SHARE
TWEET

Untitled

a guest Apr 18th, 2019 64 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. $ nmap -v -A -T4 10.0.0.78
  2. Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-18 07:31 EDT
  3. NSE: Loaded 148 scripts for scanning.
  4. NSE: Script Pre-scanning.
  5. Initiating NSE at 07:31
  6. Completed NSE at 07:31, 0.00s elapsed
  7. Initiating NSE at 07:31
  8. Completed NSE at 07:31, 0.00s elapsed
  9. Initiating Ping Scan at 07:31
  10. Scanning 10.0.0.78 [2 ports]
  11. Completed Ping Scan at 07:31, 2.00s elapsed (1 total hosts)
  12. Nmap scan report for 10.0.0.78 [host down]
  13. NSE: Script Post-scanning.
  14. Initiating NSE at 07:31
  15. Completed NSE at 07:31, 0.00s elapsed
  16. Initiating NSE at 07:31
  17. Completed NSE at 07:31, 0.00s elapsed
  18. Read data files from: /usr/bin/../share/nmap
  19. Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
  20. Nmap done: 1 IP address (0 hosts up) scanned in 2.37 seconds
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top