Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- https://nmap.org/
- Starting Nmap 7.60 ( https://nmap.org ) at 2018-01-31 09:27 CET NSE: Loaded 146 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 09:27 Completed NSE at 09:27, 0.00s elapsed Initiating NSE at 09:27 Completed NSE at 09:27, 0.00s elapsed Initiating ARP Ping Scan at 09:27 Scanning 192.168.1.1 [1 port] Completed ARP Ping Scan at 09:27, 0.01s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 09:27 Completed Parallel DNS resolution of 1 host. at 09:27, 0.01s elapsed Initiating SYN Stealth Scan at 09:27 Scanning ZyXEL.Home (192.168.1.1) [1000 ports]
- Discovered open port 53/tcp on 192.168.1.1 Discovered open port 443/tcp on 192.168.1.1 Discovered open port 22/tcp on 192.168.1.1 Discovered open port 21/tcp on 192.168.1.1 Discovered open port 23/tcp on 192.168.1.1 Discovered open port 80/tcp on 192.168.1.1 Completed SYN Stealth Scan at 09:27, 1.61s elapsed (1000 total ports) Initiating Service scan at 09:27 Scanning 6 services on ZyXEL.Home (192.168.1.1) Completed Service scan at 09:27, 8.46s elapsed (6 services on 1 host) Initiating OS detection (try #1) against ZyXEL.Home (192.168.1.1) NSE: Script scanning 192.168.1.1. Initiating NSE at 09:27 Completed NSE at 09:28, 32.55s elapsed Initiating NSE at 09:28 Completed NSE at 09:28, 0.00s elapsed Nmap scan report for ZyXEL.Home (192.168.1.1) Host is up (0.0032s latency). Not shown: 994 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp D-Link/Comtrend DSL modem ftp firmware update 22/tcp open ssh Dropbear sshd 0.46 (protocol 2.0) | ssh-hostkey: |_ 1040 dc:14:de:8e:d7:c1:15:43:23:82:25:81:d2:59:e8:c0 (RSA) 23/tcp open telnet ZyXEL DSL modem telnetd (model: VMG8324-B10A) 53/tcp open domain dnsmasq 2.48 | dns-nsid: | id.server: rdns-p03 link.PDF FOLLOW |_ bind.version: dnsmasq-2.48 80/tcp open tcpwrapped | http-methods: |_ Supported Methods: GET POST |_http-server-header: micro_httpd |_http-title: Site doesn't have a title (text/html). 443/tcp open ssl/http micro_httpd |_http-title: Site doesn't have a title (text/html).
- | ssl-cert: Subject: commonName=Daniel/organizationName=Broadcom/stateOrProvinceName=Califonia/countryName=UA | Issuer: commonName=Daniel/organizationName=Broadcom/stateOrProvinceName=Califonia/countryName=UA | Public Key type: rsa | Public Key bits: 1024 | Signature Algorithm: md5WithRSAEncryption | Not valid before: 2006-08-07T23:31:21 | Not valid after: 2006-09-06T23:31:21 | MD5: e7d8 e15b 4f7c 236c 630c dbcc 28cc d1bb |_SHA-1: f919 3349 c450 2020 51f0 c376 d6ee 2c26 2041 af61 MAC Address: 58:8B:F3:B7:17:EA (ZyXEL Communications) Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.9 - 2.6.30 Uptime guess: 2.740 days (since Sun Jan 28 15:41:47 2018) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=192 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux; Device: broadband router; CPE: cpe:/o:linux:linux_kernel, cpe:/h:zyxel:vmg8324-b10a TRACEROUTE HOP RTT ADDRESS 1 3.16 ms ZyXEL.Home (192.168.1.1)
- NSE: Script Post-scanning. Initiating NSE at 09:28 Completed NSE at 09:28, 0.00s elapsed Initiating NSE at 09:28 Completed NSE at 09:28, 0.00s elapsed Read data files from: /usr/local/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 47.71 seconds Raw packets sent: 1039 (47.176KB) | Rcvd: 1016 (41.116KB)
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-07-13 13:12 CEST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 13:12
- Completed NSE at 13:12, 0.00s elapsed
- Initiating NSE at 13:12
- Completed NSE at 13:12, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 13:12
- Completed Parallel DNS resolution of 1 host. at 13:12, 0.03s elapsed
- Initiating SYN Stealth Scan at 13:12
- Scanning s5596b6c3.adsl.online.nl (85.150.182.195) [1000 ports]
- Discovered open port 80/tcp on 85.150.182.195
- Discovered open port 21/tcp on 85.150.182.195
- Discovered open port 53/tcp on 85.150.182.195
- Discovered open port 443/tcp on 85.150.182.195
- Discovered open port 22/tcp on 85.150.182.195
- Discovered open port 23/tcp on 85.150.182.195
- Completed SYN Stealth Scan at 13:12, 1.62s elapsed (1000 total ports)
- Initiating Service scan at 13:12
- Scanning 6 services on s5596b6c3.adsl.online.nl (85.150.182.195)
- Completed Service scan at 13:12, 7.61s elapsed (6 services on 1 host)
- Initiating OS detection (try #1) against s5596b6c3.adsl.online.nl (85.150.182.195)
- Initiating Traceroute at 13:13
- Completed Traceroute at 13:13, 0.02s elapsed
- NSE: Script scanning 85.150.182.195.
- Initiating NSE at 13:13
- Completed NSE at 13:13, 35.52s elapsed
- Initiating NSE at 13:13
- Completed NSE at 13:13, 0.00s elapsed
- Nmap scan report for s5596b6c3.adsl.online.nl (85.150.182.195)
- Host is up (0.0055s latency).
- Not shown: 994 closed ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp D-Link/Comtrend DSL modem ftp firmware update
- 22/tcp open ssh Dropbear sshd 0.46 (protocol 2.0)
- | ssh-hostkey:
- |_ 1040 dc:14:de:8e:d7:c1:15:43:23:82:25:81:d2:59:e8:c0 (RSA)
- 23/tcp open telnet ZyXEL DSL modem telnetd (model: VMG8324-B10A)
- 53/tcp open domain dnsmasq 2.48
- | dns-nsid:
- | id.server: rdns-p03
- |_ bind.version: dnsmasq-2.48
- 80/tcp open http micro_httpd
- | http-methods:
- |_ Supported Methods: GET POST
- |_http-server-header: micro_httpd
- |_http-title: Site doesn't have a title (text/html).
- 443/tcp open ssl/http micro_httpd
- |_http-title: Site doesn't have a title (text/html).
- | ssl-cert: Subject: commonName=Daniel/organizationName=Broadcom/stateOrProvinceName=Califonia/countryName=UA
- | Issuer: commonName=Daniel/organizationName=Broadcom/stateOrProvinceName=Califonia/countryName=UA
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: md5WithRSAEncryption
- | Not valid before: 2006-08-07T23:31:21
- | Not valid after: 2006-09-06T23:31:21
- | MD5: e7d8 e15b 4f7c 236c 630c dbcc 28cc d1bb
- |_SHA-1: f919 3349 c450 2020 51f0 c376 d6ee 2c26 2041 af61
- Device type: general purpose
- Running: Linux 2.6.X
- OS CPE: cpe:/o:linux:linux_kernel:2.6
- OS details: Linux 2.6.9 - 2.6.30
- Uptime guess: 44.049 days (since Wed May 30 12:02:33 2018)
- Network Distance: 1 hop
- TCP Sequence Prediction: Difficulty=197 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Linux; Device: broadband router; CPE: cpe:/o:linux:linux_kernel, cpe:/h:zyxel:vmg8324-b10a
- TRACEROUTE (using port 143/tcp)
- HOP RTT ADDRESS
- 1 8.53 ms s5596b6c3.adsl.online.nl (85.150.182.195)
- NSE: Script Post-scanning.
- Initiating NSE at 13:13
- Completed NSE at 13:13, 0.00s elapsed
- Initiating NSE at 13:13
- Completed NSE at 13:13, 0.00s elapsed
- Read data files from: /usr/local/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 49.94 seconds
- Raw packets sent: 1032 (46.170KB) | Rcvd: 1023 (41.674KB)
- </output><host comment=""><status state="up"></status><address addrtype="ipv4" vendor="" addr="85.150.182.195"></address><hostnames><hostname type="PTR" name="s5596b6c3.adsl.online.nl"></hostname></hostnames><ports><extraports count="994" state="closed"></extraports><port protocol="tcp" portid="21"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="D-Link/Comtrend DSL modem ftp firmware update" method="probed" conf="10" name="ftp"></service></port><port protocol="tcp" portid="22"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="Dropbear sshd" name="ssh" extrainfo="protocol 2.0" version="0.46" conf="10" method="probed"></service></port><port protocol="tcp" portid="23"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="ZyXEL DSL modem telnetd" extrainfo="model: VMG8324-B10A" method="probed" conf="10" name="telnet"></service></port><port protocol="tcp" portid="53"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="dnsmasq" version="2.48" method="probed" conf="10" name="domain"></service></port><port protocol="tcp" portid="80"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="micro_httpd" method="probed" conf="10" name="http"></service></port><port protocol="tcp" portid="443"><state reason="syn-ack" state="open" reason_ttl="64"></state><service product="micro_httpd" method="probed" conf="10" name="http"></service></port></ports><os><portused state="open" portid="21" proto="tcp"></portused><portused state="closed" portid="1" proto="tcp"></portused><portused state="closed" portid="35184" proto="udp"></portused><osmatch line="59081" name="Linux 2.6.9 - 2.6.30" accuracy="100"><osclass type="general purpose" osfamily="Linux" vendor="Linux" osgen="2.6.X" accuracy="100"></osclass></osmatch></os><uptime lastboot="Wed May 30 12:02:33 2018" seconds="3805863"></uptime><tcpsequence index="197" values="C307FD1A,C323A615,C31DD9D2,C39168A3,C36BC96A,C38F0261" difficulty="Good luck!"></tcpsequence><ipidsequence values="0,0,0,0,0,0" class="All zeros"></ipidsequence><tcptssequence values="E2D84D6E,E2D84D9A,E2D84E1F,E2D84E6A,E2D84ECF,E2D84F38" class="1000HZ"></tcptssequence><trace port="143" proto="tcp"><hop rtt="8.53" host="s5596b6c3.adsl.online.nl" ipaddr="85.150.182.195" ttl="1"></hop></trace></host><runstats><finished timestr="Fri Jul 13 13:13:36 2018" time="1531480416"></finished><hosts down="0" total="1" up="1"></hosts></runstats></nmaprun>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement