Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- I used a program called zenmap to probe techfags server if anyone knows how to brutforce amy password please do and report any to me:) @ annon@420blaze.it
- Happy hunting :)
- annon
- Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-10-29 03:27 Eastern Daylight Time
- NSE: Loaded 122 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 03:27
- Completed NSE at 03:27, 0.00s elapsed
- Initiating NSE at 03:27
- Completed NSE at 03:27, 0.00s elapsed
- Initiating Ping Scan at 03:27
- Scanning ballista.techtronix.net (192.210.145.214) [4 ports]
- Completed Ping Scan at 03:27, 0.26s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 03:27
- Completed Parallel DNS resolution of 1 host. at 03:27, 0.58s elapsed
- Initiating SYN Stealth Scan at 03:27
- Scanning ballista.techtronix.net (192.210.145.214) [1000 ports]
- Discovered open port 53/tcp on 192.210.145.214
- Discovered open port 7070/tcp on 192.210.145.214
- Discovered open port 6667/tcp on 192.210.145.214
- Discovered open port 7007/tcp on 192.210.145.214
- Completed SYN Stealth Scan at 03:27, 5.99s elapsed (1000 total ports)
- Initiating Service scan at 03:27
- Scanning 4 services on ballista.techtronix.net (192.210.145.214)
- Completed Service scan at 03:28, 11.15s elapsed (4 services on 1 host)
- Initiating OS detection (try #1) against ballista.techtronix.net (192.210.145.214)
- Initiating Traceroute at 03:28
- Completed Traceroute at 03:28, 0.08s elapsed
- Initiating Parallel DNS resolution of 18 hosts. at 03:28
- Completed Parallel DNS resolution of 18 hosts. at 03:28, 0.08s elapsed
- NSE: Script scanning 192.210.145.214.
- Initiating NSE at 03:28
- Completed NSE at 03:28, 9.10s elapsed
- Initiating NSE at 03:28
- Completed NSE at 03:28, 0.00s elapsed
- Nmap scan report for ballista.techtronix.net (192.210.145.214)
- Host is up (0.049s latency).
- Other addresses for ballista.techtronix.net (not scanned): 2001:470:1f07:f37::1
- rDNS record for 192.210.145.214: host.colocrossing.com
- Not shown: 991 closed ports
- PORT STATE SERVICE VERSION
- 25/tcp filtered smtp
- 53/tcp open domain
- | dns-nsid:
- |_ bind.version: 9.9.5-3ubuntu0.5-Ubuntu
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 161/tcp filtered snmp
- 445/tcp filtered microsoft-ds
- 6667/tcp open irc InspIRCd
- | irc-info:
- | server: ballista.techtronix.net
- | users: 142
- | servers: 5
- | ops: 2
- | chans: 123
- | lusers: 23
- | lservers: 1
- | source ident: NONE or BLOCKED
- | source host: hiddenhost-7ie5dn.pa.comcast.net
- |_ error: Closing link: (~nmap@c-69-253-185-199.hsd1.pa.comcast.net) [Client exited]
- 7007/tcp open afs3-bos?
- 7070/tcp open realserver?
- Device type: general purpose
- Running: Linux 2.6.X|3.X
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
- OS details: Linux 2.6.32 - 3.13
- Uptime guess: 47.461 days (since Fri Sep 11 16:24:28 2015)
- Network Distance: 18 hops
- TCP Sequence Prediction: Difficulty=259 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Host: ballista.techtronix.net
- TRACEROUTE (using port 256/tcp)
- HOP RTT ADDRESS
- 1 4.00 ms 10.0.0.1
- 2 22.00 ms 96.120.77.101
- 3 22.00 ms xe-8-1-0-sur01.levittown.pa.panjde.comcast.net (68.85.153.177)
- 4 25.00 ms be-24-ar03.ivyland.pa.panjde.comcast.net (69.139.192.57)
- 5 26.00 ms be-33287-cr02.newyork.ny.ibone.comcast.net (68.86.93.173)
- 6 31.00 ms be-10103-cr02.ashburn.va.ibone.comcast.net (68.86.85.161)
- 7 26.00 ms 68.86.88.58
- 8 19.00 ms 50.242.151.190
- 9 65.00 ms 207.88.14.164.ptr.us.xo.net (207.88.14.164)
- 10 49.00 ms 207.88.12.135.ptr.us.xo.net (207.88.12.135)
- 11 56.00 ms 207.88.12.105.ptr.us.xo.net (207.88.12.105)
- 12 46.00 ms 216.156.0.250.ptr.us.xo.net (216.156.0.250)
- 13 48.00 ms 207.86.156.46
- 14 49.00 ms 10.8.25.142
- 15 49.00 ms 10.8.43.10
- 16 66.00 ms 10.8.43.42
- 17 48.00 ms host.colocrossing.com (192.210.145.130)
- 18 43.00 ms host.colocrossing.com (192.210.145.214)
- NSE: Script Post-scanning.
- Initiating NSE at 03:28
- Completed NSE at 03:28, 0.00s elapsed
- Initiating NSE at 03:28
- Completed NSE at 03:28, 0.00s elapsed
- Read data files from: C:\Program Files (x86)\Nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 32.84 seconds
- Raw packets sent: 1152 (51.522KB) | Rcvd: 1131 (46.688KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement