Advertisement
johnhackman

NATO nmap

Jun 30th, 2016
536
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 2.92 KB | None | 0 0
  1. Nmap 7.01 ( https://nmap.org ) at 2016-06-30 22:22 ICT
  2. NSE: Loaded 132 scripts for scanning.
  3. NSE: Script Pre-scanning.
  4. Initiating NSE at 22:22
  5. Completed NSE at 22:22, 0.00s elapsed
  6. Initiating NSE at 22:22
  7. Completed NSE at 22:22, 0.00s elapsed
  8. Initiating Parallel DNS resolution of 1 host. at 22:22
  9. Completed Parallel DNS resolution of 1 host. at 22:22, 0.75s elapsed
  10. Initiating SYN Stealth Scan at 22:22
  11. Scanning www.nato.int (152.152.31.120) [1000 ports]
  12. Discovered open port 80/tcp on 152.152.31.120
  13. SYN Stealth Scan Timing: About 47.90% done; ETC: 22:23 (0:00:34 remaining)
  14. Completed SYN Stealth Scan at 22:23, 61.90s elapsed (1000 total ports)
  15. Initiating Service scan at 22:23
  16. Scanning 1 service on www.nato.int (152.152.31.120)
  17. Completed Service scan at 22:23, 6.91s elapsed (1 service on 1 host)
  18. Initiating OS detection (try #1) against www.nato.int (152.152.31.120)
  19. Retrying OS detection (try #2) against www.nato.int (152.152.31.120)
  20. Initiating Traceroute at 22:23
  21. Completed Traceroute at 22:23, 3.29s elapsed
  22. Initiating Parallel DNS resolution of 10 hosts. at 22:23
  23. Completed Parallel DNS resolution of 10 hosts. at 22:23, 4.83s elapsed
  24. NSE: Script scanning 152.152.31.120.
  25. Initiating NSE at 22:23
  26. Completed NSE at 22:24, 20.07s elapsed
  27. Initiating NSE at 22:24
  28. Completed NSE at 22:24, 0.00s elapsed
  29. Nmap scan report for www.nato.int (152.152.31.120)
  30. Host is up (0.43s latency).
  31. rDNS record for 152.152.31.120: www.hq.nato.int
  32. Not shown: 998 filtered ports
  33. PORT     STATE  SERVICE    VERSION
  34. 80/tcp   open   http       Apache httpd
  35. | http-robots.txt: 4 disallowed entries
  36. | /shape/community/soa/members/ /multi/bb-audio.htm
  37. |_/download/ /kfor/
  38. |_http-server-header: Apache
  39. 8080/tcp closed http-proxy
  40. Device type: firewall
  41. Running (JUST GUESSING): Cisco PIX OS 8.X (86%)
  42. OS CPE: cpe:/o:cisco:pix_os:8.4
  43. Aggressive OS guesses: Cisco Adaptive Security Appliance (PIX OS 8.4) (86%)
  44. No exact OS matches for host (test conditions non-ideal).
  45. Network Distance: 14 hops
  46.  
  47. TRACEROUTE (using port 8080/tcp)
  48. HOP RTT       ADDRESS
  49. 1   4.44 ms   192.168.43.1
  50. 2   262.89 ms 10.8.0.1
  51. 3   ... 4
  52. 5   271.06 ms las-b3-link.telia.net (213.248.98.109)
  53. 6   267.71 ms las-b21-link.telia.net (62.115.140.254)
  54. 7   274.71 ms sjo-b21-link.telia.net (62.115.116.40)
  55. 8   282.00 ms akamai-ic-317106-sjo-b21.c.telia.net (62.115.146.109)
  56. 9   286.66 ms 209.200.184.200
  57. 10  279.75 ms 209.200.184.205
  58. 11  ...
  59. 12  404.75 ms unknown.prolexic.com (209.200.163.86)
  60. 13  ...
  61. 14  442.80 ms www.hq.nato.int (152.152.31.120)
  62.  
  63. NSE: Script Post-scanning.
  64. Initiating NSE at 22:24
  65. Completed NSE at 22:24, 0.00s elapsed
  66. Initiating NSE at 22:24
  67. Completed NSE at 22:24, 0.00s elapsed
  68. Read data files from: /usr/bin/../share/nmap
  69. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  70. Nmap done: 1 IP address (1 host up) scanned in 109.65 seconds
  71.            Raw packets sent: 3202 (146.904KB) | Rcvd: 62 (3.598KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement