Advertisement
Guest User

Untitled

a guest
Aug 10th, 2015
583
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.69 KB | None | 0 0
  1. Scanning 160.153.16.29 [7 ports]
  2.  
  3. Completed Ping Scan at 04:47, 0.30s elapsed (1 total hosts)
  4.  
  5. Initiating Parallel DNS resolution of 1 host. at 04:47
  6.  
  7. Completed Parallel DNS resolution of 1 host. at 04:47, 0.08s elapsed
  8.  
  9. Initiating SYN Stealth Scan at 04:47
  10.  
  11. Scanning ip-160-153-16-29.ip.secureserver.net (160.153.16.29) [1000 ports]
  12.  
  13. Discovered open port 3306/tcp on 160.153.16.29
  14.  
  15. Discovered open port 110/tcp on 160.153.16.29
  16.  
  17. Discovered open port 587/tcp on 160.153.16.29
  18.  
  19. Discovered open port 80/tcp on 160.153.16.29
  20.  
  21. Discovered open port 995/tcp on 160.153.16.29
  22.  
  23. Discovered open port 443/tcp on 160.153.16.29
  24.  
  25. Discovered open port 25/tcp on 160.153.16.29
  26.  
  27. Discovered open port 22/tcp on 160.153.16.29
  28.  
  29. Discovered open port 143/tcp on 160.153.16.29
  30.  
  31. Discovered open port 993/tcp on 160.153.16.29
  32.  
  33. Discovered open port 21/tcp on 160.153.16.29
  34.  
  35. Discovered open port 465/tcp on 160.153.16.29
  36.  
  37. Completed SYN Stealth Scan at 04:48, 28.19s elapsed (1000 total ports)
  38.  
  39. Initiating UDP Scan at 04:48
  40.  
  41. Scanning ip-160-153-16-29.ip.secureserver.net (160.153.16.29) [1000 ports]
  42.  
  43. Completed UDP Scan at 04:48, 9.79s elapsed (1000 total ports)
  44.  
  45. Initiating Service scan at 04:48
  46.  
  47. Scanning 1012 services on ip-160-153-16-29.ip.secureserver.net (160.153.16.29)
  48.  
  49. Service scan Timing: About 1.28% done; ETC: 06:41 (1:51:26 remaining)
  50.  
  51. Service scan Timing: About 4.25% done; ETC: 05:57 (1:05:44 remaining)
  52.  
  53. Service scan Timing: About 7.21% done; ETC: 05:48 (0:56:10 remaining)
  54.  
  55. Service scan Timing: About 10.18% done; ETC: 05:45 (0:51:29 remaining)
  56.  
  57. Service scan Timing: About 13.14% done; ETC: 05:43 (0:48:08 remaining)
  58.  
  59. Service scan Timing: About 18.38% done; ETC: 05:36 (0:39:14 remaining)
  60.  
  61. Service scan Timing: About 19.07% done; ETC: 05:41 (0:43:17 remaining)
  62.  
  63. Service scan Timing: About 24.31% done; ETC: 05:36 (0:36:35 remaining)
  64.  
  65. Service scan Timing: About 25.00% done; ETC: 05:40 (0:39:21 remaining)
  66.  
  67. Service scan Timing: About 30.14% done; ETC: 05:37 (0:34:00 remaining)
  68.  
  69. Service scan Timing: About 36.07% done; ETC: 05:37 (0:31:10 remaining)
  70.  
  71. Service scan Timing: About 42.00% done; ETC: 05:37 (0:28:19 remaining)
  72.  
  73. Service scan Timing: About 47.92% done; ETC: 05:37 (0:25:27 remaining)
  74.  
  75. Service scan Timing: About 53.85% done; ETC: 05:37 (0:22:34 remaining)
  76.  
  77. Service scan Timing: About 59.78% done; ETC: 05:37 (0:19:41 remaining)
  78.  
  79. Service scan Timing: About 65.71% done; ETC: 05:37 (0:16:47 remaining)
  80.  
  81. Service scan Timing: About 71.64% done; ETC: 05:37 (0:13:53 remaining)
  82.  
  83. Service scan Timing: About 77.57% done; ETC: 05:37 (0:10:59 remaining)
  84.  
  85. Service scan Timing: About 83.50% done; ETC: 05:37 (0:08:05 remaining)
  86.  
  87. Service scan Timing: About 88.93% done; ETC: 05:37 (0:05:27 remaining)
  88.  
  89. Service scan Timing: About 94.86% done; ETC: 05:37 (0:02:32 remaining)
  90.  
  91. Completed Service scan at 05:38, 2975.09s elapsed (1012 services on 1 host)
  92.  
  93. Initiating OS detection (try #1) against ip-160-153-16-29.ip.secureserver.net (160.153.16.29)
  94.  
  95. Initiating Traceroute at 05:38
  96.  
  97. Completed Traceroute at 05:38, 3.05s elapsed
  98.  
  99. Initiating Parallel DNS resolution of 9 hosts. at 05:38
  100.  
  101. Completed Parallel DNS resolution of 9 hosts. at 05:38, 13.00s elapsed
  102.  
  103. NSE: Script scanning 160.153.16.29.
  104.  
  105. Initiating NSE at 05:38
  106.  
  107. Completed NSE at 05:43, 295.38s elapsed
  108.  
  109. Initiating NSE at 05:43
  110.  
  111. Completed NSE at 05:43, 3.79s elapsed
  112.  
  113. Nmap scan report for ip-160-153-16-29.ip.secureserver.net (160.153.16.29)
  114.  
  115. NSOCK ERROR [3207.9170s] mksock_bind_addr(): Bind to 0.0.0.0:500 failed (IOD #648): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
  116.  
  117. NSOCK ERROR [3211.9080s] mksock_bind_addr(): Bind to 0.0.0.0:500 failed (IOD #666): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
  118.  
  119. NSOCK ERROR [3215.4780s] mksock_bind_addr(): Bind to 0.0.0.0:500 failed (IOD #687): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
  120.  
  121. NSOCK ERROR [3219.5990s] mksock_bind_addr(): Bind to 0.0.0.0:500 failed (IOD #702): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
  122.  
  123. NSOCK ERROR [3277.8350s] mksock_bind_addr(): Bind to 0.0.0.0:445 failed (IOD #965): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
  124.  
  125. Host is up (0.17s latency).
  126.  
  127. Not shown: 1000 open|filtered ports, 987 filtered ports
  128.  
  129. PORT STATE SERVICE VERSION
  130.  
  131. 21/tcp open ftp Pure-FTPd
  132.  
  133. | banner: 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x
  134.  
  135. |_0D\x0A220-You are user number 8 of 500 allowed.\x0D\x0A220-Local tim...
  136.  
  137. | ssl-cert: Subject: commonName=n1plcpnl0041.prod.ams1.secureserver.net
  138.  
  139. | Issuer: commonName=n1plcpnl0041.prod.ams1.secureserver.net
  140.  
  141. | Public Key type: rsa
  142.  
  143. | Public Key bits: 2048
  144.  
  145. | Signature Algorithm: sha256WithRSAEncryption
  146.  
  147. | Not valid before: 2015-04-09T07:01:36
  148.  
  149. | Not valid after: 2016-04-08T07:01:36
  150.  
  151. | MD5: d720 9441 ff5d ff44 51a9 7960 2dba 9882
  152.  
  153. |_SHA-1: c7ee 6ad3 c4eb a96e bbb7 97ac 7106 ed41 f885 f631
  154.  
  155. 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
  156.  
  157. |_banner: SSH-2.0-OpenSSH_5.3
  158.  
  159. | ssh-hostkey:
  160.  
  161. | 1024 b3:77:93:a2:b5:de:78:01:dc:2f:c6:4a:cc:bd:97:97 (DSA)
  162.  
  163. |_ 2048 ad:57:d6:0f:57:5e:8e:84:0c:51:48:e0:4a:bc:9c:cf (RSA)
  164.  
  165. | ssh2-enum-algos:
  166.  
  167. | kex_algorithms: (4)
  168.  
  169. | diffie-hellman-group-exchange-sha256
  170.  
  171. | diffie-hellman-group-exchange-sha1
  172.  
  173. | diffie-hellman-group14-sha1
  174.  
  175. | diffie-hellman-group1-sha1
  176.  
  177. | server_host_key_algorithms: (2)
  178.  
  179. | ssh-rsa
  180.  
  181. | ssh-dss
  182.  
  183. | encryption_algorithms: (13)
  184.  
  185. | aes128-ctr
  186.  
  187. | aes192-ctr
  188.  
  189. | aes256-ctr
  190.  
  191. | arcfour256
  192.  
  193. | arcfour128
  194.  
  195. | aes128-cbc
  196.  
  197. | 3des-cbc
  198.  
  199. | blowfish-cbc
  200.  
  201. | cast128-cbc
  202.  
  203. | aes192-cbc
  204.  
  205. | aes256-cbc
  206.  
  207. | arcfour
  208.  
  209. | rijndael-cbc@lysator.liu.se
  210.  
  211. | mac_algorithms: (9)
  212.  
  213. | hmac-md5
  214.  
  215. | hmac-sha1
  216.  
  217. | umac-64@openssh.com
  218.  
  219. | hmac-sha2-256
  220.  
  221. | hmac-sha2-512
  222.  
  223. | hmac-ripemd160
  224.  
  225. | hmac-ripemd160@openssh.com
  226.  
  227. | hmac-sha1-96
  228.  
  229. | hmac-md5-96
  230.  
  231. | compression_algorithms: (2)
  232.  
  233. | none
  234.  
  235. |_ zlib@openssh.com
  236.  
  237. 25/tcp open smtp Exim smtpd 4.85
  238.  
  239. | banner: 220-n1plcpnl0041.prod.ams1.secureserver.net ESMTP Exim 4.85 #2
  240.  
  241. |_Mon, 10 Aug 2015 02:38:19 -0700 \x0D\x0A220-We do not authorize the ...
  242.  
  243. | smtp-commands: n1plcpnl0041.prod.ams1.secureserver.net Hello 97-103-177-89.res.bhn.net [97.103.177.89], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
  244.  
  245. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  246.  
  247. | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
  248.  
  249. | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
  250.  
  251. | Public Key type: rsa
  252.  
  253. | Public Key bits: 2048
  254.  
  255. | Signature Algorithm: sha256WithRSAEncryption
  256.  
  257. | Not valid before: 2015-04-07T20:23:41
  258.  
  259. | Not valid after: 2018-04-07T20:23:41
  260.  
  261. | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
  262.  
  263. |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
  264.  
  265. |_ssl-date: 2015-08-10T09:38:32+00:00; -4s from scanner time.
  266.  
  267. 26/tcp closed rsftp
  268.  
  269. 80/tcp open http Apache httpd 2.4.12
  270.  
  271. | http-comments-displayer:
  272.  
  273. | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=ip-160-153-16-29.ip.secureserver.net
  274.  
  275. |
  276.  
  277. | Path: http://ip-160-153-16-29.ip.secureserver.net:80/
  278.  
  279. | Line number: 9
  280.  
  281. | Comment:
  282.  
  283. |_ /*background: linear-gradient(90deg, white, gray);*/
  284.  
  285. |_http-date: Mon, 10 Aug 2015 09:39:12 GMT; +16s from local time.
  286.  
  287. |_http-google-malware: [ERROR] No API key found. Update the variable APIKEY in http-google-malware or set it in the argument http-google-malware.api
  288.  
  289. | http-grep:
  290.  
  291. |_ ERROR: Argument http-grep.match was not set
  292.  
  293. | http-headers:
  294.  
  295. | Date: Mon, 10 Aug 2015 09:39:06 GMT
  296.  
  297. | Server: Apache/2.4.12
  298.  
  299. | Last-Modified: Wed, 05 Aug 2015 23:12:40 GMT
  300.  
  301. | ETag: "222790-7ab-51c988a138927"
  302.  
  303. | Accept-Ranges: bytes
  304.  
  305. | Content-Length: 1963
  306.  
  307. | Connection: close
  308.  
  309. | Content-Type: text/html
  310.  
  311. |
  312.  
  313. |_ (Request type: HEAD)
  314.  
  315. |_http-methods: GET HEAD POST OPTIONS
  316.  
  317. |_http-mobileversion-checker: No mobile version detected.
  318.  
  319. |_http-referer-checker: Couldn't find any cross-domain scripts.
  320.  
  321. |_http-server-header: Apache/2.4.12
  322.  
  323. |_http-title: Coming Soon
  324.  
  325. | http-traceroute:
  326.  
  327. |_ Possible reverse proxy detected.
  328.  
  329. | http-useragent-tester:
  330.  
  331. |
  332.  
  333. | Allowed User Agents:
  334.  
  335. | Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)
  336.  
  337. | libwww
  338.  
  339. | lwp-trivial
  340.  
  341. | libcurl-agent/1.0
  342.  
  343. | PHP/
  344.  
  345. | Python-urllib/2.5
  346.  
  347. | GT::WWW
  348.  
  349. | Snoopy
  350.  
  351. | MFC_Tear_Sample
  352.  
  353. | HTTP::Lite
  354.  
  355. | PHPCrawl
  356.  
  357. | URI::Fetch
  358.  
  359. | Zend_Http_Client
  360.  
  361. | http client
  362.  
  363. | PECL::HTTP
  364.  
  365. | Wget/1.13.4 (linux-gnu)
  366.  
  367. | WWW-Mechanize/1.34
  368.  
  369. |_
  370.  
  371. |_http-xssed: No previously reported XSS vuln.
  372.  
  373. 110/tcp open pop3 Dovecot pop3d
  374.  
  375. |_banner: +OK Dovecot ready.
  376.  
  377. |_pop3-capabilities: USER PIPELINING AUTH-RESP-CODE TOP UIDL RESP-CODES SASL(PLAIN LOGIN) STLS CAPA
  378.  
  379. | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
  380.  
  381. | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
  382.  
  383. | Public Key type: rsa
  384.  
  385. | Public Key bits: 2048
  386.  
  387. | Signature Algorithm: sha256WithRSAEncryption
  388.  
  389. | Not valid before: 2015-04-07T20:23:41
  390.  
  391. | Not valid after: 2018-04-07T20:23:41
  392.  
  393. | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
  394.  
  395. |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
  396.  
  397. |_ssl-date: 2015-08-10T09:42:26+00:00; -1s from scanner time.
  398.  
  399. 143/tcp open imap Dovecot imapd
  400.  
  401. | banner: * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID
  402.  
  403. |_ENABLE IDLE NAMESPACE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
  404.  
  405. |_imap-capabilities: Pre-login more AUTH=PLAIN have OK SASL-IR LITERAL+ listed ID ENABLE IMAP4rev1 NAMESPACE STARTTLS AUTH=LOGINA0001 post-login LOGIN-REFERRALS IDLE capabilities
  406.  
  407. | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
  408.  
  409. | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
  410.  
  411. | Public Key type: rsa
  412.  
  413. | Public Key bits: 2048
  414.  
  415. | Signature Algorithm: sha256WithRSAEncryption
  416.  
  417. | Not valid before: 2015-04-07T20:23:41
  418.  
  419. | Not valid after: 2018-04-07T20:23:41
  420.  
  421. | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
  422.  
  423. |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
  424.  
  425. |_ssl-date: 2015-08-10T09:40:18+00:00; -3s from scanner time.
  426.  
  427. 443/tcp open ssl/http Apache httpd 2.4.12
  428.  
  429. | http-cisco-anyconnect:
  430.  
  431. |_ ERROR: Not a Cisco ASA or unsupported version
  432.  
  433. | http-comments-displayer:
  434.  
  435. | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=ip-160-153-16-29.ip.secureserver.net
  436.  
  437. |
  438.  
  439. | Path: http://ip-160-153-16-29.ip.secureserver.net:443/
  440.  
  441. | Line number: 48
  442.  
  443. | Comment:
  444.  
  445. | <!--
  446.  
  447. | instead of REQUEST_URI, we could show absolute URL via:
  448.  
  449. | http://HTTP_HOST/REQUEST_URI
  450.  
  451. | but what if its https:// or other protocol?
  452.  
  453. |
  454.  
  455. | SERVER_PORT_SECURE doesn't seem to be used
  456.  
  457. | SERVER_PORT logic would break if they use alternate ports
  458.  
  459. | -->
  460.  
  461. |
  462.  
  463. | Path: http://ip-160-153-16-29.ip.secureserver.net:443/
  464.  
  465. | Line number: 46
  466.  
  467. | Comment:
  468.  
  469. | <!-- start content-->
  470.  
  471. |
  472.  
  473. | Path: http://ip-160-153-16-29.ip.secureserver.net:443/
  474.  
  475. | Line number: 70
  476.  
  477. | Comment:
  478.  
  479. |_ <!-- end content -->
  480.  
  481. |_http-date: Mon, 10 Aug 2015 09:41:56 GMT; +1m05s from local time.
  482.  
  483. | http-email-harvest:
  484.  
  485. | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=ip-160-153-16-29.ip.secureserver.net
  486.  
  487. |_ hostingex@godaddy.com
  488.  
  489. |_http-google-malware: [ERROR] No API key found. Update the variable APIKEY in http-google-malware or set it in the argument http-google-malware.api
  490.  
  491. | http-grep:
  492.  
  493. |_ ERROR: Argument http-grep.match was not set
  494.  
  495. | http-headers:
  496.  
  497. | Date: Mon, 10 Aug 2015 09:41:56 GMT
  498.  
  499. | Server: Apache/2.4.12
  500.  
  501. | Accept-Ranges: bytes
  502.  
  503. | Connection: close
  504.  
  505. | Content-Type: text/html
  506.  
  507. |
  508.  
  509. |_ (Request type: GET)
  510.  
  511. |_http-methods: GET HEAD POST OPTIONS
  512.  
  513. |_http-mobileversion-checker: No mobile version detected.
  514.  
  515. |_http-referer-checker: Couldn't find any cross-domain scripts.
  516.  
  517. |_http-server-header: Apache/2.4.12
  518.  
  519. |_http-title: 400 Bad Request
  520.  
  521. | http-traceroute:
  522.  
  523. |_ Possible reverse proxy detected.
  524.  
  525. | http-useragent-tester:
  526.  
  527. |
  528.  
  529. | Allowed User Agents:
  530.  
  531. | Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)
  532.  
  533. | libwww
  534.  
  535. | lwp-trivial
  536.  
  537. | libcurl-agent/1.0
  538.  
  539. | PHP/
  540.  
  541. | Python-urllib/2.5
  542.  
  543. | GT::WWW
  544.  
  545. | Snoopy
  546.  
  547. | MFC_Tear_Sample
  548.  
  549. | HTTP::Lite
  550.  
  551. | PHPCrawl
  552.  
  553. | URI::Fetch
  554.  
  555. | Zend_Http_Client
  556.  
  557. | http client
  558.  
  559. | PECL::HTTP
  560.  
  561. | Wget/1.13.4 (linux-gnu)
  562.  
  563. | WWW-Mechanize/1.34
  564.  
  565. |_
  566.  
  567. |_http-xssed: No previously reported XSS vuln.
  568.  
  569. | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
  570.  
  571. | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
  572.  
  573. | Public Key type: rsa
  574.  
  575. | Public Key bits: 2048
  576.  
  577. | Signature Algorithm: sha256WithRSAEncryption
  578.  
  579. | Not valid before: 2015-04-07T20:23:41
  580.  
  581. | Not valid after: 2018-04-07T20:23:41
  582.  
  583. | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
  584.  
  585. |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
  586.  
  587. |_ssl-date: 2015-08-10T09:42:25+00:00; -2s from scanner time.
  588.  
  589. | ssl-google-cert-catalog:
  590.  
  591. |_ No DB entry
  592.  
  593. 465/tcp open ssl/smtp Exim smtpd 4.85
  594.  
  595. | banner: 220-n1plcpnl0041.prod.ams1.secureserver.net ESMTP Exim 4.85 #2
  596.  
  597. |_Mon, 10 Aug 2015 02:41:20 -0700 \x0D\x0A220-We do not authorize the ...
  598.  
  599. | smtp-commands: n1plcpnl0041.prod.ams1.secureserver.net Hello 97-103-177-89.res.bhn.net [97.103.177.89], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
  600.  
  601. |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  602.  
  603. | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
  604.  
  605. | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
  606.  
  607. | Public Key type: rsa
  608.  
  609. | Public Key bits: 2048
  610.  
  611. | Signature Algorithm: sha256WithRSAEncryption
  612.  
  613. | Not valid before: 2015-04-07T20:23:41
  614.  
  615. | Not valid after: 2018-04-07T20:23:41
  616.  
  617. | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
  618.  
  619. |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
  620.  
  621. |_ssl-date: 2015-08-10T09:41:35+00:00; -4s from scanner time.
  622.  
  623. | ssl-google-cert-catalog:
  624.  
  625. |_ No DB entry
  626.  
  627. 587/tcp open smtp Exim smtpd 4.85
  628.  
  629. | banner: 220-n1plcpnl0041.prod.ams1.secureserver.net ESMTP Exim 4.85 #2
  630.  
  631. |_Mon, 10 Aug 2015 02:42:05 -0700 \x0D\x0A220-We do not authorize the ...
  632.  
  633. | smtp-commands: n1plcpnl0041.prod.ams1.secureserver.net Hello 97-103-177-89.res.bhn.net [97.103.177.89], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
  634.  
  635. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
  636.  
  637. | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
  638.  
  639. | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
  640.  
  641. | Public Key type: rsa
  642.  
  643. | Public Key bits: 2048
  644.  
  645. | Signature Algorithm: sha256WithRSAEncryption
  646.  
  647. | Not valid before: 2015-04-07T20:23:41
  648.  
  649. | Not valid after: 2018-04-07T20:23:41
  650.  
  651. | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
  652.  
  653. |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
  654.  
  655. |_ssl-date: 2015-08-10T09:42:03+00:00; -4s from scanner time.
  656.  
  657. 993/tcp open ssl/imap Dovecot imapd
  658.  
  659. | banner: * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID
  660.  
  661. |_ENABLE IDLE NAMESPACE AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
  662.  
  663. | imap-capabilities:
  664.  
  665. |_ ERROR: Failed to connect to server
  666.  
  667. | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
  668.  
  669. | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
  670.  
  671. | Public Key type: rsa
  672.  
  673. | Public Key bits: 2048
  674.  
  675. | Signature Algorithm: sha256WithRSAEncryption
  676.  
  677. | Not valid before: 2015-04-07T20:23:41
  678.  
  679. | Not valid after: 2018-04-07T20:23:41
  680.  
  681. | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
  682.  
  683. |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
  684.  
  685. |_ssl-date: 2015-08-10T09:42:23+00:00; -1s from scanner time.
  686.  
  687. | ssl-google-cert-catalog:
  688.  
  689. |_ No DB entry
  690.  
  691. 995/tcp open ssl/pop3 Dovecot pop3d
  692.  
  693. |_banner: +OK Dovecot ready.
  694.  
  695. | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
  696.  
  697. | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
  698.  
  699. | Public Key type: rsa
  700.  
  701. | Public Key bits: 2048
  702.  
  703. | Signature Algorithm: sha256WithRSAEncryption
  704.  
  705. | Not valid before: 2015-04-07T20:23:41
  706.  
  707. | Not valid after: 2018-04-07T20:23:41
  708.  
  709. | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
  710.  
  711. |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
  712.  
  713. |_ssl-date: 2015-08-10T09:42:22+00:00; -2s from scanner time.
  714.  
  715. | ssl-google-cert-catalog:
  716.  
  717. |_ No DB entry
  718.  
  719. 3306/tcp open mysql MySQL 5.5.41-cll-lve
  720.  
  721. | banner: R\x00\x00\x00\x0A5.5.41-cll-lve\x00Z\xDB\xD8\x00ihO3Q}Dy\x00\xF
  722.  
  723. |_F\xF7\x08\x02\x00\x0F\x80\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0...
  724.  
  725. | mysql-audit:
  726.  
  727. |_ No audit rulebase file was supplied (see mysql-audit.filename)
  728.  
  729. | mysql-info:
  730.  
  731. | Protocol: 53
  732.  
  733. | Version: .5.41-cll-lve
  734.  
  735. | Thread ID: 14212746
  736.  
  737. | Capabilities flags: 63487
  738.  
  739. | Some Capabilities: Speaks41ProtocolNew, InteractiveClient, FoundRows, Speaks41ProtocolOld, Support41Auth, IgnoreSigpipes, IgnoreSpaceBeforeParenthesis, LongColumnFlag, LongPassword, SupportsLoadDataLocal, SupportsTransactions, DontAllowDatabaseTableColumn, ODBCClient, SupportsCompression, ConnectWithDatabase
  740.  
  741. | Status: Autocommit
  742.  
  743. |_ Salt: }w`Y}-`!~ydh^~!&9.y;
  744.  
  745. Device type: general purpose
  746.  
  747. Running: Linux 2.6.X|3.X
  748.  
  749. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
  750.  
  751. OS details: Linux 2.6.32 - 3.13
  752.  
  753. Uptime guess: 45.035 days (since Fri Jun 26 04:53:29 2015)
  754.  
  755. Network Distance: 14 hops
  756.  
  757. TCP Sequence Prediction: Difficulty=256 (Good luck!)
  758.  
  759. IP ID Sequence Generation: All zeros
  760.  
  761. Service Info: Host: n1plcpnl0041.prod.ams1.secureserver.net
  762.  
  763.  
  764.  
  765. Host script results:
  766.  
  767. | asn-query:
  768.  
  769. | BGP: 160.153.16.0/22 | Country: US
  770.  
  771. | Origin AS: 26496 - AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC,US
  772.  
  773. |_ Peer AS: 209 1103 1299 2381 3356 196844
  774.  
  775. | fcrdns:
  776.  
  777. | ip-160-153-16-29.ip.secureserver.net:
  778.  
  779. | status: pass
  780.  
  781. | addresses:
  782.  
  783. |_ 160.153.16.29
  784.  
  785. | firewalk:
  786.  
  787. | HOP HOST PROTOCOL BLOCKED PORTS
  788.  
  789. | 11 208.109.115.134 tcp 1,3-4,6-7,9,13,17,19-20
  790.  
  791. |_ udp 2-3,7,9,13,17,19-22
  792.  
  793. |_hostmap-robtex:
  794.  
  795. | ip-geolocation-geoplugin:
  796.  
  797. | 160.153.16.29
  798.  
  799. | coordinates (lat,lon): 33.6119,-111.890602
  800.  
  801. |_ state: Arizona, United States
  802.  
  803. |_ip-geolocation-maxmind: ERROR: Script execution failed (use -d to debug)
  804.  
  805. |_ipidseq: All zeros
  806.  
  807. |_path-mtu: PMTU == 1500
  808.  
  809. | qscan:
  810.  
  811. | PORT FAMILY MEAN (us) STDDEV LOSS (%)
  812.  
  813. | 21 0 376300.00 655191.07 0.0%
  814.  
  815. | 22 0 979700.00 2551713.98 0.0%
  816.  
  817. | 25 0 2370200.00 6942187.53 0.0%
  818.  
  819. | 26 0 173000.00 5637.18 0.0%
  820.  
  821. | 80 0 3842400.00 11588221.24 0.0%
  822.  
  823. | 110 0 16928000.00 52989935.51 0.0%
  824.  
  825. | 143 0 2686400.00 7947016.68 0.0%
  826.  
  827. | 443 0 1439200.00 3999161.88 0.0%
  828.  
  829. |_465 0 171600.00 4812.02 0.0%
  830.  
  831. | traceroute-geolocation:
  832.  
  833. | HOP RTT ADDRESS GEOLOCATION
  834.  
  835. | 1 12.00 192.168.0.1 - ,-
  836.  
  837. | 2 ...
  838.  
  839. | 3 21.00 ten0-7-0-0.ORLD43-cts2.bhn.net (72.31.193.240) 38,-97 United States (Unknown)
  840.  
  841. | 4 20.00 72-31-188-110.net.bhntampa.com (72.31.188.110) 38,-97 United States (Unknown)
  842.  
  843. | 5 25.00 72-31-220-174.net.bhntampa.com (72.31.220.174) 38,-97 United States (Unknown)
  844.  
  845. | 6 23.00 hun0-2-0-7.ORLD71-cbr1.bhn.net (72.31.220.228) 38,-97 United States (Unknown)
  846.  
  847. | 7 27.00 4.68.70.153 38,-97 United States (Unknown)
  848.  
  849. | 8 ...
  850.  
  851. | 9 ...
  852.  
  853. | 10 78.00 4.34.191.254 38,-97 United States (Unknown)
  854.  
  855. | 11 169.00 ip-208-109-115-134.ip.secureserver.net (208.109.115.134) 33,-111 United States (Arizona)
  856.  
  857. | 12 174.00 ip-208-109-115-134.ip.secureserver.net (208.109.115.134) 33,-111 United States (Arizona)
  858.  
  859. | 13 ...
  860.  
  861. |_ 14 167.00 ip-160-153-16-29.ip.secureserver.net (160.153.16.29) 33,-111 United States (Arizona)
  862.  
  863. |_whois-domain: You should provide a domain name.
  864.  
  865. | whois-ip: Record found at whois.arin.net
  866.  
  867. | netrange: 160.153.0.0 - 160.153.255.255
  868.  
  869. | netname: GO-DADDY-COM-LLC
  870.  
  871. | orgname: GoDaddy.com, LLC
  872.  
  873. | orgid: GODAD
  874.  
  875. | country: US stateprov: AZ
  876.  
  877. | orgtechname: Network Operations Center
  878.  
  879. |_orgtechemail: noc@godaddy.com
  880.  
  881.  
  882.  
  883. TRACEROUTE (using port 26/tcp)
  884.  
  885. HOP RTT ADDRESS
  886.  
  887. 1 12.00 ms 192.168.0.1
  888.  
  889. 2 ...
  890.  
  891. 3 21.00 ms ten0-7-0-0.ORLD43-cts2.bhn.net (72.31.193.240)
  892.  
  893. 4 20.00 ms 72-31-188-110.net.bhntampa.com (72.31.188.110)
  894.  
  895. 5 25.00 ms 72-31-220-174.net.bhntampa.com (72.31.220.174)
  896.  
  897. 6 23.00 ms hun0-2-0-7.ORLD71-cbr1.bhn.net (72.31.220.228)
  898.  
  899. 7 27.00 ms 4.68.70.153
  900.  
  901. 8 ... 9
  902.  
  903. 10 78.00 ms 4.34.191.254
  904.  
  905. 11 169.00 ms ip-208-109-115-134.ip.secureserver.net (208.109.115.134)
  906.  
  907. 12 174.00 ms ip-208-109-115-134.ip.secureserver.net (208.109.115.134)
  908.  
  909. 13 ...
  910.  
  911. 14 167.00 ms ip-160-153-16-29.ip.secureserver.net (160.153.16.29)
  912.  
  913.  
  914.  
  915. NSE: Script Post-scanning.
  916.  
  917. Initiating NSE at 05:43
  918.  
  919. Completed NSE at 05:43, 0.00s elapsed
  920.  
  921. Initiating NSE at 05:43
  922.  
  923. Completed NSE at 05:43, 0.00s elapsed
  924.  
  925. Read data files from: C:\Program Files (x86)\Nmap
  926.  
  927. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  928.  
  929. Nmap done: 1 IP address (1 host up) scanned in 3345.14 seconds
  930.  
  931. Raw packets sent: 5302 (204.730KB) | Rcvd: 68 (3.993KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement