Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- Nom de l'hôte www.theuka.us FAI GoDaddy.com, LLC
- Continent Asie Drapeau
- SG
- Pays Singapour Code du pays SG
- Région Inconnu Heure locale 21 Oct 2018 05:39 +08
- Ville Inconnu Code Postal Inconnu
- Adresse IP 182.50.132.242 Latitude 1.367
- Longitude 103.8
- #######################################################################################################################################
- Server: 10.211.254.254
- Address: 10.211.254.254#53
- ** server can't find A: NXDOMAIN
- > www.theuka.us
- Server: 10.211.254.254
- Address: 10.211.254.254#53
- Non-authoritative answer:
- www.theuka.us canonical name = theuka.us.
- Name: theuka.us
- Address: 182.50.132.242
- #######################################################################################################################################
- HostIP:182.50.132.242
- HostName:www.theuka.us
- Gathered Inet-whois information for 182.50.132.242
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 182.0.0.0 - 182.255.255.255
- netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
- descr: IPv4 address block not managed by the RIPE NCC
- remarks: ------------------------------------------------------
- remarks:
- remarks: You can find the whois server to query, or the
- remarks: IANA registry to query on this web page:
- remarks: http://www.iana.org/assignments/ipv4-address-space
- remarks:
- remarks: You can access databases of other RIRs at:
- remarks:
- remarks: AFRINIC (Africa)
- remarks: http://www.afrinic.net/ whois.afrinic.net
- remarks:
- remarks: APNIC (Asia Pacific)
- remarks: http://www.apnic.net/ whois.apnic.net
- remarks:
- remarks: ARIN (Northern America)
- remarks: http://www.arin.net/ whois.arin.net
- remarks:
- remarks: LACNIC (Latin America and the Carribean)
- remarks: http://www.lacnic.net/ whois.lacnic.net
- remarks:
- remarks: IANA IPV4 Recovered Address Space
- remarks: http://www.iana.org/assignments/ipv4-recovered-address-space/ipv4-recovered-address-space.xhtml
- remarks:
- remarks: ------------------------------------------------------
- country: EU # Country is really world wide
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- status: ALLOCATED UNSPECIFIED
- mnt-by: RIPE-NCC-HM-MNT
- mnt-lower: RIPE-NCC-HM-MNT
- created: 2014-11-07T14:14:58Z
- last-modified: 2018-09-04T13:31:20Z
- source: RIPE
- role: Internet Assigned Numbers Authority
- address: see http://www.iana.org.
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- nic-hdl: IANA1-RIPE
- remarks: For more information on IANA services
- remarks: go to IANA web site at http://www.iana.org.
- mnt-by: RIPE-NCC-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2001-09-22T09:31:27Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.92.6 (HEREFORD)
- Gathered Inic-whois information for theuka.us
- ---------------------------------------------------------------------------------------------------------------------------------------
- Domain Name: theuka.us
- Registry Domain ID: D32964433-US
- Registrar WHOIS Server: whois.godaddy.com
- Registrar URL: whois.godaddy.com
- Updated Date: 2018-06-14T12:31:59Z
- Creation Date: 2011-06-09T13:38:03Z
- Registry Expiry Date: 2019-06-08T23:59:59Z
- Registrar: GoDaddy.com, Inc.
- Registrar IANA ID: 146
- Registrar Abuse Contact Email: abuse@godaddy.com
- Registrar Abuse Contact Phone: +1.4806242505
- Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
- Domain Status: clientRenewProhibited https://ica�U@nn.or���|%g/�epp#clD����ieU@ntRenJ����ew�U@Prohi�������bited
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
- Registry Registrant ID: C32964429-US
- Registrant Name: Bradley Jenkins
- Registrant Organization: UKA
- Registrant Street: 418 Amason Rd
- Registrant Street:
- Registrant Street:
- Registrant City: Lineville
- Registrant State/Province: Alabama
- Registrant Postal Code: 36266
- Registrant Country: US
- Registrant Phone: +1.2562528047
- Registrant Phone Ext:
- Registrant Fax:
- Registrant Fax Ext:
- Registrant Email: jenkinsbradleys33@outlook.com
- Registrant Application Purpose: P3
- Registrant Nexus Category: C21
- Registry Admin ID: C32964431-US
- Admin Name: Bradley Jenkins
- Admin Organization: UKA
- Admin Street: 418 Amason Rd
- Admin Street:
- Admin Street:
- Admin City: Lineville
- Admin State/Province: Alabama
- Admin Postal Code: 36266
- Admin Country: US
- Admin Phone: +1.2562528047
- Admin Phone Ext:
- Admin Fax:
- Admin Fax Ext:
- Admin Email: jenkinsbradleys33@outlook.com
- Admin Application Purpose: P3
- Admin Nexus Category: C21
- Registry Tech ID: C32964430-US
- Tech Name: Bradley Jenkins
- Tech Organization: UKA
- Tech Street: 418 Amason Rd
- Tech Street:
- Tech Street:
- Tech City: Lineville
- Tech State/Province: Alabama
- Tech Postal Code: 36266
- Tech Country: US
- Tech Phone: +1.2562528047
- Tech Phone Ext:
- Tech Fax:
- Tech Fax Ext:
- Tech Email: jenkinsbradleys33@outlook.com
- Tech Application Purpose: P3
- Tech Nexus Category: C21
- Name Server: ns78.domaincontrol.com
- Name Server: ns77.domaincontrol.com
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of WHOIS database: 2018-10-20T21:43:46Z <<<
- #######################################################################################################################################
- [i] Scanning Site: http://www.theuka.us
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: Home
- [+] IP address: 182.50.132.242
- [+] Web Server: DPS/1.4.17
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow: /cache/
- Disallow: /_backup/
- Disallow: /_mygallery/
- Disallow: /_temp/
- Disallow: /_tempalbums/
- Disallow: /_tmpfileop/
- Disallow: /dbboon/
- Disallow: /Flash/
- Disallow: /images/
- Disallow: /mobile/
- Disallow: /plugins/
- Disallow: /scripts/
- Disallow: /stats/
- Disallow: /statshistory/
- Disallow: /QSC/
- -----------[end of contents]-------------
- W H O I S L O O K U P
- =======================================================================================================================================
- Catastrophic error: disclaimer text has been changed.
- Please upgrade this program.
- Domain Name: theuka.us
- Registry Domain ID: D32964433-US
- Registrar WHOIS Server: whois.godaddy.com
- Registrar URL: whois.godaddy.com
- Updated Date: 2018-06-14T12:31:59Z
- Creation Date: 2011-06-09T13:38:03Z
- Registry Expiry Date: 2019-06-08T23:59:59Z
- Registrar: GoDaddy.com, Inc.
- Registrar IANA ID: 146
- Registrar Abuse Contact Email: abuse@godaddy.com
- Registrar Abuse Contact Phone: +1.4806242505
- Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
- Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
- Registry Registrant ID: C32964429-US
- Registrant Name: Bradley Jenkins
- Registrant Organization: UKA
- Registrant Street: 418 Amason Rd
- Registrant Street:
- Registrant Street:
- Registrant City: Lineville
- Registrant State/Province: Alabama
- Registrant Postal Code: 36266
- Registrant Country: US
- Registrant Phone: +1.2562528047
- Registrant Phone Ext:
- Registrant Fax:
- Registrant Fax Ext:
- Registrant Email: jenkinsbradleys33@outlook.com
- Registrant Application Purpose: P3
- Registrant Nexus Category: C21
- Registry Admin ID: C32964431-US
- Admin Name: Bradley Jenkins
- Admin Organization: UKA
- Admin Street: 418 Amason Rd
- Admin Street:
- Admin Street:
- Admin City: Lineville
- Admin State/Province: Alabama
- Admin Postal Code: 36266
- Admin Country: US
- Admin Phone: +1.2562528047
- Admin Phone Ext:
- Admin Fax:
- Admin Fax Ext:
- Admin Email: jenkinsbradleys33@outlook.com
- Admin Application Purpose: P3
- Admin Nexus Category: C21
- Registry Tech ID: C32964430-US
- Tech Name: Bradley Jenkins
- Tech Organization: UKA
- Tech Street: 418 Amason Rd
- Tech Street:
- Tech Street:
- Tech City: Lineville
- Tech State/Province: Alabama
- Tech Postal Code: 36266
- Tech Country: US
- Tech Phone: +1.2562528047
- Tech Phone Ext:
- Tech Fax:
- Tech Fax Ext:
- Tech Email: jenkinsbradleys33@outlook.com
- Tech Application Purpose: P3
- Tech Nexus Category: C21
- Name Server: ns78.domaincontrol.com
- Name Server: ns77.domaincontrol.com
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of WHOIS database: 2018-10-20T21:44:00Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 198.71.232.3
- [i] Country: US
- [i] State: Arizona
- [i] City: Scottsdale
- [i] Latitude: 33.611900
- [i] Longitude: -111.890602
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Content-Type: text/html; charset=utf-8
- [i] Cache-Control: public, max-age=60, s-maxage=300
- [i] Vary: Accept-Encoding
- [i] Content-Encoding: raw
- [i] Server: DPS/1.4.17
- [i] X-SiteId: 3000
- [i] Set-Cookie: dps_site_id=3000; path=/
- [i] ETag: d3a34bf78843493622936804cbb8e182
- [i] Date: Sat, 20 Oct 2018 21:44:04 GMT
- [i] Connection: close
- D N S L O O K U P
- =======================================================================================================================================
- ;; Truncated, retrying in TCP mode.
- theuka.us. 3600 IN MX 0 smtp.secureserver.net.
- theuka.us. 3600 IN NS ns78.domaincontrol.com.
- theuka.us. 3600 IN SOA ns77.domaincontrol.com. dns.jomax.net. 2017030103 28800 7200 604800 3600
- theuka.us. 600 IN A 198.71.232.3
- theuka.us. 3600 IN NS ns77.domaincontrol.com.
- theuka.us. 3600 IN MX 10 mailstore1.secureserver.net.
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 198.71.232.3
- Network = 198.71.232.3 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 198.71.232.3 - 198.71.232.3 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2018-10-20 21:44 UTC
- Nmap scan report for theuka.us (198.71.232.3)
- Host is up (0.13s latency).
- rDNS record for 198.71.232.3: ip-198-71-232-3.ip.secureserver.net
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp open ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 13.61 seconds
- #######################################################################################################################################
- [?] Enter the target: http://www.theuka.us/
- [!] IP Address : 182.50.132.242
- [!] Server: DPS/1.4.17
- [+] Clickjacking protection is not in place.
- [!] www.theuka.us doesn't seem to use a CMS
- [+] Honeypot Probabilty: 0%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for www.theuka.us
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/www.theuka.us
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 3.36 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [verbose] Retrieved token: lyyAIzkxFvjz8nvRvcMzVSB7FPK8AZdA
- [+] DNS Records
- ns78.domaincontrol.com. (173.201.76.49) AS26496 GoDaddy.com, LLC United States
- ns77.domaincontrol.com. (216.69.185.49) AS26496 GoDaddy.com, LLC United States
- [+] MX Records
- 10 (68.178.213.244) AS26496 GoDaddy.com, LLC United States
- [+] MX Records
- 0 (72.167.238.29) AS26496 GoDaddy.com, LLC United States
- [+] Host Records (A)
- www.theuka.us (ip-198-71-232-3.ip.secureserver.net) (198.71.232.3) AS26496 GoDaddy.com, LLC United States
- [+] TXT Records
- [+] DNS Map: https://dnsdumpster.com/static/map/theuka.us.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- [+] Emails found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- pixel-1540071860737937-web-@www.theuka.us
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Crawling the target for fuzzable URLs
- [-] No fuzzable URLs found
- #######################################################################################################################################
- ; <<>> DiG 9.11.4-P2-3-Debian <<>> www.theuka.us
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14909
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 5
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;www.theuka.us. IN A
- ;; ANSWER SECTION:
- www.theuka.us. 2148 IN CNAME theuka.us.
- theuka.us. 218 IN A 182.50.132.242
- ;; AUTHORITY SECTION:
- theuka.us. 2192 IN NS ns77.domaincontrol.com.
- theuka.us. 2192 IN NS ns78.domaincontrol.com.
- ;; ADDITIONAL SECTION:
- ns77.domaincontrol.com. 21067 IN AAAA 2607:f208:206::31
- ns78.domaincontrol.com. 129576 IN AAAA 2603:5:22c4::31
- ns77.domaincontrol.com. 21067 IN A 216.69.185.49
- ns78.domaincontrol.com. 129576 IN A 173.201.76.49
- ;; Query time: 417 msec
- ;; SERVER: 10.211.254.254#53(10.211.254.254)
- ;; WHEN: sam oct 20 18:07:56 EDT 2018
- ;; MSG SIZE rcvd: 215
- #######################################################################################################################################
- [+] Hosting Info for Website: www.theuka.us
- [+] Visitors per day: < 200
- [+] IP Address: ...
- [+] IP Reverse DNS (Host): ip-198-71-232-3.ip.secureserver.net
- [+] Hosting Company: Godaddy.com, LLC
- [+] Hosting IP Range: 198.71.128.0 - 198.71.255.255 (32,768 ip)
- [+] Hosting Address: 14455 N Hayden Road, Suite 226, Scottsdale, AZ, 85260, US
- [+] Hosting Country: USA
- [+] Hosting Phone: +1-480-505-8809
- [+] Hosting Website: www.godaddy.com
- [+] CIDR: 198.71.128.0/17
- [+] Hosting CIDR: 198.71.128.0/17
- [+] NS: theuka.us
- [+] NS: ns77.domaincontrol.com
- [+] NS: ns78.domaincontrol.com
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: theuka.us
- [!] Wildcard resolution is enabled on this domain
- [!] It is resolving to 182.50.132.242
- [!] All queries will resolve to this address!!
- [-] DNSSEC is not configured for theuka.us
- [*] SOA ns77.domaincontrol.com 216.69.185.49
- [*] NS ns78.domaincontrol.com 173.201.76.49
- [*] NS ns78.domaincontrol.com 2603:5:22c4::31
- [*] NS ns77.domaincontrol.com 216.69.185.49
- [*] NS ns77.domaincontrol.com 2607:f208:206::31
- [*] MX mailstore1.secureserver.net 68.178.213.243
- [*] MX mailstore1.secureserver.net 68.178.213.244
- [*] MX mailstore1.secureserver.net 72.167.238.32
- [*] MX smtp.secureserver.net 68.178.213.37
- [*] MX smtp.secureserver.net 72.167.238.29
- [*] MX smtp.secureserver.net 68.178.213.203
- [*] A theuka.us 182.50.132.242
- [*] Enumerating SRV Records
- [-] No SRV Records Found for theuka.us
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain theuka.us
- [+] Getting nameservers
- 173.201.76.49 - ns78.domaincontrol.com
- 216.69.185.49 - ns77.domaincontrol.com
- [-] Zone transfer failed
- [+] MX records found, added to target list
- 0 smtp.secureserver.net.
- 10 mailstore1.secureserver.net.
- [+] Wildcard domain found - 182.50.132.242
- [*] Scanning theuka.us for A records
- 72.167.218.45 - e.theuka.us
- 173.201.193.148 - e.theuka.us
- 173.201.193.133 - e.theuka.us
- 173.201.192.148 - e.theuka.us
- 45.40.130.40 - e.theuka.us
- 173.201.192.20 - e.theuka.us
- 173.201.192.133 - e.theuka.us
- 97.74.135.148 - e.theuka.us
- 72.167.218.173 - e.theuka.us
- 68.178.252.148 - e.theuka.us
- 97.74.135.133 - e.theuka.us
- 45.40.130.41 - e.theuka.us
- 72.167.218.55 - e.theuka.us
- 173.201.192.5 - e.theuka.us
- 68.178.252.5 - e.theuka.us
- 173.201.193.20 - e.theuka.us
- 97.74.135.45 - e.theuka.us
- 173.201.193.5 - e.theuka.us
- 68.178.252.20 - e.theuka.us
- 72.167.218.183 - e.theuka.us
- 68.178.252.133 - e.theuka.us
- 97.74.135.55 - e.theuka.us
- 68.178.252.133 - email.theuka.us
- 72.167.218.55 - email.theuka.us
- 97.74.135.55 - email.theuka.us
- 68.178.252.148 - email.theuka.us
- 97.74.135.133 - email.theuka.us
- 45.40.130.41 - email.theuka.us
- 45.40.130.40 - email.theuka.us
- 173.201.193.20 - email.theuka.us
- 173.201.192.133 - email.theuka.us
- 173.201.193.5 - email.theuka.us
- 72.167.218.173 - email.theuka.us
- 68.178.252.20 - email.theuka.us
- 97.74.135.148 - email.theuka.us
- 72.167.218.45 - email.theuka.us
- 72.167.218.183 - email.theuka.us
- 173.201.193.148 - email.theuka.us
- 173.201.192.20 - email.theuka.us
- 173.201.193.133 - email.theuka.us
- 68.178.252.5 - email.theuka.us
- 97.74.135.45 - email.theuka.us
- 173.201.192.5 - email.theuka.us
- 173.201.192.148 - email.theuka.us
- 208.109.14.154 - forum.theuka.us
- 97.74.135.10 - imap.theuka.us
- 173.201.192.158 - imap.theuka.us
- 72.167.218.138 - imap.theuka.us
- 173.201.193.97 - imap.theuka.us
- 173.201.192.129 - imap.theuka.us
- 97.74.135.143 - imap.theuka.us
- 173.201.193.129 - imap.theuka.us
- 68.178.252.117 - imap.theuka.us
- 173.201.192.129 - mail.theuka.us
- 97.74.135.10 - mail.theuka.us
- 72.167.218.138 - mail.theuka.us
- 173.201.192.158 - mail.theuka.us
- 68.178.252.117 - mail.theuka.us
- 97.74.135.143 - mail.theuka.us
- 173.201.193.129 - mail.theuka.us
- 173.201.193.97 - mail.theuka.us
- 173.201.193.5 - pda.theuka.us
- 173.201.193.97 - pop.theuka.us
- 173.201.192.129 - pop.theuka.us
- 68.178.252.117 - pop.theuka.us
- 97.74.135.10 - pop.theuka.us
- 97.74.135.143 - pop.theuka.us
- 72.167.218.138 - pop.theuka.us
- 173.201.192.158 - pop.theuka.us
- 173.201.193.129 - pop.theuka.us
- 68.178.213.203 - smtp.theuka.us
- 68.178.213.37 - smtp.theuka.us
- 72.167.238.29 - smtp.theuka.us
- 97.74.135.148 - webmail.theuka.us
- 173.201.192.133 - webmail.theuka.us
- 72.167.218.55 - webmail.theuka.us
- 72.167.218.45 - webmail.theuka.us
- 72.167.218.183 - webmail.theuka.us
- 72.167.218.173 - webmail.theuka.us
- 97.74.135.45 - webmail.theuka.us
- 68.178.252.133 - webmail.theuka.us
- 68.178.252.20 - webmail.theuka.us
- 173.201.192.5 - webmail.theuka.us
- 173.201.193.20 - webmail.theuka.us
- 45.40.130.41 - webmail.theuka.us
- 173.201.193.5 - webmail.theuka.us
- 173.201.192.20 - webmail.theuka.us
- 173.201.193.148 - webmail.theuka.us
- 173.201.192.148 - webmail.theuka.us
- 45.40.130.40 - webmail.theuka.us
- 97.74.135.133 - webmail.theuka.us
- 97.74.135.55 - webmail.theuka.us
- 68.178.252.5 - webmail.theuka.us
- 68.178.252.148 - webmail.theuka.us
- 173.201.193.133 - webmail.theuka.us
- #######################################################################################################################################
- Start: 2018-10-20T22:40:33+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.202 0.0% 3 0.7 0.6 0.5 0.7 0.1
- 2.|-- 45.79.12.2 0.0% 3 0.6 0.6 0.5 0.6 0.1
- 3.|-- ae-37.a01.dllstx04.us.bb.gin.ntt.net 0.0% 3 1.0 2.0 1.0 3.4 1.3
- 4.|-- ae-9.r10.dllstx09.us.bb.gin.ntt.net 0.0% 3 1.8 1.6 1.3 1.8 0.3
- 5.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 6.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 7.|-- 4.28.83.74 0.0% 3 24.2 44.7 24.2 79.9 30.7
- 8.|-- ip-148-72-32-11.ip.secureserver.net 0.0% 3 29.2 26.0 24.1 29.2 2.8
- 9.|-- be39.trmc0215-01.ars.mgmt.phx3.gdg 0.0% 3 49.6 49.6 49.5 49.8 0.2
- 10.|-- ip-97-74-255-129.ip.secureserver.net 0.0% 3 50.4 53.3 50.2 59.3 5.2
- 11.|-- ip-72-167-191-69.ip.secureserver.net 0.0% 3 64.1 58.7 55.0 64.1 4.8
- #######################################################################################################################################
- [+] Testing domain
- www.theuka.us 182.50.132.242
- [+] Dns resolving
- Domain name Ip address Name server
- theuka.us 182.50.132.242 ip-182-50-132-242.ip.secureserver.net
- Found 1 host(s) for theuka.us
- [+] Testing wildcard
- #######################################################################################################################################
- -------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 182.50.132.242
- + Target Hostname: 182.50.132.242
- + Target Port: 80
- + Start Time: 2018-10-26 00:22:52 (GMT-4)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: No banner retrieved
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + ERROR: Error limit (20) reached for host, giving up. Last error: error reading HTTP response
- + Scan terminated: 20 error(s) and 3 item(s) reported on remote host
- + End Time: 2018-10-26 00:29:45 (GMT-4) (413 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- PING 182.50.132.242 (182.50.132.242) 56(84) bytes of data.
- 64 bytes from 182.50.132.242: icmp_seq=1 ttl=243 time=505 ms
- --- 182.50.132.242 ping statistics ---
- 1 packets transmitted, 1 received, 0% packet loss, time 0ms
- rtt min/avg/max/mdev = 504.516/504.516/504.516/0.000 ms
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-10-26 00:24 EDT
- Nmap scan report for ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Host is up (0.20s latency).
- Not shown: 470 filtered ports, 3 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 80/tcp open http
- 8080/tcp open http-proxy
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-10-26 00:24 EDT
- Nmap scan report for ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Host is up (0.27s latency).
- Not shown: 6 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-10-26 00:24 EDT
- Nmap scan report for ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Host is up (0.071s latency).
- PORT STATE SERVICE VERSION
- 21/tcp filtered ftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 20 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 158.48 ms 10.244.200.1
- 2 158.52 ms 177.67.82.193
- 3 159.23 ms 177.67.87.185
- 4 159.27 ms 5-178-46-202.seabone.net (5.178.46.202)
- 5 161.34 ms 195.22.219.3
- 6 160.07 ms 149.3.181.65
- 7 292.35 ms ae-4.r24.nycmny01.us.bb.gin.ntt.net (129.250.2.227)
- 8 333.53 ms 129.250.4.13
- 9 333.02 ms ae-0.r23.sttlwa01.us.bb.gin.ntt.net (129.250.6.30)
- 10 340.22 ms ae-3.r23.snjsca04.us.bb.gin.ntt.net (129.250.3.124)
- 11 343.60 ms ae-0.r22.snjsca04.us.bb.gin.ntt.net (129.250.2.182)
- 12 507.52 ms ae-2.r20.sngpsi05.sg.bb.gin.ntt.net (129.250.3.49)
- 13 509.01 ms ae-2.r00.sngpsi02.sg.bb.gin.ntt.net (129.250.3.147)
- 14 516.87 ms xe-0-5-0-26.r00.sngpsi02.sg.ce.gin.ntt.net (116.51.27.158)
- 15 ...
- 16 508.94 ms ip-148-72-204-7.ip.secureserver.net (148.72.204.7)
- 17 505.79 ms ip-182-50-156-132.ip.secureserver.net (182.50.156.132)
- 18 ... 19
- 20 506.76 ms ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-10-26 00:24 EDT
- Nmap scan report for ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Host is up (0.067s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 20 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 161.97 ms 10.244.200.1
- 2 162.02 ms 177.67.82.193
- 3 168.96 ms 177.67.87.185
- 4 163.14 ms 5-178-46-202.seabone.net (5.178.46.202)
- 5 165.91 ms 195.22.219.3
- 6 163.64 ms 149.3.181.65
- 7 293.23 ms ae-4.r24.nycmny01.us.bb.gin.ntt.net (129.250.2.227)
- 8 337.07 ms 129.250.4.13
- 9 337.12 ms ae-0.r23.sttlwa01.us.bb.gin.ntt.net (129.250.6.30)
- 10 344.38 ms ae-3.r23.snjsca04.us.bb.gin.ntt.net (129.250.3.124)
- 11 340.23 ms ae-0.r22.snjsca04.us.bb.gin.ntt.net (129.250.2.182)
- 12 506.64 ms ae-2.r20.sngpsi05.sg.bb.gin.ntt.net (129.250.3.49)
- 13 508.42 ms ae-2.r00.sngpsi02.sg.bb.gin.ntt.net (129.250.3.147)
- 14 515.71 ms xe-0-5-0-26.r00.sngpsi02.sg.ce.gin.ntt.net (116.51.27.158)
- 15 ...
- 16 508.43 ms ip-148-72-204-7.ip.secureserver.net (148.72.204.7)
- 17 510.92 ms ip-182-50-156-132.ip.secureserver.net (182.50.156.132)
- 18 ... 19
- 20 508.80 ms ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 122.16 seconds
- + -- --=[Port 68 closed... skipping.
- + -- --=[Port 69 opened... running tests...
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-10-26 00:26 EDT
- Nmap scan report for ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Host is up (0.067s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 20 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 168.02 ms 10.244.200.1
- 2 168.07 ms 177.67.82.193
- 3 169.20 ms 177.67.87.185
- 4 168.55 ms 5-178-46-202.seabone.net (5.178.46.202)
- 5 168.53 ms 195.22.219.3
- 6 168.92 ms 149.3.181.65
- 7 298.08 ms ae-4.r24.nycmny01.us.bb.gin.ntt.net (129.250.2.227)
- 8 341.87 ms 129.250.4.13
- 9 340.51 ms ae-0.r23.sttlwa01.us.bb.gin.ntt.net (129.250.6.30)
- 10 348.18 ms ae-3.r23.snjsca04.us.bb.gin.ntt.net (129.250.3.124)
- 11 341.73 ms ae-0.r22.snjsca04.us.bb.gin.ntt.net (129.250.2.182)
- 12 505.16 ms ae-2.r20.sngpsi05.sg.bb.gin.ntt.net (129.250.3.49)
- 13 506.68 ms ae-2.r00.sngpsi02.sg.bb.gin.ntt.net (129.250.3.147)
- 14 513.94 ms xe-0-5-0-26.r00.sngpsi02.sg.ce.gin.ntt.net (116.51.27.158)
- 15 ...
- 16 505.47 ms ip-148-72-204-7.ip.secureserver.net (148.72.204.7)
- 17 507.32 ms ip-182-50-156-132.ip.secureserver.net (182.50.156.132)
- 18 ... 19
- 20 508.06 ms ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- #######################################################################################################################################
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://182.50.132.242
- Generic Detection results:
- The site http://182.50.132.242 seems to be behind a WAF or some sort of security solution
- Reason: Blocking is being done at connection/packet level.
- Number of requests: 12
- #######################################################################################################################################
- http://182.50.132.242 [404 Not Found] Cookies[dps_site_id], Country[SINGAPORE][SG], HTML5, HTTPServer[DPS/1.4.17], IP[182.50.132.242], Title[404 Not Found], UncommonHeaders[x-siteid]
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://182.50.132.242...
- _________________ SITE INFO __________________
- IP Title
- 182.50.132.242 404 Not Found
- __________________ VERSION ___________________
- Name Versions Type
- dps 1.4.17 Platform
- ______________________________________________
- Time: 70.9 sec Urls: 599 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 404 Not Found
- Content-Type: text/html;charset=utf-8
- Content-Length: 964
- Vary: Accept-Encoding
- Server: DPS/1.4.17
- X-SiteId: 3000
- Set-Cookie: dps_site_id=3000; path=/
- Date: Fri, 26 Oct 2018 04:29:46 GMT
- Connection: keep-alive
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-10-26 00:29 EDT
- Nmap scan report for ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Host is up (0.50s latency).
- PORT STATE SERVICE VERSION
- 161/tcp filtered snmp
- 161/udp open|filtered snmp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 20 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 157.47 ms 10.244.200.1
- 2 157.51 ms 177.67.82.193
- 3 160.32 ms 177.67.87.185
- 4 158.73 ms 5-178-46-202.seabone.net (5.178.46.202)
- 5 160.37 ms 195.22.219.3
- 6 159.27 ms 149.3.181.65
- 7 291.01 ms ae-4.r24.nycmny01.us.bb.gin.ntt.net (129.250.2.227)
- 8 332.45 ms 129.250.4.13
- 9 332.88 ms ae-0.r23.sttlwa01.us.bb.gin.ntt.net (129.250.6.30)
- 10 340.47 ms ae-3.r23.snjsca04.us.bb.gin.ntt.net (129.250.3.124)
- 11 342.39 ms ae-0.r22.snjsca04.us.bb.gin.ntt.net (129.250.2.182)
- 12 507.27 ms ae-2.r20.sngpsi05.sg.bb.gin.ntt.net (129.250.3.49)
- 13 508.17 ms ae-2.r00.sngpsi02.sg.bb.gin.ntt.net (129.250.3.147)
- 14 523.21 ms xe-0-5-0-26.r00.sngpsi02.sg.ce.gin.ntt.net (116.51.27.158)
- 15 ...
- 16 507.32 ms ip-148-72-204-7.ip.secureserver.net (148.72.204.7)
- 17 511.40 ms ip-182-50-156-132.ip.secureserver.net (182.50.156.132)
- 18 ... 19
- 20 508.70 ms ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 76.69 seconds
- #######################################################################################################################################
- RHOSTS => 182.50.132.242
- [-] 182.50.132.242 SNMP request timeout.
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- + -- --=[Port 162 closed... skipping.
- + -- --=[Port 389 closed... skipping.
- + -- --=[Port 443 closed... skipping.
- + -- --=[Port 445 closed... skipping.
- + -- --=[Port 512 closed... skipping.
- + -- --=[Port 513 closed... skipping.
- + -- --=[Port 514 closed... skipping.
- + -- --=[Port 623 closed... skipping.
- + -- --=[Port 624 closed... skipping.
- + -- --=[Port 1099 closed... skipping.
- + -- --=[Port 1433 closed... skipping.
- + -- --=[Port 2049 closed... skipping.
- + -- --=[Port 2121 closed... skipping.
- + -- --=[Port 3306 closed... skipping.
- + -- --=[Port 3310 closed... skipping.
- + -- --=[Port 3128 closed... skipping.
- + -- --=[Port 3389 closed... skipping.
- + -- --=[Port 3632 closed... skipping.
- + -- --=[Port 4443 closed... skipping.
- + -- --=[Port 5432 closed... skipping.
- + -- --=[Port 5555 closed... skipping.
- + -- --=[Port 5800 closed... skipping.
- + -- --=[Port 5900 closed... skipping.
- + -- --=[Port 5984 closed... skipping.
- + -- --=[Port 6000 closed... skipping.
- + -- --=[Port 6667 closed... skipping.
- + -- --=[Port 7001 closed... skipping.
- + -- --=[Port 8000 closed... skipping.
- + -- --=[Port 8100 closed... skipping.
- + -- --=[Port 8080 opened... running tests...
- ^ ^
- _ __ _ ____ _ __ _ _ ____
- ///7/ /.' \ / __////7/ /,' \ ,' \ / __/
- | V V // o // _/ | V V // 0 // 0 // _/
- |_n_,'/_n_//_/ |_n_,' \_,' \_,'/_/
- <
- ...'
- WAFW00F - Web Application Firewall Detection Tool
- By Sandro Gauci && Wendel G. Henrique
- Checking http://182.50.132.242:8080
- Version: 1.11.12-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- #######################################################################################################################################
- RHOSTS => 182.50.132.242
- RHOST => 182.50.132.242
- [-] WAR file not found
- [*] Auxiliary module execution completed
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- RPORT => 8080
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] Attempting to connect to 182.50.132.242:8080
- [+] No File(s) found
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [*] http://182.50.132.242:8080/admin/j_security_check - Checking j_security_check...
- [-] The connection timed out (182.50.132.242:8080).
- [-] http://182.50.132.242:8080/admin/j_security_check - Unable to enumerate users with this URI
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] The host (182.50.132.242:8080) was unreachable.
- [-] The connection timed out (182.50.132.242:8080).
- [-] http://182.50.132.242:8080/manager/html - No response
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- [-] Exploit aborted due to failure: unreachable: The target server did not respond to fingerprinting, use 'set FingerprintCheck false' to disable this check.
- [*] Exploit completed, but no session was created.
- USERNAME => tomcat
- PASSWORD => tomcat
- [-] Exploit aborted due to failure: unreachable: The target server did not respond to fingerprinting, use 'set FingerprintCheck false' to disable this check.
- [*] Exploit completed, but no session was created.
- #######################################################################################################################################
- RHOSTS => 182.50.132.242
- RPORT => 8080
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- * --- JexBoss: Jboss verify and EXploitation Tool --- *
- | * And others Java Deserialization Vulnerabilities * |
- | |
- | @author: João Filho Matos Figueiredo |
- | @contact: joaomatosf@gmail.com |
- | |
- | @update: https://github.com/joaomatosf/jexboss |
- #______________________________________________________#
- @version: 1.2.4
- * Checking for updates in: http://joaomatosf.com/rnp/releases.txt **
- ** Checking Host: http://182.50.132.242:8080 **
- [*] Checking admin-console:
- * An error occurred while connecting to the host http://182.50.132.242:8080 (HTTPConnectionPool(host='182.50.132.242', port=8080): Max retries exceeded with url: /admin-console/ (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7faffeec3190>: Failed to establish a new connection: [Errno 113] No route to host',)))
- [*] Checking Struts2:
- * An error occurred while connecting to the host http://182.50.132.242:8080 (HTTPConnectionPool(host='182.50.132.242', port=8080): Max retries exceeded with url: / (Caused by ConnectTimeoutError(<urllib3.connection.HTTPConnection object at 0x7faffebe5710>, 'Connection to 182.50.132.242 timed out. (connect timeout=3)')))
- [*] Checking Servlet Deserialization:
- * An error occurred while connecting to the host http://182.50.132.242:8080 (HTTPConnectionPool(host='182.50.132.242', port=8080): Max retries exceeded with url: / (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7faffec1e350>: Failed to establish a new connection: [Errno 113] No route to host',)))
- [*] Checking Application Deserialization:
- * An error occurred while connecting to the host http://182.50.132.242:8080 (HTTPConnectionPool(host='182.50.132.242', port=8080): Max retries exceeded with url: / (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7faffec1e410>: Failed to establish a new connection: [Errno 113] No route to host',)))
- [*] Checking Jenkins:
- * An error occurred while connecting to the host http://182.50.132.242:8080 (HTTPConnectionPool(host='182.50.132.242', port=8080): Max retries exceeded with url: / (Caused by ConnectTimeoutError(<urllib3.connection.HTTPConnection object at 0x7faffec1e4d0>, 'Connection to 182.50.132.242 timed out. (connect timeout=3)')))
- [*] Checking web-console:
- * An error occurred while connecting to the host http://182.50.132.242:8080 (HTTPConnectionPool(host='182.50.132.242', port=8080): Max retries exceeded with url: /web-console/Invoker (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7faffec1e5d0>: Failed to establish a new connection: [Errno 113] No route to host',)))
- [*] Checking jmx-console:
- * An error occurred while connecting to the host http://182.50.132.242:8080 (HTTPConnectionPool(host='182.50.132.242', port=8080): Max retries exceeded with url: /jmx-console/HtmlAdaptor?action=inspectMBean&name=jboss.system:type=ServerInfo (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7faffec1e6d0>: Failed to establish a new connection: [Errno 113] No route to host',)))
- [*] Checking JMXInvokerServlet:
- * An error occurred while connecting to the host http://182.50.132.242:8080 (HTTPConnectionPool(host='182.50.132.242', port=8080): Max retries exceeded with url: /invoker/JMXInvokerServlet (Caused by NewConnectionError('<urllib3.connection.HTTPConnection object at 0x7faffec1e790>: Failed to establish a new connection: [Errno 113] No route to host',)))
- * Results:
- The server is not vulnerable to bugs tested ... :D
- * Info: review, suggestions, updates, etc:
- https://github.com/joaomatosf/jexboss
- * DONATE: Please consider making a donation to help improve this tool,
- * Bitcoin Address: 14x4niEpfp7CegBYr3tTzTn4h6DAnDCD9C
- #######################################################################################################################################
- I, [2018-10-26T00:34:35.883656 #25451] INFO -- : Initiating port scan
- I, [2018-10-26T00:35:27.687142 #25451] INFO -- : Using nmap scan output file logs/nmap_output_2018-10-26_00-34-35.xml
- I, [2018-10-26T00:35:27.709817 #25451] INFO -- : Discovered open port: 182.50.132.242:80
- I, [2018-10-26T00:35:37.712064 #25451] INFO -- : Discovered open port: 182.50.132.242:443
- W, [2018-10-26T00:35:47.714080 #25451] WARN -- : Yasuo did not find any potential hosts to enumerate
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-10-26 00:35 EDT
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 00:35
- Completed NSE at 00:35, 0.00s elapsed
- Initiating NSE at 00:35
- Completed NSE at 00:35, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:35
- Completed Parallel DNS resolution of 1 host. at 00:35, 0.02s elapsed
- Initiating SYN Stealth Scan at 00:35
- Scanning ip-182-50-132-242.ip.secureserver.net (182.50.132.242) [474 ports]
- Completed SYN Stealth Scan at 00:35, 7.73s elapsed (474 total ports)
- Initiating Service scan at 00:35
- Initiating OS detection (try #1) against ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Retrying OS detection (try #2) against ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Initiating Traceroute at 00:35
- Completed Traceroute at 00:35, 0.17s elapsed
- Initiating Parallel DNS resolution of 2 hosts. at 00:35
- Completed Parallel DNS resolution of 2 hosts. at 00:35, 0.16s elapsed
- NSE: Script scanning 182.50.132.242.
- Initiating NSE at 00:35
- Completed NSE at 00:35, 0.00s elapsed
- Initiating NSE at 00:35
- Completed NSE at 00:35, 0.00s elapsed
- Nmap scan report for ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Host is up (0.16s latency).
- Not shown: 471 filtered ports
- PORT STATE SERVICE VERSION
- 25/tcp closed smtp
- 139/tcp closed netbios-ssn
- 445/tcp closed microsoft-ds
- Too many fingerprints match this host to give specific OS details
- Network Distance: 2 hops
- TRACEROUTE (using port 139/tcp)
- HOP RTT ADDRESS
- 1 160.54 ms 10.244.200.1
- 2 160.53 ms ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- NSE: Script Post-scanning.
- Initiating NSE at 00:35
- Completed NSE at 00:35, 0.00s elapsed
- Initiating NSE at 00:35
- Completed NSE at 00:35, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 12.05 seconds
- Raw packets sent: 995 (48.148KB) | Rcvd: 371 (22.409KB)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-10-26 00:35 EDT
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 00:36
- Completed NSE at 00:36, 0.00s elapsed
- Initiating NSE at 00:36
- Completed NSE at 00:36, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:36
- Completed Parallel DNS resolution of 1 host. at 00:36, 0.02s elapsed
- Initiating UDP Scan at 00:36
- Scanning ip-182-50-132-242.ip.secureserver.net (182.50.132.242) [14 ports]
- Completed UDP Scan at 00:36, 2.49s elapsed (14 total ports)
- Initiating Service scan at 00:36
- Scanning 12 services on ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Service scan Timing: About 8.33% done; ETC: 00:45 (0:08:48 remaining)
- Service scan Timing: About 25.00% done; ETC: 00:42 (0:04:39 remaining)
- Completed Service scan at 00:37, 102.57s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Retrying OS detection (try #2) against ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Initiating Traceroute at 00:37
- Completed Traceroute at 00:38, 7.39s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:38
- Completed Parallel DNS resolution of 1 host. at 00:38, 0.03s elapsed
- NSE: Script scanning 182.50.132.242.
- Initiating NSE at 00:38
- Completed NSE at 00:38, 20.37s elapsed
- Initiating NSE at 00:38
- Completed NSE at 00:38, 2.33s elapsed
- Nmap scan report for ip-182-50-132-242.ip.secureserver.net (182.50.132.242)
- Host is up (0.24s latency).
- PORT STATE SERVICE VERSION
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 137/udp)
- HOP RTT ADDRESS
- 1 158.00 ms 10.244.200.1
- 2 ... 3
- 4 162.06 ms 10.244.200.1
- 5 159.33 ms 10.244.200.1
- 6 159.32 ms 10.244.200.1
- 7 159.31 ms 10.244.200.1
- 8 159.31 ms 10.244.200.1
- 9 159.30 ms 10.244.200.1
- 10 159.33 ms 10.244.200.1
- 11 ... 18
- 19 159.71 ms 10.244.200.1
- 20 160.97 ms 10.244.200.1
- 21 ... 27
- 28 162.15 ms 10.244.200.1
- 29 161.45 ms 10.244.200.1
- 30 157.29 ms 10.244.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 00:38
- Completed NSE at 00:38, 0.00s elapsed
- Initiating NSE at 00:38
- Completed NSE at 00:38, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 144.57 seconds
- Raw packets sent: 142 (12.624KB) | Rcvd: 2418 (252.934KB)
- #######################################################################################################################################
- Anonymous JTSEC #OpDomesticTerrorism Full Recon #10
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement