Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.92 ( https://nmap.org ) at 2022-06-24 14:59 IST
- NSE: Loaded 155 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 14:59
- Completed NSE at 14:59, 0.00s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 14:59
- Completed NSE at 14:59, 0.00s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 14:59
- Completed NSE at 14:59, 0.00s elapsed
- Initiating Ping Scan at 14:59
- Scanning 10.200.84.200 [4 ports]
- Completed Ping Scan at 14:59, 0.33s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 14:59
- Completed Parallel DNS resolution of 1 host. at 14:59, 0.00s elapsed
- DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
- Initiating SYN Stealth Scan at 14:59
- Scanning 10.200.84.200 [15000 ports]
- Discovered open port 22/tcp on 10.200.84.200
- Discovered open port 80/tcp on 10.200.84.200
- Discovered open port 443/tcp on 10.200.84.200
- SYN Stealth Scan Timing: About 23.18% done; ETC: 15:01 (0:01:43 remaining)
- Discovered open port 10000/tcp on 10.200.84.200
- SYN Stealth Scan Timing: About 33.10% done; ETC: 15:02 (0:02:03 remaining)
- SYN Stealth Scan Timing: About 49.27% done; ETC: 15:02 (0:01:46 remaining)
- SYN Stealth Scan Timing: About 66.71% done; ETC: 15:02 (0:01:06 remaining)
- Completed SYN Stealth Scan at 15:02, 181.35s elapsed (15000 total ports)
- Initiating Service scan at 15:02
- Scanning 4 services on 10.200.84.200
- Completed Service scan at 15:02, 13.54s elapsed (4 services on 1 host)
- Initiating OS detection (try #1) against 10.200.84.200
- Retrying OS detection (try #2) against 10.200.84.200
- NSE: Script scanning 10.200.84.200.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 15:02
- Completed NSE at 15:03, 30.32s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 15:03
- Completed NSE at 15:03, 3.03s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 15:03
- Completed NSE at 15:03, 0.00s elapsed
- Nmap scan report for 10.200.84.200
- Host is up, received echo-reply ttl 63 (0.29s latency).
- Scanned at 2022-06-24 14:59:09 IST for 236s
- Not shown: 14808 filtered tcp ports (no-response), 187 filtered tcp ports (admin-prohibited)
- PORT STATE SERVICE REASON VERSION
- 22/tcp open ssh syn-ack ttl 63 OpenSSH 8.0 (protocol 2.0)
- | ssh-hostkey:
- | 3072 9c:1b:d4:b4:05:4d:88:99:ce:09:1f:c1:15:6a:d4:7e (RSA)
- | ssh-rsa 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
- | 256 93:55:b4:d9:8b:70:ae:8e:95:0d:c2:b6:d2:03:89:a4 (ECDSA)
- | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFccvYHwpGWYUsw9mTk/mEvzyrY4ghhX2D6o3n/upTLFXbhJPV6ls4C8O0wH6TyGq7ClV3XpVa7zevngNoqlwzM=
- | 256 f0:61:5a:55:34:9b:b7:b8:3a:46:ca:7d:9f:dc:fa:12 (ED25519)
- |_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINLfVtZHSGvCy3JP5GX0Dgzcxz+Y9In0TcQc3vhvMXCP
- 80/tcp open http syn-ack ttl 63 Apache httpd 2.4.37 ((centos) OpenSSL/1.1.1c)
- |_http-title: Did not follow redirect to https://thomaswreath.thm
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Apache/2.4.37 (centos) OpenSSL/1.1.1c
- 443/tcp open ssl/http syn-ack ttl 63 Apache httpd 2.4.37 ((centos) OpenSSL/1.1.1c)
- | http-methods:
- | Supported Methods: GET POST OPTIONS HEAD TRACE
- |_ Potentially risky methods: TRACE
- |_http-title: Thomas Wreath | Developer
- | tls-alpn:
- |_ http/1.1
- |_ssl-date: TLS randomness does not represent time
- |_http-server-header: Apache/2.4.37 (centos) OpenSSL/1.1.1c
- | ssl-cert: Subject: commonName=thomaswreath.thm/organizationName=Thomas Wreath Development/stateOrProvinceName=East Riding Yorkshire/countryName=GB/localityName=Easingwold/emailAddress=me@thomaswreath.thm
- | Issuer: commonName=thomaswreath.thm/organizationName=Thomas Wreath Development/stateOrProvinceName=East Riding Yorkshire/countryName=GB/localityName=Easingwold/emailAddress=me@thomaswreath.thm
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2022-06-24T05:40:12
- | Not valid after: 2023-06-24T05:40:12
- | MD5: ea24 5273 dcef 46b5 539a c4dc 1246 55b5
- | SHA-1: 56cd 2849 04fe 90dc 2d95 b674 3ace 0ce8 fbea 69a0
- | -----BEGIN CERTIFICATE-----
- | MIIELTCCAxWgAwIBAgIUf5s7MZmuFaEqDNZOnVvX5l/+fhkwDQYJKoZIhvcNAQEL
- | BQAwgaUxCzAJBgNVBAYTAkdCMR4wHAYDVQQIDBVFYXN0IFJpZGluZyBZb3Jrc2hp
- | cmUxEzARBgNVBAcMCkVhc2luZ3dvbGQxIjAgBgNVBAoMGVRob21hcyBXcmVhdGgg
- | RGV2ZWxvcG1lbnQxGTAXBgNVBAMMEHRob21hc3dyZWF0aC50aG0xIjAgBgkqhkiG
- | 9w0BCQEWE21lQHRob21hc3dyZWF0aC50aG0wHhcNMjIwNjI0MDU0MDEyWhcNMjMw
- | NjI0MDU0MDEyWjCBpTELMAkGA1UEBhMCR0IxHjAcBgNVBAgMFUVhc3QgUmlkaW5n
- | IFlvcmtzaGlyZTETMBEGA1UEBwwKRWFzaW5nd29sZDEiMCAGA1UECgwZVGhvbWFz
- | IFdyZWF0aCBEZXZlbG9wbWVudDEZMBcGA1UEAwwQdGhvbWFzd3JlYXRoLnRobTEi
- | MCAGCSqGSIb3DQEJARYTbWVAdGhvbWFzd3JlYXRoLnRobTCCASIwDQYJKoZIhvcN
- | AQEBBQADggEPADCCAQoCggEBAJla1WkAXIiqcrh4InUQQ5AqYeYo97xIcLyeVtIq
- | nw9y2G24pW7dVxkeal1g1LRD1XRwemUwyAlv0XBxLCFD4dKG1z1VtVjLQGqG9UmG
- | k5KE6AQDTZBYu50a/QZLLop0bdtLlsOgTfefwjivQjOqNKJIrtQXdhx2FNTP1wLm
- | 8l+clJS6bm3Vj1JmNKDw0QHO7cZG2zAdZXGkJ/saV38uaWzV0cKK1uJj9nE3SGRu
- | kUbm4LqfS3y7QV075afRyTRfH27bnrXtAfB2G+YzLtJm7lSTxn6nYe5m2c0FmiRi
- | 9cLY6efqdGSSAUsDlDg+law/5ucOVZuBVyqvv453ZiJaZr0CAwEAAaNTMFEwHQYD
- | VR0OBBYEFDNHxFo4+LpnlZEoCXjsHLOyj1gzMB8GA1UdIwQYMBaAFDNHxFo4+Lpn
- | lZEoCXjsHLOyj1gzMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEB
- | AAFNvDCq/uC/P6wgrKGilpNXCXvMLsCLKYQaItYpfmxEU+lkMRbky+a7qUhGErNE
- | pAEEBoHF56W4iqalxr9FPPNwEiHJQ0ehXEvSLp0tpWS2PMdCeLZjgdyxdzQGnIHV
- | GOQ70PVN9BPdsYWJGBgPaX+Fo/2rb1+vmUeTW/bPI2tfyrsrIjADDjwA5MDeGS8H
- | rYDEvcR+wXjyN2/NWZzlK/sfxoB8PGxlKVUcC8XGYpwDmdaXJ9cOYy7RJZGCYQmU
- | vTVUGXoUqSFYATC/d/J/SukuFhkVz8Ux96gLW6ospFA0vAYn1C+y57TEMsj/LYD7
- | aUPgOU7AgL+wZBzyUfd3bqU=
- |_-----END CERTIFICATE-----
- 9090/tcp closed zeus-admin reset ttl 63
- 10000/tcp open http syn-ack ttl 63 MiniServ 1.890 (Webmin httpd)
- |_http-title: Site doesn't have a title (text/html; Charset=iso-8859-1).
- |_http-favicon: Unknown favicon MD5: 8E8E99E610C1F8474422D68A4D749607
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
- Aggressive OS guesses: HP P2000 G3 NAS device (91%), Infomir MAG-250 set-top box (90%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (90%), Netgear RAIDiator 4.2.21 (Linux 2.6.37) (90%), Linux 2.6.32 - 3.13 (89%), Linux 2.6.32 (89%), Linux 3.10 - 3.13 (89%), Linux 3.7 (89%), Linux 5.0 (89%), Linux 5.4 (89%)
- No exact OS matches for host (test conditions non-ideal).
- TCP/IP fingerprint:
- SCAN(V=7.92%E=4%D=6/24%OT=22%CT=9090%CU=%PV=Y%G=N%TM=62B584D1%P=x86_64-pc-linux-gnu)
- SEQ(SP=F3%GCD=1%ISR=111%TI=Z%CI=Z%TS=A)
- SEQ(SP=FF%GCD=1%ISR=110%TI=Z%CI=Z%II=I%TS=A)
- OPS(O1=M506ST11NW7%O2=M506ST11NW7%O3=M506NNT11NW7%O4=M506ST11NW7%O5=M506ST11NW7%O6=M506ST11)
- WIN(W1=68DF%W2=68DF%W3=68DF%W4=68DF%W5=68DF%W6=68DF)
- ECN(R=Y%DF=Y%TG=40%W=6903%O=M506NNSNW7%CC=Y%Q=)
- T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
- T2(R=N)
- T3(R=N)
- T4(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
- T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
- T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
- T7(R=N)
- U1(R=N)
- IE(R=Y%DFI=N%TG=40%CD=S)
- Uptime guess: 15.425 days (since Thu Jun 9 04:51:34 2022)
- TCP Sequence Prediction: Difficulty=255 (Good luck!)
- IP ID Sequence Generation: All zeros
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 3) scan.
- Initiating NSE at 15:03
- Completed NSE at 15:03, 0.00s elapsed
- NSE: Starting runlevel 2 (of 3) scan.
- Initiating NSE at 15:03
- Completed NSE at 15:03, 0.00s elapsed
- NSE: Starting runlevel 3 (of 3) scan.
- Initiating NSE at 15:03
- Completed NSE at 15:03, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 237.26 seconds
- Raw packets sent: 44882 (1.978MB) | Rcvd: 230 (21.496KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement