- | smtp-commands: gator3216.hostgator.com Hello suksesbersamammm.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- 53/tcp open domain
- 80/tcp open http-proxy Squid http proxy
- |_http-favicon: Unknown favicon MD5: B845C4830A13B85CE16911B8B413BD9C
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-title: MMM INDONESIA | PANDUAN MMM INDONESIA | SUKSES BERSAMA MMM IND...
- 110/tcp open pop3 Dovecot pop3d
- |_pop3-capabilities: SASL(PLAIN LOGIN) STLS CAPA UIDL AUTH-RESP-CODE USER PIPELINING TOP RESP-CODES
- 143/tcp open imap Dovecot imapd
- |_imap-capabilities: AUTH=LOGINA0001 OK ID more AUTH=PLAIN IDLE ENABLE NAMESPACE post-login LOGIN-REFERRALS SASL-IR LITERAL+ Pre-login STARTTLS have listed capabilities IMAP4rev1
- 443/tcp open http Apache httpd
- |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- | http-robots.txt: 1 disallowed entry
- |_/
- |_http-title: suksesbersamammm.com
- 465/tcp open ssl/smtp Exim smtpd 4.82
- | smtp-commands: gator3216.hostgator.com Hello suksesbersamammm.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- |_ Commands supported:
- 587/tcp open smtp Exim smtpd 4.82
- | smtp-commands: gator3216.hostgator.com Hello suksesbersamammm.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=*.hostgator.com
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- |_SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- |_ssl-date: 2014-09-05T19:06:48+00:00; -53s from local time.
- 993/tcp open ssl/imap Dovecot imapd
- |_imap-capabilities: AUTH=LOGINA0001 OK ID more AUTH=PLAIN IDLE ENABLE NAMESPACE post-login LOGIN-REFERRALS SASL-IR LITERAL+ Pre-login capabilities have listed IMAP4rev1
- | ssl-cert: Subject: commonName=*.hostgator.com
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- |_SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- |_ssl-date: 2014-09-05T19:06:47+00:00; -54s from local time.
- 995/tcp open ssl/pop3 Dovecot pop3d
- |_pop3-capabilities: CAPA UIDL TOP SASL(PLAIN LOGIN) USER PIPELINING AUTH-RESP-CODE RESP-CODES
- | ssl-cert: Subject: commonName=*.hostgator.com
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- |_SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- |_ssl-date: 2014-09-05T19:06:48+00:00; -54s from local time.
- 2222/tcp open ssh OpenSSH 5.3 (protocol 2.0)
- |_ssh-hostkey:
- 3306/tcp open mysql MySQL 5.5.37-35.1
- | mysql-info:
- | Protocol: 53
- | Version: .5.37-35.1
- | Thread ID: 10183475
- | Capabilities flags: 65535
- | Some Capabilities: IgnoreSpaceBeforeParenthesis, InteractiveClient, DontAllowDatabaseTableColumn, Support41Auth, SupportsCompression, SupportsTransactions, LongPassword, Speaks41ProtocolOld, IgnoreSigpipes, SupportsLoadDataLocal, ODBCClient, SwitchToSSLAfterHandshake, Speaks41ProtocolNew, LongColumnFlag, ConnectWithDatabase, FoundRows
- | Status: Autocommit
- |_ Salt: 3)q}DzY.v-zAr>{qFGq%
- 8080/tcp open http nginx 1.6.1
- |_http-favicon: Unknown favicon MD5: B845C4830A13B85CE16911B8B413BD9C
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-title: MMM INDONESIA | PANDUAN MMM INDONESIA | SUKSES BERSAMA MMM IND...
- Device type: WAP|storage-misc
- Running: Linux 2.4.X, Netgear RAIDiator 4.X
- OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:netgear:raidiator:4
- OS details: DD-WRT v23 (Linux 2.4.36), Netgear ReadyNAS Duo NAS device (RAIDiator 4.1.4)
- Uptime guess: 78.365 days (since Thu Jun 19 17:24:22 2014)
- Network Distance: 4 hops
- Service Info: Host: gator3216.hostgator.com
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 0.70 ms 192.168.200.1
- 2 3.28 ms 192.168.30.1
- 3 3.79 ms 172.16.1.1
- 4 7.29 ms 192.254.232.73
- NSE: Script Post-scanning.
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 239.75 seconds
- Raw packets sent: 1187 (54.300KB) | Rcvd: 1021 (47.750KB)
- root@javanese:~# nmap 192.255.232.73
- Starting Nmap 6.47 ( http://nmap.org ) at 2014-09-06 02:14 WIB
- Nmap scan report for client-192-255-232-73.hostwindsdns.com (192.255.232.73)
- Host is up (0.046s latency).
- Not shown: 988 filtered ports
- PORT STATE SERVICE
- 20/tcp closed ftp-data
- 21/tcp open ftp
- 22/tcp open ssh
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- Nmap done: 1 IP address (1 host up) scanned in 43.72 seconds
- root@javanese:~# nmap -v -A suksesbersamammm.com -d
- Starting Nmap 6.47 ( http://nmap.org ) at 2014-09-06 02:47 WIB
- PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0)
- --------------- Timing report ---------------
- hostgroups: min 1, max 100000
- rtt-timeouts: init 1000, min 100, max 10000
- max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
- parallelism: min 0, max 0
- max-retries: 10, host-timeout: 0
- min-rate: 0, max-rate: 0
- ---------------------------------------------
- NSE: Using Lua 5.2.
- NSE: Script Arguments seen from CLI:
- NSE: Loaded 118 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating Ping Scan at 02:47
- Scanning suksesbersamammm.com (192.254.232.73) [4 ports]
- Packet capture filter (device eth0): dst host 192.168.200.23 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 192.254.232.73)))
- We got a TCP ping packet back from 192.254.232.73 port 80 (trynum = 0)
- Completed Ping Scan at 02:47, 0.06s elapsed (1 total hosts)
- Overall sending rates: 65.47 packets / s, 2487.93 bytes / s.
- mass_rdns: Using DNS server 192.168.200.1
- mass_rdns: Using DNS server 202.134.1.10
- mass_rdns: Using DNS server 8.8.8.8
- Initiating Parallel DNS resolution of 1 host. at 02:47
- mass_rdns: 16.50s 0/1 [#: 3, OK: 0, NX: 0, DR: 0, SF: 0, TR: 6]
- Completed Parallel DNS resolution of 1 host. at 02:47, 16.50s elapsed
- DNS resolution of 1 IPs took 16.50s. Mode: Async [#: 3, OK: 0, NX: 0, DR: 1, SF: 0, TR: 6, CN: 0]
- Initiating SYN Stealth Scan at 02:47
- Scanning suksesbersamammm.com (192.254.232.73) [1000 ports]
- Packet capture filter (device eth0): dst host 192.168.200.23 and (icmp or icmp6 or ((tcp or udp or sctp) and (src host 192.254.232.73)))
- Discovered open port 80/tcp on 192.254.232.73
- Discovered open port 993/tcp on 192.254.232.73
- Discovered open port 443/tcp on 192.254.232.73
- Discovered open port 3306/tcp on 192.254.232.73
- Discovered open port 143/tcp on 192.254.232.73
- Discovered open port 21/tcp on 192.254.232.73
- Discovered open port 110/tcp on 192.254.232.73
- Discovered open port 995/tcp on 192.254.232.73
- Discovered open port 587/tcp on 192.254.232.73
- Discovered open port 8080/tcp on 192.254.232.73
- Discovered open port 53/tcp on 192.254.232.73
- Increased max_successful_tryno for 192.254.232.73 to 1 (packet drop)
- Discovered open port 2222/tcp on 192.254.232.73
- Increased max_successful_tryno for 192.254.232.73 to 2 (packet drop)
- Discovered open port 26/tcp on 192.254.232.73
- Discovered open port 465/tcp on 192.254.232.73
- Increased max_successful_tryno for 192.254.232.73 to 3 (packet drop)
- Completed SYN Stealth Scan at 02:48, 29.90s elapsed (1000 total ports)
- Overall sending rates: 40.53 packets / s, 1783.04 bytes / s.
- Initiating Service scan at 02:48
- Scanning 14 services on suksesbersamammm.com (192.254.232.73)
- Got nsock CONNECT response with status ERROR - aborting this service
- Completed Service scan at 02:48, 24.11s elapsed (14 services on 1 host)
- Packet capture filter (device eth0): dst host 192.168.200.23 and (icmp or (tcp and (src host 192.254.232.73)))
- Initiating OS detection (try #1) against suksesbersamammm.com (192.254.232.73)
- OS detection timingRatio() == (1409946514.314 - 1409946513.814) * 1000 / 500 == 1.002
- Retrying OS detection (try #2) against suksesbersamammm.com (192.254.232.73)
- Insufficient responses from 192.254.232.73 for TCP sequencing (2), OS detection may be less accurate
- OS detection timingRatio() == (1409946517.691 - 1409946517.190) * 1000 / 500 == 1.000
- WARNING: OS didn't match until try #2
- Packet capture filter (device eth0): (ip or ip6) and dst host 192.168.200.23
- Initiating Traceroute at 02:48
- Completed Traceroute at 02:48, 0.05s elapsed
- Initiating Parallel DNS resolution of 4 hosts. at 02:48
- mass_rdns: 0.00s 0/4 [#: 3, OK: 0, NX: 0, DR: 0, SF: 0, TR: 4]
- Completed Parallel DNS resolution of 4 hosts. at 02:48, 16.50s elapsed
- DNS resolution of 4 IPs took 16.50s. Mode: Async [#: 3, OK: 0, NX: 3, DR: 1, SF: 0, TR: 9, CN: 0]
- NSE: Script scanning 192.254.232.73.
- NSE: Starting runlevel 1 (of 2) scan.
- NSE: Starting address-info against suksesbersamammm.com (192.254.232.73).
- NSE: Starting imap-capabilities against suksesbersamammm.com (192.254.232.73:143).
- NSE: Starting ssh-hostkey against suksesbersamammm.com (192.254.232.73:2222).
- NSE: Starting sshv1 against suksesbersamammm.com (192.254.232.73:2222).
- NSE: Starting http-auth against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Starting http-cors against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Starting http-favicon against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Starting http-generator against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Starting http-git against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Starting http-methods against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Starting http-ntlm-info against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Starting http-open-proxy against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Starting http-robots.txt against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Starting http-title against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Starting mysql-info against suksesbersamammm.com (192.254.232.73:3306).
- NSE: Starting pop3-capabilities against suksesbersamammm.com (192.254.232.73:995).
- NSE: Starting ssl-cert against suksesbersamammm.com (192.254.232.73:995).
- NSE: Starting ssl-date against suksesbersamammm.com (192.254.232.73:995).
- NSE: Starting ssl-known-key against suksesbersamammm.com (192.254.232.73:995).
- NSE: Starting sslv2 against suksesbersamammm.com (192.254.232.73:995).
- NSE: Starting tls-nextprotoneg against suksesbersamammm.com (192.254.232.73:995).
- NSE: Starting imap-capabilities against suksesbersamammm.com (192.254.232.73:993).
- NSE: Starting ssl-cert against suksesbersamammm.com (192.254.232.73:993).
- NSE: Starting ssl-date against suksesbersamammm.com (192.254.232.73:993).
- NSE: Starting ssl-known-key against suksesbersamammm.com (192.254.232.73:993).
- NSE: Starting sslv2 against suksesbersamammm.com (192.254.232.73:993).
- NSE: Starting tls-nextprotoneg against suksesbersamammm.com (192.254.232.73:993).
- NSE: Starting dns-nsid against suksesbersamammm.com (192.254.232.73:53).
- NSE: Starting smtp-commands against suksesbersamammm.com (192.254.232.73:587).
- NSE: Starting ssl-cert against suksesbersamammm.com (192.254.232.73:587).
- NSE: Starting ssl-date against suksesbersamammm.com (192.254.232.73:587).
- NSE: Starting ssl-known-key against suksesbersamammm.com (192.254.232.73:587).
- NSE: Starting sslv2 against suksesbersamammm.com (192.254.232.73:587).
- NSE: Starting tls-nextprotoneg against suksesbersamammm.com (192.254.232.73:587).
- NSE: Starting rpc-grind against suksesbersamammm.com (192.254.232.73:465).
- NSE: Starting smtp-commands against suksesbersamammm.com (192.254.232.73:465).
- NSE: Starting ssl-cert against suksesbersamammm.com (192.254.232.73:465).
- NSE: Starting ssl-date against suksesbersamammm.com (192.254.232.73:465).
- NSE: Starting ssl-known-key against suksesbersamammm.com (192.254.232.73:465).
- NSE: Starting sslv2 against suksesbersamammm.com (192.254.232.73:465).
- NSE: Starting tls-nextprotoneg against suksesbersamammm.com (192.254.232.73:465).
- NSE: Starting ftp-anon against suksesbersamammm.com (192.254.232.73:21).
- NSE: Starting ftp-bounce against suksesbersamammm.com (192.254.232.73:21).
- NSE: Starting ssl-cert against suksesbersamammm.com (192.254.232.73:21).
- NSE: Starting ssl-date against suksesbersamammm.com (192.254.232.73:21).
- NSE: Starting http-auth against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting http-cors against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting http-favicon against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting http-generator against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting http-git against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting http-methods against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting http-ntlm-info against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting http-robots.txt against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting http-title against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting ssl-cert against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting ssl-date against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting ssl-known-key against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting sslv2 against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting sstp-discover against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting tls-nextprotoneg against suksesbersamammm.com (192.254.232.73:443).
- NSE: Starting smtp-commands against suksesbersamammm.com (192.254.232.73:26).
- NSE: Starting ssl-cert against suksesbersamammm.com (192.254.232.73:26).
- NSE: Starting ssl-date against suksesbersamammm.com (192.254.232.73:26).
- NSE: Starting pop3-capabilities against suksesbersamammm.com (192.254.232.73:110).
- NSE: Starting http-auth against suksesbersamammm.com (192.254.232.73:80).
- NSE: Starting http-cors against suksesbersamammm.com (192.254.232.73:80).
- NSE: Starting http-favicon against suksesbersamammm.com (192.254.232.73:80).
- NSE: Starting http-generator against suksesbersamammm.com (192.254.232.73:80).
- NSE: Starting http-git against suksesbersamammm.com (192.254.232.73:80).
- NSE: Starting http-methods against suksesbersamammm.com (192.254.232.73:80).
- NSE: Starting http-ntlm-info against suksesbersamammm.com (192.254.232.73:80).
- NSE: Starting http-open-proxy against suksesbersamammm.com (192.254.232.73:80).
- NSE: Starting http-robots.txt against suksesbersamammm.com (192.254.232.73:80).
- NSE: Starting http-title against suksesbersamammm.com (192.254.232.73:80).
- Initiating NSE at 02:48
- NSE: Finished address-info against suksesbersamammm.com (192.254.232.73).
- NSE: GET Request: GET http://www.google.com HTTP/1.0
- Host: www.google.com
- NSE: Finished sshv1 against suksesbersamammm.com (192.254.232.73:2222).
- NSE: HEAD Request: HEAD http://www.google.com HTTP/1.0
- Host: www.google.com
- NSE: CONNECT Request: CONNECT www.google.com:80 HTTP/1.0
- NSE: rpc-grind: isRPC didn't receive response.
- NSE: Target port 465 is not a RPC port.
- NSE: Finished rpc-grind against suksesbersamammm.com (192.254.232.73:465).
- NSE: Finished ssl-date against suksesbersamammm.com (192.254.232.73:995).
- NSE: Test 1 - Google Web Server
- Received valid status codes, but pattern does not match
- NSE: Finished sslv2 against suksesbersamammm.com (192.254.232.73:587).
- NSE: GET Request: GET http://www.wikipedia.org HTTP/1.0
- Host: www.wikipedia.org
- NSE: Finished sslv2 against suksesbersamammm.com (192.254.232.73:465).
- NSE: tls-nextprotoneg: Server does not support TLS NPN extension.
- NSE: Finished tls-nextprotoneg against suksesbersamammm.com (192.254.232.73:465).
- NSE: Finished ssl-cert against suksesbersamammm.com (192.254.232.73:995).
- NSE: Finished imap-capabilities against suksesbersamammm.com (192.254.232.73:143).
- NSE: GET Request: GET http://www.google.com HTTP/1.0
- Host: www.google.com
- NSE: Finished smtp-commands against suksesbersamammm.com (192.254.232.73:587).
- NSE: HEAD Request: HEAD http://www.wikipedia.org HTTP/1.0
- Host: www.wikipedia.org
- NSE: Finished smtp-commands against suksesbersamammm.com (192.254.232.73:26).
- NSE: Finished ssl-date against suksesbersamammm.com (192.254.232.73:21).
- NSE: Finished ssl-date against suksesbersamammm.com (192.254.232.73:587).
- NSE: Finished http-robots.txt against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished http-title against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished pop3-capabilities against suksesbersamammm.com (192.254.232.73:995).
- NSE: Finished smtp-commands against suksesbersamammm.com (192.254.232.73:465).
- NSE: Finished sstp-discover against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished http-robots.txt against suksesbersamammm.com (192.254.232.73:80).
- NSE: http-methods.nse: HTTP Status for OPTIONS is 200
- NSE: Finished http-methods against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished ssh-hostkey against suksesbersamammm.com (192.254.232.73:2222).
- NSE: CONNECT Request: CONNECT www.wikipedia.org:80 HTTP/1.0
- NSE: Test 2 - Wikipedia.org
- Received valid status codes, but pattern does not match
- NSE: Finished mysql-info against suksesbersamammm.com (192.254.232.73:3306).
- NSE: GET Request: GET http://www.computerhistory.org HTTP/1.0
- Host: www.computerhistory.org
- NSE: tls-nextprotoneg: Server does not support TLS NPN extension.
- NSE: Finished tls-nextprotoneg against suksesbersamammm.com (192.254.232.73:993).
- NSE: Finished ftp-bounce against suksesbersamammm.com (192.254.232.73:21).
- NSE: Couldn't receive: EOF
- NSE: Finished tls-nextprotoneg against suksesbersamammm.com (192.254.232.73:443).
- NSE: Couldn't receive: EOF
- NSE: Finished ssl-date against suksesbersamammm.com (192.254.232.73:443).
- NSE: ftp-anon against suksesbersamammm.com (192.254.232.73:21) threw an error!
- ERROR
- stack traceback:
- [C]: in function 'try'
- /usr/bin/../share/nmap/scripts/ftp-anon.nse:122: in function </usr/bin/../share/nmap/scripts/ftp-anon.nse:99>
- (...tail calls...)
- NSE: Finished http-favicon against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished sslv2 against suksesbersamammm.com (192.254.232.73:993).
- NSE: CONNECT Request: CONNECT www.computerhistory.org:80 HTTP/1.0
- NSE: sslcert.getCertificate error: Failed to connect to server
- NSE: Finished ssl-known-key against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished http-open-proxy against suksesbersamammm.com (192.254.232.73:80).
- NSE: Can't send: ERROR
- NSE: Finished ssl-date against suksesbersamammm.com (192.254.232.73:465).
- NSE: Finished pop3-capabilities against suksesbersamammm.com (192.254.232.73:110).
- NSE: Finished ssl-cert against suksesbersamammm.com (192.254.232.73:26).
- NSE: Finished http-git against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Finished ssl-date against suksesbersamammm.com (192.254.232.73:993).
- NSE: tls-nextprotoneg: Server does not support TLS NPN extension.
- NSE: Finished tls-nextprotoneg against suksesbersamammm.com (192.254.232.73:995).
- NSE: Finished http-auth against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished http-ntlm-info against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished http-generator against suksesbersamammm.com (192.254.232.73:80).
- NSE: Finished http-git against suksesbersamammm.com (192.254.232.73:80).
- NSE: Finished http-generator against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished http-ntlm-info against suksesbersamammm.com (192.254.232.73:80).
- NSE: Finished http-favicon against suksesbersamammm.com (192.254.232.73:80).
- NSE: Finished http-title against suksesbersamammm.com (192.254.232.73:80).
- NSE: Finished sslv2 against suksesbersamammm.com (192.254.232.73:995).
- NSE: Finished ssl-cert against suksesbersamammm.com (192.254.232.73:993).
- NSE: Finished http-ntlm-info against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Finished ssl-date against suksesbersamammm.com (192.254.232.73:26).
- NSE: Finished http-generator against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Finished imap-capabilities against suksesbersamammm.com (192.254.232.73:993).
- NSE: HEAD Request: HEAD http://www.google.com HTTP/1.0
- Host: www.google.com
- NSE: http-methods.nse: HTTP Status for OPTIONS is 200
- NSE: Finished http-methods against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Finished http-git against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished http-robots.txt against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Finished ssl-known-key against suksesbersamammm.com (192.254.232.73:587).
- NSE: http-methods.nse: HTTP Status for OPTIONS is 200
- NSE: Finished http-methods against suksesbersamammm.com (192.254.232.73:80).
- NSE: Finished ssl-cert against suksesbersamammm.com (192.254.232.73:21).
- NSE: sslcert.getCertificate error: Failed to connect to server
- NSE: Finished ssl-known-key against suksesbersamammm.com (192.254.232.73:465).
- NSE: dns.query() failed to resolve the requested query: id.server
- NSE: Finished ssl-cert against suksesbersamammm.com (192.254.232.73:443).
- NSE: Finished ssl-known-key against suksesbersamammm.com (192.254.232.73:995).
- NSE: Finished ssl-cert against suksesbersamammm.com (192.254.232.73:587).
- NSE: Finished ssl-cert against suksesbersamammm.com (192.254.232.73:465).
- NSE: Finished ssl-known-key against suksesbersamammm.com (192.254.232.73:993).
- NSE: Finished http-favicon against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Finished http-auth against suksesbersamammm.com (192.254.232.73:80).
- NSE: CONNECT Request: CONNECT www.google.com:80 HTTP/1.0
- NSE: Finished http-auth against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Finished http-title against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Test 1 - Google Web Server
- Received valid status codes, but pattern does not match
- NSE: GET Request: GET http://www.wikipedia.org HTTP/1.0
- Host: www.wikipedia.org
- NSE: dns.query() failed to resolve the requested query: version.bind
- NSE: Finished dns-nsid against suksesbersamammm.com (192.254.232.73:53).
- NSE: Couldn't receive: TIMEOUT
- NSE: Finished tls-nextprotoneg against suksesbersamammm.com (192.254.232.73:587).
- NSE: Finished http-cors against suksesbersamammm.com (192.254.232.73:443).
- NSE: HEAD Request: HEAD http://www.wikipedia.org HTTP/1.0
- Host: www.wikipedia.org
- NSE: Finished sslv2 against suksesbersamammm.com (192.254.232.73:443).
- NSE: CONNECT Request: CONNECT www.wikipedia.org:80 HTTP/1.0
- NSE: Test 2 - Wikipedia.org
- Received valid status codes, but pattern does not match
- NSE: GET Request: GET http://www.computerhistory.org HTTP/1.0
- Host: www.computerhistory.org
- NSE: CONNECT Request: CONNECT www.computerhistory.org:80 HTTP/1.0
- NSE: Finished http-open-proxy against suksesbersamammm.com (192.254.232.73:8080).
- NSE Timing: About 97.30% done; ETC: 02:49 (0:00:01 remaining)
- NSE: Finished http-cors against suksesbersamammm.com (192.254.232.73:8080).
- NSE: Finished http-cors against suksesbersamammm.com (192.254.232.73:80).
- Completed NSE at 02:49, 46.05s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Nmap scan report for suksesbersamammm.com (192.254.232.73)
- Host is up, received reset (0.087s latency).
- Scanned at 2014-09-06 02:47:22 WIB for 140s
- Not shown: 951 closed ports
- Reason: 951 resets
- PORT STATE SERVICE REASON VERSION
- 1/tcp filtered tcpmux no-response
- 3/tcp filtered compressnet no-response
- 4/tcp filtered unknown no-response
- 6/tcp filtered unknown no-response
- 7/tcp filtered echo no-response
- 9/tcp filtered discard no-response
- 13/tcp filtered daytime no-response
- 17/tcp filtered qotd no-response
- 19/tcp filtered chargen no-response
- 21/tcp open ftp syn-ack Pure-FTPd
- |_ftp-bounce: no banner
- 22/tcp filtered ssh no-response
- 23/tcp filtered telnet no-response
- 25/tcp filtered smtp no-response
- 26/tcp open smtp syn-ack Exim smtpd 4.82
- | smtp-commands: gator3216.hostgator.com Hello suksesbersamammm.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- |_ssl-date: 2014-09-05T19:48:06+00:00; -54s from local time.
- 53/tcp open domain syn-ack
- 80/tcp open http-proxy syn-ack Squid http proxy
- |_http-favicon: Unknown favicon MD5: B845C4830A13B85CE16911B8B413BD9C
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-title: MMM INDONESIA | PANDUAN MMM INDONESIA | SUKSES BERSAMA MMM IND...
- 110/tcp open pop3 syn-ack Dovecot pop3d
- |_pop3-capabilities: USER PIPELINING UIDL CAPA AUTH-RESP-CODE SASL(PLAIN LOGIN) STLS RESP-CODES TOP
- 111/tcp filtered rpcbind no-response
- 135/tcp filtered msrpc no-response
- 139/tcp filtered netbios-ssn no-response
- 143/tcp open imap syn-ack Dovecot imapd
- |_imap-capabilities: STARTTLS Pre-login SASL-IR LITERAL+ ID ENABLE NAMESPACE IMAP4rev1 capabilities LOGIN-REFERRALS more have AUTH=LOGINA0001 post-login IDLE listed AUTH=PLAIN OK
- 179/tcp filtered bgp no-response
- 443/tcp open http syn-ack Apache httpd
- |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- | http-robots.txt: 1 disallowed entry
- |_/
- |_http-title: Site doesn't have a title (text/html).
- 445/tcp filtered microsoft-ds no-response
- 465/tcp open smtps? syn-ack
- | smtp-commands: gator3216.hostgator.com Hello suksesbersamammm.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- |_ Commands supported:
- 514/tcp filtered shell no-response
- 587/tcp open smtp syn-ack Exim smtpd 4.82
- | smtp-commands: gator3216.hostgator.com Hello suksesbersamammm.com [180.246.64.148], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=*.hostgator.com/organizationalUnitName=Domain Control Validated - RapidSSL(R)/serialNumber=Ua2imiD94EQbAgrLVmkdAdyb1udBOJfs
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- | SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- | -----BEGIN CERTIFICATE-----
- | MIIFMzCCBBugAwIBAgIDEeu0MA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNVBAYTAlVT
- | MRcwFQYDVQQKEw5HZW9UcnVzdCwgSW5jLjEUMBIGA1UEAxMLUmFwaWRTU0wgQ0Ew
- | HhcNMTQwNDA5MDI1NjQ1WhcNMTgwNDEwMjI0NjQ1WjCBvjEpMCcGA1UEBRMgVWEy
- | aW1pRDk0RVFiQWdyTFZta2RBZHliMXVkQk9KZnMxEzARBgNVBAsTCkdUNzExNzA3
- | NDQxMTAvBgNVBAsTKFNlZSB3d3cucmFwaWRzc2wuY29tL3Jlc291cmNlcy9jcHMg
- | KGMpMTQxLzAtBgNVBAsTJkRvbWFpbiBDb250cm9sIFZhbGlkYXRlZCAtIFJhcGlk
- | U1NMKFIpMRgwFgYDVQQDDA8qLmhvc3RnYXRvci5jb20wggEiMA0GCSqGSIb3DQEB
- | AQUAA4IBDwAwggEKAoIBAQDPCBITp5OXDZne7xN+gULA8Py5/M0DP+Xah9cf8lRp
- | 0W6jDHBybwb8SRWi2OOJdBHvF/2DYlJGdT9YtIGc/L2VqUND7lQOXuFL5AXsxLfb
- | YTaSZ6tEuWftx/+96buRj7iC/iM7lOtOF1EmKV8y9ZKg4Worr+SW0AO20+pfFf6p
- | 6g/3Zdgo+uBwYeVHecCYwcHhS8kSz2uhgvVhdiKrY72Hjw6ms2Zbm8/bzicCitmP
- | HARCEcJictLq8N+wnXuLhbxWB9wsWX7bqrFoLiCBexVfvasm8nTzlf9f6QKdtwMe
- | EehSlDOXjSsxOG/eKJeqz1ZT6A2qZfPtniZiFXBQaGMLAgMBAAGjggG5MIIBtTAf
- | BgNVHSMEGDAWgBRraT1qGEJK3Y8CZTn9NSSGeJEWMDAOBgNVHQ8BAf8EBAMCBaAw
- | HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMCkGA1UdEQQiMCCCDyouaG9z
- | dGdhdG9yLmNvbYINaG9zdGdhdG9yLmNvbTBDBgNVHR8EPDA6MDigNqA0hjJodHRw
- | Oi8vcmFwaWRzc2wtY3JsLmdlb3RydXN0LmNvbS9jcmxzL3JhcGlkc3NsLmNybDAd
- | BgNVHQ4EFgQUSNecfnT/4/Fd/A0rZCZWatA0+K4wDAYDVR0TAQH/BAIwADB4Bggr
- | BgEFBQcBAQRsMGowLQYIKwYBBQUHMAGGIWh0dHA6Ly9yYXBpZHNzbC1vY3NwLmdl
- | b3RydXN0LmNvbTA5BggrBgEFBQcwAoYtaHR0cDovL3JhcGlkc3NsLWFpYS5nZW90
- | cnVzdC5jb20vcmFwaWRzc2wuY3J0MEwGA1UdIARFMEMwQQYKYIZIAYb4RQEHNjAz
- | MDEGCCsGAQUFBwIBFiVodHRwOi8vd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMv
- | Y3BzMA0GCSqGSIb3DQEBBQUAA4IBAQBoMTZsQUynM42kxtaHLjRR5IVbclOlfcMQ
- | gnFG5oximAbhP54P3Qb5V9aum11G4mwmU3gVFTPSPyO6Jvu37NCxqj16p7IpAHeN
- | FQx1kX0jLfW5lwPo9xEuPKb3dUOZeeDfXToN7OjaZSWIzg3BNur85mzvPgChlTt9
- | 7S6KM7DXgy3YOo8CTwAl7ck7MaCwIIxpJNUnNUpLeha4wiVYIR1N/1p9WztwlYsT
- | +J02fpQ1rxo+8TWbM33LD0gtX6501hoAdnYlM3b9k0gycae/JjjSCV2OpDJLFljT
- | /bstAqDjUAhxCoEvDeiC+cRxM68MYXfcMRDMdEXkzYIzO1AZK6mD
- |_-----END CERTIFICATE-----
- |_ssl-date: 2014-09-05T19:48:04+00:00; -54s from local time.
- 593/tcp filtered http-rpc-epmap no-response
- 993/tcp open ssl/imap syn-ack Dovecot imapd
- |_imap-capabilities: post-login Pre-login SASL-IR LITERAL+ ID ENABLE NAMESPACE IMAP4rev1 capabilities LOGIN-REFERRALS more AUTH=LOGINA0001 have IDLE AUTH=PLAIN listed OK
- | ssl-cert: Subject: commonName=*.hostgator.com/organizationalUnitName=Domain Control Validated - RapidSSL(R)/serialNumber=Ua2imiD94EQbAgrLVmkdAdyb1udBOJfs
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- | SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- | -----BEGIN CERTIFICATE-----
- | MIIFMzCCBBugAwIBAgIDEeu0MA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNVBAYTAlVT
- | MRcwFQYDVQQKEw5HZW9UcnVzdCwgSW5jLjEUMBIGA1UEAxMLUmFwaWRTU0wgQ0Ew
- | HhcNMTQwNDA5MDI1NjQ1WhcNMTgwNDEwMjI0NjQ1WjCBvjEpMCcGA1UEBRMgVWEy
- | aW1pRDk0RVFiQWdyTFZta2RBZHliMXVkQk9KZnMxEzARBgNVBAsTCkdUNzExNzA3
- | NDQxMTAvBgNVBAsTKFNlZSB3d3cucmFwaWRzc2wuY29tL3Jlc291cmNlcy9jcHMg
- | KGMpMTQxLzAtBgNVBAsTJkRvbWFpbiBDb250cm9sIFZhbGlkYXRlZCAtIFJhcGlk
- | U1NMKFIpMRgwFgYDVQQDDA8qLmhvc3RnYXRvci5jb20wggEiMA0GCSqGSIb3DQEB
- | AQUAA4IBDwAwggEKAoIBAQDPCBITp5OXDZne7xN+gULA8Py5/M0DP+Xah9cf8lRp
- | 0W6jDHBybwb8SRWi2OOJdBHvF/2DYlJGdT9YtIGc/L2VqUND7lQOXuFL5AXsxLfb
- | YTaSZ6tEuWftx/+96buRj7iC/iM7lOtOF1EmKV8y9ZKg4Worr+SW0AO20+pfFf6p
- | 6g/3Zdgo+uBwYeVHecCYwcHhS8kSz2uhgvVhdiKrY72Hjw6ms2Zbm8/bzicCitmP
- | HARCEcJictLq8N+wnXuLhbxWB9wsWX7bqrFoLiCBexVfvasm8nTzlf9f6QKdtwMe
- | EehSlDOXjSsxOG/eKJeqz1ZT6A2qZfPtniZiFXBQaGMLAgMBAAGjggG5MIIBtTAf
- | BgNVHSMEGDAWgBRraT1qGEJK3Y8CZTn9NSSGeJEWMDAOBgNVHQ8BAf8EBAMCBaAw
- | HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMCkGA1UdEQQiMCCCDyouaG9z
- | dGdhdG9yLmNvbYINaG9zdGdhdG9yLmNvbTBDBgNVHR8EPDA6MDigNqA0hjJodHRw
- | Oi8vcmFwaWRzc2wtY3JsLmdlb3RydXN0LmNvbS9jcmxzL3JhcGlkc3NsLmNybDAd
- | BgNVHQ4EFgQUSNecfnT/4/Fd/A0rZCZWatA0+K4wDAYDVR0TAQH/BAIwADB4Bggr
- | BgEFBQcBAQRsMGowLQYIKwYBBQUHMAGGIWh0dHA6Ly9yYXBpZHNzbC1vY3NwLmdl
- | b3RydXN0LmNvbTA5BggrBgEFBQcwAoYtaHR0cDovL3JhcGlkc3NsLWFpYS5nZW90
- | cnVzdC5jb20vcmFwaWRzc2wuY3J0MEwGA1UdIARFMEMwQQYKYIZIAYb4RQEHNjAz
- | MDEGCCsGAQUFBwIBFiVodHRwOi8vd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMv
- | Y3BzMA0GCSqGSIb3DQEBBQUAA4IBAQBoMTZsQUynM42kxtaHLjRR5IVbclOlfcMQ
- | gnFG5oximAbhP54P3Qb5V9aum11G4mwmU3gVFTPSPyO6Jvu37NCxqj16p7IpAHeN
- | FQx1kX0jLfW5lwPo9xEuPKb3dUOZeeDfXToN7OjaZSWIzg3BNur85mzvPgChlTt9
- | 7S6KM7DXgy3YOo8CTwAl7ck7MaCwIIxpJNUnNUpLeha4wiVYIR1N/1p9WztwlYsT
- | +J02fpQ1rxo+8TWbM33LD0gtX6501hoAdnYlM3b9k0gycae/JjjSCV2OpDJLFljT
- | /bstAqDjUAhxCoEvDeiC+cRxM68MYXfcMRDMdEXkzYIzO1AZK6mD
- |_-----END CERTIFICATE-----
- |_ssl-date: 2014-09-05T19:48:06+00:00; -53s from local time.
- 995/tcp open ssl/pop3 syn-ack Dovecot pop3d
- |_pop3-capabilities: RESP-CODES CAPA SASL(PLAIN LOGIN) AUTH-RESP-CODE USER UIDL PIPELINING TOP
- | ssl-cert: Subject: commonName=*.hostgator.com/organizationalUnitName=Domain Control Validated - RapidSSL(R)/serialNumber=Ua2imiD94EQbAgrLVmkdAdyb1udBOJfs
- | Issuer: commonName=RapidSSL CA/organizationName=GeoTrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Not valid before: 2014-04-09T02:56:45+00:00
- | Not valid after: 2018-04-10T22:46:45+00:00
- | MD5: 626c e2ae 0031 4763 877a 57bc b21f 5dc3
- | SHA-1: 84b7 d48a b47c 9b60 e8ce 79c8 acad c9dd 4870 7020
- | -----BEGIN CERTIFICATE-----
- | MIIFMzCCBBugAwIBAgIDEeu0MA0GCSqGSIb3DQEBBQUAMDwxCzAJBgNVBAYTAlVT
- | MRcwFQYDVQQKEw5HZW9UcnVzdCwgSW5jLjEUMBIGA1UEAxMLUmFwaWRTU0wgQ0Ew
- | HhcNMTQwNDA5MDI1NjQ1WhcNMTgwNDEwMjI0NjQ1WjCBvjEpMCcGA1UEBRMgVWEy
- | aW1pRDk0RVFiQWdyTFZta2RBZHliMXVkQk9KZnMxEzARBgNVBAsTCkdUNzExNzA3
- | NDQxMTAvBgNVBAsTKFNlZSB3d3cucmFwaWRzc2wuY29tL3Jlc291cmNlcy9jcHMg
- | KGMpMTQxLzAtBgNVBAsTJkRvbWFpbiBDb250cm9sIFZhbGlkYXRlZCAtIFJhcGlk
- | U1NMKFIpMRgwFgYDVQQDDA8qLmhvc3RnYXRvci5jb20wggEiMA0GCSqGSIb3DQEB
- | AQUAA4IBDwAwggEKAoIBAQDPCBITp5OXDZne7xN+gULA8Py5/M0DP+Xah9cf8lRp
- | 0W6jDHBybwb8SRWi2OOJdBHvF/2DYlJGdT9YtIGc/L2VqUND7lQOXuFL5AXsxLfb
- | YTaSZ6tEuWftx/+96buRj7iC/iM7lOtOF1EmKV8y9ZKg4Worr+SW0AO20+pfFf6p
- | 6g/3Zdgo+uBwYeVHecCYwcHhS8kSz2uhgvVhdiKrY72Hjw6ms2Zbm8/bzicCitmP
- | HARCEcJictLq8N+wnXuLhbxWB9wsWX7bqrFoLiCBexVfvasm8nTzlf9f6QKdtwMe
- | EehSlDOXjSsxOG/eKJeqz1ZT6A2qZfPtniZiFXBQaGMLAgMBAAGjggG5MIIBtTAf
- | BgNVHSMEGDAWgBRraT1qGEJK3Y8CZTn9NSSGeJEWMDAOBgNVHQ8BAf8EBAMCBaAw
- | HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMCkGA1UdEQQiMCCCDyouaG9z
- | dGdhdG9yLmNvbYINaG9zdGdhdG9yLmNvbTBDBgNVHR8EPDA6MDigNqA0hjJodHRw
- | Oi8vcmFwaWRzc2wtY3JsLmdlb3RydXN0LmNvbS9jcmxzL3JhcGlkc3NsLmNybDAd
- | BgNVHQ4EFgQUSNecfnT/4/Fd/A0rZCZWatA0+K4wDAYDVR0TAQH/BAIwADB4Bggr
- | BgEFBQcBAQRsMGowLQYIKwYBBQUHMAGGIWh0dHA6Ly9yYXBpZHNzbC1vY3NwLmdl
- | b3RydXN0LmNvbTA5BggrBgEFBQcwAoYtaHR0cDovL3JhcGlkc3NsLWFpYS5nZW90
- | cnVzdC5jb20vcmFwaWRzc2wuY3J0MEwGA1UdIARFMEMwQQYKYIZIAYb4RQEHNjAz
- | MDEGCCsGAQUFBwIBFiVodHRwOi8vd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMv
- | Y3BzMA0GCSqGSIb3DQEBBQUAA4IBAQBoMTZsQUynM42kxtaHLjRR5IVbclOlfcMQ
- | gnFG5oximAbhP54P3Qb5V9aum11G4mwmU3gVFTPSPyO6Jvu37NCxqj16p7IpAHeN
- | FQx1kX0jLfW5lwPo9xEuPKb3dUOZeeDfXToN7OjaZSWIzg3BNur85mzvPgChlTt9
- | 7S6KM7DXgy3YOo8CTwAl7ck7MaCwIIxpJNUnNUpLeha4wiVYIR1N/1p9WztwlYsT
- | +J02fpQ1rxo+8TWbM33LD0gtX6501hoAdnYlM3b9k0gycae/JjjSCV2OpDJLFljT
- | /bstAqDjUAhxCoEvDeiC+cRxM68MYXfcMRDMdEXkzYIzO1AZK6mD
- |_-----END CERTIFICATE-----
- |_ssl-date: 2014-09-05T19:48:03+00:00; -54s from local time.
- 1024/tcp filtered kdm no-response
- 1025/tcp filtered NFS-or-IIS no-response
- 1026/tcp filtered LSA-or-nterm no-response
- 1027/tcp filtered IIS no-response
- 1028/tcp filtered unknown no-response
- 1029/tcp filtered ms-lsa no-response
- 1030/tcp filtered iad1 no-response
- 1080/tcp filtered socks no-response
- 1433/tcp filtered ms-sql-s no-response
- 1434/tcp filtered ms-sql-m no-response
- 2049/tcp filtered nfs no-response
- 2222/tcp open ssh syn-ack OpenSSH 5.3 (protocol 2.0)
- |_ssh-hostkey:
- 3306/tcp open mysql syn-ack MySQL 5.5.37-35.1
- | mysql-info:
- | Protocol: 53
- | Version: .5.37-35.1
- | Thread ID: 10233754
- | Capabilities flags: 65535
- | Some Capabilities: LongColumnFlag, Support41Auth, Speaks41ProtocolOld, SupportsTransactions, ConnectWithDatabase, SwitchToSSLAfterHandshake, DontAllowDatabaseTableColumn, FoundRows, SupportsCompression, InteractiveClient, ODBCClient, LongPassword, Speaks41ProtocolNew, IgnoreSpaceBeforeParenthesis, SupportsLoadDataLocal, IgnoreSigpipes
- | Status: Autocommit
- |_ Salt: jFZsU/*$r5NhCVdr5Ng<
- 4444/tcp filtered krb524 no-response
- 5050/tcp filtered mmcc no-response
- 6000/tcp filtered X11 no-response
- 8080/tcp open http syn-ack nginx 1.6.1
- |_http-favicon: Unknown favicon MD5: B845C4830A13B85CE16911B8B413BD9C
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-title: MMM INDONESIA | PANDUAN MMM INDONESIA | SUKSES BERSAMA MMM IND...
- 9898/tcp filtered monkeycom no-response
- 12345/tcp filtered netbus no-response
- Device type: WAP|storage-misc
- Running: Linux 2.4.X, Netgear RAIDiator 4.X
- OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:netgear:raidiator:4
- OS details: DD-WRT v23 (Linux 2.4.36), Netgear ReadyNAS Duo NAS device (RAIDiator 4.1.4)
- TCP/IP fingerprint:
- OS:SCAN(V=6.47%E=4%D=9/6%OT=21%CT=20%CU=31198%PV=N%DS=4%DC=T%G=N%TM=540A13D
- OS:6%P=i686-pc-linux-gnu)SEQ(SP=109%GCD=1%ISR=10A%TI=Z%II=I%TS=7)SEQ(II=I%T
- OS:S=7)OPS(O1=M5A0ST11NW7%O2=M5A0ST11NW7%O3=M5A0NNT11NW7%O4=M5A0ST11NW7%O5=
- OS:M5A0ST11NW7%O6=M5A0ST11)WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7
- OS:120)ECN(R=Y%DF=Y%T=40%W=7210%O=M5A0NNSNW7%CC=Y%Q=)ECN(R=N)T1(R=Y%DF=Y%T=
- OS:40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=N)T5(R=Y%DF=Y%T=40%W=0%S=Z%A
- OS:=S+%F=AR%O=%RD=0%Q=)T6(R=N)T7(R=N)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%R
- OS:ID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
- Uptime guess: 78.393 days (since Thu Jun 19 17:24:23 2014)
- Network Distance: 4 hops
- Service Info: Host: gator3216.hostgator.com
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 0.52 ms 192.168.200.1
- 2 1.16 ms 192.168.30.1
- 3 3.35 ms 172.16.1.1
- 4 22.18 ms 192.254.232.73
- Final times for host: srtt: 87282 rttvar: 102201 to: 496086
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- NSE: Starting runlevel 2 (of 2) scan.
- Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes nmap-services.
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 141.04 seconds
- Raw packets sent: 1312 (59.788KB) | Rcvd: 1030 (43.731KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement