Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Scanning 160.153.16.29 [7 ports]
- Completed Ping Scan at 04:47, 0.30s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 04:47
- Completed Parallel DNS resolution of 1 host. at 04:47, 0.08s elapsed
- Initiating SYN Stealth Scan at 04:47
- Scanning ip-160-153-16-29.ip.secureserver.net (160.153.16.29) [1000 ports]
- Discovered open port 3306/tcp on 160.153.16.29
- Discovered open port 110/tcp on 160.153.16.29
- Discovered open port 587/tcp on 160.153.16.29
- Discovered open port 80/tcp on 160.153.16.29
- Discovered open port 995/tcp on 160.153.16.29
- Discovered open port 443/tcp on 160.153.16.29
- Discovered open port 25/tcp on 160.153.16.29
- Discovered open port 22/tcp on 160.153.16.29
- Discovered open port 143/tcp on 160.153.16.29
- Discovered open port 993/tcp on 160.153.16.29
- Discovered open port 21/tcp on 160.153.16.29
- Discovered open port 465/tcp on 160.153.16.29
- Completed SYN Stealth Scan at 04:48, 28.19s elapsed (1000 total ports)
- Initiating UDP Scan at 04:48
- Scanning ip-160-153-16-29.ip.secureserver.net (160.153.16.29) [1000 ports]
- Completed UDP Scan at 04:48, 9.79s elapsed (1000 total ports)
- Initiating Service scan at 04:48
- Scanning 1012 services on ip-160-153-16-29.ip.secureserver.net (160.153.16.29)
- Service scan Timing: About 1.28% done; ETC: 06:41 (1:51:26 remaining)
- Service scan Timing: About 4.25% done; ETC: 05:57 (1:05:44 remaining)
- Service scan Timing: About 7.21% done; ETC: 05:48 (0:56:10 remaining)
- Service scan Timing: About 10.18% done; ETC: 05:45 (0:51:29 remaining)
- Service scan Timing: About 13.14% done; ETC: 05:43 (0:48:08 remaining)
- Service scan Timing: About 18.38% done; ETC: 05:36 (0:39:14 remaining)
- Service scan Timing: About 19.07% done; ETC: 05:41 (0:43:17 remaining)
- Service scan Timing: About 24.31% done; ETC: 05:36 (0:36:35 remaining)
- Service scan Timing: About 25.00% done; ETC: 05:40 (0:39:21 remaining)
- Service scan Timing: About 30.14% done; ETC: 05:37 (0:34:00 remaining)
- Service scan Timing: About 36.07% done; ETC: 05:37 (0:31:10 remaining)
- Service scan Timing: About 42.00% done; ETC: 05:37 (0:28:19 remaining)
- Service scan Timing: About 47.92% done; ETC: 05:37 (0:25:27 remaining)
- Service scan Timing: About 53.85% done; ETC: 05:37 (0:22:34 remaining)
- Service scan Timing: About 59.78% done; ETC: 05:37 (0:19:41 remaining)
- Service scan Timing: About 65.71% done; ETC: 05:37 (0:16:47 remaining)
- Service scan Timing: About 71.64% done; ETC: 05:37 (0:13:53 remaining)
- Service scan Timing: About 77.57% done; ETC: 05:37 (0:10:59 remaining)
- Service scan Timing: About 83.50% done; ETC: 05:37 (0:08:05 remaining)
- Service scan Timing: About 88.93% done; ETC: 05:37 (0:05:27 remaining)
- Service scan Timing: About 94.86% done; ETC: 05:37 (0:02:32 remaining)
- Completed Service scan at 05:38, 2975.09s elapsed (1012 services on 1 host)
- Initiating OS detection (try #1) against ip-160-153-16-29.ip.secureserver.net (160.153.16.29)
- Initiating Traceroute at 05:38
- Completed Traceroute at 05:38, 3.05s elapsed
- Initiating Parallel DNS resolution of 9 hosts. at 05:38
- Completed Parallel DNS resolution of 9 hosts. at 05:38, 13.00s elapsed
- NSE: Script scanning 160.153.16.29.
- Initiating NSE at 05:38
- Completed NSE at 05:43, 295.38s elapsed
- Initiating NSE at 05:43
- Completed NSE at 05:43, 3.79s elapsed
- Nmap scan report for ip-160-153-16-29.ip.secureserver.net (160.153.16.29)
- NSOCK ERROR [3207.9170s] mksock_bind_addr(): Bind to 0.0.0.0:500 failed (IOD #648): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
- NSOCK ERROR [3211.9080s] mksock_bind_addr(): Bind to 0.0.0.0:500 failed (IOD #666): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
- NSOCK ERROR [3215.4780s] mksock_bind_addr(): Bind to 0.0.0.0:500 failed (IOD #687): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
- NSOCK ERROR [3219.5990s] mksock_bind_addr(): Bind to 0.0.0.0:500 failed (IOD #702): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
- NSOCK ERROR [3277.8350s] mksock_bind_addr(): Bind to 0.0.0.0:445 failed (IOD #965): An attempt was made to access a socket in a way forbidden by its access permissions. (10013)
- Host is up (0.17s latency).
- Not shown: 1000 open|filtered ports, 987 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- | banner: 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x
- |_0D\x0A220-You are user number 8 of 500 allowed.\x0D\x0A220-Local tim...
- | ssl-cert: Subject: commonName=n1plcpnl0041.prod.ams1.secureserver.net
- | Issuer: commonName=n1plcpnl0041.prod.ams1.secureserver.net
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-04-09T07:01:36
- | Not valid after: 2016-04-08T07:01:36
- | MD5: d720 9441 ff5d ff44 51a9 7960 2dba 9882
- |_SHA-1: c7ee 6ad3 c4eb a96e bbb7 97ac 7106 ed41 f885 f631
- 22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
- |_banner: SSH-2.0-OpenSSH_5.3
- | ssh-hostkey:
- | 1024 b3:77:93:a2:b5:de:78:01:dc:2f:c6:4a:cc:bd:97:97 (DSA)
- |_ 2048 ad:57:d6:0f:57:5e:8e:84:0c:51:48:e0:4a:bc:9c:cf (RSA)
- | ssh2-enum-algos:
- | kex_algorithms: (4)
- | diffie-hellman-group-exchange-sha256
- | diffie-hellman-group-exchange-sha1
- | diffie-hellman-group14-sha1
- | diffie-hellman-group1-sha1
- | server_host_key_algorithms: (2)
- | ssh-rsa
- | ssh-dss
- | encryption_algorithms: (13)
- | aes128-ctr
- | aes192-ctr
- | aes256-ctr
- | arcfour256
- | arcfour128
- | aes128-cbc
- | 3des-cbc
- | blowfish-cbc
- | cast128-cbc
- | aes192-cbc
- | aes256-cbc
- | arcfour
- | rijndael-cbc@lysator.liu.se
- | mac_algorithms: (9)
- | hmac-md5
- | hmac-sha1
- | umac-64@openssh.com
- | hmac-sha2-256
- | hmac-sha2-512
- | hmac-ripemd160
- | hmac-ripemd160@openssh.com
- | hmac-sha1-96
- | hmac-md5-96
- | compression_algorithms: (2)
- | none
- |_ zlib@openssh.com
- 25/tcp open smtp Exim smtpd 4.85
- | banner: 220-n1plcpnl0041.prod.ams1.secureserver.net ESMTP Exim 4.85 #2
- |_Mon, 10 Aug 2015 02:38:19 -0700 \x0D\x0A220-We do not authorize the ...
- | smtp-commands: n1plcpnl0041.prod.ams1.secureserver.net Hello 97-103-177-89.res.bhn.net [97.103.177.89], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
- | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-04-07T20:23:41
- | Not valid after: 2018-04-07T20:23:41
- | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
- |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
- |_ssl-date: 2015-08-10T09:38:32+00:00; -4s from scanner time.
- 26/tcp closed rsftp
- 80/tcp open http Apache httpd 2.4.12
- | http-comments-displayer:
- | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=ip-160-153-16-29.ip.secureserver.net
- |
- | Path: http://ip-160-153-16-29.ip.secureserver.net:80/
- | Line number: 9
- | Comment:
- |_ /*background: linear-gradient(90deg, white, gray);*/
- |_http-date: Mon, 10 Aug 2015 09:39:12 GMT; +16s from local time.
- |_http-google-malware: [ERROR] No API key found. Update the variable APIKEY in http-google-malware or set it in the argument http-google-malware.api
- | http-grep:
- |_ ERROR: Argument http-grep.match was not set
- | http-headers:
- | Date: Mon, 10 Aug 2015 09:39:06 GMT
- | Server: Apache/2.4.12
- | Last-Modified: Wed, 05 Aug 2015 23:12:40 GMT
- | ETag: "222790-7ab-51c988a138927"
- | Accept-Ranges: bytes
- | Content-Length: 1963
- | Connection: close
- | Content-Type: text/html
- |
- |_ (Request type: HEAD)
- |_http-methods: GET HEAD POST OPTIONS
- |_http-mobileversion-checker: No mobile version detected.
- |_http-referer-checker: Couldn't find any cross-domain scripts.
- |_http-server-header: Apache/2.4.12
- |_http-title: Coming Soon
- | http-traceroute:
- |_ Possible reverse proxy detected.
- | http-useragent-tester:
- |
- | Allowed User Agents:
- | Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)
- | libwww
- | lwp-trivial
- | libcurl-agent/1.0
- | PHP/
- | Python-urllib/2.5
- | GT::WWW
- | Snoopy
- | MFC_Tear_Sample
- | HTTP::Lite
- | PHPCrawl
- | URI::Fetch
- | Zend_Http_Client
- | http client
- | PECL::HTTP
- | Wget/1.13.4 (linux-gnu)
- | WWW-Mechanize/1.34
- |_
- |_http-xssed: No previously reported XSS vuln.
- 110/tcp open pop3 Dovecot pop3d
- |_banner: +OK Dovecot ready.
- |_pop3-capabilities: USER PIPELINING AUTH-RESP-CODE TOP UIDL RESP-CODES SASL(PLAIN LOGIN) STLS CAPA
- | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
- | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-04-07T20:23:41
- | Not valid after: 2018-04-07T20:23:41
- | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
- |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
- |_ssl-date: 2015-08-10T09:42:26+00:00; -1s from scanner time.
- 143/tcp open imap Dovecot imapd
- | banner: * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID
- |_ENABLE IDLE NAMESPACE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
- |_imap-capabilities: Pre-login more AUTH=PLAIN have OK SASL-IR LITERAL+ listed ID ENABLE IMAP4rev1 NAMESPACE STARTTLS AUTH=LOGINA0001 post-login LOGIN-REFERRALS IDLE capabilities
- | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
- | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-04-07T20:23:41
- | Not valid after: 2018-04-07T20:23:41
- | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
- |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
- |_ssl-date: 2015-08-10T09:40:18+00:00; -3s from scanner time.
- 443/tcp open ssl/http Apache httpd 2.4.12
- | http-cisco-anyconnect:
- |_ ERROR: Not a Cisco ASA or unsupported version
- | http-comments-displayer:
- | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=ip-160-153-16-29.ip.secureserver.net
- |
- | Path: http://ip-160-153-16-29.ip.secureserver.net:443/
- | Line number: 48
- | Comment:
- | <!--
- | instead of REQUEST_URI, we could show absolute URL via:
- | http://HTTP_HOST/REQUEST_URI
- | but what if its https:// or other protocol?
- |
- | SERVER_PORT_SECURE doesn't seem to be used
- | SERVER_PORT logic would break if they use alternate ports
- | -->
- |
- | Path: http://ip-160-153-16-29.ip.secureserver.net:443/
- | Line number: 46
- | Comment:
- | <!-- start content-->
- |
- | Path: http://ip-160-153-16-29.ip.secureserver.net:443/
- | Line number: 70
- | Comment:
- |_ <!-- end content -->
- |_http-date: Mon, 10 Aug 2015 09:41:56 GMT; +1m05s from local time.
- | http-email-harvest:
- | Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=ip-160-153-16-29.ip.secureserver.net
- |_ hostingex@godaddy.com
- |_http-google-malware: [ERROR] No API key found. Update the variable APIKEY in http-google-malware or set it in the argument http-google-malware.api
- | http-grep:
- |_ ERROR: Argument http-grep.match was not set
- | http-headers:
- | Date: Mon, 10 Aug 2015 09:41:56 GMT
- | Server: Apache/2.4.12
- | Accept-Ranges: bytes
- | Connection: close
- | Content-Type: text/html
- |
- |_ (Request type: GET)
- |_http-methods: GET HEAD POST OPTIONS
- |_http-mobileversion-checker: No mobile version detected.
- |_http-referer-checker: Couldn't find any cross-domain scripts.
- |_http-server-header: Apache/2.4.12
- |_http-title: 400 Bad Request
- | http-traceroute:
- |_ Possible reverse proxy detected.
- | http-useragent-tester:
- |
- | Allowed User Agents:
- | Mozilla/5.0 (compatible; Nmap Scripting Engine; http://nmap.org/book/nse.html)
- | libwww
- | lwp-trivial
- | libcurl-agent/1.0
- | PHP/
- | Python-urllib/2.5
- | GT::WWW
- | Snoopy
- | MFC_Tear_Sample
- | HTTP::Lite
- | PHPCrawl
- | URI::Fetch
- | Zend_Http_Client
- | http client
- | PECL::HTTP
- | Wget/1.13.4 (linux-gnu)
- | WWW-Mechanize/1.34
- |_
- |_http-xssed: No previously reported XSS vuln.
- | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
- | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-04-07T20:23:41
- | Not valid after: 2018-04-07T20:23:41
- | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
- |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
- |_ssl-date: 2015-08-10T09:42:25+00:00; -2s from scanner time.
- | ssl-google-cert-catalog:
- |_ No DB entry
- 465/tcp open ssl/smtp Exim smtpd 4.85
- | banner: 220-n1plcpnl0041.prod.ams1.secureserver.net ESMTP Exim 4.85 #2
- |_Mon, 10 Aug 2015 02:41:20 -0700 \x0D\x0A220-We do not authorize the ...
- | smtp-commands: n1plcpnl0041.prod.ams1.secureserver.net Hello 97-103-177-89.res.bhn.net [97.103.177.89], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
- | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-04-07T20:23:41
- | Not valid after: 2018-04-07T20:23:41
- | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
- |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
- |_ssl-date: 2015-08-10T09:41:35+00:00; -4s from scanner time.
- | ssl-google-cert-catalog:
- |_ No DB entry
- 587/tcp open smtp Exim smtpd 4.85
- | banner: 220-n1plcpnl0041.prod.ams1.secureserver.net ESMTP Exim 4.85 #2
- |_Mon, 10 Aug 2015 02:42:05 -0700 \x0D\x0A220-We do not authorize the ...
- | smtp-commands: n1plcpnl0041.prod.ams1.secureserver.net Hello 97-103-177-89.res.bhn.net [97.103.177.89], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
- | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-04-07T20:23:41
- | Not valid after: 2018-04-07T20:23:41
- | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
- |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
- |_ssl-date: 2015-08-10T09:42:03+00:00; -4s from scanner time.
- 993/tcp open ssl/imap Dovecot imapd
- | banner: * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID
- |_ENABLE IDLE NAMESPACE AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
- | imap-capabilities:
- |_ ERROR: Failed to connect to server
- | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
- | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-04-07T20:23:41
- | Not valid after: 2018-04-07T20:23:41
- | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
- |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
- |_ssl-date: 2015-08-10T09:42:23+00:00; -1s from scanner time.
- | ssl-google-cert-catalog:
- |_ No DB entry
- 995/tcp open ssl/pop3 Dovecot pop3d
- |_banner: +OK Dovecot ready.
- | ssl-cert: Subject: commonName=*.prod.ams1.secureserver.net
- | Issuer: commonName=Starfield Secure Certificate Authority - G2/organizationName=Starfield Technologies, Inc./stateOrProvinceName=Arizona/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-04-07T20:23:41
- | Not valid after: 2018-04-07T20:23:41
- | MD5: c0e9 e04c a3c3 47af 42c7 a9a1 f5a5 b2fe
- |_SHA-1: 4d0e 70c1 42fc e882 f33a 3b42 999e 5d92 90dc 3391
- |_ssl-date: 2015-08-10T09:42:22+00:00; -2s from scanner time.
- | ssl-google-cert-catalog:
- |_ No DB entry
- 3306/tcp open mysql MySQL 5.5.41-cll-lve
- | banner: R\x00\x00\x00\x0A5.5.41-cll-lve\x00Z\xDB\xD8\x00ihO3Q}Dy\x00\xF
- |_F\xF7\x08\x02\x00\x0F\x80\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0...
- | mysql-audit:
- |_ No audit rulebase file was supplied (see mysql-audit.filename)
- | mysql-info:
- | Protocol: 53
- | Version: .5.41-cll-lve
- | Thread ID: 14212746
- | Capabilities flags: 63487
- | Some Capabilities: Speaks41ProtocolNew, InteractiveClient, FoundRows, Speaks41ProtocolOld, Support41Auth, IgnoreSigpipes, IgnoreSpaceBeforeParenthesis, LongColumnFlag, LongPassword, SupportsLoadDataLocal, SupportsTransactions, DontAllowDatabaseTableColumn, ODBCClient, SupportsCompression, ConnectWithDatabase
- | Status: Autocommit
- |_ Salt: }w`Y}-`!~ydh^~!&9.y;
- Device type: general purpose
- Running: Linux 2.6.X|3.X
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
- OS details: Linux 2.6.32 - 3.13
- Uptime guess: 45.035 days (since Fri Jun 26 04:53:29 2015)
- Network Distance: 14 hops
- TCP Sequence Prediction: Difficulty=256 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Host: n1plcpnl0041.prod.ams1.secureserver.net
- Host script results:
- | asn-query:
- | BGP: 160.153.16.0/22 | Country: US
- | Origin AS: 26496 - AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC,US
- |_ Peer AS: 209 1103 1299 2381 3356 196844
- | fcrdns:
- | ip-160-153-16-29.ip.secureserver.net:
- | status: pass
- | addresses:
- |_ 160.153.16.29
- | firewalk:
- | HOP HOST PROTOCOL BLOCKED PORTS
- | 11 208.109.115.134 tcp 1,3-4,6-7,9,13,17,19-20
- |_ udp 2-3,7,9,13,17,19-22
- |_hostmap-robtex:
- | ip-geolocation-geoplugin:
- | 160.153.16.29
- | coordinates (lat,lon): 33.6119,-111.890602
- |_ state: Arizona, United States
- |_ip-geolocation-maxmind: ERROR: Script execution failed (use -d to debug)
- |_ipidseq: All zeros
- |_path-mtu: PMTU == 1500
- | qscan:
- | PORT FAMILY MEAN (us) STDDEV LOSS (%)
- | 21 0 376300.00 655191.07 0.0%
- | 22 0 979700.00 2551713.98 0.0%
- | 25 0 2370200.00 6942187.53 0.0%
- | 26 0 173000.00 5637.18 0.0%
- | 80 0 3842400.00 11588221.24 0.0%
- | 110 0 16928000.00 52989935.51 0.0%
- | 143 0 2686400.00 7947016.68 0.0%
- | 443 0 1439200.00 3999161.88 0.0%
- |_465 0 171600.00 4812.02 0.0%
- | traceroute-geolocation:
- | HOP RTT ADDRESS GEOLOCATION
- | 1 12.00 192.168.0.1 - ,-
- | 2 ...
- | 3 21.00 ten0-7-0-0.ORLD43-cts2.bhn.net (72.31.193.240) 38,-97 United States (Unknown)
- | 4 20.00 72-31-188-110.net.bhntampa.com (72.31.188.110) 38,-97 United States (Unknown)
- | 5 25.00 72-31-220-174.net.bhntampa.com (72.31.220.174) 38,-97 United States (Unknown)
- | 6 23.00 hun0-2-0-7.ORLD71-cbr1.bhn.net (72.31.220.228) 38,-97 United States (Unknown)
- | 7 27.00 4.68.70.153 38,-97 United States (Unknown)
- | 8 ...
- | 9 ...
- | 10 78.00 4.34.191.254 38,-97 United States (Unknown)
- | 11 169.00 ip-208-109-115-134.ip.secureserver.net (208.109.115.134) 33,-111 United States (Arizona)
- | 12 174.00 ip-208-109-115-134.ip.secureserver.net (208.109.115.134) 33,-111 United States (Arizona)
- | 13 ...
- |_ 14 167.00 ip-160-153-16-29.ip.secureserver.net (160.153.16.29) 33,-111 United States (Arizona)
- |_whois-domain: You should provide a domain name.
- | whois-ip: Record found at whois.arin.net
- | netrange: 160.153.0.0 - 160.153.255.255
- | netname: GO-DADDY-COM-LLC
- | orgname: GoDaddy.com, LLC
- | orgid: GODAD
- | country: US stateprov: AZ
- | orgtechname: Network Operations Center
- |_orgtechemail: noc@godaddy.com
- TRACEROUTE (using port 26/tcp)
- HOP RTT ADDRESS
- 1 12.00 ms 192.168.0.1
- 2 ...
- 3 21.00 ms ten0-7-0-0.ORLD43-cts2.bhn.net (72.31.193.240)
- 4 20.00 ms 72-31-188-110.net.bhntampa.com (72.31.188.110)
- 5 25.00 ms 72-31-220-174.net.bhntampa.com (72.31.220.174)
- 6 23.00 ms hun0-2-0-7.ORLD71-cbr1.bhn.net (72.31.220.228)
- 7 27.00 ms 4.68.70.153
- 8 ... 9
- 10 78.00 ms 4.34.191.254
- 11 169.00 ms ip-208-109-115-134.ip.secureserver.net (208.109.115.134)
- 12 174.00 ms ip-208-109-115-134.ip.secureserver.net (208.109.115.134)
- 13 ...
- 14 167.00 ms ip-160-153-16-29.ip.secureserver.net (160.153.16.29)
- NSE: Script Post-scanning.
- Initiating NSE at 05:43
- Completed NSE at 05:43, 0.00s elapsed
- Initiating NSE at 05:43
- Completed NSE at 05:43, 0.00s elapsed
- Read data files from: C:\Program Files (x86)\Nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 3345.14 seconds
- Raw packets sent: 5302 (204.730KB) | Rcvd: 68 (3.993KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement