Advertisement
deepdish

Khilaafah.com - Exposed

Feb 10th, 2017
240
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.73 KB | None | 0 0
  1. Scan made by de3pdish @noisis
  2.  
  3. Khilaafah.com -
  4. 193.254.211.2 -
  5. United kingdom
  6. bilbo.visn.co.uk
  7.  
  8.  
  9. Reverse DNS: 2.211.254.193.in-addr.arpa
  10.  
  11.  
  12. Hostname: bilbo.visn.co.uk
  13.  
  14.  
  15. Nameservers:
  16. ns0.visn.co.uk >> 193.254.210.100
  17.  
  18. ns1.visn.co.uk >> 82.68.228.152
  19.  
  20.  
  21.  
  22.  
  23. ############################!!!!!!!!!!!!!!!!!!!!############################
  24. ############################!!!!!!!!!!!!!!!!!!!!############################
  25.  
  26. Ports
  27.  
  28. Scanning Khilaafah.com (193.254.211.2) [1000 ports] SERVICE VERSION
  29. Discovered open port 3306/tcp on 193.254.211.2 MariaDB (unauthorized)
  30. Discovered open port 587/tcp on 193.254.211.2 smtp Exim smtpd 4.88
  31. Discovered open port 80/tcp on 193.254.211.2 http Apache httpd
  32. Discovered open port 995/tcp on 193.254.211.2 ssl/pop3 Dovecot pop3d
  33. Discovered open port 110/tcp on 193.254.211.2 pop3 Dovecot pop3d
  34. Discovered open port 443/tcp on 193.254.211.2 ssl/ssl Apache httpd (SSL-only mode)
  35. Discovered open port 143/tcp on 193.254.211.2 imap Dovecot imapd
  36. Discovered open port 993/tcp on 193.254.211.2 ssl/imapDovecot imapd
  37. Discovered open port 21/tcp on 193.254.211.2 ftp Pure-FTPd
  38. Discovered open port 465/tcp on 193.254.211.2 ssl/smtp Exim smtpd 4.88
  39.  
  40. ############################!!!!!!!!!!!!!!!!!!!!############################
  41. ############################!!!!!!!!!!!!!!!!!!!!############################
  42.  
  43. Web Browser XSS Protection is not enabled,
  44. or is disabled by the configuration
  45. of the 'X-XSS-Protection' HTTP response header on the web server
  46.  
  47. ############################!!!!!!!!!!!!!!!!!!!!############################
  48. ############################!!!!!!!!!!!!!!!!!!!!############################
  49.  
  50. X-Frame-Options Header Not Set
  51.  
  52.  
  53. ############################!!!!!!!!!!!!!!!!!!!!############################
  54. ############################!!!!!!!!!!!!!!!!!!!!############################
  55.  
  56. X-Content-Type-Options Header Missing
  57.  
  58. The Anti-MIME-Sniffing header X-Content-Type-Options was not set to 'nosniff'.
  59. This allows older versions of Internet Explorer and Chrome to perform MIME-sniffing on the response body,
  60. potentially causing the response body to be interpreted and displayed as a content type other than the declared content type.
  61. Current (early 2014) and legacy versions of Firefox will use the declared content type (if one is set),
  62. rather than performing MIME-sniffing.
  63.  
  64. ############################!!!!!!!!!!!!!!!!!!!!############################
  65. ############################!!!!!!!!!!!!!!!!!!!!############################
  66. ############################!!!!!!!!!!!!!!!!!!!!############################
  67. ############################!!!!!!!!!!!!!!!!!!!!############################
  68.  
  69. HTTP HEADERS
  70.  
  71. HTTP/1.1 200 OK
  72. Date: Wed, 08 Feb 2017 22:33:26 GMT
  73. Server: Apache
  74. Last-Modified: Tue, 25 Jun 2013 22:34:15 GMT
  75. Accept-Ranges: bytes
  76. Content-Length: 30559
  77. Content-Type: text/html
  78.  
  79.  
  80. ############################!!!!!!!!!!!!!!!!!!!!############################
  81. ############################!!!!!!!!!!!!!!!!!!!!############################
  82.  
  83. Intense Scan
  84.  
  85.  
  86.  
  87. Starting Nmap 7.25BETA1 ( https://nmap.org ) at 2017-02-08 22:46 UTC
  88. NSE: Loaded 264 scripts for scanning.
  89. NSE: Script Pre-scanning.
  90. Initiating NSE at 22:46
  91. NSE: [shodan-api] Error: Please specify your ShodanAPI key with the shodan-api.apikey argument
  92. NSE: [mtrace] A source IP must be provided through fromip argument.
  93. NSE: [resolveall] Skipping 'resolveall', missing required argument 'resolveall.hosts'.
  94. Completed NSE at 22:46, 10.07s elapsed
  95. Initiating NSE at 22:46
  96. Completed NSE at 22:46, 0.00s elapsed
  97. Initiating NSE at 22:46
  98. Completed NSE at 22:46, 0.00s elapsed
  99. Pre-scan script results:
  100. | broadcast-igmp-discovery:
  101. | 192.168.1.16
  102. | Interface: eth0
  103. | Version: 2
  104. | Group: 239.255.255.250
  105. | Description: Organization-Local Scope (rfc2365)
  106. |_ Use the newtargets script-arg to add the results as targets
  107. | targets-asn:
  108. |_ targets-asn.asn is a mandatory parameter
  109. Initiating Ping Scan at 22:46
  110. Scanning Khilaafah.com (193.254.211.2) [7 ports]
  111. Completed Ping Scan at 22:46, 0.09s elapsed (1 total hosts)
  112. Initiating Parallel DNS resolution of 1 host. at 22:46
  113. Completed Parallel DNS resolution of 1 host. at 22:46, 0.01s elapsed
  114. Initiating SYN Stealth Scan at 22:46
  115. Scanning Khilaafah.com (193.254.211.2) [1000 ports]
  116. Discovered open port 3306/tcp on 193.254.211.2
  117. Discovered open port 587/tcp on 193.254.211.2
  118. Discovered open port 80/tcp on 193.254.211.2
  119. Discovered open port 995/tcp on 193.254.211.2
  120. Discovered open port 110/tcp on 193.254.211.2
  121. Discovered open port 443/tcp on 193.254.211.2
  122. Discovered open port 143/tcp on 193.254.211.2
  123. Discovered open port 993/tcp on 193.254.211.2
  124. Discovered open port 21/tcp on 193.254.211.2
  125. Discovered open port 465/tcp on 193.254.211.2
  126. Completed SYN Stealth Scan at 22:46, 6.13s elapsed (1000 total ports)
  127. Initiating UDP Scan at 22:46
  128. Scanning Khilaafah.com (193.254.211.2) [1000 ports]
  129. Completed UDP Scan at 22:46, 4.05s elapsed (1000 total ports)
  130. Initiating Service scan at 22:46
  131. Scanning 1009 services on Khilaafah.com (193.254.211.2)
  132. Service scan Timing: About 1.09% done; ETC: 00:59 (2:11:33 remaining)
  133. Service scan Timing: About 4.06% done; ETC: 23:58 (1:08:52 remaining)
  134. Service scan Timing: About 7.04% done; ETC: 23:48 (0:57:41 remaining)
  135. Service scan Timing: About 10.01% done; ETC: 23:44 (0:52:27 remaining)
  136. Service scan Timing: About 12.98% done; ETC: 23:42 (0:48:49 remaining)
  137. Service scan Timing: About 17.94% done; ETC: 23:35 (0:40:25 remaining)
  138. Service scan Timing: About 18.93% done; ETC: 23:40 (0:43:41 remaining)
  139. Service scan Timing: About 23.89% done; ETC: 23:35 (0:37:27 remaining)
  140. Service scan Timing: About 27.75% done; ETC: 23:34 (0:34:43 remaining)
  141. Service scan Timing: About 27.85% done; ETC: 23:38 (0:37:47 remaining)
  142. Service scan Timing: About 32.71% done; ETC: 23:35 (0:33:10 remaining)
  143. Service scan Timing: About 36.67% done; ETC: 23:34 (0:30:34 remaining)
  144. Service scan Timing: About 42.62% done; ETC: 23:34 (0:27:46 remaining)
  145. Service scan Timing: About 48.56% done; ETC: 23:34 (0:24:56 remaining)
  146. Service scan Timing: About 54.51% done; ETC: 23:34 (0:22:04 remaining)
  147. Service scan Timing: About 60.46% done; ETC: 23:35 (0:19:13 remaining)
  148. Service scan Timing: About 66.40% done; ETC: 23:35 (0:16:20 remaining)
  149. Service scan Timing: About 72.25% done; ETC: 23:35 (0:13:30 remaining)
  150. Service scan Timing: About 78.20% done; ETC: 23:35 (0:10:37 remaining)
  151. Service scan Timing: About 84.14% done; ETC: 23:35 (0:07:44 remaining)
  152. Service scan Timing: About 90.09% done; ETC: 23:35 (0:04:50 remaining)
  153. Service scan Timing: About 96.04% done; ETC: 23:35 (0:01:56 remaining)
  154. Completed Service scan at 23:36, 2976.29s elapsed (1009 services on 1 host)
  155. Initiating OS detection (try #1) against Khilaafah.com (193.254.211.2)
  156. Retrying OS detection (try #2) against Khilaafah.com (193.254.211.2)
  157. Initiating Traceroute at 23:36
  158. Completed Traceroute at 23:36, 0.08s elapsed
  159. Initiating Parallel DNS resolution of 15 hosts. at 23:36
  160. Completed Parallel DNS resolution of 15 hosts. at 23:36, 0.95s elapsed
  161. NSE: Script scanning 193.254.211.2.
  162. Initiating NSE at 23:36
  163. Discovered open port 67/udp on 193.254.211.2
  164. Completed NSE at 23:40, 250.62s elapsed
  165. Initiating NSE at 23:40
  166. Completed NSE at 23:41, 51.39s elapsed
  167. Initiating NSE at 23:41
  168. Completed NSE at 23:41, 3.62s elapsed
  169. Nmap scan report for Khilaafah.com (193.254.211.2)
  170. Host is up (0.063s latency).
  171. rDNS record for 193.254.211.2: bilbo.visn.co.uk
  172. Not shown: 998 open|filtered ports, 933 filtered ports, 58 closed ports
  173. PORT STATE SERVICE VERSION
  174. 21/tcp open ftp Pure-FTPd
  175. | banner: 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x
  176. |_0D\x0A220-You are user number 6 of 50 allowed.\x0D\x0A220-Local time...
  177. | ssl-cert: Subject: commonName=*.visn.co.uk
  178. | Issuer: commonName=RapidSSL SHA256 CA/organizationName=GeoTrust Inc./countryName=US
  179. | Public Key type: rsa
  180. | Public Key bits: 2048
  181. | Signature Algorithm: sha256WithRSAEncryption
  182. | Not valid before: 2017-01-29T00:00:00
  183. | Not valid after: 2018-04-30T23:59:59
  184. | MD5: 6d8a 2d57 3b49 a849 501e c932 623a 9b55
  185. |_SHA-1: aefc 11d1 ebba 7a89 f096 33bb aed9 dc9e b4e0 a014
  186. |_ssl-date: 2017-02-08T23:36:24+00:00; -2s from scanner time.
  187. 80/tcp open http Apache httpd
  188. |_http-comments-displayer: Couldn't find any comments.
  189. |_http-date: Wed, 08 Feb 2017 23:38:30 GMT; +1s from local time.
  190. | http-headers:
  191. | Date: Wed, 08 Feb 2017 23:39:12 GMT
  192. | Server: Apache
  193. | Allow:
  194. | Content-Length: 337
  195. | Connection: close
  196. | Content-Type: text/html; charset=iso-8859-1
  197. |
  198. |_ (Request type: GET)
  199. | http-methods:
  200. | Supported Methods:
  201. |_ Potentially risky methods:
  202. |_http-mobileversion-checker: No mobile version detected.
  203. |_http-referer-checker: Couldn't find any cross-domain scripts.
  204. |_http-server-header: Apache
  205. |_http-title: 501 Method Not Implemented
  206. | http-traceroute:
  207. |_ Possible reverse proxy detected.
  208. | http-useragent-tester:
  209. |
  210. | Allowed User Agents:
  211. | Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)
  212. | libwww
  213. | lwp-trivial
  214. | libcurl-agent/1.0
  215. | PHP/
  216. | Python-urllib/2.5
  217. | GT::WWW
  218. | Snoopy
  219. | MFC_Tear_Sample
  220. | HTTP::Lite
  221. | PHPCrawl
  222. | URI::Fetch
  223. | Zend_Http_Client
  224. | http client
  225. | PECL::HTTP
  226. | Wget/1.13.4 (linux-gnu)
  227. | WWW-Mechanize/1.34
  228. |_
  229. |_http-xssed: No previously reported XSS vuln.
  230. 110/tcp open pop3 Dovecot pop3d
  231. |_banner: +OK Dovecot ready.
  232. |_pop3-capabilities: CAPA PIPELINING AUTH-RESP-CODE STLS RESP-CODES UIDL USER SASL(PLAIN LOGIN) TOP
  233. | ssl-cert: Subject: commonName=*.visn.co.uk
  234. | Issuer: commonName=RapidSSL SHA256 CA/organizationName=GeoTrust Inc./countryName=US
  235. | Public Key type: rsa
  236. | Public Key bits: 2048
  237. | Signature Algorithm: sha256WithRSAEncryption
  238. | Not valid before: 2017-01-29T00:00:00
  239. | Not valid after: 2018-04-30T23:59:59
  240. | MD5: 6d8a 2d57 3b49 a849 501e c932 623a 9b55
  241. |_SHA-1: aefc 11d1 ebba 7a89 f096 33bb aed9 dc9e b4e0 a014
  242. |_ssl-date: 2017-02-08T23:38:23+00:00; -3s from scanner time.
  243. 143/tcp open imap Dovecot imapd
  244. | banner: * OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID
  245. |_ENABLE IDLE NAMESPACE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
  246. |_imap-capabilities: OK listed IMAP4rev1 ENABLE NAMESPACE AUTH=PLAIN LOGIN-REFERRALS LITERAL+ IDLE Pre-login have more STARTTLS SASL-IR post-login ID capabilities AUTH=LOGINA0001
  247. | ssl-cert: Subject: commonName=*.visn.co.uk
  248. | Issuer: commonName=RapidSSL SHA256 CA/organizationName=GeoTrust Inc./countryName=US
  249. | Public Key type: rsa
  250. | Public Key bits: 2048
  251. | Signature Algorithm: sha256WithRSAEncryption
  252. | Not valid before: 2017-01-29T00:00:00
  253. | Not valid after: 2018-04-30T23:59:59
  254. | MD5: 6d8a 2d57 3b49 a849 501e c932 623a 9b55
  255. |_SHA-1: aefc 11d1 ebba 7a89 f096 33bb aed9 dc9e b4e0 a014
  256. |_ssl-date: 2017-02-08T23:37:15+00:00; -3s from scanner time.
  257. 443/tcp open ssl/ssl Apache httpd (SSL-only mode)
  258. |_http-comments-displayer: Couldn't find any comments.
  259. |_http-date: Wed, 08 Feb 2017 23:39:17 GMT; +7s from local time.
  260. | http-headers:
  261. | Date: Wed, 08 Feb 2017 23:39:43 GMT
  262. | Server: Apache
  263. | Allow:
  264. | Content-Length: 337
  265. | Connection: close
  266. | Content-Type: text/html; charset=iso-8859-1
  267. |
  268. |_ (Request type: GET)
  269. | http-methods:
  270. |_ Supported Methods: GET HEAD
  271. |_http-mobileversion-checker: No mobile version detected.
  272. |_http-referer-checker: Couldn't find any cross-domain scripts.
  273. |_http-title: 501 Method Not Implemented
  274. | http-useragent-tester:
  275. |
  276. | Allowed User Agents:
  277. | Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)
  278. | libwww
  279. | lwp-trivial
  280. | libcurl-agent/1.0
  281. | PHP/
  282. | Python-urllib/2.5
  283. | GT::WWW
  284. | Snoopy
  285. | MFC_Tear_Sample
  286. | HTTP::Lite
  287. | PHPCrawl
  288. | URI::Fetch
  289. | Zend_Http_Client
  290. | http client
  291. | PECL::HTTP
  292. | Wget/1.13.4 (linux-gnu)
  293. | WWW-Mechanize/1.34
  294. |_
  295. |_http-xssed: No previously reported XSS vuln.
  296. | ssl-cert: Subject: commonName=*.visn.co.uk
  297. | Issuer: commonName=RapidSSL SHA256 CA/organizationName=GeoTrust Inc./countryName=US
  298. | Public Key type: rsa
  299. | Public Key bits: 2048
  300. | Signature Algorithm: sha256WithRSAEncryption
  301. | Not valid before: 2017-01-29T00:00:00
  302. | Not valid after: 2018-04-30T23:59:59
  303. | MD5: 6d8a 2d57 3b49 a849 501e c932 623a 9b55
  304. |_SHA-1: aefc 11d1 ebba 7a89 f096 33bb aed9 dc9e b4e0 a014
  305. |_ssl-date: 2017-02-08T23:39:11+00:00; -3s from scanner time.
  306. |_ssl-google-cert-catalog: ERROR: Script execution failed (use -d to debug)
  307. 465/tcp open ssl/smtp Exim smtpd 4.88
  308. | banner: 220-bilbo.visn.co.uk ESMTP Exim 4.88 #1 Wed, 08 Feb 2017 23:37:
  309. |_38 +0000 \x0D\x0A220-We do not authorize the use of this system to t...
  310. | smtp-commands: bilbo.visn.co.uk Hello lfbn-1-3897-185.w86-233.abo.wanadoo.fr [86.233.149.185], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, CHUNKING, HELP,
  311. |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
  312. |_ssl-date: 2017-02-08T23:37:37+00:00; -3s from scanner time.
  313. 587/tcp open smtp Exim smtpd 4.88
  314. | banner: 220-bilbo.visn.co.uk ESMTP Exim 4.88 #1 Wed, 08 Feb 2017 23:36:
  315. |_59 +0000 \x0D\x0A220-We do not authorize the use of this system to t...
  316. | smtp-commands: bilbo.visn.co.uk Hello lfbn-1-3897-185.w86-233.abo.wanadoo.fr [86.233.149.185], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP,
  317. |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
  318. | ssl-cert: Subject: commonName=*.visn.co.uk
  319. | Issuer: commonName=RapidSSL SHA256 CA/organizationName=GeoTrust Inc./countryName=US
  320. | Public Key type: rsa
  321. | Public Key bits: 2048
  322. | Signature Algorithm: sha256WithRSAEncryption
  323. | Not valid before: 2017-01-29T00:00:00
  324. | Not valid after: 2018-04-30T23:59:59
  325. | MD5: 6d8a 2d57 3b49 a849 501e c932 623a 9b55
  326. |_SHA-1: aefc 11d1 ebba 7a89 f096 33bb aed9 dc9e b4e0 a014
  327. |_ssl-date: 2017-02-08T23:37:05+00:00; -3s from scanner time.
  328. 993/tcp open ssl/imap Dovecot imapd
  329. |_ssl-date: 2017-02-08T23:36:37+00:00; -2s from scanner time.
  330. 995/tcp open ssl/pop3 Dovecot pop3d
  331. |_banner: +OK Dovecot ready.
  332. |_ssl-date: 2017-02-08T23:36:09+00:00; -2s from scanner time.
  333. 3306/tcp open mysql MariaDB (unauthorized)
  334. | banner: I\x00\x00\x00\xFFj\x04Host '86.233.149.185' is not allowed to c
  335. |_onnect to this MariaDB server
  336. 67/udp open dhcps?
  337. | dhcp-discover:
  338. | DHCP Message Type: DHCPACK
  339. | Server Identifier: 192.168.1.1
  340. | Subnet Mask: 255.255.255.0
  341. | Domain Name Server: 192.168.1.1
  342. | Domain Name: home
  343. | Broadcast Address: 192.168.1.255
  344. |_ Router: 192.168.1.1
  345. Aggressive OS guesses: Linux 2.6.32 (98%), Linux 2.6.32 or 3.10 (98%), Linux 2.6.32 - 2.6.39 (98%), Linux 2.6.32 - 3.0 (95%), Synology DiskStation Manager 5.1 (94%), Linux 3.2 - 3.8 (94%), Linux 2.6.32 - 2.6.35 (94%), Linux 2.6.39 (93%), Linux 3.4 (93%), WatchGuard Fireware 11.8 (93%)
  346. No exact OS matches for host (test conditions non-ideal).
  347. Uptime guess: 24.965 days (since Sun Jan 15 00:32:03 2017)
  348. Network Distance: 15 hops
  349. TCP Sequence Prediction: Difficulty=126 (Good luck!)
  350. IP ID Sequence Generation: All zeros
  351.  
  352. Host script results:
  353. |_asn-query: ERROR: Script execution failed (use -d to debug)
  354. |_dns-zeustracker: ERROR: Script execution failed (use -d to debug)
  355. |_fcrdns: ERROR: Script execution failed (use -d to debug)
  356. | firewalk:
  357. | HOP HOST PROTOCOL BLOCKED PORTS
  358. | 12 185.19.16.154 tcp 20
  359. | 13 62.128.192.233 tcp 3-4,6,9,13,17
  360. | udp 9,13,17,19-22
  361. | 14 77.240.7.218 tcp 1,7,19
  362. |_ udp 2-3,7
  363. |_hostmap-robtex: ERROR: Script execution failed (use -d to debug)
  364. | ip-geolocation-geoplugin:
  365. | 193.254.211.2 (Khilaafah.com)
  366. | coordinates (lat,lon): 51.4964,-0.1224
  367. |_ state: , United Kingdom
  368. |_ip-geolocation-maxmind: ERROR: Script execution failed (use -d to debug)
  369. |_ipidseq: All zeros
  370. |_path-mtu: PMTU == 1500
  371. | qscan:
  372. | PORT FAMILY MEAN (us) STDDEV LOSS (%)
  373. | 21 0 60834.10 1273.32 0.0%
  374. | 80 0 60399.30 1444.12 0.0%
  375. | 110 0 60138.00 1234.86 0.0%
  376. | 113 0 60042.40 1550.08 0.0%
  377. | 143 0 60052.80 1064.07 0.0%
  378. | 443 0 59963.70 1326.95 0.0%
  379. | 465 0 59964.20 1456.38 0.0%
  380. | 587 0 59942.90 1275.79 0.0%
  381. |_993 0 60569.40 1098.45 50.0%
  382. | traceroute-geolocation:
  383. | HOP RTT ADDRESS GEOLOCATION
  384. | 1 1.00 livebox.home (192.168.1.1) - ,-
  385. | 2 5.54 80.10.232.105 - ,-
  386. | 3 5.77 ae105-0.ncbay101.Anglet.francetelecom.net (193.253.94.254) 48,2 France ()
  387. | 4 11.47 ae44-0.nipoi201.Poitiers.francetelecom.net (81.253.130.9) 48,2 France ()
  388. | 5 12.09 ae40-0.nipoi202.Poitiers.francetelecom.net (193.252.160.46) 48,2 France ()
  389. | 6 21.13 193.252.137.14 48,2 France ()
  390. | 7 62.36 be3044.ccr21.par04.atlas.cogentco.com (130.117.15.93) 47,8 Europe ()
  391. | 8 61.39 be12309.ccr42.par01.atlas.cogentco.com (154.54.39.65) 37,-97 United States ()
  392. | 9 62.20 be2320.rcr21.lhr01.atlas.cogentco.com (154.54.36.50) 37,-97 United States ()
  393. | 10 61.74 be5.asr01.ld5.as20860.net (149.11.166.210) 51,0 United Kingdom (Merton)
  394. | 11 67.21 po97.core2.ld5.as20860.net (62.128.215.14) 51,0 United Kingdom ()
  395. | 12 67.00 2990.core1.dc7.as20860.net (185.19.16.154) 51,0 United Kingdom ()
  396. | 13 66.81 3503.core2.dc7.as20860.net (62.128.192.233) 51,0 United Kingdom (London)
  397. | 14 65.78 custfw5a.tur.melbourne.co.uk (77.240.7.218) 53,-2 United Kingdom (Cheshire)
  398. |_ 15 65.41 bilbo.visn.co.uk (193.254.211.2) 51,0 United Kingdom ()
  399. | whois-domain:
  400. |
  401. | Domain name record found at whois.tucows.com
  402. | Domain Name: KHILAAFAH.COM
  403. | Domain ID: 647627994_DOMAIN_COM-VRSN
  404. | Registrar WHOIS Server: whois.tucows.com
  405. | Registrar URL: http://tucowsdomains.com
  406. | Updated Date: 2016-10-28T13:25:39Z
  407. | Creation Date: 2006-10-26T22:34:18Z
  408. | Registrar Registration Expiration Date: 2017-10-26T22:34:18Z
  409. | Registrar: TUCOWS, INC.
  410. | Registrar IANA ID: 69
  411. | Registrar Abuse Contact Email: domainabuse@tucows.com
  412. | Registrar Abuse Contact Phone: +1.4165350123
  413. | Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  414. | Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
  415. | Registry Registrant ID:
  416. | Registrant Name: Ajmal khurshid
  417. | Registrant Organization: A khurshid
  418. | Registrant Street: 58 havelock close india way
  419. | Registrant City: london
  420. | Registrant State/Province: london
  421. | Registrant Postal Code: W12 7NQ
  422. | Registrant Country: GB
  423. | Registrant Phone: +44.7737583897
  424. | Registrant Phone Ext:
  425. | Registrant Fax:
  426. | Registrant Fax Ext:
  427. | Registrant Email: departmentofdawah@lycos.com
  428. | Registry Admin ID:
  429. | Admin Name: Ajmal khurshid
  430. | Admin Organization: A khurshid
  431. | Admin Street: 58 havelock close india way
  432. | Admin City: london
  433. | Admin State/Province: london
  434. | Admin Postal Code: W12 7NQ
  435. | Admin Country: GB
  436. | Admin Phone: +44.7737583897
  437. | Admin Phone Ext:
  438. | Admin Fax:
  439. | Admin Fax Ext:
  440. | Admin Email: departmentofdawah@lycos.com
  441. | Registry Tech ID:
  442. | Tech Name: VISN Hostmaster
  443. | Tech Organization: Vision Internet Limited
  444. | Tech Street: PO Box 82
  445. | Tech City: Hyde
  446. | Tech State/Province: Cheshire
  447. | Tech Postal Code: SK14 6FF
  448. | Tech Country: UK
  449. | Tech Phone: +44.1457763501
  450. | Tech Phone Ext:
  451. | Tech Fax: +44.1457763501
  452. | Tech Fax Ext:
  453. | Tech Email: hostmaster@visn.co.uk
  454. | Name Server: NS0.VISN.CO.UK
  455. | Name Server: NS1.VISN.CO.UK
  456. | DNSSEC: unsigned
  457. | URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
  458. | >>> Last update of WHOIS database: 2016-10-28T13:25:39Z <<<
  459. |
  460. | "For more information on Whois status codes, please visit https://icann.org/epp"
  461. |
  462. | The Data in the Tucows Registrar WHOIS database is provided to you by Tucows
  463. | for information purposes only, and may be used to assist you in obtaining
  464. | information about or related to a domain name's registration record.
  465. |
  466. | Tucows makes this information available "as is," and does not guarantee its
  467. | accuracy.
  468. |
  469. | By submitting a WHOIS query, you agree that you will use this data only for
  470. | lawful purposes and that, under no circumstances will you use this data to:
  471. | a) allow, enable, or otherwise support the transmission by e-mail,
  472. | telephone, or facsimile of mass, unsolicited, commercial advertising or
  473. | solicitations to entities other than the data recipient's own existing
  474. | customers; or (b) enable high volume, automated, electronic processes that
  475. | send queries or data to the systems of any Registry Operator or
  476. | ICANN-Accredited registrar, except as reasonably necessary to register
  477. | domain names or modify existing registrations.
  478. |
  479. | The compilation, repackaging, dissemination or other use of this Data is
  480. | expressly prohibited without the prior written consent of Tucows.
  481. |
  482. | Tucows reserves the right to terminate your access to the Tucows WHOIS
  483. | database in its sole discretion, including without limitation, for excessive
  484. | querying of the WHOIS database or for failure to otherwise abide by this
  485. | policy.
  486. |
  487. | Tucows reserves the right to modify these terms at any time.
  488. |
  489. | By submitting this query, you agree to abide by these terms.
  490. |
  491. | NOTE: THE WHOIS DATABASE IS A CONTACT DATABASE ONLY. LACK OF A DOMAIN
  492. | RECORD DOES NOT SIGNIFY DOMAIN AVAILABILITY.
  493. |_
  494. | whois-ip: Record found at whois.ripe.net
  495. | inetnum: 193.254.210.0 - 193.254.211.255
  496. | netname: VISN-MCR-LAN
  497. | country: GB
  498. | orgname: Vision Internet Limited
  499. | organisation: ORG-VIL5-RIPE
  500. | email: hostmaster@visn.co.uk
  501. | role: Vision Internet Limited Hostmaster
  502. |_email: hostmaster@visn.co.uk
  503.  
  504. TRACEROUTE (using port 113/tcp)
  505. HOP RTT ADDRESS
  506. 1 1.00 ms livebox.home (192.168.1.1)
  507. 2 5.54 ms 80.10.232.105
  508. 3 5.77 ms ae105-0.ncbay101.Anglet.francetelecom.net (193.253.94.254)
  509. 4 11.47 ms ae44-0.nipoi201.Poitiers.francetelecom.net (81.253.130.9)
  510. 5 12.09 ms ae40-0.nipoi202.Poitiers.francetelecom.net (193.252.160.46)
  511. 6 21.13 ms 193.252.137.14
  512. 7 62.36 ms be3044.ccr21.par04.atlas.cogentco.com (130.117.15.93)
  513. 8 61.39 ms be12309.ccr42.par01.atlas.cogentco.com (154.54.39.65)
  514. 9 62.20 ms be2320.rcr21.lhr01.atlas.cogentco.com (154.54.36.50)
  515. 10 61.74 ms be5.asr01.ld5.as20860.net (149.11.166.210)
  516. 11 67.21 ms po97.core2.ld5.as20860.net (62.128.215.14)
  517. 12 67.00 ms 2990.core1.dc7.as20860.net (185.19.16.154)
  518. 13 66.81 ms 3503.core2.dc7.as20860.net (62.128.192.233)
  519. 14 65.78 ms custfw5a.tur.melbourne.co.uk (77.240.7.218)
  520. 15 65.41 ms bilbo.visn.co.uk (193.254.211.2)
  521.  
  522. NSE: Script Post-scanning.
  523. Initiating NSE at 23:41
  524. Completed NSE at 23:41, 0.00s elapsed
  525. Initiating NSE at 23:41
  526. Completed NSE at 23:41, 0.00s elapsed
  527. Initiating NSE at 23:41
  528. Completed NSE at 23:41, 0.00s elapsed
  529. Read data files from: /usr/bin/../share/nmap
  530. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  531. Nmap done: 1 IP address (1 host up) scanned in 3309.28 seconds
  532. Raw packets sent: 5181 (200.042KB) | Rcvd: 109 (6.348KB)
  533. nmap: nse_nsock.cc:362: void callback(nsock_pool, nsock_event, void*): Assertion `lua_status(L) == LUA_YIELD' failed.
  534.  
  535.  
  536.  
  537. ############################!!!!!!!!!!!!!!!!!!!!############################
  538. ############################!!!!!!!!!!!!!!!!!!!!############################
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement