Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-18 07:41 EDT
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 07:41
- Completed NSE at 07:41, 0.00s elapsed
- Initiating NSE at 07:41
- Completed NSE at 07:41, 0.00s elapsed
- Initiating Ping Scan at 07:41
- Scanning 40.68.205.171 [2 ports]
- Completed Ping Scan at 07:41, 2.00s elapsed (1 total hosts)
- Nmap scan report for 40.68.205.171 [host down]
- NSE: Script Post-scanning.
- Initiating NSE at 07:41
- Completed NSE at 07:41, 0.00s elapsed
- Initiating NSE at 07:41
- Completed NSE at 07:41, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
- Nmap done: 1 IP address (0 hosts up) scanned in 2.40 seconds
- $ nmap -v -A -T4 40.68.205.171 -pN
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-18 07:41 EDT
- Error #485: Your port specifications are illegal. Example of proper form: "-100,200-1024,T:3000-4000,U:60000-"
- QUITTING!
- $ nmap -v -A -T4 40.68.205.171 -Pn
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-18 07:41 EDT
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 07:41
- Completed NSE at 07:41, 0.00s elapsed
- Initiating NSE at 07:41
- Completed NSE at 07:41, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 07:41
- Completed Parallel DNS resolution of 1 host. at 07:41, 0.03s elapsed
- Initiating Connect Scan at 07:41
- Scanning 40.68.205.171 [1000 ports]
- Discovered open port 3389/tcp on 40.68.205.171
- Completed Connect Scan at 07:41, 5.51s elapsed (1000 total ports)
- Initiating Service scan at 07:41
- Scanning 1 service on 40.68.205.171
- Completed Service scan at 07:42, 11.02s elapsed (1 service on 1 host)
- NSE: Script scanning 40.68.205.171.
- Initiating NSE at 07:42
- Completed NSE at 07:42, 0.07s elapsed
- Initiating NSE at 07:42
- Completed NSE at 07:42, 0.00s elapsed
- Nmap scan report for 40.68.205.171
- Host is up (0.0026s latency).
- Not shown: 999 filtered ports
- PORT STATE SERVICE VERSION
- 3389/tcp open ms-wbt-server Microsoft Terminal Services
- | ssl-cert: Subject: commonName=WIN10-D03.GROEN.WIT-D03.local
- | Issuer: commonName=WIN10-D03.GROEN.WIT-D03.local
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-04-04T11:36:27
- | Not valid after: 2019-10-04T11:36:27
- | MD5: 9c75 bb66 0f67 7eb4 73ac db50 cb62 d334
- |_SHA-1: 8892 2b53 e3c9 0bfe 8855 a123 e249 d64f 4337 cd57
- |_ssl-date: 2019-04-18T11:42:07+00:00; +1s from scanner time.
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- NSE: Script Post-scanning.
- Initiating NSE at 07:42
- Completed NSE at 07:42, 0.00s elapsed
- Initiating NSE at 07:42
- Completed NSE at 07:42, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 17.15 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement