Advertisement
friendsPC

Nmap scan report for s5596b6c3.adsl.online.nl 85.150.182.195

Feb 9th, 2019
563
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.68 KB | None | 0 0
  1. https://nmap.org/
  2.  
  3. Starting Nmap 7.70 ( https://nmap.org ) at 2018-07-13 13:12 CEST
  4. NSE: Loaded 148 scripts for scanning.
  5. NSE: Script Pre-scanning.
  6. Initiating NSE at 13:12
  7. Completed NSE at 13:12, 0.00s elapsed
  8. Initiating NSE at 13:12
  9. Completed NSE at 13:12, 0.00s elapsed
  10. Initiating Parallel DNS resolution of 1 host. at 13:12
  11. Completed Parallel DNS resolution of 1 host. at 13:12, 0.03s elapsed
  12. Initiating SYN Stealth Scan at 13:12
  13. Scanning s5596b6c3.adsl.online.nl (85.150.182.195) [1000 ports]
  14. Discovered open port 80/tcp on 85.150.182.195
  15. Discovered open port 21/tcp on 85.150.182.195
  16. Discovered open port 53/tcp on 85.150.182.195
  17. Discovered open port 443/tcp on 85.150.182.195
  18. Discovered open port 22/tcp on 85.150.182.195
  19. Discovered open port 23/tcp on 85.150.182.195
  20. Completed SYN Stealth Scan at 13:12, 1.62s elapsed (1000 total ports)
  21. Initiating Service scan at 13:12
  22. Scanning 6 services on s5596b6c3.adsl.online.nl (85.150.182.195)
  23. Completed Service scan at 13:12, 7.61s elapsed (6 services on 1 host)
  24. Initiating OS detection (try #1) against s5596b6c3.adsl.online.nl (85.150.182.195)
  25. Initiating Traceroute at 13:13
  26. Completed Traceroute at 13:13, 0.02s elapsed
  27. NSE: Script scanning 85.150.182.195.
  28. Initiating NSE at 13:13
  29. Completed NSE at 13:13, 35.52s elapsed
  30. Initiating NSE at 13:13
  31. Completed NSE at 13:13, 0.00s elapsed
  32. Nmap scan report for s5596b6c3.adsl.online.nl (85.150.182.195)
  33. Host is up (0.0055s latency).
  34. Not shown: 994 closed ports
  35. PORT STATE SERVICE VERSION
  36. 21/tcp open ftp D-Link/Comtrend DSL modem ftp firmware update
  37. 22/tcp open ssh Dropbear sshd 0.46 (protocol 2.0)
  38. | ssh-hostkey:
  39. |_ 1040 dc:14:de:8e:d7:c1:15:43:23:82:25:81:d2:59:e8:c0 (RSA)
  40. 23/tcp open telnet ZyXEL DSL modem telnetd (model: VMG8324-B10A)
  41. 53/tcp open domain dnsmasq 2.48
  42. | dns-nsid:
  43. | id.server: rdns-p03
  44. |_ bind.version: dnsmasq-2.48
  45. 80/tcp open http micro_httpd
  46. | http-methods:
  47. |_ Supported Methods: GET POST
  48. |_http-server-header: micro_httpd
  49. |_http-title: Site doesn't have a title (text/html).
  50. 443/tcp open ssl/http micro_httpd
  51. |_http-title: Site doesn't have a title (text/html).
  52. | ssl-cert: Subject: commonName=Daniel/organizationName=Broadcom/stateOrProvinceName=Califonia/countryName=UA
  53. | Issuer: commonName=Daniel/organizationName=Broadcom/stateOrProvinceName=Califonia/countryName=UA
  54. | Public Key type: rsa
  55. | Public Key bits: 1024
  56. | Signature Algorithm: md5WithRSAEncryption
  57. | Not valid before: 2006-08-07T23:31:21
  58. | Not valid after: 2006-09-06T23:31:21
  59. | MD5: e7d8 e15b 4f7c 236c 630c dbcc 28cc d1bb
  60. |_SHA-1: f919 3349 c450 2020 51f0 c376 d6ee 2c26 2041 af61
  61. Device type: general purpose
  62. Running: Linux 2.6.X
  63. OS CPE: cpe:/o:linux:linux_kernel:2.6
  64. OS details: Linux 2.6.9 - 2.6.30
  65. Uptime guess: 44.049 days (since Wed May 30 12:02:33 2018)
  66. Network Distance: 1 hop
  67. TCP Sequence Prediction: Difficulty=197 (Good luck!)
  68. IP ID Sequence Generation: All zeros
  69. Service Info: OS: Linux; Device: broadband router; CPE: cpe:/o:linux:linux_kernel, cpe:/h:zyxel:vmg8324-b10a
  70.  
  71. TRACEROUTE (using port 143/tcp)
  72. HOP RTT ADDRESS
  73. 1 8.53 ms s5596b6c3.adsl.online.nl (85.150.182.195)
  74.  
  75. NSE: Script Post-scanning.
  76. Initiating NSE at 13:13
  77. Completed NSE at 13:13, 0.00s elapsed
  78. Initiating NSE at 13:13
  79. Completed NSE at 13:13, 0.00s elapsed
  80. Read data files from: /usr/local/bin/../share/nmap
  81. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  82. Nmap done: 1 IP address (1 host up) scanned in 49.94 seconds
  83. Raw packets sent: 1032 (46.170KB) | Rcvd: 1023 (41.674KB)
  84. </output><host comment=""><status state="up"></status><address addrtype="ipv4" vendor="" addr="85.150.182.195"></address><hostnames><hostname type="PTR" name="s5596b6c3.adsl.online.nl"></hostname></hostnames><ports><extraports count="994" state="closed"></extraports><port protocol="tcp" portid="21"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="D-Link/Comtrend DSL modem ftp firmware update" method="probed" conf="10" name="ftp"></service></port><port protocol="tcp" portid="22"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="Dropbear sshd" name="ssh" extrainfo="protocol 2.0" version="0.46" conf="10" method="probed"></service></port><port protocol="tcp" portid="23"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="ZyXEL DSL modem telnetd" extrainfo="model: VMG8324-B10A" method="probed" conf="10" name="telnet"></service></port><port protocol="tcp" portid="53"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="dnsmasq" version="2.48" method="probed" conf="10" name="domain"></service></port><port protocol="tcp" portid="80"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="micro_httpd" method="probed" conf="10" name="http"></service></port><port protocol="tcp" portid="443"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="micro_httpd" method="probed" conf="10" name="http"></service></port></ports><os><portused state="open" portid="21" proto="tcp"></portused><portused state="closed" portid="1" proto="tcp"></portused><portused state="closed" portid="35184" proto="udp"></portused><osmatch line="59081" name="Linux 2.6.9 - 2.6.30" accuracy="100"><osclass type="general purpose" osfamily="Linux" vendor="Linux" osgen="2.6.X" accuracy="100"></osclass></osmatch></os><uptime lastboot="Wed May 30 12:02:33 2018" seconds="3805863"></uptime><tcpsequence index="197" values="C307FD1A,C323A615,C31DD9D2,C39168A3,C36BC96A,C38F0261" difficulty="Good luck!"></tcpsequence><ipidsequence values="0,0,0,0,0,0" class="All zeros"></ipidsequence><tcptssequence values="E2D84D6E,E2D84D9A,E2D84E1F,E2D84E6A,E2D84ECF,E2D84F38" class="1000HZ"></tcptssequence><trace port="143" proto="tcp"><hop rtt="8.53" host="s5596b6c3.adsl.online.nl" ipaddr="85.150.182.195" ttl="1"></hop></trace></host><runstats><finished timestr="Fri Jul 13 13:13:36 2018" time="1531480416"></finished><hosts down="0" total="1" up="1"></hosts></runstats></nmaprun>
  85.  
  86. Starting Nmap 7.60 ( https://nmap.org ) at 2018-01-31 09:27 CET
NSE: Loaded 146 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 09:27
Completed NSE at 09:27, 0.00s elapsed
Initiating NSE at 09:27
Completed NSE at 09:27, 0.00s elapsed
Initiating ARP Ping Scan at 09:27
Scanning 192.168.1.1 [1 port]
Completed ARP Ping Scan at 09:27, 0.01s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 09:27
Completed Parallel DNS resolution of 1 host. at 09:27, 0.01s elapsed
Initiating SYN Stealth Scan at 09:27
Scanning ZyXEL.Home (192.168.1.1) [1000 ports]

  87. Discovered open port 53/tcp on 192.168.1.1
Discovered open port 443/tcp on 192.168.1.1
Discovered open port 22/tcp on 192.168.1.1
Discovered open port 21/tcp on 192.168.1.1
Discovered open port 23/tcp on 192.168.1.1
Discovered open port 80/tcp on 192.168.1.1
Completed SYN Stealth Scan at 09:27, 1.61s elapsed (1000 total ports)
Initiating Service scan at 09:27
Scanning 6 services on ZyXEL.Home (192.168.1.1)
Completed Service scan at 09:27, 8.46s elapsed (6 services on 1 host)
Initiating OS detection (try #1) against ZyXEL.Home (192.168.1.1)
NSE: Script scanning 192.168.1.1.
Initiating NSE at 09:27
Completed NSE at 09:28, 32.55s elapsed
Initiating NSE at 09:28
Completed NSE at 09:28, 0.00s elapsed
Nmap scan report for ZyXEL.Home (192.168.1.1)
Host is up (0.0032s latency).
Not shown: 994 closed ports
PORT    STATE SERVICE    VERSION
21/tcp  open  ftp        D-Link/Comtrend DSL modem ftp firmware update
22/tcp  open  ssh        Dropbear sshd 0.46 (protocol 2.0)
| ssh-hostkey: 
|_  1040 dc:14:de:8e:d7:c1:15:43:23:82:25:81:d2:59:e8:c0 (RSA)
23/tcp  open  telnet     ZyXEL DSL modem telnetd (model: VMG8324-B10A)
53/tcp  open  domain     dnsmasq 2.48
| dns-nsid: 
|   id.server: rdns-p03 link.PDF FOLLOW
|_  bind.version: dnsmasq-2.48
80/tcp  open  tcpwrapped
| http-methods: 
|_  Supported Methods: GET POST
|_http-server-header: micro_httpd
|_http-title: Site doesn't have a title (text/html).
443/tcp open  ssl/http   micro_httpd
|_http-title: Site doesn't have a title (text/html).

  88.  
  89. | ssl-cert: Subject: commonName=Daniel/organizationName=Broadcom/stateOrProvinceName=Califonia/countryName=UA
| Issuer: commonName=Daniel/organizationName=Broadcom/stateOrProvinceName=Califonia/countryName=UA
| Public Key type: rsa
| Public Key bits: 1024
| Signature Algorithm: md5WithRSAEncryption
| Not valid before: 2006-08-07T23:31:21
| Not valid after:  2006-09-06T23:31:21
| MD5:   e7d8 e15b 4f7c 236c 630c dbcc 28cc d1bb
|_SHA-1: f919 3349 c450 2020 51f0 c376 d6ee 2c26 2041 af61
MAC Address: 58:8B:F3:B7:17:EA (ZyXEL Communications)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.30
Uptime guess: 2.740 days (since Sun Jan 28 15:41:47 2018)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=192 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; Device: broadband router; CPE: cpe:/o:linux:linux_kernel, cpe:/h:zyxel:vmg8324-b10a

TRACEROUTE
HOP RTT     ADDRESS
1   3.16 ms ZyXEL.Home (192.168.1.1)
  90.  
  91.  
  92. NSE: Script Post-scanning.
Initiating NSE at 09:28
Completed NSE at 09:28, 0.00s elapsed
Initiating NSE at 09:28
Completed NSE at 09:28, 0.00s elapsed
Read data files from: /usr/local/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 47.71 seconds
           Raw packets sent: 1039 (47.176KB) | Rcvd: 1016 (41.116KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement