Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-11-15 09:53 CET
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 09:53
- Completed NSE at 09:53, 0.00s elapsed
- Initiating NSE at 09:53
- Completed NSE at 09:53, 0.00s elapsed
- Initiating Ping Scan at 09:53
- Scanning 10.25.105.111 [4 ports]
- Completed Ping Scan at 09:53, 0.05s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 09:53
- Completed Parallel DNS resolution of 1 host. at 09:53, 0.19s elapsed
- Initiating SYN Stealth Scan at 09:53
- Scanning 10.25.105.111 [65535 ports]
- Discovered open port 8080/tcp on 10.25.105.111
- Discovered open port 25/tcp on 10.25.105.111
- Discovered open port 111/tcp on 10.25.105.111
- Discovered open port 22/tcp on 10.25.105.111
- Discovered open port 8787/tcp on 10.25.105.111
- Discovered open port 8282/tcp on 10.25.105.111
- Discovered open port 51272/tcp on 10.25.105.111
- Discovered open port 7938/tcp on 10.25.105.111
- Discovered open port 51409/tcp on 10.25.105.111
- Discovered open port 9011/tcp on 10.25.105.111
- Discovered open port 10050/tcp on 10.25.105.111
- Discovered open port 2049/tcp on 10.25.105.111
- Discovered open port 8701/tcp on 10.25.105.111
- Discovered open port 51529/tcp on 10.25.105.111
- Discovered open port 5666/tcp on 10.25.105.111
- Discovered open port 9990/tcp on 10.25.105.111
- Discovered open port 7937/tcp on 10.25.105.111
- Discovered open port 34495/tcp on 10.25.105.111
- Discovered open port 55492/tcp on 10.25.105.111
- Completed SYN Stealth Scan at 09:53, 3.12s elapsed (65535 total ports)
- Initiating Service scan at 09:53
- Scanning 19 services on 10.25.105.111
- Completed Service scan at 09:54, 86.20s elapsed (19 services on 1 host)
- Initiating OS detection (try #1) against 10.25.105.111
- Initiating Traceroute at 09:54
- Completed Traceroute at 09:54, 0.01s elapsed
- Initiating Parallel DNS resolution of 5 hosts. at 09:54
- Completed Parallel DNS resolution of 5 hosts. at 09:54, 0.14s elapsed
- NSE: Script scanning 10.25.105.111.
- Initiating NSE at 09:54
- Completed NSE at 09:55, 17.25s elapsed
- Initiating NSE at 09:55
- Completed NSE at 09:55, 2.22s elapsed
- Nmap scan report for 10.25.105.111
- Host is up (0.0011s latency).
- Not shown: 65516 closed ports
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.10 (Ubuntu Linux; protocol 2.0)
- | ssh-hostkey:
- | 1024 19:f3:96:de:2f:9b:f0:df:8d:10:bc:b2:2a:f3:ee:43 (DSA)
- | 2048 68:55:5e:ff:c6:6e:b5:0c:ef:30:50:58:d8:91:20:f3 (RSA)
- | 256 08:62:e9:e0:48:1a:1f:4a:4b:d9:30:e2:4d:30:8e:a0 (ECDSA)
- |_ 256 0d:b1:cd:66:90:2f:48:fc:9e:9f:19:98:22:dd:27:2e (ED25519)
- 25/tcp open smtp Postfix smtpd
- |_smtp-commands: x64lmwbip6n.dsit.sncf.fr, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
- |_ssl-date: TLS randomness does not represent time
- 111/tcp open rpcbind 2-4 (RPC #100000)
- | rpcinfo:
- | program version port/proto service
- | 100003 2,3,4 2049/tcp nfs
- | 100003 2,3,4 2049/udp nfs
- | 100005 1,2,3 51529/tcp mountd
- | 100005 1,2,3 59546/udp mountd
- | 100021 1,3,4 33144/udp nlockmgr
- | 100021 1,3,4 51409/tcp nlockmgr
- | 100024 1 33439/udp status
- | 100024 1 51272/tcp status
- | 100227 2,3 2049/tcp nfs_acl
- |_ 100227 2,3 2049/udp nfs_acl
- 2049/tcp open nfs_acl 2-3 (RPC #100227)
- 5666/tcp open tcpwrapped
- 7937/tcp open nsrexec 1 (RPC #390113)
- 7938/tcp open rpcbind 2 (RPC #100000)
- 8080/tcp open http-proxy
- | fingerprint-strings:
- | FourOhFourRequest, GetRequest, HTTPOptions:
- | HTTP/1.0 403 Forbidden
- | Connection: close
- | X-Powered-By: Undertow/1
- | Content-Length: 74
- | Content-Type: text/html
- | Date: Thu, 15 Nov 2018 08:53:27 GMT
- | <html><head><title>Error</title></head><body>403 - Forbidden</body></html>
- | Help, Kerberos, LDAPSearchReq, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, Socks5, TLSSessionReq, WMSRequest:
- | HTTP/1.1 400 Bad Request
- | Content-Length: 0
- |_ Connection: close
- |_http-title: Error
- 8282/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.10 (Ubuntu Linux; protocol 2.0)
- | ssh-hostkey:
- | 1024 19:f3:96:de:2f:9b:f0:df:8d:10:bc:b2:2a:f3:ee:43 (DSA)
- | 2048 68:55:5e:ff:c6:6e:b5:0c:ef:30:50:58:d8:91:20:f3 (RSA)
- | 256 08:62:e9:e0:48:1a:1f:4a:4b:d9:30:e2:4d:30:8e:a0 (ECDSA)
- |_ 256 0d:b1:cd:66:90:2f:48:fc:9e:9f:19:98:22:dd:27:2e (ED25519)
- 8701/tcp open rpcbind
- 8787/tcp open jdwp unknown
- 9011/tcp open rpcbind
- 9990/tcp open osm-appsrvr?
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.0 404 Not Found
- | Connection: close
- | Content-Length: 74
- | Content-Type: text/html
- | Date: Thu, 15 Nov 2018 08:53:52 GMT
- | <html><head><title>Error</title></head><body>404 - Not Found</body></html>
- | GetRequest:
- | HTTP/1.0 301 Moved Permanently
- | Connection: close
- | Location: http://10.25.105.111:9990/console/index.html
- | Content-Length: 0
- | Date: Thu, 15 Nov 2018 08:53:32 GMT
- | HTTPOptions:
- | HTTP/1.0 405 Method Not Allowed
- | Connection: close
- | Content-Length: 83
- | Content-Type: text/html
- | Date: Thu, 15 Nov 2018 08:53:32 GMT
- | <html><head><title>Error</title></head><body>405 - Method Not Allowed</body></html>
- | Help, Kerberos, LDAPSearchReq, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, WMSRequest, oracle-tns:
- | HTTP/1.1 400 Bad Request
- | Content-Length: 0
- |_ Connection: close
- 10050/tcp open tcpwrapped
- 34495/tcp open mountd 1-3 (RPC #100005)
- 51272/tcp open status 1 (RPC #100024)
- 51409/tcp open nlockmgr 1-4 (RPC #100021)
- 51529/tcp open mountd 1-3 (RPC #100005)
- 55492/tcp open mountd 1-3 (RPC #100005)
- 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port8080-TCP:V=7.70%I=7%D=11/15%Time=5BED3407%P=x86_64-pc-linux-gnu%r(G
- SF:etRequest,E3,"HTTP/1\.0\x20403\x20Forbidden\r\nConnection:\x20close\r\n
- SF:X-Powered-By:\x20Undertow/1\r\nContent-Length:\x2074\r\nContent-Type:\x
- SF:20text/html\r\nDate:\x20Thu,\x2015\x20Nov\x202018\x2008:53:27\x20GMT\r\
- SF:n\r\n<html><head><title>Error</title></head><body>403\x20-\x20Forbidden
- SF:</body></html>")%r(HTTPOptions,E3,"HTTP/1\.0\x20403\x20Forbidden\r\nCon
- SF:nection:\x20close\r\nX-Powered-By:\x20Undertow/1\r\nContent-Length:\x20
- SF:74\r\nContent-Type:\x20text/html\r\nDate:\x20Thu,\x2015\x20Nov\x202018\
- SF:x2008:53:27\x20GMT\r\n\r\n<html><head><title>Error</title></head><body>
- SF:403\x20-\x20Forbidden</body></html>")%r(RTSPRequest,42,"HTTP/1\.1\x2040
- SF:0\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\n
- SF:\r\n")%r(FourOhFourRequest,E3,"HTTP/1\.0\x20403\x20Forbidden\r\nConnect
- SF:ion:\x20close\r\nX-Powered-By:\x20Undertow/1\r\nContent-Length:\x2074\r
- SF:\nContent-Type:\x20text/html\r\nDate:\x20Thu,\x2015\x20Nov\x202018\x200
- SF:8:53:27\x20GMT\r\n\r\n<html><head><title>Error</title></head><body>403\
- SF:x20-\x20Forbidden</body></html>")%r(Socks5,42,"HTTP/1\.1\x20400\x20Bad\
- SF:x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(
- SF:Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\n
- SF:Connection:\x20close\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20
- SF:Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n"
- SF:)%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Len
- SF:gth:\x200\r\nConnection:\x20close\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x2
- SF:0400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\
- SF:r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConten
- SF:t-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(LDAPSearchReq,42,"HT
- SF:TP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:
- SF:\x20close\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Bad\x20Request
- SF:\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(WMSRequest
- SF:,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConn
- SF:ection:\x20close\r\n\r\n");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port9990-TCP:V=7.70%I=7%D=11/15%Time=5BED340C%P=x86_64-pc-linux-gnu%r(G
- SF:etRequest,A5,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nConnection:\x
- SF:20close\r\nLocation:\x20http://10\.25\.105\.111:9990/console/index\.htm
- SF:l\r\nContent-Length:\x200\r\nDate:\x20Thu,\x2015\x20Nov\x202018\x2008:5
- SF:3:32\x20GMT\r\n\r\n")%r(HTTPOptions,DB,"HTTP/1\.0\x20405\x20Method\x20N
- SF:ot\x20Allowed\r\nConnection:\x20close\r\nContent-Length:\x2083\r\nConte
- SF:nt-Type:\x20text/html\r\nDate:\x20Thu,\x2015\x20Nov\x202018\x2008:53:32
- SF:\x20GMT\r\n\r\n<html><head><title>Error</title></head><body>405\x20-\x2
- SF:0Method\x20Not\x20Allowed</body></html>")%r(RTSPRequest,42,"HTTP/1\.1\x
- SF:20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close
- SF:\r\n\r\n")%r(Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Len
- SF:gth:\x200\r\nConnection:\x20close\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\
- SF:.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20c
- SF:lose\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r
- SF:\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(Kerberos,42,
- SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnecti
- SF:on:\x20close\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x20Bad\x20Requ
- SF:est\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(FourOhF
- SF:ourRequest,C9,"HTTP/1\.0\x20404\x20Not\x20Found\r\nConnection:\x20close
- SF:\r\nContent-Length:\x2074\r\nContent-Type:\x20text/html\r\nDate:\x20Thu
- SF:,\x2015\x20Nov\x202018\x2008:53:52\x20GMT\r\n\r\n<html><head><title>Err
- SF:or</title></head><body>404\x20-\x20Not\x20Found</body></html>")%r(LDAPS
- SF:earchReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200
- SF:\r\nConnection:\x20close\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x2
- SF:0Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n
- SF:")%r(WMSRequest,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Lengt
- SF:h:\x200\r\nConnection:\x20close\r\n\r\n")%r(oracle-tns,42,"HTTP/1\.1\x2
- SF:0400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\
- SF:r\n\r\n");
- Device type: general purpose
- Running: Linux 3.X|4.X
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
- OS details: Linux 3.2 - 4.9
- Uptime guess: 4.333 days (since Sun Nov 11 01:55:26 2018)
- Network Distance: 5 hops
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Host: x64lmwbip6n.dsit.sncf.fr; OS: Linux; CPE: cpe:/o:linux:linux_kernel
- TRACEROUTE (using port 23/tcp)
- HOP RTT ADDRESS
- 1 1.65 ms 10.148.116.2
- 2 0.98 ms 10.106.65.3
- 3 1.03 ms 10.223.164.6
- 4 1.34 ms 10.223.164.14
- 5 1.04 ms 10.25.105.111
- NSE: Script Post-scanning.
- Initiating NSE at 09:55
- Completed NSE at 09:55, 0.00s elapsed
- Initiating NSE at 09:55
- Completed NSE at 09:55, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 111.33 seconds
- Raw packets sent: 65582 (2.886MB) | Rcvd: 65560 (2.623MB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement