Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-17 12:08 GMT Daylight Time
- NSE: Loaded 285 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 12:08
- NSE: [mtrace] A source IP must be provided through fromip argument.
- NSE: [shodan-api] Error: Please specify your ShodanAPI key with the shodan-api.apikey argument
- Completed NSE at 12:09, 11.55s elapsed
- Initiating NSE at 12:09
- Completed NSE at 12:09, 0.00s elapsed
- Initiating NSE at 12:09
- Completed NSE at 12:09, 0.00s elapsed
- Pre-scan script results:
- | broadcast-igmp-discovery:
- | 192.168.43.1
- | Interface: eth1
- | Version: 2
- | Group: 239.255.67.250
- | Description: Organization-Local Scope (rfc2365)
- | 192.168.43.1
- | Interface: eth1
- | Version: 2
- | Group: 239.255.255.250
- | Description: Organization-Local Scope (rfc2365)
- |_ Use the newtargets script-arg to add the results as targets
- | targets-asn:
- |_ targets-asn.asn is a mandatory parameter
- Initiating Ping Scan at 12:09
- Scanning 192.145.127.238 [7 ports]
- Completed Ping Scan at 12:09, 0.45s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 12:09
- Completed Parallel DNS resolution of 1 host. at 12:09, 0.00s elapsed
- Initiating SYN Stealth Scan at 12:09
- Scanning 192.145.127.238 [1000 ports]
- Discovered open port 1234/tcp on 192.145.127.238
- Discovered open port 1233/tcp on 192.145.127.238
- Completed SYN Stealth Scan at 12:09, 9.29s elapsed (1000 total ports)
- Initiating UDP Scan at 12:09
- Scanning 192.145.127.238 [1000 ports]
- Discovered open port 500/udp on 192.145.127.238
- Increasing send delay for 192.145.127.238 from 0 to 50 due to 11 out of 18 dropped probes since last increase.
- Increasing send delay for 192.145.127.238 from 50 to 100 due to max_successful_tryno increase to 5
- UDP Scan Timing: About 5.73% done; ETC: 12:18 (0:08:30 remaining)
- UDP Scan Timing: About 16.31% done; ETC: 12:18 (0:08:02 remaining)
- UDP Scan Timing: About 21.67% done; ETC: 12:18 (0:07:28 remaining)
- UDP Scan Timing: About 26.63% done; ETC: 12:20 (0:07:57 remaining)
- UDP Scan Timing: About 28.43% done; ETC: 12:21 (0:08:31 remaining)
- UDP Scan Timing: About 34.10% done; ETC: 12:21 (0:07:53 remaining)
- UDP Scan Timing: About 39.96% done; ETC: 12:20 (0:06:53 remaining)
- UDP Scan Timing: About 45.26% done; ETC: 12:20 (0:06:09 remaining)
- UDP Scan Timing: About 50.66% done; ETC: 12:20 (0:05:32 remaining)
- UDP Scan Timing: About 55.83% done; ETC: 12:20 (0:04:56 remaining)
- UDP Scan Timing: About 61.70% done; ETC: 12:20 (0:04:11 remaining)
- UDP Scan Timing: About 66.87% done; ETC: 12:20 (0:03:35 remaining)
- UDP Scan Timing: About 71.97% done; ETC: 12:19 (0:03:01 remaining)
- UDP Scan Timing: About 77.30% done; ETC: 12:19 (0:02:26 remaining)
- UDP Scan Timing: About 82.27% done; ETC: 12:19 (0:01:54 remaining)
- UDP Scan Timing: About 87.64% done; ETC: 12:19 (0:01:19 remaining)
- UDP Scan Timing: About 92.79% done; ETC: 12:19 (0:00:46 remaining)
- Completed UDP Scan at 12:19, 640.76s elapsed (1000 total ports)
- Initiating Service scan at 12:19
- Scanning 719 services on 192.145.127.238
- Service scan Timing: About 0.42% done
- Service scan Timing: About 0.56% done
- Service scan Timing: About 4.45% done; ETC: 13:08 (0:46:09 remaining)
- Service scan Timing: About 4.73% done; ETC: 13:28 (1:05:29 remaining)
- Service scan Timing: About 8.62% done; ETC: 13:03 (0:40:05 remaining)
- Service scan Timing: About 8.90% done; ETC: 13:14 (0:49:59 remaining)
- Service scan Timing: About 12.80% done; ETC: 13:02 (0:36:48 remaining)
- Service scan Timing: About 13.07% done; ETC: 13:09 (0:43:13 remaining)
- Service scan Timing: About 16.97% done; ETC: 13:01 (0:34:25 remaining)
- Service scan Timing: About 17.25% done; ETC: 13:07 (0:39:02 remaining)
- Service scan Timing: About 21.14% done; ETC: 13:00 (0:32:16 remaining)
- Service scan Timing: About 21.42% done; ETC: 13:05 (0:35:46 remaining)
- Service scan Timing: About 25.31% done; ETC: 13:00 (0:30:20 remaining)
- Service scan Timing: About 25.59% done; ETC: 13:04 (0:33:06 remaining)
- Service scan Timing: About 29.49% done; ETC: 13:00 (0:28:28 remaining)
- Discovered open port 4500/udp on 192.145.127.238
- Discovered open|filtered port 4500/udp on 192.145.127.238 is actually open
- Service scan Timing: About 36.86% done; ETC: 12:59 (0:25:13 remaining)
- Service scan Timing: About 42.00% done; ETC: 12:59 (0:23:10 remaining)
- Service scan Timing: About 49.37% done; ETC: 12:59 (0:20:05 remaining)
- Service scan Timing: About 54.52% done; ETC: 12:59 (0:18:04 remaining)
- Service scan Timing: About 61.89% done; ETC: 12:59 (0:15:04 remaining)
- Service scan Timing: About 67.04% done; ETC: 12:59 (0:13:03 remaining)
- Service scan Timing: About 74.41% done; ETC: 12:59 (0:10:05 remaining)
- Service scan Timing: About 79.55% done; ETC: 12:59 (0:08:04 remaining)
- Service scan Timing: About 86.93% done; ETC: 12:59 (0:05:09 remaining)
- Service scan Timing: About 92.07% done; ETC: 12:59 (0:03:07 remaining)
- Completed Service scan at 12:58, 2346.19s elapsed (719 services on 1 host)
- Initiating OS detection (try #1) against 192.145.127.238
- Retrying OS detection (try #2) against 192.145.127.238
- Initiating Traceroute at 12:59
- Completed Traceroute at 12:59, 3.16s elapsed
- Initiating Parallel DNS resolution of 13 hosts. at 12:59
- Completed Parallel DNS resolution of 13 hosts. at 12:59, 0.27s elapsed
- NSE: Script scanning 192.145.127.238.
- Initiating NSE at 12:59
- NSE: [ip-geolocation-maxmind] You must specify a Maxmind database file with the maxmind_db argument.
- NSE: [ip-geolocation-maxmind] Download the database from http://dev.maxmind.com/geoip/legacy/geolite/
- Completed NSE at 13:00, 78.02s elapsed
- Initiating NSE at 13:00
- Completed NSE at 13:01, 42.06s elapsed
- Initiating NSE at 13:01
- Completed NSE at 13:01, 3.61s elapsed
- Nmap scan report for 192.145.127.238
- NSOCK ERROR [3129.9120s] mksock_bind_addr(): Bind to 0.0.0.0:123 failed (IOD #511): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
- NSOCK ERROR [3139.3480s] mksock_bind_addr(): Bind to 0.0.0.0:137 failed (IOD #695): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
- Host is up (0.10s latency).
- Not shown: 992 filtered ports, 715 open|filtered ports, 289 closed ports
- PORT STATE SERVICE VERSION
- 1233/tcp open univ-appserver?
- 1234/tcp open hotline?
- 500/udp open isakmp StrongSwan ISAKMP
- 4500/udp open isakmp StrongSwan ISAKMP
- Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (91%), Asus RT-AC66U router (Linux 2.6) (89%), Asus RT-N16 WAP (Linux 2.6) (89%), Asus RT-N66U WAP (Linux 2.6) (89%), Tomato 1.28 (Linux 2.6.22) (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (89%), OpenWrt White Russian 0.9 (Linux 2.4.30) (89%), Linux 3.16 (89%), OpenWrt Chaos Calmer 15.05 (Linux 3.18) or Designated Driver (Linux 4.1 or 4.4) (89%), Linux 4.5 (88%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 27.518 days (since Tue May 21 00:35:41 2019)
- Network Distance: 18 hops
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: All zeros
- Host script results:
- | asn-query:
- | BGP: 192.145.127.0/24 | Country: RO
- | Origin AS: 9009 - M247, GB
- |_ Peer AS: 174 1299 3356 6762
- |_fcrdns: FAIL (No PTR record)
- |_firewalk: ERROR: Script execution failed (use -d to debug)
- |_hostmap-robtex: ERROR: Script execution failed (use -d to debug)
- |_ip-geolocation-geoplugin: bad argument #2 to 'lpeg.match' (string expected, got nil)
- |_ipidseq: ERROR: Script execution failed (use -d to debug)
- |_path-mtu: ERROR: Script execution failed (use -d to debug)
- |_qscan: ERROR: Script execution failed (use -d to debug)
- |_traceroute-geolocation: ERROR: Script execution failed (use -d to debug)
- |_whois-domain: You should provide a domain name.
- | whois-ip: Record found at whois.ripe.net
- | inetnum: 192.145.127.0 - 192.145.127.255
- | netname: M247-LTD-Milan
- | descr: M247-LTD-Milan-Network
- | country: IT
- | role: GLOBALAXS NOC MILAN
- |_email: nmc@m247.com
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 1.00 ms 192.168.43.1
- 2 ...
- 3 48.00 ms 172.23.128.201
- 4 50.00 ms 172.23.162.5
- 5 49.00 ms 172.23.175.1
- 6 ... 8
- 9 117.00 ms be4250.agr21.lhr01.atlas.cogentco.com (149.6.9.25)
- 10 99.00 ms be3672.ccr52.lhr01.atlas.cogentco.com (130.117.48.145)
- 11 119.00 ms be3684.ccr41.par01.atlas.cogentco.com (154.54.60.169)
- 12 119.00 ms be3093.ccr22.mrs01.atlas.cogentco.com (130.117.50.166)
- 13 120.00 ms be2314.rcr21.mil01.atlas.cogentco.com (130.117.50.94)
- 14 120.00 ms te0-0-2-0.nr11.b019160-1.mil01.atlas.cogentco.com (154.25.7.34)
- 15 120.00 ms 149.6.152.250
- 16 ...
- 17 121.00 ms vlan2907.as07.mil1.it.m247.com (212.103.51.129)
- 18 130.00 ms 192.145.127.238
- NSE: Script Post-scanning.
- Initiating NSE at 13:01
- Completed NSE at 13:01, 0.00s elapsed
- Initiating NSE at 13:01
- Completed NSE at 13:01, 0.00s elapsed
- Initiating NSE at 13:01
- Completed NSE at 13:01, 0.00s elapsed
- Read data files from: C:\Program Files (x86)\Nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 3151.25 seconds
- Raw packets sent: 7745 (263.285KB) | Rcvd: 758 (42.144KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement