Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-11-22 05:51 GMT
- NSE: Loaded 122 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 05:51
- Completed NSE at 05:51, 0.00s elapsed
- Initiating NSE at 05:51
- Completed NSE at 05:51, 0.00s elapsed
- Initiating Ping Scan at 05:51
- Scanning 256 hosts [4 ports/host]
- Completed Ping Scan at 05:52, 42.03s elapsed (256 total hosts)
- Initiating Parallel DNS resolution of 256 hosts. at 05:52
- Completed Parallel DNS resolution of 256 hosts. at 05:52, 13.18s elapsed
- Nmap scan report for 94.141.221.0 [host down]
- Nmap scan report for 94.141.221.1 [host down]
- Nmap scan report for 94.141.221.2 [host down]
- Nmap scan report for 94.141.221.4 [host down]
- Nmap scan report for 94.141.221.5 [host down]
- Nmap scan report for 94.141.221.6 [host down]
- Nmap scan report for 94.141.221.7 [host down]
- Nmap scan report for 94.141.221.8 [host down]
- Nmap scan report for 94.141.221.9 [host down]
- Nmap scan report for 94.141.221.11 [host down]
- Nmap scan report for 94.141.221.13 [host down]
- Nmap scan report for 94.141.221.14 [host down]
- Nmap scan report for 94.141.221.15 [host down]
- Nmap scan report for 94.141.221.16 [host down]
- Nmap scan report for 94.141.221.17 [host down]
- Nmap scan report for 94.141.221.20 [host down]
- Nmap scan report for 94.141.221.21 [host down]
- Nmap scan report for 94.141.221.23 [host down]
- Nmap scan report for 94.141.221.25 [host down]
- Nmap scan report for 94.141.221.26 [host down]
- Nmap scan report for 94.141.221.27 [host down]
- Nmap scan report for 94.141.221.29 [host down]
- Nmap scan report for 94.141.221.30 [host down]
- Nmap scan report for 94.141.221.35 [host down]
- Nmap scan report for 94.141.221.36 [host down]
- Nmap scan report for 94.141.221.37 [host down]
- Nmap scan report for 94.141.221.40 [host down]
- Nmap scan report for 94.141.221.41 [host down]
- Nmap scan report for 94.141.221.42 [host down]
- Nmap scan report for 94.141.221.44 [host down]
- Nmap scan report for 94.141.221.47 [host down]
- Nmap scan report for 94.141.221.48 [host down]
- Nmap scan report for 94.141.221.51 [host down]
- Nmap scan report for 94.141.221.52 [host down]
- Nmap scan report for 94.141.221.54 [host down]
- Nmap scan report for 94.141.221.55 [host down]
- Nmap scan report for 94.141.221.57 [host down]
- Nmap scan report for 94.141.221.59 [host down]
- Nmap scan report for 94.141.221.60 [host down]
- Nmap scan report for 94.141.221.61 [host down]
- Nmap scan report for 94.141.221.62 [host down]
- Nmap scan report for 94.141.221.63 [host down]
- Nmap scan report for 94.141.221.64 [host down]
- Nmap scan report for 94.141.221.65 [host down]
- Nmap scan report for 94.141.221.67 [host down]
- Nmap scan report for 94.141.221.69 [host down]
- Nmap scan report for 94.141.221.70 [host down]
- Nmap scan report for 94.141.221.71 [host down]
- Nmap scan report for 94.141.221.72 [host down]
- Nmap scan report for 94.141.221.74 [host down]
- Nmap scan report for 94.141.221.76 [host down]
- Nmap scan report for 94.141.221.77 [host down]
- Nmap scan report for 94.141.221.78 [host down]
- Nmap scan report for 94.141.221.82 [host down]
- Nmap scan report for 94.141.221.83 [host down]
- Nmap scan report for 94.141.221.84 [host down]
- Nmap scan report for 94.141.221.85 [host down]
- Nmap scan report for 94.141.221.86 [host down]
- Nmap scan report for 94.141.221.87 [host down]
- Nmap scan report for 94.141.221.88 [host down]
- Nmap scan report for 94.141.221.89 [host down]
- Nmap scan report for 94.141.221.90 [host down]
- Nmap scan report for 94.141.221.91 [host down]
- Nmap scan report for 94.141.221.92 [host down]
- Nmap scan report for 94.141.221.94 [host down]
- Nmap scan report for 94.141.221.95 [host down]
- Nmap scan report for 94.141.221.96 [host down]
- Nmap scan report for 94.141.221.97 [host down]
- Nmap scan report for 94.141.221.98 [host down]
- Nmap scan report for 94.141.221.100 [host down]
- Nmap scan report for 94.141.221.102 [host down]
- Nmap scan report for 94.141.221.104 [host down]
- Nmap scan report for 94.141.221.105 [host down]
- Nmap scan report for 94.141.221.107 [host down]
- Nmap scan report for 94.141.221.109 [host down]
- Nmap scan report for 94.141.221.110 [host down]
- Nmap scan report for 94.141.221.111 [host down]
- Nmap scan report for 94.141.221.112 [host down]
- Nmap scan report for 94.141.221.117 [host down]
- Nmap scan report for 94.141.221.123 [host down]
- Nmap scan report for 94.141.221.124 [host down]
- Nmap scan report for 94.141.221.125 [host down]
- Nmap scan report for 94.141.221.126 [host down]
- Nmap scan report for 94.141.221.129 [host down]
- Nmap scan report for 94.141.221.130 [host down]
- Nmap scan report for 94.141.221.133 [host down]
- Nmap scan report for 94.141.221.134 [host down]
- Nmap scan report for 94.141.221.135 [host down]
- Nmap scan report for 94.141.221.138 [host down]
- Nmap scan report for 94.141.221.140 [host down]
- Nmap scan report for 94.141.221.141 [host down]
- Nmap scan report for 94.141.221.142 [host down]
- Nmap scan report for 94.141.221.143 [host down]
- Nmap scan report for 94.141.221.145 [host down]
- Nmap scan report for 94.141.221.147 [host down]
- Nmap scan report for 94.141.221.148 [host down]
- Nmap scan report for 94.141.221.149 [host down]
- Nmap scan report for 94.141.221.151 [host down]
- Nmap scan report for 94.141.221.152 [host down]
- Nmap scan report for 94.141.221.153 [host down]
- Nmap scan report for 94.141.221.154 [host down]
- Nmap scan report for 94.141.221.155 [host down]
- Nmap scan report for 94.141.221.156 [host down]
- Nmap scan report for 94.141.221.158 [host down]
- Nmap scan report for 94.141.221.159 [host down]
- Nmap scan report for 94.141.221.160 [host down]
- Nmap scan report for 94.141.221.162 [host down]
- Nmap scan report for 94.141.221.163 [host down]
- Nmap scan report for 94.141.221.164 [host down]
- Nmap scan report for 94.141.221.165 [host down]
- Nmap scan report for 94.141.221.166 [host down]
- Nmap scan report for 94.141.221.167 [host down]
- Nmap scan report for 94.141.221.168 [host down]
- Nmap scan report for 94.141.221.169 [host down]
- Nmap scan report for 94.141.221.170 [host down]
- Nmap scan report for 94.141.221.171 [host down]
- Nmap scan report for 94.141.221.172 [host down]
- Nmap scan report for 94.141.221.173 [host down]
- Nmap scan report for 94.141.221.174 [host down]
- Nmap scan report for 94.141.221.175 [host down]
- Nmap scan report for 94.141.221.176 [host down]
- Nmap scan report for 94.141.221.177 [host down]
- Nmap scan report for 94.141.221.178 [host down]
- Nmap scan report for 94.141.221.180 [host down]
- Nmap scan report for 94.141.221.183 [host down]
- Nmap scan report for 94.141.221.184 [host down]
- Nmap scan report for 94.141.221.185 [host down]
- Nmap scan report for 94.141.221.186 [host down]
- Nmap scan report for 94.141.221.187 [host down]
- Nmap scan report for 94.141.221.188 [host down]
- Nmap scan report for 94.141.221.190 [host down]
- Nmap scan report for 94.141.221.192 [host down]
- Nmap scan report for 94.141.221.194 [host down]
- Initiating SYN Stealth Scan at 05:52
- Scanning 64 hosts [1000 ports/host]
- SYN Stealth Scan Timing: About 0.38% done
- adjust_timeouts2: packet supposedly had rtt of 9311997 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9311997 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8099911 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8099911 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8612769 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8612769 microseconds. Ignoring time.
- Discovered open port 3306/tcp on 94.141.221.66
- Discovered open port 993/tcp on 94.141.221.182
- Discovered open port 8080/tcp on 94.141.221.191
- adjust_timeouts2: packet supposedly had rtt of 9994993 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9994993 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8832544 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8832544 microseconds. Ignoring time.
- Discovered open port 8080/tcp on 94.141.221.58
- adjust_timeouts2: packet supposedly had rtt of 8946370 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8946370 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8132047 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8132047 microseconds. Ignoring time.
- Discovered open port 8080/tcp on 94.141.221.19
- Discovered open port 8080/tcp on 94.141.221.101
- SYN Stealth Scan Timing: About 0.83% done
- adjust_timeouts2: packet supposedly had rtt of 9197965 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9197965 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Discovered open port 8080/tcp on 94.141.221.150
- Discovered open port 443/tcp on 94.141.221.66
- Increasing send delay for 94.141.221.161 from 0 to 5 due to 11 out of 16 dropped probes since last increase.
- Discovered open port 8080/tcp on 94.141.221.193
- Discovered open port 443/tcp on 94.141.221.68
- Discovered open port 80/tcp on 94.141.221.31
- Discovered open port 80/tcp on 94.141.221.122
- adjust_timeouts2: packet supposedly had rtt of 9559816 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9559816 microseconds. Ignoring time.
- Discovered open port 80/tcp on 94.141.221.157
- Discovered open port 80/tcp on 94.141.221.195
- Discovered open port 8080/tcp on 94.141.221.139
- adjust_timeouts2: packet supposedly had rtt of 9434205 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9434205 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9523946 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9523946 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9387505 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9387505 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9956292 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9956292 microseconds. Ignoring time.
- Discovered open port 80/tcp on 94.141.221.22
- adjust_timeouts2: packet supposedly had rtt of 9933898 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9933898 microseconds. Ignoring time.
- SYN Stealth Scan Timing: About 1.29% done; ETC: 07:50 (1:56:28 remaining)
- adjust_timeouts2: packet supposedly had rtt of 9837852 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9837852 microseconds. Ignoring time.
- Discovered open port 53/tcp on 94.141.221.182
- Discovered open port 80/tcp on 94.141.221.106
- Discovered open port 8080/tcp on 94.141.221.53
- Discovered open port 443/tcp on 94.141.221.182
- Discovered open port 80/tcp on 94.141.221.144
- adjust_timeouts2: packet supposedly had rtt of 9490688 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9490688 microseconds. Ignoring time.
- Discovered open port 80/tcp on 94.141.221.115
- Discovered open port 80/tcp on 94.141.221.39
- adjust_timeouts2: packet supposedly had rtt of 9481923 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9481923 microseconds. Ignoring time.
- Discovered open port 80/tcp on 94.141.221.33
- Discovered open port 80/tcp on 94.141.221.24
- Discovered open port 21/tcp on 94.141.221.19
- Discovered open port 21/tcp on 94.141.221.179
- Discovered open port 80/tcp on 94.141.221.12
- Discovered open port 80/tcp on 94.141.221.46
- Discovered open port 80/tcp on 94.141.221.34
- Discovered open port 21/tcp on 94.141.221.144
- adjust_timeouts2: packet supposedly had rtt of 8111551 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8111551 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8124289 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8124289 microseconds. Ignoring time.
- Discovered open port 80/tcp on 94.141.221.139
- adjust_timeouts2: packet supposedly had rtt of 9595634 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9595634 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8602199 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8602199 microseconds. Ignoring time.
- Discovered open port 21/tcp on 94.141.221.39
- Discovered open port 21/tcp on 94.141.221.116
- SYN Stealth Scan Timing: About 1.84% done; ETC: 07:45 (1:50:22 remaining)
- Discovered open port 80/tcp on 94.141.221.182
- Discovered open port 554/tcp on 94.141.221.31
- Discovered open port 21/tcp on 94.141.221.12
- Discovered open port 80/tcp on 94.141.221.66
- Increasing send delay for 94.141.221.161 from 5 to 10 due to 11 out of 19 dropped probes since last increase.
- adjust_timeouts2: packet supposedly had rtt of 10045846 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 10045846 microseconds. Ignoring time.
- Discovered open port 80/tcp on 94.141.221.49
- adjust_timeouts2: packet supposedly had rtt of 9975289 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9975289 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8858056 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8858056 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8748484 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8748484 microseconds. Ignoring time.
- Discovered open port 3389/tcp on 94.141.221.68
- Discovered open port 80/tcp on 94.141.221.99
- Discovered open port 80/tcp on 94.141.221.43
- Discovered open port 21/tcp on 94.141.221.53
- Increasing send delay for 94.141.221.43 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
- Discovered open port 80/tcp on 94.141.221.193
- Discovered open port 554/tcp on 94.141.221.115
- adjust_timeouts2: packet supposedly had rtt of 8832683 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8832683 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9627072 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9627072 microseconds. Ignoring time.
- Discovered open port 21/tcp on 94.141.221.150
- Discovered open port 3389/tcp on 94.141.221.75
- Discovered open port 21/tcp on 94.141.221.101
- Warning: 94.141.221.161 giving up on port because retransmission cap hit (6).
- Discovered open port 143/tcp on 94.141.221.182
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Discovered open port 554/tcp on 94.141.221.139
- Discovered open port 3389/tcp on 94.141.221.182
- Discovered open port 554/tcp on 94.141.221.132
- Discovered open port 995/tcp on 94.141.221.182
- Discovered open port 21/tcp on 94.141.221.43
- Discovered open port 21/tcp on 94.141.221.38
- Discovered open port 110/tcp on 94.141.221.182
- Discovered open port 554/tcp on 94.141.221.99
- adjust_timeouts2: packet supposedly had rtt of 8381522 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8381522 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8357715 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8357715 microseconds. Ignoring time.
- Discovered open port 3389/tcp on 94.141.221.49
- adjust_timeouts2: packet supposedly had rtt of 10052214 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 10052214 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8918811 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8918811 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8750282 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8750282 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9250846 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9250846 microseconds. Ignoring time.
- Increasing send delay for 94.141.221.43 from 5 to 10 due to 11 out of 22 dropped probes since last increase.
- adjust_timeouts2: packet supposedly had rtt of 8109891 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8109891 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8015198 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8015198 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8205762 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8205762 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8373143 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8373143 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8181459 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8181459 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9335180 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9335180 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9116243 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9116243 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9220061 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9220061 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9212804 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9212804 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9117969 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9117969 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8226571 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8226571 microseconds. Ignoring time.
- SYN Stealth Scan Timing: About 3.97% done; ETC: 07:41 (1:44:24 remaining)
- adjust_timeouts2: packet supposedly had rtt of 8070960 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8070960 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8536619 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8536619 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8566036 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8566036 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8436099 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8436099 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8339090 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8339090 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9457774 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9457774 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9787508 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9787508 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9523788 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9523788 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9152580 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9152580 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 8433991 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8433991 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8793443 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8793443 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8719439 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8719439 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8158902 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8158902 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8101015 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8101015 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8926541 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8926541 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8578906 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8578906 microseconds. Ignoring time.
- SYN Stealth Scan Timing: About 5.06% done; ETC: 07:36 (1:38:49 remaining)
- Discovered open port 10002/tcp on 94.141.221.106
- adjust_timeouts2: packet supposedly had rtt of 9162604 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9162604 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Discovered open port 10002/tcp on 94.141.221.46
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 8299091 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8299091 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8317803 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8317803 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8094160 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8094160 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9373749 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9373749 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8930326 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8930326 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Discovered open port 5566/tcp on 94.141.221.122
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Increasing send delay for 94.141.221.116 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
- SYN Stealth Scan Timing: About 6.29% done; ETC: 07:32 (1:33:18 remaining)
- adjust_timeouts2: packet supposedly had rtt of 8632035 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8632035 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8656463 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8656463 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9498135 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9498135 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9347588 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9347588 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8053252 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8053252 microseconds. Ignoring time.
- Increasing send delay for 94.141.221.121 from 0 to 5 due to 11 out of 22 dropped probes since last increase.
- adjust_timeouts2: packet supposedly had rtt of 9818860 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9818860 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9706204 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9706204 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9089096 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9089096 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9379264 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9379264 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8152607 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8152607 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9638363 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9638363 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9516596 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9516596 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8981207 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8981207 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8210319 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8210319 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9417707 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9417707 microseconds. Ignoring time.
- Discovered open port 5431/tcp on 94.141.221.39
- adjust_timeouts2: packet supposedly had rtt of 8223853 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8223853 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8923431 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8923431 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9705674 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9705674 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8298740 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8298740 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9753850 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9753850 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9070019 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9070019 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8611626 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8611626 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8838435 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8838435 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8776980 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8776980 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 9418015 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9418015 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8304185 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8304185 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8148124 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8148124 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8678896 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8678896 microseconds. Ignoring time.
- SYN Stealth Scan Timing: About 8.08% done; ETC: 07:28 (1:28:19 remaining)
- adjust_timeouts2: packet supposedly had rtt of 8749273 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8749273 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8756111 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8756111 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8631898 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8631898 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9193775 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9193775 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9683434 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9683434 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9413077 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9413077 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9977072 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9977072 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9724115 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9724115 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9734713 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9734713 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8652903 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8652903 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8947760 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8947760 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9931913 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9931913 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9709994 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9709994 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9992586 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9992586 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9581308 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9581308 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9273396 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9273396 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 8572561 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8572561 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8569735 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8569735 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 9470000 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9470000 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9873593 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9873593 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8837088 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8837088 microseconds. Ignoring time.
- Discovered open port 8080/tcp on 94.141.221.38
- adjust_timeouts2: packet supposedly had rtt of 8105726 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8105726 microseconds. Ignoring time.
- Discovered open port 9010/tcp on 94.141.221.22
- adjust_timeouts2: packet supposedly had rtt of 10049015 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 10049015 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9525135 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9525135 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8959406 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8959406 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8094163 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8094163 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9295363 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9295363 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9898448 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9898448 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9889708 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9889708 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9655085 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9655085 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8350830 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8350830 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 8517173 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8517173 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9056069 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9056069 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9917943 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9917943 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9932981 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9932981 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8731428 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8731428 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9403406 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9403406 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8333164 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8333164 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9861554 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9861554 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8731671 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8731671 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8171455 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8171455 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9452449 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9452449 microseconds. Ignoring time.
- SYN Stealth Scan Timing: About 10.38% done; ETC: 07:26 (1:23:29 remaining)
- Discovered open port 1864/tcp on 94.141.221.122
- adjust_timeouts2: packet supposedly had rtt of 8287051 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8287051 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8176358 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8176358 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8023773 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8023773 microseconds. Ignoring time.
- Discovered open port 88/tcp on 94.141.221.24
- adjust_timeouts2: packet supposedly had rtt of 9209873 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9209873 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8590749 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8590749 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9133430 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9133430 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8197567 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8197567 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Discovered open port 9010/tcp on 94.141.221.121
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Discovered open port 9010/tcp on 94.141.221.108
- adjust_timeouts2: packet supposedly had rtt of 8297798 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8297798 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8441002 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8441002 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9343292 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9343292 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9476931 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9476931 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8649520 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8649520 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8403144 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8403144 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9230715 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9230715 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9135401 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9135401 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8781759 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8781759 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9881102 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9881102 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9597854 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9597854 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9416796 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9416796 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9338333 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9338333 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8129628 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8129628 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9980346 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9980346 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8872226 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8872226 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9309324 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9309324 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9229083 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9229083 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8165044 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8165044 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8157229 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8157229 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9856594 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9856594 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8630353 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8630353 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9250125 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9250125 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9214775 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9214775 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8057130 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8057130 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8027416 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8027416 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9244432 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9244432 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8262582 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8262582 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9377097 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9377097 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9363278 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9363278 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8267162 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8267162 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8188812 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8188812 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8189808 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8189808 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 8374295 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8374295 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8330240 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8330240 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8366478 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8366478 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8052728 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8052728 microseconds. Ignoring time.
- Discovered open port 88/tcp on 94.141.221.182
- Discovered open port 88/tcp on 94.141.221.49
- Increasing send delay for 94.141.221.121 from 5 to 10 due to 11 out of 22 dropped probes since last increase.
- Increasing send delay for 94.141.221.116 from 5 to 10 due to 11 out of 21 dropped probes since last increase.
- adjust_timeouts2: packet supposedly had rtt of 8062426 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8062426 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8319283 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8319283 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8267362 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8267362 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8554497 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8554497 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9299893 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9299893 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8661111 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8661111 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8436185 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8436185 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8089477 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8089477 microseconds. Ignoring time.
- SYN Stealth Scan Timing: About 13.67% done; ETC: 07:24 (1:18:45 remaining)
- adjust_timeouts2: packet supposedly had rtt of 9114678 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9114678 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8829038 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8829038 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9078099 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9078099 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9267047 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9267047 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9320451 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9320451 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9334744 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9334744 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9471291 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9471291 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9053589 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9053589 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8317383 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8317383 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8440567 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8440567 microseconds. Ignoring time.
- Discovered open port 563/tcp on 94.141.221.182
- adjust_timeouts2: packet supposedly had rtt of 8844217 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8844217 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9521272 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9521272 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9039178 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9039178 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8400516 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8400516 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9149038 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9149038 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9116656 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9116656 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8154045 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8154045 microseconds. Ignoring time.
- Discovered open port 8002/tcp on 94.141.221.22
- adjust_timeouts2: packet supposedly had rtt of 9169711 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9169711 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8986294 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8986294 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8201030 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8201030 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9274744 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9274744 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9330368 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9330368 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9339531 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9339531 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9683685 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9683685 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9724899 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9724899 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9665043 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9665043 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9198584 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9198584 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8577548 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8577548 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8596607 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8596607 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9446639 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9446639 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9563525 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9563525 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9024417 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9024417 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8495307 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8495307 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8498955 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8498955 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9804593 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9804593 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9533421 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9533421 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9819705 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9819705 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9699582 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9699582 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8666868 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8666868 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9534336 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9534336 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9633988 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9633988 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9543584 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9543584 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9227613 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9227613 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8465738 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8465738 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8153534 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8153534 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9797490 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9797490 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9711184 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9711184 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9303393 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9303393 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8543899 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8543899 microseconds. Ignoring time.
- SYN Stealth Scan Timing: About 16.13% done; ETC: 07:21 (1:14:11 remaining)
- adjust_timeouts2: packet supposedly had rtt of 9655751 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9655751 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8462344 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8462344 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9616655 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9616655 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8459599 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8459599 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8067661 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8067661 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8055033 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8055033 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9495962 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9495962 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8281098 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8281098 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9764177 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9764177 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8675931 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8675931 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9858534 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9858534 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9951116 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9951116 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 10726722 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 10726722 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 10169116 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 10169116 microseconds. Ignoring time.
- Discovered open port 8002/tcp on 94.141.221.108
- adjust_timeouts2: packet supposedly had rtt of 8210018 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8210018 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 10059362 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 10059362 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8998857 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8998857 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8912792 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8912792 microseconds. Ignoring time.
- SYN Stealth Scan Timing: About 20.62% done; ETC: 07:20 (1:09:45 remaining)
- adjust_timeouts2: packet supposedly had rtt of 8989247 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8989247 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8436405 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8436405 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9021988 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9021988 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8891938 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8891938 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9738504 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9738504 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9666128 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9666128 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8704057 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8704057 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9254693 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9254693 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8561709 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8561709 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8110253 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8110253 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8111972 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8111972 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9301142 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9301142 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9400328 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9400328 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8120801 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8120801 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9909181 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9909181 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8762998 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8762998 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8369371 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8369371 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9641169 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9641169 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8521309 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8521309 microseconds. Ignoring time.
- Discovered open port 1099/tcp on 94.141.221.181
- Discovered open port 3128/tcp on 94.141.221.66
- adjust_timeouts2: packet supposedly had rtt of 9671322 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9671322 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8540701 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8540701 microseconds. Ignoring time.
- Discovered open port 81/tcp on 94.141.221.122
- SYN Stealth Scan Timing: About 24.35% done; ETC: 07:19 (1:05:18 remaining)
- adjust_timeouts2: packet supposedly had rtt of 9761035 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9761035 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9080043 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9080043 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9516019 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9516019 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9802683 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9802683 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9406685 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9406685 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8383379 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8383379 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Discovered open port 5001/tcp on 94.141.221.195
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Discovered open port 21/tcp on 94.141.221.195
- Discovered open port 3306/tcp on 94.141.221.195
- Discovered open port 49152/tcp on 94.141.221.191
- Discovered open port 5001/tcp on 94.141.221.38
- SYN Stealth Scan Timing: About 28.51% done; ETC: 07:18 (1:00:59 remaining)
- Discovered open port 8291/tcp on 94.141.221.179
- Discovered open port 81/tcp on 94.141.221.116
- Discovered open port 6000/tcp on 94.141.221.58
- Discovered open port 65000/tcp on 94.141.221.127
- Discovered open port 49152/tcp on 94.141.221.182
- SYN Stealth Scan Timing: About 32.57% done; ETC: 07:16 (0:56:39 remaining)
- Discovered open port 8291/tcp on 94.141.221.101
- Discovered open port 636/tcp on 94.141.221.182
- Discovered open port 8291/tcp on 94.141.221.38
- Discovered open port 49161/tcp on 94.141.221.191
- Discovered open port 1025/tcp on 94.141.221.58
- Discovered open port 8291/tcp on 94.141.221.150
- SYN Stealth Scan Timing: About 37.33% done; ETC: 07:16 (0:52:25 remaining)
- Discovered open port 8291/tcp on 94.141.221.49
- Increasing send delay for 94.141.221.66 from 0 to 5 due to max_successful_tryno increase to 5
- SYN Stealth Scan Timing: About 41.11% done; ETC: 07:14 (0:48:10 remaining)
- Increasing send delay for 94.141.221.66 from 5 to 10 due to max_successful_tryno increase to 6
- Warning: 94.141.221.66 giving up on port because retransmission cap hit (6).
- Discovered open port 1050/tcp on 94.141.221.3
- Discovered open port 464/tcp on 94.141.221.182
- Discovered open port 4443/tcp on 94.141.221.122
- SYN Stealth Scan Timing: About 44.95% done; ETC: 07:12 (0:43:59 remaining)
- Discovered open port 49154/tcp on 94.141.221.191
- Discovered open port 4002/tcp on 94.141.221.68
- Discovered open port 888/tcp on 94.141.221.49
- Discovered open port 49157/tcp on 94.141.221.182
- SYN Stealth Scan Timing: About 49.36% done; ETC: 07:11 (0:39:59 remaining)
- Discovered open port 49155/tcp on 94.141.221.191
- SYN Stealth Scan Timing: About 53.45% done; ETC: 07:10 (0:36:02 remaining)
- Discovered open port 49154/tcp on 94.141.221.182
- SYN Stealth Scan Timing: About 57.51% done; ETC: 07:08 (0:32:05 remaining)
- SYN Stealth Scan Timing: About 61.39% done; ETC: 07:06 (0:28:15 remaining)
- Discovered open port 2121/tcp on 94.141.221.43
- Discovered open port 2869/tcp on 94.141.221.191
- Discovered open port 20/tcp on 94.141.221.179
- Discovered open port 9011/tcp on 94.141.221.22
- Discovered open port 49160/tcp on 94.141.221.191
- SYN Stealth Scan Timing: About 65.57% done; ETC: 07:04 (0:24:34 remaining)
- Discovered open port 49155/tcp on 94.141.221.182
- Discovered open port 8800/tcp on 94.141.221.182
- SYN Stealth Scan Timing: About 70.30% done; ETC: 07:03 (0:20:56 remaining)
- Discovered open port 49153/tcp on 94.141.221.191
- Completed SYN Stealth Scan against 94.141.221.179 in 3058.14s (63 hosts left)
- Discovered open port 8000/tcp on 94.141.221.46
- Discovered open port 2049/tcp on 94.141.221.113
- Discovered open port 8085/tcp on 94.141.221.181
- SYN Stealth Scan Timing: About 74.94% done; ETC: 07:01 (0:17:19 remaining)
- Discovered open port 8000/tcp on 94.141.221.106
- Discovered open port 119/tcp on 94.141.221.182
- Discovered open port 9011/tcp on 94.141.221.108
- Discovered open port 1688/tcp on 94.141.221.113
- Discovered open port 6005/tcp on 94.141.221.113
- Discovered open port 9011/tcp on 94.141.221.121
- Discovered open port 1048/tcp on 94.141.221.113
- Discovered open port 464/tcp on 94.141.221.113
- Discovered open port 6007/tcp on 94.141.221.113
- Discovered open port 6006/tcp on 94.141.221.113
- Discovered open port 88/tcp on 94.141.221.113
- Discovered open port 8000/tcp on 94.141.221.127
- Discovered open port 1863/tcp on 94.141.221.122
- Discovered open port 3268/tcp on 94.141.221.113
- Discovered open port 3268/tcp on 94.141.221.182
- SYN Stealth Scan Timing: About 79.68% done; ETC: 07:01 (0:13:51 remaining)
- Discovered open port 49159/tcp on 94.141.221.182
- Discovered open port 10243/tcp on 94.141.221.191
- Discovered open port 5500/tcp on 94.141.221.193
- Increasing send delay for 94.141.221.191 from 0 to 5 due to max_successful_tryno increase to 5
- Increasing send delay for 94.141.221.191 from 5 to 10 due to max_successful_tryno increase to 6
- Warning: 94.141.221.191 giving up on port because retransmission cap hit (6).
- Discovered open port 808/tcp on 94.141.221.113
- Discovered open port 5500/tcp on 94.141.221.53
- SYN Stealth Scan Timing: About 84.59% done; ETC: 07:00 (0:10:22 remaining)
- Discovered open port 5000/tcp on 94.141.221.46
- Discovered open port 5500/tcp on 94.141.221.38
- Discovered open port 49153/tcp on 94.141.221.182
- Discovered open port 5000/tcp on 94.141.221.106
- Completed SYN Stealth Scan against 94.141.221.181 in 3504.79s (62 hosts left)
- Discovered open port 5222/tcp on 94.141.221.182
- Discovered open port 1047/tcp on 94.141.221.113
- Discovered open port 49158/tcp on 94.141.221.182
- Completed SYN Stealth Scan against 94.141.221.114 in 3535.67s (61 hosts left)
- Completed SYN Stealth Scan against 94.141.221.136 in 3540.09s (60 hosts left)
- Discovered open port 49165/tcp on 94.141.221.191
- Completed SYN Stealth Scan against 94.141.221.119 in 3581.87s (59 hosts left)
- Completed SYN Stealth Scan against 94.141.221.189 in 3583.09s (58 hosts left)
- SYN Stealth Scan Timing: About 89.55% done; ETC: 06:59 (0:06:59 remaining)
- Discovered open port 8000/tcp on 94.141.221.113
- Discovered open port 593/tcp on 94.141.221.182
- Discovered open port 3269/tcp on 94.141.221.182
- Completed SYN Stealth Scan against 94.141.221.22 in 3682.00s (57 hosts left)
- Completed SYN Stealth Scan against 94.141.221.31 in 3684.33s (56 hosts left)
- Completed SYN Stealth Scan against 94.141.221.195 in 3697.17s (55 hosts left)
- Discovered open port 389/tcp on 94.141.221.182
- Discovered open port 161/tcp on 94.141.221.144
- Discovered open port 4001/tcp on 94.141.221.68
- Completed SYN Stealth Scan against 94.141.221.18 in 3731.08s (54 hosts left)
- Completed SYN Stealth Scan against 94.141.221.80 in 3737.09s (53 hosts left)
- Completed SYN Stealth Scan against 94.141.221.3 in 3749.09s (52 hosts left)
- Completed SYN Stealth Scan against 94.141.221.46 in 3754.50s (51 hosts left)
- SYN Stealth Scan Timing: About 94.61% done; ETC: 06:59 (0:03:34 remaining)
- Completed SYN Stealth Scan against 94.141.221.106 in 3756.70s (50 hosts left)
- Completed SYN Stealth Scan against 94.141.221.34 in 3759.39s (49 hosts left)
- Discovered open port 8081/tcp on 94.141.221.93
- Completed SYN Stealth Scan against 94.141.221.93 in 3783.93s (48 hosts left)
- Completed SYN Stealth Scan against 94.141.221.144 in 3784.97s (47 hosts left)
- Completed SYN Stealth Scan against 94.141.221.157 in 3802.00s (46 hosts left)
- Completed SYN Stealth Scan against 94.141.221.146 in 3803.93s (45 hosts left)
- Completed SYN Stealth Scan against 94.141.221.99 in 3815.01s (44 hosts left)
- Completed SYN Stealth Scan against 94.141.221.24 in 3815.61s (43 hosts left)
- Increasing send delay for 94.141.221.131 from 0 to 5 due to max_successful_tryno increase to 5
- Completed SYN Stealth Scan against 94.141.221.137 in 3858.53s (42 hosts left)
- Increasing send delay for 94.141.221.131 from 5 to 10 due to max_successful_tryno increase to 6
- Warning: 94.141.221.131 giving up on port because retransmission cap hit (6).
- Discovered open port 161/tcp on 94.141.221.12
- Completed SYN Stealth Scan against 94.141.221.191 in 3870.22s (41 hosts left)
- Completed SYN Stealth Scan against 94.141.221.122 in 3878.66s (40 hosts left)
- Completed SYN Stealth Scan against 94.141.221.103 in 3882.64s (39 hosts left)
- Discovered open port 593/tcp on 94.141.221.113
- Discovered open port 161/tcp on 94.141.221.53
- Completed SYN Stealth Scan against 94.141.221.101 in 3902.43s (38 hosts left)
- Discovered open port 3269/tcp on 94.141.221.113
- Completed SYN Stealth Scan against 94.141.221.32 in 3906.93s (37 hosts left)
- Completed SYN Stealth Scan against 94.141.221.81 in 3911.41s (36 hosts left)
- Completed SYN Stealth Scan against 94.141.221.58 in 3918.38s (35 hosts left)
- Completed SYN Stealth Scan against 94.141.221.182 in 3920.52s (34 hosts left)
- Completed SYN Stealth Scan against 94.141.221.115 in 3923.90s (33 hosts left)
- Discovered open port 161/tcp on 94.141.221.38
- Completed SYN Stealth Scan against 94.141.221.150 in 3928.71s (32 hosts left)
- Completed SYN Stealth Scan against 94.141.221.120 in 3929.72s (31 hosts left)
- Completed SYN Stealth Scan against 94.141.221.79 in 3930.89s (30 hosts left)
- Discovered open port 389/tcp on 94.141.221.113
- Completed SYN Stealth Scan against 94.141.221.196 in 3935.49s (29 hosts left)
- Completed SYN Stealth Scan against 94.141.221.193 in 3938.46s (28 hosts left)
- Completed SYN Stealth Scan against 94.141.221.53 in 3940.47s (27 hosts left)
- Completed SYN Stealth Scan against 94.141.221.131 in 3941.45s (26 hosts left)
- Completed SYN Stealth Scan against 94.141.221.45 in 3941.99s (25 hosts left)
- Completed SYN Stealth Scan against 94.141.221.10 in 3944.37s (24 hosts left)
- Completed SYN Stealth Scan against 94.141.221.12 in 3946.28s (23 hosts left)
- Completed SYN Stealth Scan against 94.141.221.127 in 3946.28s (22 hosts left)
- Completed SYN Stealth Scan against 94.141.221.73 in 3947.17s (21 hosts left)
- Completed SYN Stealth Scan against 94.141.221.139 in 3953.20s (20 hosts left)
- Completed SYN Stealth Scan against 94.141.221.38 in 3956.80s (19 hosts left)
- Completed SYN Stealth Scan against 94.141.221.50 in 3966.05s (18 hosts left)
- Completed SYN Stealth Scan against 94.141.221.68 in 3966.62s (17 hosts left)
- Completed SYN Stealth Scan against 94.141.221.128 in 3971.28s (16 hosts left)
- SYN Stealth Scan Timing: About 98.16% done; ETC: 07:00 (0:01:14 remaining)
- Completed SYN Stealth Scan against 94.141.221.121 in 3973.61s (15 hosts left)
- Completed SYN Stealth Scan against 94.141.221.33 in 3973.74s (14 hosts left)
- Completed SYN Stealth Scan against 94.141.221.39 in 3981.10s (13 hosts left)
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Completed SYN Stealth Scan against 94.141.221.28 in 3989.18s (12 hosts left)
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Completed SYN Stealth Scan against 94.141.221.66 in 3989.83s (11 hosts left)
- Discovered open port 8081/tcp on 94.141.221.108
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Discovered open port 8081/tcp on 94.141.221.49
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- Completed SYN Stealth Scan against 94.141.221.108 in 4000.27s (10 hosts left)
- adjust_timeouts2: packet supposedly had rtt of 8014708 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8014708 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 8519186 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8519186 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8529448 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8529448 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8519710 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8519710 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8488708 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8488708 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8377764 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8377764 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8407052 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8407052 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8376661 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8376661 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8362087 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8362087 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 8252433 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8252433 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8327945 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8327945 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8231080 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8231080 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 8573194 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8573194 microseconds. Ignoring time.
- Completed SYN Stealth Scan against 94.141.221.19 in 4004.74s (9 hosts left)
- adjust_timeouts2: packet supposedly had rtt of 9179311 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9179311 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9188752 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9188752 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9093485 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9093485 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9081204 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9081204 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9084461 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9084461 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9063781 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9063781 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8921873 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8921873 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8401897 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8401897 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8364607 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8364607 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8344988 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8344988 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8312502 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8312502 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8279321 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8279321 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8271239 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8271239 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8248961 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8248961 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8263322 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8263322 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8176169 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8176169 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8175135 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8175135 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8096444 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8096444 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8084643 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8084643 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8074458 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8074458 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8028931 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8028931 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8071792 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8071792 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8023812 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8023812 microseconds. Ignoring time.
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 8072362 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8072362 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8247409 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8247409 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8192574 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8192574 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8202608 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8202608 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8398297 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8398297 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8437814 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8437814 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8459722 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8459722 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8666580 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8666580 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8695535 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8695535 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8609702 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8609702 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8628682 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8628682 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8612646 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8612646 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8629631 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8629631 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8621998 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8621998 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8619687 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8619687 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8377121 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8377121 microseconds. Ignoring time.
- Completed SYN Stealth Scan against 94.141.221.49 in 4007.55s (8 hosts left)
- Completed SYN Stealth Scan against 94.141.221.56 in 4008.27s (7 hosts left)
- Discovered open port 161/tcp on 94.141.221.43
- adjust_timeouts2: packet supposedly had rtt of 8112855 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8112855 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8107527 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8107527 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8076397 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8076397 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8029476 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8029476 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8029926 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8029926 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8039271 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8039271 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8328463 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8328463 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8292016 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8292016 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8275458 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8275458 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8251721 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8251721 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8212865 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8212865 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8165548 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8165548 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8259419 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8259419 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8177149 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8177149 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8148977 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8148977 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8245432 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8245432 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8261146 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8261146 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8229134 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8229134 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8103626 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8103626 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8101965 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8101965 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8299687 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8299687 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8261612 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8261612 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8198375 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8198375 microseconds. Ignoring time.
- Discovered open port 6002/tcp on 94.141.221.113
- Completed SYN Stealth Scan against 94.141.221.75 in 4017.11s (6 hosts left)
- Discovered open port 8008/tcp on 94.141.221.113
- adjust_timeouts2: packet supposedly had rtt of 8093236 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8093236 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8080208 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8080208 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8088911 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8088911 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8045043 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8045043 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8394546 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8394546 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8303043 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8303043 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8530313 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8530313 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8499064 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8499064 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8474306 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8474306 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8456193 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8456193 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8434425 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8434425 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8469042 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8469042 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8429478 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8429478 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8421439 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8421439 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8337322 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8337322 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8390586 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8390586 microseconds. Ignoring time.
- Completed SYN Stealth Scan against 94.141.221.43 in 4019.34s (5 hosts left)
- adjust_timeouts2: packet supposedly had rtt of 8353297 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8353297 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8315674 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8315674 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8309777 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8309777 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8316240 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8316240 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8271820 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8271820 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8286727 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8286727 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8254785 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8254785 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8282768 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8282768 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8224909 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8224909 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8209665 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8209665 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8141404 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8141404 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8344950 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8344950 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8285213 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8285213 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8186703 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8186703 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8196775 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8196775 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8379208 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8379208 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8345346 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8345346 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8376800 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8376800 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8350326 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8350326 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8521458 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8521458 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8513419 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8513419 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8482031 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8482031 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8445301 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8445301 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8484126 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8484126 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8435940 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8435940 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8475744 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8475744 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8429639 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8429639 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8439264 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8439264 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8399319 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8399319 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8364369 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8364369 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8381093 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8381093 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8328975 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8328975 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8228670 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8228670 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8336397 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8336397 microseconds. Ignoring time.
- Completed SYN Stealth Scan against 94.141.221.113 in 4021.89s (4 hosts left)
- adjust_timeouts2: packet supposedly had rtt of 8757565 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8757565 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8685300 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8685300 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8709291 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8709291 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8676393 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8676393 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8671105 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8671105 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8663481 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8663481 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8550286 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8550286 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8545900 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8545900 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8424383 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8424383 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8528631 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8528631 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8273128 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8273128 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8455661 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8455661 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8400184 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8400184 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8556761 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8556761 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8535605 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8535605 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8511293 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8511293 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8372286 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8372286 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8392526 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8392526 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8371086 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8371086 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8358342 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8358342 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8340485 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8340485 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8307662 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8307662 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8317926 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8317926 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8213475 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8213475 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8232438 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8232438 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8241383 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8241383 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8002205 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8002205 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8002103 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8002103 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8041141 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8041141 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8045594 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8045594 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8066404 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8066404 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8895391 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8895391 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8902755 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8902755 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8852911 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8852911 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8846524 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8846524 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8851773 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8851773 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8607915 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8607915 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8728755 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8728755 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9434973 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9434973 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9405335 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9405335 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9736497 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9736497 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9515584 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9515584 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9489256 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9489256 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9652223 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9652223 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9623316 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9623316 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9574164 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9574164 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9558953 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9558953 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9542937 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9542937 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9604473 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9604473 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9641254 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9641254 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9563009 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9563009 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9561006 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9561006 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9552085 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9552085 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9480627 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9480627 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9607688 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9607688 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9773702 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9773702 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9761862 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9761862 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9759383 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9759383 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9661992 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9661992 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9821764 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9821764 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9668978 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9668978 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9662738 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9662738 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9773908 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9773908 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9717869 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9717869 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9713951 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9713951 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9729391 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9729391 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9695391 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9695391 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9649889 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9649889 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9645069 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9645069 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9659183 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9659183 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9679052 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9679052 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9660085 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9660085 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9655262 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9655262 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9656147 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9656147 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9659370 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9659370 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9652370 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9652370 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9656931 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9656931 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9633048 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9633048 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9608862 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9608862 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9568066 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9568066 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9573365 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9573365 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9526926 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9526926 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9453956 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9453956 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9451805 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9451805 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9397597 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9397597 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9337097 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9337097 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9355072 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9355072 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9266934 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9266934 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9018785 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9018785 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9000451 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9000451 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8991618 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8991618 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9065387 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9065387 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9021735 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9021735 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9026709 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9026709 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9049103 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9049103 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9056894 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9056894 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9063919 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9063919 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9013905 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9013905 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9036835 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9036835 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9020776 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9020776 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9018942 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9018942 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9007198 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9007198 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8987211 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8987211 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8938984 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8938984 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8941530 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8941530 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8896890 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8896890 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8878151 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8878151 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8837731 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8837731 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8792733 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8792733 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8746685 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8746685 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8675618 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8675618 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8768781 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8768781 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8535434 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8535434 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8475553 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8475553 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8478377 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8478377 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8478741 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8478741 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8477608 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8477608 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8454596 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8454596 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8482565 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8482565 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8473886 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8473886 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8421562 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8421562 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8415916 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8415916 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8439122 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8439122 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8435648 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8435648 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8423673 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8423673 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8411236 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8411236 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8385158 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8385158 microseconds. Ignoring time.
- SYN Stealth Scan Timing: About 99.16% done; ETC: 07:00 (0:00:34 remaining)
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
- adjust_timeouts2: packet supposedly had rtt of 8275271 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8275271 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8660644 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8660644 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9680247 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9680247 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9665637 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9665637 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9885846 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9885846 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9940838 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9940838 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9912857 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9912857 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9942766 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9942766 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9930646 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9930646 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9926460 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9926460 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9920835 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9920835 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9944054 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9944054 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9944616 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9944616 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9935390 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9935390 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9892897 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9892897 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9909933 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9909933 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9907554 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9907554 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9906774 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9906774 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9904096 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9904096 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9935597 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9935597 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9931677 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9931677 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9933149 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9933149 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9883805 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9883805 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9907599 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9907599 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9897591 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9897591 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9904803 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9904803 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9912259 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9912259 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9840078 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9840078 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9625050 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9625050 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9615088 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9615088 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9629740 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9629740 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9557957 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9557957 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9588935 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9588935 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9629834 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9629834 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9602262 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9602262 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9625515 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9625515 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9597096 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9597096 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9568078 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9568078 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9577272 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9577272 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9511342 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9511342 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9380516 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9380516 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9363842 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9363842 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9346338 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9346338 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9343741 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9343741 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9347195 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9347195 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9343510 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9343510 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9368317 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9368317 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9371516 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9371516 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9373809 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9373809 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9384810 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9384810 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9390351 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9390351 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9392114 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9392114 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9407363 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9407363 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9338731 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9338731 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9365855 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9365855 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9352358 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9352358 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9364629 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9364629 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9358498 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9358498 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9369037 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9369037 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9364563 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9364563 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9374257 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9374257 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9325682 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9325682 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9314146 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9314146 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9310959 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9310959 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9336925 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9336925 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9337168 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9337168 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9256510 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9256510 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9109425 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9109425 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9101816 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9101816 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9112657 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9112657 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9050885 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9050885 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9053515 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9053515 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9060918 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9060918 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9034683 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9034683 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9059143 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9059143 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9030546 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9030546 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9016996 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9016996 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9031702 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9031702 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9048696 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9048696 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8984807 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8984807 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8851363 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8851363 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8847857 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8847857 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8825222 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8825222 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8828878 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8828878 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8830883 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8830883 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8850150 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8850150 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8863923 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8863923 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8888590 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8888590 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8880496 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8880496 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8892782 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8892782 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8903000 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8903000 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8894839 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8894839 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8906366 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8906366 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8859093 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8859093 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8872100 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8872100 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8875806 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8875806 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8868808 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8868808 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9151447 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9151447 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9158194 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9158194 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9169989 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9169989 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9155567 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9155567 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9158202 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9158202 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9149849 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 9149849 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8367622 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8367622 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8367753 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8367753 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8379736 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8379736 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8396557 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8396557 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8387890 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8387890 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8396346 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8396346 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8403319 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8403319 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8429860 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8429860 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8028531 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8028531 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8018914 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 8018914 microseconds. Ignoring time.
- Discovered open port 100/tcp on 94.141.221.161
- Completed SYN Stealth Scan against 94.141.221.161 in 4104.18s (3 hosts left)
- Completed SYN Stealth Scan against 94.141.221.118 in 4297.78s (2 hosts left)
- Completed SYN Stealth Scan against 94.141.221.116 in 4504.33s (1 host left)
- Increasing send delay for 94.141.221.132 from 0 to 5 due to 289 out of 722 dropped probes since last increase.
- Increasing send delay for 94.141.221.132 from 5 to 10 due to 11 out of 11 dropped probes since last increase.
- Completed SYN Stealth Scan at 07:16, 5000.10s elapsed (64000 total ports)
- Initiating Service scan at 07:16
- Scanning 160 services on 64 hosts
- WARNING: Service 94.141.221.38:5500 had already soft-matched rtsp, but now soft-matched sip; ignoring second value
- WARNING: Service 94.141.221.53:5500 had already soft-matched rtsp, but now soft-matched sip; ignoring second value
- Service scan Timing: About 33.12% done; ETC: 07:17 (0:01:03 remaining)
- Service scan Timing: About 63.75% done; ETC: 07:18 (0:00:54 remaining)
- Service scan Timing: About 78.75% done; ETC: 07:19 (0:00:40 remaining)
- Completed Service scan at 07:21, 294.61s elapsed (160 services on 64 hosts)
- Initiating OS detection (try #1) against 64 hosts
- Completed os scan against 94.141.221.10 in 113.221s (63 hosts left)
- Completed os scan against 94.141.221.32 in 113.221s (62 hosts left)
- Completed os scan against 94.141.221.34 in 113.221s (61 hosts left)
- Completed os scan against 94.141.221.45 in 113.221s (60 hosts left)
- Completed os scan against 94.141.221.73 in 113.221s (59 hosts left)
- Completed os scan against 94.141.221.80 in 113.221s (58 hosts left)
- Completed os scan against 94.141.221.103 in 113.221s (57 hosts left)
- Completed os scan against 94.141.221.114 in 113.221s (56 hosts left)
- Completed os scan against 94.141.221.119 in 113.221s (55 hosts left)
- Completed os scan against 94.141.221.120 in 113.221s (54 hosts left)
- Completed os scan against 94.141.221.128 in 113.221s (53 hosts left)
- Completed os scan against 94.141.221.131 in 113.221s (52 hosts left)
- Completed os scan against 94.141.221.146 in 113.221s (51 hosts left)
- Completed os scan against 94.141.221.189 in 113.221s (50 hosts left)
- Retrying OS detection (try #2) against 50 hosts
- Initiating Traceroute at 07:23
- Completed Traceroute at 07:26, 140.28s elapsed
- Initiating Parallel DNS resolution of 68 hosts. at 07:26
- Completed Parallel DNS resolution of 68 hosts. at 07:26, 13.11s elapsed
- NSE: Script scanning 64 hosts.
- Initiating NSE at 07:26
- Completed NSE at 07:31, 292.28s elapsed
- Initiating NSE at 07:31
- Completed NSE at 07:31, 0.03s elapsed
- Nmap scan report for 94.141.221.3
- Host is up (0.36s latency).
- Not shown: 978 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp filtered http
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 587/tcp filtered submission
- 1050/tcp open http mini_httpd 1.19 19dec2003
- | giop-info:
- |_ ERROR: Failed to read Packet.GIOP
- | http-auth:
- | HTTP/1.1 401 Unauthorized
- |_ Digest realm=dirname algorithm=MD5 uri=/ qop=auth nonce=5f6d7579141ef284a3d54245005570a8 opaque=0123456789987654
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: mini_httpd/1.19 19dec2003
- |_http-title: 401 Unauthorized
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5060/tcp filtered sip
- Aggressive OS guesses: Asus RT-AC66U router (Linux 2.6) (94%), Asus RT-N16 WAP (Linux 2.6) (94%), Asus RT-N66U WAP (Linux 2.6) (94%), Tomato 1.28 (Linux 2.6.22) (94%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (94%), HP P2000 G3 NAS device (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (93%), Linksys WRV54G WAP (93%), Linux 2.4.18 (92%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 65.963 days (since Thu Sep 17 09:24:25 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=169 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 314.88 ms 94.141.221.3
- Nmap scan report for 94.141.221.10
- Host is up (1.2s latency).
- Not shown: 999 filtered ports
- PORT STATE SERVICE VERSION
- 631/tcp closed ipp
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 631/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 30
- Nmap scan report for 94.141.221.12
- Host is up (0.40s latency).
- Not shown: 997 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.12/
- 80/tcp open http Virtual Web 0.9
- |_http-favicon: Unknown favicon MD5: D7C6D6BADE16E3D2417E661EC7E68B93
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Virtual Web 0.9
- |_http-title: Site doesn't have a title (text/html).
- 161/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.12/
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC1%P=x86_64-pc-linux-gnu%
- SF:r(GetRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Virtual\x20Web\x
- SF:200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent-Type:\x20text
- SF:/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html><head><meta\x2
- SF:0HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x20language='jav
- SF:ascript'>parent\.location=\"/login\.htm\"</script></head><body></body><
- SF:/html>")%r(HTTPOptions,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
- SF::\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Req
- SF:uest\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\
- SF:n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HT
- SF:ML>\n")%r(RTSPRequest,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
- SF:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Requ
- SF:est\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n
- SF:</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTM
- SF:L>\n")%r(FourOhFourRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Vi
- SF:rtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent
- SF:-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html>
- SF:<head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x2
- SF:0language='javascript'>parent\.location=\"/login\.htm\"</script></head>
- SF:<body></body></html>")%r(GenericLines,C1,"HTTP/1\.1\x20400\x20Bad\x20Re
- SF:quest\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>40
- SF:0\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Ba
- SF:d\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>
- SF:\x20</BODY></HTML>\n")%r(SIPOptions,114,"HTTP/1\.1\x20200\x20OK\r\nServ
- SF:er:\x20Virtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r
- SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\
- SF:r\n<html><head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><
- SF:script\x20language='javascript'>parent\.location=\"/login\.htm\"</scrip
- SF:t></head><body></body></html>");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Linux 2.6.X|3.X (87%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
- Aggressive OS guesses: Linux 2.6.32 (87%), Linux 3.10 (87%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.756 days (since Sat Nov 21 13:22:50 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=238 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 362.62 ms 94.141.221.12
- Nmap scan report for 94.141.221.18
- Host is up (0.44s latency).
- All 1000 scanned ports on 94.141.221.18 are filtered
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 129.35 ms 172.20.32.1
- 2 125.61 ms 208.68.88.113
- 3 154.35 ms bb1.yyz01.3z.ca (208.68.88.1)
- 4 130.38 ms cr1.yyz01.3z.ca (208.68.88.178)
- 5 245.23 ms toro-b1-link.telia.net (213.248.98.241)
- 6 141.54 ms level3-ic-305926-toro-b1.c.telia.net (62.115.41.182)
- 7 215.87 ms ae-226-3602.edge3.London15.Level3.net (4.69.167.94)
- 8 233.35 ms ae-227-3603.edge3.London15.Level3.net (4.69.167.98)
- 9 264.80 ms PCCW-GLOBAL.edge3.London15.Level3.net (212.187.139.86)
- 10 281.39 ms cyprus.te7-8.br03.ldn01.pccwbtn.net (63.218.34.58)
- 11 337.55 ms 82.137.192.225
- 12 ... 15
- 16 345.65 ms 94.141.221.18
- Nmap scan report for 94.141.221.19
- Host is up (0.47s latency).
- Not shown: 867 filtered ports, 131 closed ports
- PORT STATE SERVICE VERSION
- 21/tcp open tcpwrapped
- |_ftp-anon: ERROR: Script execution failed (use -d to debug)
- 8080/tcp open tcpwrapped
- Device type: broadband router|firewall|WAP
- Running (JUST GUESSING): ZyXEL ZyNOS 3.X|4.X (94%), ZyXEL embedded (90%)
- OS CPE: cpe:/o:zyxel:zynos cpe:/o:zyxel:zynos:3 cpe:/h:zyxel:p-2602h-d1a cpe:/o:zyxel:zynos:4
- Aggressive OS guesses: ZyXEL Prestige 660HW-61 ADSL router (ZyNOS 3.40) (94%), ZyXEL ZyWALL 2 firewall or Prestige 660HW-61 ADSL router (ZyNOS 3.62) (90%), ZyXEL ZyNOS 3.40 (90%), ZyXEL P-2602H-D1A DSL modem (90%), ZyXEL Prestige 660HW-D1 wireless ADSL router (89%), ZyXEL ZyWALL 5 firewall (89%), ZyXEL ZyWALL 2, 5, or 70 firewall (ZyNOS 4.04) (88%), ZyXEL G-3000H WAP (ZyNOS 3.50) (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=17 (Good luck!)
- IP ID Sequence Generation: Incremental
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 403.53 ms 94.141.221.19
- Nmap scan report for 94.141.221.22
- Host is up (0.38s latency).
- Not shown: 975 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open http Boa HTTPd 0.94.14rc21
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: Boa/0.94.14rc21
- |_http-title: main page
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5060/tcp filtered sip
- 5989/tcp filtered wbem-https
- 6881/tcp filtered bittorrent-tracker
- 8002/tcp open teradataordbms?
- 9010/tcp open sdr?
- 9011/tcp open unknown
- Aggressive OS guesses: Linux 2.6.15 (likely TP-LINK WAP) (90%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (90%), Linux 2.6.9 (CentOS 4.3) (89%), Riverbed Steelhead proxy server (89%), Ruckus ZD1050 WAP (89%), Linux 2.6.20 (89%), Linux 2.6.20 (Ubuntu, x86_64) (89%), Linux 2.6.21 (89%), Linux 2.6.22 (89%), Linux 2.6.27 (Ubuntu 8.10) (89%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.645 days (since Sat Nov 21 16:01:54 2015)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=175 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 384.52 ms 94.141.221.22
- Nmap scan report for 94.141.221.24
- Host is up (0.43s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http mini_httpd 1.19 19dec2003
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: mini_httpd/1.19 19dec2003
- |_http-title: Site doesn't have a title (text/html; charset=utf-8).
- 88/tcp open http mini_httpd 1.19 19dec2003
- | http-auth:
- | HTTP/1.1 401 Unauthorized
- |_ Basic realm=.
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: mini_httpd/1.19 19dec2003
- |_http-title: 401 Unauthorized
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linksys WRV54G WAP (92%), Crestron XPanel control system (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (89%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (89%), MikroTik RouterOS 4.9 (Linux 2.6) (88%), Linux 2.4.18 (88%), OpenWrt White Russian 0.9 (Linux 2.4.30) (87%), HP P2000 G3 NAS device (86%), Asus RT-AC66U router (Linux 2.6) (86%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (86%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 2.630 days (since Thu Nov 19 16:23:30 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=184 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 416.37 ms 94.141.221.24
- Nmap scan report for 94.141.221.28
- Host is up (1.7s latency).
- All 1000 scanned ports on 94.141.221.28 are filtered
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 325.65 ms 94.141.221.28
- Nmap scan report for 94.141.221.31
- Host is up (0.36s latency).
- Not shown: 979 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open http Virtual Web 0.9
- |_http-favicon: Unknown favicon MD5: D7C6D6BADE16E3D2417E661EC7E68B93
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Virtual Web 0.9
- |_http-title: Site doesn't have a title (text/html).
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 554/tcp open rtsp D-Link DCS-2130 or Pelco IDE10DN webcam rtspd
- |_rtsp-methods: OPTIONS, DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, GET_PARAMETER, SET_PARAMETER
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5060/tcp filtered sip
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC2%P=x86_64-pc-linux-gnu%
- SF:r(GetRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Virtual\x20Web\x
- SF:200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent-Type:\x20text
- SF:/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html><head><meta\x2
- SF:0HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x20language='jav
- SF:ascript'>parent\.location=\"/login\.htm\"</script></head><body></body><
- SF:/html>")%r(HTTPOptions,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
- SF::\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Req
- SF:uest\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\
- SF:n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HT
- SF:ML>\n")%r(RTSPRequest,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
- SF:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Requ
- SF:est\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n
- SF:</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTM
- SF:L>\n")%r(FourOhFourRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Vi
- SF:rtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent
- SF:-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html>
- SF:<head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x2
- SF:0language='javascript'>parent\.location=\"/login\.htm\"</script></head>
- SF:<body></body></html>")%r(GenericLines,C1,"HTTP/1\.1\x20400\x20Bad\x20Re
- SF:quest\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>40
- SF:0\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Ba
- SF:d\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>
- SF:\x20</BODY></HTML>\n")%r(SIPOptions,114,"HTTP/1\.1\x20200\x20OK\r\nServ
- SF:er:\x20Virtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r
- SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\
- SF:r\n<html><head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><
- SF:script\x20language='javascript'>parent\.location=\"/login\.htm\"</scrip
- SF:t></head><body></body></html>");
- Device type: switch|firewall|WAP|router
- Running (JUST GUESSING): D-Link embedded (87%), SonicWALL SonicOS 4.X (85%), Netgear embedded (85%), Asus Linux 2.6.X (85%), Linux 2.6.X (85%)
- OS CPE: cpe:/h:dlink:des-3526 cpe:/o:sonicwall:sonicos:4 cpe:/h:netgear:wgr614v7 cpe:/o:asus:linux_kernel:2.6 cpe:/h:asus:rt-n16 cpe:/o:linux:linux_kernel:2.6.22
- Aggressive OS guesses: D-Link DES-3526 switch (87%), D-Link DES-3028P switch (86%), SonicWALL TZ 190 firewall (SonicOS Enhanced 4.0) (85%), Netgear WGR614v7 wireless broadband router (85%), Asus RT-AC66U router (Linux 2.6) (85%), Asus RT-N16 WAP (Linux 2.6) (85%), Asus RT-N66U WAP (Linux 2.6) (85%), Tomato 1.28 (Linux 2.6.22) (85%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.861 days (since Sat Nov 21 10:51:32 2015)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=124 (Good luck!)
- IP ID Sequence Generation: Incrementing by 2
- Service Info: Device: webcam; CPE: cpe:/h:pelco:ide10dn
- TRACEROUTE (using port 113/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 375.02 ms 94.141.221.31
- Nmap scan report for 94.141.221.32
- Host is up (0.37s latency).
- All 1000 scanned ports on 94.141.221.32 are filtered (860) or closed (140)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 331.61 ms 94.141.221.32
- Nmap scan report for 94.141.221.33
- Host is up (0.37s latency).
- Not shown: 999 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http Virtual Web 0.9
- |_http-favicon: Unknown favicon MD5: D7C6D6BADE16E3D2417E661EC7E68B93
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Virtual Web 0.9
- |_http-title: Site doesn't have a title (text/html).
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC1%P=x86_64-pc-linux-gnu%
- SF:r(GetRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Virtual\x20Web\x
- SF:200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent-Type:\x20text
- SF:/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html><head><meta\x2
- SF:0HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x20language='jav
- SF:ascript'>parent\.location=\"/login\.htm\"</script></head><body></body><
- SF:/html>")%r(HTTPOptions,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
- SF::\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Req
- SF:uest\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\
- SF:n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HT
- SF:ML>\n")%r(RTSPRequest,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
- SF:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Requ
- SF:est\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n
- SF:</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTM
- SF:L>\n")%r(FourOhFourRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Vi
- SF:rtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent
- SF:-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html>
- SF:<head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x2
- SF:0language='javascript'>parent\.location=\"/login\.htm\"</script></head>
- SF:<body></body></html>")%r(GenericLines,C1,"HTTP/1\.1\x20400\x20Bad\x20Re
- SF:quest\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>40
- SF:0\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Ba
- SF:d\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>
- SF:\x20</BODY></HTML>\n")%r(SIPOptions,114,"HTTP/1\.1\x20200\x20OK\r\nServ
- SF:er:\x20Virtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r
- SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\
- SF:r\n<html><head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><
- SF:script\x20language='javascript'>parent\.location=\"/login\.htm\"</scrip
- SF:t></head><body></body></html>");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: switch|VoIP adapter
- Running (JUST GUESSING): D-Link embedded (91%), 3Com embedded (85%), Allied Telesyn embedded (85%)
- OS CPE: cpe:/h:dlink:des-3028p cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:dvg-4022s
- Aggressive OS guesses: D-Link DES-3028P switch (91%), D-Link DES-3526 switch (90%), D-Link DES-3326 switch (89%), 3Com 3924 switch (85%), Allied Telesyn AT-GS950 or D-Link DES-3226L switch (85%), D-Link DES-3010F or DES-3010G switch (85%), D-Link DES-3010G switch (85%), D-Link DES-3526 or DES-3550 switch (85%), D-Link DES-3550 switch (85%), D-Link DGS-3024 switch (85%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.502 days (since Sat Nov 21 19:28:30 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=135 (Good luck!)
- IP ID Sequence Generation: Incrementing by 2
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 358.14 ms 94.141.221.33
- Nmap scan report for 94.141.221.34
- Host is up (0.41s latency).
- Not shown: 999 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open tcpwrapped
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: specialized|WAP|phone
- Running: iPXE 1.X, Linksys Linux 2.4.X, Linux 2.6.X, Sony Ericsson embedded
- OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linksys:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6 cpe:/h:sonyericsson:u8i_vivaz
- OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 30
- Nmap scan report for 94.141.221.38
- Host is up (0.36s latency).
- Not shown: 975 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 21/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.38/
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 161/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.38/
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5001/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.38/
- 5060/tcp filtered sip
- 5500/tcp open rtsp
- |_rtsp-methods: ERROR: Script execution failed (use -d to debug)
- 8080/tcp open http Tenda N60 WAP http admin
- |_http-methods: No Allow or Public header in OPTIONS response (status code 400)
- |_http-title: Did not follow redirect to http://94.141.221.38/login.asp
- 8291/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.38/
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port5500-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC3%P=x86_64-pc-linux-gn
- SF:u%r(GenericLines,FC,"\x20501\x20Not\x20Implemented\r\nContent-Type:\x20
- SF:text/html\r\nConnection:\x20close\r\nContent-Length:\x20149\r\nServer:\
- SF:x201\.0\x20\r\n\r\n<HTML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE>
- SF:</HEAD><BODY><H1>Not\x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20
- SF:not\x20implemented\x20by\x20this\x20server\.</BODY></HTML>\r\n")%r(GetR
- SF:equest,EF,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/ht
- SF:ml\r\nConnection:\x20close\r\nContent-Length:\x20134\r\nServer:\x201\.0
- SF:\x20\r\n\r\n<HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY>
- SF:<H1>Not\x20Found</H1>The\x20requested\x20URL\x20was\x20not\x20found\x20
- SF:on\x20this\x20server\.</BODY></HTML>\r\n")%r(HTTPOptions,104,"HTTP/1\.0
- SF:\x20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConnecti
- SF:on:\x20close\r\nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<H
- SF:TML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\
- SF:x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x2
- SF:0by\x20this\x20server\.</BODY></HTML>\r\n")%r(RTSPRequest,104,"RTSP/1\.
- SF:0\x20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConnect
- SF:ion:\x20close\r\nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<
- SF:HTML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not
- SF:\x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x
- SF:20by\x20this\x20server\.</BODY></HTML>\r\n")%r(FourOhFourRequest,EF,"HT
- SF:TP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/html\r\nConnect
- SF:ion:\x20close\r\nContent-Length:\x20134\r\nServer:\x201\.0\x20\r\n\r\n<
- SF:HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY><H1>Not\x20Fo
- SF:und</H1>The\x20requested\x20URL\x20was\x20not\x20found\x20on\x20this\x2
- SF:0server\.</BODY></HTML>\r\n")%r(SIPOptions,103,"SIP/2\.0\x20501\x20Not\
- SF:x20Implemented\r\nContent-Type:\x20text/html\r\nConnection:\x20close\r\
- SF:nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<HTML><HEAD><TITL
- SF:E>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20Implemented<
- SF:/H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\x20
- SF:server\.</BODY></HTML>\r\n");
- Aggressive OS guesses: Linux 2.6.32 (95%), Linux 2.6.32 - 3.13 (94%), Linux 2.6.32 - 2.6.39 (94%), Linux 2.6.32 - 3.1 (94%), Linux 2.6.39 (94%), HP P2000 G3 NAS device (93%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.9 (92%), Linux 3.10 (92%), Linux 3.11 (92%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.064 days (since Sun Nov 22 05:59:29 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=230 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Device: WAP; CPE: cpe:/h:tenda:n60
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 338.56 ms 94.141.221.38
- Nmap scan report for 94.141.221.39
- Host is up (0.41s latency).
- Not shown: 978 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 21/tcp open tcpwrapped
- |_ftp-anon: ERROR: Script execution failed (use -d to debug)
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open tcpwrapped
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5060/tcp filtered sip
- 5431/tcp open tcpwrapped
- OS fingerprint not ideal because: maxTimingRatio (1.297600e+01) is greater than 1.4
- No OS matches for host
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 30
- Nmap scan report for 94.141.221.43
- Host is up (0.37s latency).
- Not shown: 858 filtered ports, 138 closed ports
- PORT STATE SERVICE VERSION
- 21/tcp open tcpwrapped
- |_ftp-anon: ERROR: Script execution failed (use -d to debug)
- 80/tcp open tcpwrapped
- 161/tcp open tcpwrapped
- 2121/tcp open tcpwrapped
- OS fingerprint not ideal because: maxTimingRatio (1.283400e+01) is greater than 1.4
- No OS matches for host
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 30
- Nmap scan report for 94.141.221.45
- Host is up (0.36s latency).
- All 1000 scanned ports on 94.141.221.45 are filtered
- Device type: switch|VoIP adapter|VoIP phone
- Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded, HP embedded, Xylan embedded
- OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000 cpe:/h:xylan:omnistack_4024cf
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-11 are the same as for 94.141.221.18
- 12 ... 15
- 16 363.33 ms 94.141.221.45
- Nmap scan report for 94.141.221.46
- Host is up (0.36s latency).
- Not shown: 977 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open http Boa HTTPd 0.94.13
- |_http-favicon: Unknown favicon MD5: E6D3B3FF180103E14C19E5C297678C9F
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: Boa/0.94.13
- |_http-title: Site doesn't have a title (text/html).
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5000/tcp open upnp?
- 5060/tcp filtered sip
- 8000/tcp open http-alt?
- 10002/tcp open documentum?
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port5000-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC2%P=x86_64-pc-linux-gn
- SF:u%r(NULL,2C,"\0\0\0\(\0\0\0\0\xcf\x01\x20\0ff774297\0\0\0\0\0\0\0\0\0\0
- SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0")%r(GenericLines,2C,"\0\0\0\(\0\0\0\0\xcf\
- SF:x01\x20\0ff774297\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0")%r(S
- SF:MBProgNeg,2C,"\0\0\0\(\0\0\0\0\xcf\x01\x20\0ff774297\0\0\0\0\0\0\0\0\0\
- SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0")%r(ZendJavaBridge,2C,"\0\0\0\(\0\0\0\0\x
- SF:cf\x01\x20\0ff774297\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0")%
- SF:r(Kerberos,2C,"\0\0\0\(\0\0\0\0\xcf\x01\x20\0ff774297\0\0\0\0\0\0\0\0\0
- SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0");
- Aggressive OS guesses: HP P2000 G3 NAS device (97%), MikroTik RouterOS 6.19 (Linux 3.3.5) (94%), Linux 2.6.32 - 3.13 (94%), Linux 2.6.32 - 2.6.39 (94%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.9 (92%), Linux 2.6.32 (92%), Linux 3.10 (92%), Linux 3.2 (91%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (91%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 2.807 days (since Thu Nov 19 12:08:31 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=232 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 319.41 ms 94.141.221.46
- Nmap scan report for 94.141.221.49
- Host is up (0.35s latency).
- Not shown: 989 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open tcpwrapped
- 88/tcp open http BusyBox httpd
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-title: \xE6\x97\xA0\xE6\xA0\x87\xE9\xA2\x98\xE9\xA1\xB5
- 888/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
- |_http-title: ::: Login :::
- 1863/tcp closed msnp
- 1864/tcp closed paradym-31
- 3389/tcp open ms-wbt-server Microsoft Terminal Service
- 4443/tcp closed pharos
- 5190/tcp closed aol
- 5566/tcp closed westec-connect
- 8081/tcp open blackice-icecap?
- 8291/tcp open unknown
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port8081-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC7%P=x86_64-pc-linux-gn
- SF:u%r(GetRequest,4A,"HTTP/1\.1\x20503\x20Service\x20Unavailable\r\nConnec
- SF:tion:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(FourOhFourRequest,4A
- SF:,"HTTP/1\.1\x20503\x20Service\x20Unavailable\r\nConnection:\x20Close\r\
- SF:nContent-Length:\x200\r\n\r\n")%r(SIPOptions,4A,"HTTP/1\.1\x20503\x20Se
- SF:rvice\x20Unavailable\r\nConnection:\x20Close\r\nContent-Length:\x200\r\
- SF:n\r\n")%r(WWWOFFLEctrlstat,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x
- SF:20Error\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(Gen
- SF:ericLines,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConnec
- SF:tion:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(HTTPOptions,4A,"HTTP
- SF:/1\.1\x20503\x20Service\x20Unavailable\r\nConnection:\x20Close\r\nConte
- SF:nt-Length:\x200\r\n\r\n")%r(RTSPRequest,4A,"HTTP/1\.1\x20503\x20Service
- SF:\x20Unavailable\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n
- SF:")%r(RPCCheck,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nCo
- SF:nnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(DNSVersionBindRe
- SF:q,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConnection:\x2
- SF:0Close\r\nContent-Length:\x200\r\n\r\n")%r(DNSStatusRequest,4C,"HTTP/1\
- SF:.1\x20500\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\nCon
- SF:tent-Length:\x200\r\n\r\n")%r(Help,4C,"HTTP/1\.1\x20500\x20Internal\x20
- SF:Server\x20Error\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n
- SF:")%r(SSLSessionReq,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\
- SF:r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(TLSSessionR
- SF:eq,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConnection:\x
- SF:20Close\r\nContent-Length:\x200\r\n\r\n")%r(Kerberos,4C,"HTTP/1\.1\x205
- SF:00\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\nContent-Le
- SF:ngth:\x200\r\n\r\n")%r(SMBProgNeg,4C,"HTTP/1\.1\x20500\x20Internal\x20S
- SF:erver\x20Error\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n"
- SF:)%r(X11Probe,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nCon
- SF:nection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(LPDString,4C,"HTT
- SF:P/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\
- SF:nContent-Length:\x200\r\n\r\n");
- Device type: WAP|general purpose|printer|power-device|storage-misc|remote management|broadband router
- Running (JUST GUESSING): Linux 2.4.X|2.6.X (94%), Epson embedded (91%), Raritan embedded (91%), Linksys Linux 2.4.X (91%), HP embedded (91%), Dell embedded (90%), AVM embedded (89%)
- OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:epson:artisan_810 cpe:/o:linux:linux_kernel:2.6.23 cpe:/o:linksys:linux_kernel:2.4 cpe:/h:hp:p2000_g3 cpe:/h:dell:remote_access_card:5 cpe:/h:avm:fritz%21box_fon_7170
- Aggressive OS guesses: OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), Linux 2.4.21 - 2.4.31 (likely embedded) (93%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (92%), Epson Artisan 810 printer (91%), Linux 2.4.27 (91%), Linux 2.6.23 (91%), Linux 2.6.23-gentoo-r3 (91%), Linux 2.6.8 - 2.6.30 (91%), Raritan Dominion PX DPXR20-20L power control unit (91%), OpenWrt White Russian 0.9 (Linux 2.4.30) (91%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 72.694 days (since Thu Sep 10 15:51:55 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=183 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OSs: Linux, Windows; Devices: media device, webcam; CPE: cpe:/o:linux:linux_kernel, cpe:/h:avtech:avn801, cpe:/o:microsoft:windows
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 313.11 ms 94.141.221.49
- Nmap scan report for 94.141.221.50
- Host is up (1.5s latency).
- All 1000 scanned ports on 94.141.221.50 are filtered
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 341.62 ms 94.141.221.50
- Nmap scan report for 94.141.221.53
- Host is up (0.36s latency).
- Not shown: 977 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 21/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.53/
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 161/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.53/
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5060/tcp filtered sip
- 5500/tcp open rtsp
- |_rtsp-methods: ERROR: Script execution failed (use -d to debug)
- 8080/tcp open http Tenda N60 WAP http admin
- |_http-methods: No Allow or Public header in OPTIONS response (status code 400)
- |_http-title: Did not follow redirect to http://94.141.221.53/login.asp
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port5500-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC9%P=x86_64-pc-linux-gn
- SF:u%r(GenericLines,FC,"\x20501\x20Not\x20Implemented\r\nContent-Type:\x20
- SF:text/html\r\nConnection:\x20close\r\nContent-Length:\x20149\r\nServer:\
- SF:x201\.0\x20\r\n\r\n<HTML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE>
- SF:</HEAD><BODY><H1>Not\x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20
- SF:not\x20implemented\x20by\x20this\x20server\.</BODY></HTML>\r\n")%r(GetR
- SF:equest,EF,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/ht
- SF:ml\r\nConnection:\x20close\r\nContent-Length:\x20134\r\nServer:\x201\.0
- SF:\x20\r\n\r\n<HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY>
- SF:<H1>Not\x20Found</H1>The\x20requested\x20URL\x20was\x20not\x20found\x20
- SF:on\x20this\x20server\.</BODY></HTML>\r\n")%r(HTTPOptions,104,"HTTP/1\.0
- SF:\x20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConnecti
- SF:on:\x20close\r\nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<H
- SF:TML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\
- SF:x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x2
- SF:0by\x20this\x20server\.</BODY></HTML>\r\n")%r(RTSPRequest,104,"RTSP/1\.
- SF:0\x20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConnect
- SF:ion:\x20close\r\nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<
- SF:HTML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not
- SF:\x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x
- SF:20by\x20this\x20server\.</BODY></HTML>\r\n")%r(FourOhFourRequest,EF,"HT
- SF:TP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/html\r\nConnect
- SF:ion:\x20close\r\nContent-Length:\x20134\r\nServer:\x201\.0\x20\r\n\r\n<
- SF:HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY><H1>Not\x20Fo
- SF:und</H1>The\x20requested\x20URL\x20was\x20not\x20found\x20on\x20this\x2
- SF:0server\.</BODY></HTML>\r\n")%r(SIPOptions,103,"SIP/2\.0\x20501\x20Not\
- SF:x20Implemented\r\nContent-Type:\x20text/html\r\nConnection:\x20close\r\
- SF:nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<HTML><HEAD><TITL
- SF:E>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20Implemented<
- SF:/H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\x20
- SF:server\.</BODY></HTML>\r\n");
- Aggressive OS guesses: Linux 2.6.32 (95%), Linux 2.6.32 - 3.13 (94%), Linux 2.6.32 - 2.6.39 (94%), Linux 2.6.32 - 3.1 (94%), Linux 2.6.39 (94%), HP P2000 G3 NAS device (93%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.9 (92%), Linux 3.10 (92%), MikroTik RouterOS 6.19 (Linux 3.3.5) (92%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.195 days (since Sun Nov 22 02:50:46 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=231 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Device: WAP; CPE: cpe:/h:tenda:n60
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 368.53 ms 94.141.221.53
- Nmap scan report for 94.141.221.56
- Host is up (1.3s latency).
- All 1000 scanned ports on 94.141.221.56 are filtered
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 337.22 ms 94.141.221.56
- Nmap scan report for 94.141.221.58
- Host is up (0.36s latency).
- Not shown: 974 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 587/tcp filtered submission
- 1025/tcp open http GM Streaming Server httpd
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-title: Site doesn't have a title (text/html).
- 1039/tcp filtered sbl
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5060/tcp filtered sip
- 5666/tcp filtered nrpe
- 6000/tcp open X11 (access denied)
- 8080/tcp open http lighttpd 1.4.20
- | http-auth:
- | HTTP/1.1 401 Unauthorized
- |_ Basic realm=WEB Remote Viewer
- |_http-methods: No Allow or Public header in OPTIONS response (status code 401)
- |_http-server-header: lighttpd/1.4.20
- |_http-title: 401 - Unauthorized
- 9101/tcp filtered jetdirect
- 50800/tcp filtered unknown
- Aggressive OS guesses: Linux 2.6.8 - 2.6.30 (95%), Asus RT-AC66U router (Linux 2.6) (95%), Asus RT-N16 WAP (Linux 2.6) (95%), Asus RT-N66U WAP (Linux 2.6) (95%), Tomato 1.28 (Linux 2.6.22) (95%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (95%), Linux 2.6.18 - 2.6.27 (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), D-Link DIR-300 NRU router (Linux 2.6.21) (94%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 2.916 days (since Thu Nov 19 09:32:03 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=176 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Unix; Device: webcam
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 307.05 ms 94.141.221.58
- Nmap scan report for 94.141.221.66
- Host is up (0.43s latency).
- Not shown: 977 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.66/
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 443/tcp open ssl/https Apache/2.2.15 (CentOS)
- | http-cisco-anyconnect:
- |_ ERROR: Not a Cisco ASA or unsupported version
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- | ssl-cert: Subject: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=--
- | Issuer: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=--
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-02-25T17:26:42
- | Not valid after: 2016-02-25T17:26:42
- | MD5: 2a40 7563 e2fc 5451 a95a d64c 9cc5 70d2
- |_SHA-1: 9743 cf02 7d98 aa8a 8e41 db6f 9702 ceb5 3e8a 5027
- |_ssl-date: 2015-11-22T15:23:30+00:00; +7h55m14s from scanner time.
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 3128/tcp open http-proxy Squid http proxy 3.1.10
- |_http-methods: No Allow or Public header in OPTIONS response (status code 403)
- |_http-server-header: squid/3.1.10
- |_http-title: ERROR: The requested URL could not be retrieved
- 3306/tcp open mysql MySQL (unauthorized)
- 5060/tcp filtered sip
- Device type: storage-misc|general purpose|firewall
- Running (JUST GUESSING): Synology Linux (92%), Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (90%), Fortinet Linux 2.6.X (85%)
- OS CPE: cpe:/o:synology:linux_kernel cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:watchguard:fireware:11 cpe:/o:fortinet:linux_kernel:2.6
- Aggressive OS guesses: Synology DiskStation Manager 5.1 (92%), Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (90%), Linux 3.4 (90%), WatchGuard Fireware 11.8 (90%), Linux 2.6.32 - 2.6.39 (90%), Linux 3.1 - 3.2 (89%), Linux 2.6.38 (87%), Linux 2.6.37 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.326 days (since Sat Nov 21 23:42:27 2015)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=238 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 424.82 ms 94.141.221.66
- Nmap scan report for 94.141.221.68
- Host is up (0.37s latency).
- Not shown: 996 filtered ports
- PORT STATE SERVICE VERSION
- 443/tcp open ssl/http Microsoft IIS httpd
- | http-cisco-anyconnect:
- |_ ERROR: Not a Cisco ASA or unsupported version
- | ssl-cert: Subject: commonName=h-srv-mail01.hiltisyr.local
- | Issuer: commonName=hiltisyr-CA
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha512WithRSAEncryption
- | Not valid before: 2015-10-19T10:10:39
- | Not valid after: 2017-10-18T10:10:39
- | MD5: 0d01 3504 91dc b0e8 9815 0cf5 724e 5365
- |_SHA-1: 5d61 2c93 8fef 3897 1241 802e 5aa7 c39e 5134 f111
- |_ssl-date: 2015-11-22T07:21:19+00:00; -5m51s from scanner time.
- | sslv2:
- | SSLv2 supported
- | ciphers:
- | SSL2_RC4_128_WITH_MD5
- |_ SSL2_DES_192_EDE3_CBC_WITH_MD5
- 3389/tcp open ms-wbt-server?
- | ssl-cert: Subject: commonName=h-srv-term01.hiltisyr.local
- | Issuer: commonName=h-srv-term01.hiltisyr.local
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-10-17T22:47:34
- | Not valid after: 2016-04-17T22:47:34
- | MD5: 681a bfa8 0b95 2d79 2179 5371 9e6c dde8
- |_SHA-1: 5dc1 e3ad 9f96 3d9f b86d e753 6f34 d2db 62ee 3e5f
- |_ssl-date: 2015-11-22T07:22:35+00:00; -5m51s from scanner time.
- 4001/tcp open ms-wbt-server Microsoft Terminal Service
- | ssl-cert: Subject: commonName=h-srv-svc01.hiltisyr.local
- | Issuer: commonName=h-srv-svc01.hiltisyr.local
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-08-28T15:19:36
- | Not valid after: 2016-02-27T15:19:36
- | MD5: 6347 f321 a6eb 7fa2 612a ef62 850a 1987
- |_SHA-1: 4525 6f82 d447 32c5 14b5 ead8 3407 667d d3b8 b2ab
- |_ssl-date: 2015-11-22T07:22:31+00:00; -5m50s from scanner time.
- 4002/tcp open mlchat-proxy?
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|phone
- Running (JUST GUESSING): Microsoft Windows Vista|2008|7|Phone (89%)
- OS CPE: cpe:/o:microsoft:windows_vista::- cpe:/o:microsoft:windows_vista::sp1 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows
- Aggressive OS guesses: Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7 (89%), Microsoft Windows Server 2008 SP1 (88%), Microsoft Windows Server 2008 (88%), Microsoft Windows Server 2008 R2 or Windows 8 (88%), Microsoft Windows 7 SP1 (88%), Microsoft Windows Server 2008 R2 (87%), Microsoft Windows Server 2008 R2 SP1 or Windows 8 (87%), Windows Server 2008 R2 (87%), Microsoft Windows 7 Professional or Windows 8 (87%), Microsoft Windows 7 SP1 or Windows Server 2008 SP1 - SP2 (87%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 81.726 days (since Tue Sep 1 15:06:32 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=236 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 311.57 ms 94.141.221.68
- Nmap scan report for 94.141.221.73
- Host is up (0.49s latency).
- All 1000 scanned ports on 94.141.221.73 are filtered
- Device type: switch|VoIP adapter|VoIP phone
- Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded, HP embedded, Xylan embedded
- OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000 cpe:/h:xylan:omnistack_4024cf
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 296.30 ms 82.137.192.237
- 12 ... 15
- 16 379.81 ms 94.141.221.73
- Nmap scan report for 94.141.221.75
- Host is up (0.35s latency).
- Not shown: 856 filtered ports, 143 closed ports
- PORT STATE SERVICE VERSION
- 3389/tcp open http mini_httpd 1.19 19dec2003
- | http-auth:
- | HTTP/1.1 401 Unauthorized
- |_ Basic realm=DVR
- | http-cisco-anyconnect:
- |_ ERROR: Not a Cisco ASA or unsupported version
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: mini_httpd/1.19 19dec2003
- |_http-title: 401 Unauthorized
- Device type: general purpose
- Running (JUST GUESSING): Linux 2.6.X (86%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6
- Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=230 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 307.14 ms 94.141.221.75
- Nmap scan report for 94.141.221.79
- Host is up (0.47s latency).
- All 1000 scanned ports on 94.141.221.79 are filtered
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-11 are the same as for 94.141.221.73
- 12 ... 30
- Nmap scan report for 94.141.221.80
- Host is up (0.47s latency).
- All 1000 scanned ports on 94.141.221.80 are filtered
- Device type: switch|VoIP adapter|VoIP phone
- Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded, HP embedded, Xylan embedded
- OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000 cpe:/h:xylan:omnistack_4024cf
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-11 are the same as for 94.141.221.18
- 12 ... 15
- 16 363.68 ms 94.141.221.80
- Nmap scan report for 94.141.221.81
- Host is up (0.44s latency).
- All 1000 scanned ports on 94.141.221.81 are filtered
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-11 are the same as for 94.141.221.18
- 12 ... 15
- 16 381.02 ms 94.141.221.81
- Nmap scan report for 94.141.221.93
- Host is up (0.39s latency).
- Not shown: 999 filtered ports
- PORT STATE SERVICE VERSION
- 8081/tcp open http mini_httpd 1.19 19dec2003
- | http-auth:
- | HTTP/1.1 401 Unauthorized
- |_ Basic realm=DVR
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: mini_httpd/1.19 19dec2003
- |_http-title: 401 Unauthorized
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|WAP|game console|media device
- Running (JUST GUESSING): Linux 2.6.X|3.X (88%), Nintendo embedded (87%), ProVision Linux 2.6.X (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:nintendo:wii cpe:/o:provision:linux_kernel:2.6
- Aggressive OS guesses: Linux 2.6.32 - 3.10 (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (87%), DD-WRT v24-sp2 (Linux 3.10) (87%), Nintendo Wii game console (87%), Linux 2.6.32 (86%), ProVision-ISR security DVR (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=238 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 8081/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 353.30 ms 94.141.221.93
- Nmap scan report for 94.141.221.99
- Host is up (0.45s latency).
- Not shown: 979 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
- |_http-title: ::: Login :::
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 554/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
- |_http-title: ::: Login :::
- |_rtsp-methods: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, SET_PARAMETER, GET_PARAMETER
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5060/tcp filtered sip
- Device type: general purpose|broadband router|firewall
- Running (JUST GUESSING): Linux 2.6.X|3.X (86%), D-Link embedded (85%), IPCop Linux 2.6.X (85%), IPFire Linux 2.6.X (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/h:dlink:dsl-2890al cpe:/o:ipcop:linux_kernel:2.6 cpe:/o:ipfire:linux_kernel:2.6
- Aggressive OS guesses: Linux 2.6.32 (86%), Linux 3.0 (86%), D-Link DSL-2890AL ADSL router (85%), IPCop 1.9.19 or IPFire firewall 2.9 (Linux 2.6.32) (85%), OpenWrt Kamikaze 8.09 (Linux 2.6.25.20) (85%), Linux 2.6.36 (85%), Linux 3.2.1 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=225 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Linux; Device: webcam; CPE: cpe:/h:avtech:avn801, cpe:/o:linux:linux_kernel
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 410.92 ms 94.141.221.99
- Nmap scan report for 94.141.221.101
- Host is up (0.37s latency).
- Not shown: 996 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp MikroTik router ftpd 6.29
- 161/tcp closed snmp
- 8080/tcp open http Arris TG862G http config
- | http-auth:
- | HTTP/1.1 401 Unauthorized
- |_ Basic realm=Wi-Fi_Protected_Setup(ANNEX A)
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: <empty>
- |_http-title: Site doesn't have a title (text/html).
- 8291/tcp open unknown
- Aggressive OS guesses: HP P2000 G3 NAS device (96%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 2.6.39 (92%), MikroTik RouterOS 6.19 (Linux 3.3.5) (92%), Linux 3.10 (90%), Linux 2.6.32 - 3.10 (89%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (89%), Linux 3.6 (89%), Linux 3.2 (88%), Linux 2.6.32 - 3.9 (88%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 1.660 days (since Fri Nov 20 15:41:25 2015)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=237 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Devices: router, WAP; CPE: cpe:/h:arris:tg862g
- TRACEROUTE (using port 161/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 333.52 ms 94.141.221.101
- Nmap scan report for 94.141.221.103
- Host is up (0.41s latency).
- All 1000 scanned ports on 94.141.221.103 are filtered (860) or closed (140)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 346.69 ms 94.141.221.103
- Nmap scan report for 94.141.221.106
- Host is up (0.38s latency).
- Not shown: 977 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open http AcIDSoftWebServer/0.1b
- |_http-favicon: Unknown favicon MD5: E6D3B3FF180103E14C19E5C297678C9F
- |_http-methods: No Allow or Public header in OPTIONS response (status code 404)
- |_http-server-header: AcIDSoftWebServer/0.1b
- |_http-title: Site doesn't have a title (text/html).
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5000/tcp open upnp?
- 5060/tcp filtered sip
- 8000/tcp open http-alt?
- 10002/tcp open documentum?
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BD4%P=x86_64-pc-linux-gnu%
- SF:r(GetRequest,1390,"HTTP/1\.0\x20200\x20OK\r\nDate:\x20Sun,\x2022\x20Nov
- SF:\x202015\x2009:41:30\x20GMT\r\nServer:\x20AcIDSoftWebServer/0\.1b\r\nAc
- SF:cept-Ranges:\x20bytes\r\nContent-Length:\x2031854\r\nConnection:\x20clo
- SF:se\r\nContent-Type:\x20text/html\r\n\r\n\xef\xbb\xbf<!DOCTYPE\x20html\x
- SF:20PUBLIC\x20\"-//W3C//DTD\x20XHTML\x201\.0\x20Strict//EN\"\x20\"http://
- SF:www\.w3\.org/TR/xhtml1/DTD/xhtml1-strict\.dtd\">\r\n<html>\r\n<head>\r\
- SF:n<meta\x20http-equiv=\"Content-Type\"\x20content=\"text/html;\x20charse
- SF:t=UTF-8\">\r\n<script\x20type=\"text/javascript\"\x20src=\"oem_t\.js\">
- SF:</script>\r\n<script\x20type=\"text/javascript\"\x20src=\"m\.js\"></scr
- SF:ipt>\r\n<link\x20rel=\"stylesheet\"\x20type=\"text/css\"\x20media=\"scr
- SF:een\"\x20href=\"m\.css\"\x20/>\r\n\r\n<script\x20type=\"text/javascript
- SF:\">\r\nvar\x20gt;\r\nvar\x20gdomready=0;\r\nvar\x20gopenall=0;\r\nvar\x
- SF:20gsld;\r\nvar\x20gslda;\r\nvar\x20gsldb;\r\nvar\x20gsldc;\r\nvar\x20gs
- SF:ldd;\r\nvar\x20gca=0;\r\nvar\x20gcb=0;\r\nvar\x20gcc=0;\r\nvar\x20gcd=0
- SF:;\r\nvar\x20gwid=0;\r\nvar\x20gcid=-1;\r\nvar\x20gptz=0;\r\nvar\x20gxh=
- SF:0;\r\nvar\x20gfz=0;\r\nvar\x20gxz=0;\r\nvar\x20gxs=0;\r\nvar\x20gxj=0;\
- SF:r\nvar\x20gdj=0;\r\nvar\x20gdg=0;\r\nvar\x20gchsize=0;\r\nvar\x20HashCo
- SF:okie\x20=\x20")%r(HTTPOptions,94,"HTTP/1\.0\x20404\x20Resource\x20not\x
- SF:20found\r\nContent-Length:\x200\r\nContent-Type:\x20text/html\r\nDate:\
- SF:x20Sun,\x2022\x20Nov\x202015\x2009:41:31\x20GMT\r\nServer:\x20AcIDSoftW
- SF:ebServer/0\.1b\r\n\r\n")%r(RTSPRequest,94,"HTTP/1\.0\x20404\x20Resource
- SF:\x20not\x20found\r\nContent-Length:\x200\r\nContent-Type:\x20text/html\
- SF:r\nDate:\x20Sun,\x2022\x20Nov\x202015\x2009:41:32\x20GMT\r\nServer:\x20
- SF:AcIDSoftWebServer/0\.1b\r\n\r\n")%r(FourOhFourRequest,94,"HTTP/1\.0\x20
- SF:404\x20Resource\x20not\x20found\r\nContent-Length:\x200\r\nContent-Type
- SF::\x20text/html\r\nDate:\x20Sun,\x2022\x20Nov\x202015\x2009:41:38\x20GMT
- SF:\r\nServer:\x20AcIDSoftWebServer/0\.1b\r\n\r\n")%r(SIPOptions,94,"HTTP/
- SF:1\.0\x20404\x20Resource\x20not\x20found\r\nContent-Length:\x200\r\nCont
- SF:ent-Type:\x20text/html\r\nDate:\x20Sun,\x2022\x20Nov\x202015\x2009:42:3
- SF:6\x20GMT\r\nServer:\x20AcIDSoftWebServer/0\.1b\r\n\r\n");
- Aggressive OS guesses: Linux 2.6.9 (91%), Cisco SA520 firewall (Linux 2.6) (90%), Linux 2.6.11 (90%), Linux 2.6.28 (90%), Linux 2.6.30 (90%), Linux 2.6.9 (CentOS 4.4) (90%), Linux 2.6.9 - 2.6.27 (90%), Riverbed Steelhead 200 proxy server (90%), Cisco UC320W PBX (Linux 2.6) (90%), Linux 2.6.18 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 5.862 days (since Mon Nov 16 10:50:29 2015)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=169 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 1025/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 348.91 ms 94.141.221.106
- Nmap scan report for 94.141.221.108
- Host is up (0.36s latency).
- Not shown: 536 filtered ports, 460 closed ports
- PORT STATE SERVICE VERSION
- 8002/tcp open tcpwrapped
- 8081/tcp open tcpwrapped
- 9010/tcp open tcpwrapped
- 9011/tcp open tcpwrapped
- OS fingerprint not ideal because: maxTimingRatio (1.202000e+01) is greater than 1.4
- No OS matches for host
- TRACEROUTE (using port 3306/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 30
- Nmap scan report for 94.141.221.113
- Host is up (0.37s latency).
- Not shown: 738 closed ports, 245 filtered ports
- PORT STATE SERVICE VERSION
- 88/tcp open kerberos-sec Windows 2003 Kerberos (server time: 2015-11-22 07:16:46Z)
- 389/tcp open ldap
- 464/tcp open tcpwrapped
- 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
- 808/tcp open ccproxy-http?
- 1047/tcp open nlockmgr 1-4 (RPC #100021)
- 1048/tcp open mountd 1-3 (RPC #100005)
- 1688/tcp open tcpwrapped
- 2049/tcp open nfs 2-3 (RPC #100003)
- 3268/tcp open ldap
- 3269/tcp open ssl/ldap
- | ssl-cert: Subject: commonName=Aserver.hq.local
- | Issuer: commonName=hq-ASERVER-CA
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-07-09T03:53:07
- | Not valid after: 2016-07-08T03:53:07
- | MD5: aa33 b8ad cf1b 0b31 a83f fae3 6420 7319
- |_SHA-1: 5b6a 9ff0 9611 1210 b022 08b2 8f1c 2b9d 74db 9d49
- |_ssl-date: 2015-11-22T07:27:30+00:00; +6s from scanner time.
- | sslv2:
- | SSLv2 supported
- | ciphers:
- | SSL2_RC4_128_WITH_MD5
- |_ SSL2_DES_192_EDE3_CBC_WITH_MD5
- 6002/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
- 6005/tcp open msrpc Microsoft Windows RPC
- 6006/tcp open msrpc Microsoft Windows RPC
- 6007/tcp open msrpc Microsoft Windows RPC
- 8000/tcp open http-alt?
- 8008/tcp open http WindWeb 2.0
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: WindWeb/2.0
- |_http-title: NetVideoOCX
- Device type: general purpose|WAP
- Running (JUST GUESSING): Microsoft Windows 7|Vista|2008|8.1|2012 (93%), Linux 2.6.X (86%), OpenBSD 4.X (85%)
- OS CPE: cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_vista::sp1:home_premium cpe:/o:microsoft:windows_server_2008 cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2012 cpe:/o:microsoft:windows_8 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:openbsd:openbsd:4.3
- Aggressive OS guesses: Microsoft Windows 7 SP1 (93%), Microsoft Windows Windows 7 SP1 (93%), Microsoft Windows Vista Home Premium SP1, Windows 7, or Windows Server 2008 (93%), Microsoft Windows 7 SP1 or Windows Server 2008 SP2 (92%), Microsoft Windows 7 Ultimate (91%), Microsoft Windows 8.1 (91%), Microsoft Windows Vista SP1 (90%), Windows Server 2008 R2 SP1 (88%), Microsoft Windows 7 SP 1 (88%), Microsoft Windows Server 2008 (88%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.034 days (since Sun Nov 22 06:42:36 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=236 (Good luck!)
- IP ID Sequence Generation: Busy server or unknown class
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows_server_2003, cpe:/o:microsoft:windows
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 355.71 ms 94.141.221.113
- Nmap scan report for 94.141.221.114
- Host is up (0.37s latency).
- All 1000 scanned ports on 94.141.221.114 are filtered
- Device type: switch|VoIP adapter|VoIP phone
- Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded, HP embedded, Xylan embedded
- OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000 cpe:/h:xylan:omnistack_4024cf
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-11 are the same as for 94.141.221.18
- 12 ... 15
- 16 431.92 ms 94.141.221.114
- Nmap scan report for 94.141.221.115
- Host is up (0.38s latency).
- Not shown: 979 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
- |_http-title: ::: Login :::
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 554/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
- |_http-title: ::: Login :::
- |_rtsp-methods: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, SET_PARAMETER
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5060/tcp filtered sip
- Device type: general purpose|WAP|remote management|specialized|broadband router|storage-misc|print server|switch
- Running (JUST GUESSING): Linux 2.6.X|2.4.X (93%), AVM embedded (92%), Dell embedded (92%), MontaVista Linux 2.4.X (91%), Connected Data Linux 2.6.X (90%), Google embedded (90%), HP embedded (90%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:avm:fritz%21box_fon_wlan_7170 cpe:/h:dell:remote_access_card:5 cpe:/o:linux:linux_kernel:2.4.21 cpe:/o:montavista:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4.35 cpe:/o:connecteddata:linux_kernel:2.6
- Aggressive OS guesses: Linux 2.6.15 - 2.6.26 (likely embedded) (93%), AVM FRITZ!Box FON WLAN 7170 WAP (92%), Dell Remote Access Controller 5/I (DRAC 5/I) (92%), Linux 2.4.21 (embedded) (92%), MontaVista embedded Linux 2.4.17 (91%), Linux 2.4.35 (91%), Drobo 5D NAS (Linux 2.6.18) (90%), Dell Integrated Remote Access Controller (iDRAC9) (90%), Google Mini search appliance (90%), HP 4200 PSA (Print Server Appliance) model J4117A (90%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 2.685 days (since Thu Nov 19 15:04:42 2015)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=185 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Linux; Device: webcam; CPE: cpe:/h:avtech:avn801, cpe:/o:linux:linux_kernel
- TRACEROUTE (using port 1025/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 341.73 ms 94.141.221.115
- Nmap scan report for 94.141.221.116
- Host is up (0.69s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Microsoft ftpd
- | ftp-anon: Anonymous FTP login allowed (FTP code 230)
- | 11-17-15 09:56PM <DIR> Bando POS
- | 09-22-12 04:33PM <DIR> eddata
- |_11-17-15 09:57PM <DIR> \xE3\xE1\xDD\xC7\xCA \xD1\xD6\xE6\xC7\xE4
- 81/tcp open tcpwrapped
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|media device
- Running (JUST GUESSING): Microsoft Windows 2003|2000|XP (89%), Motorola Windows PocketPC/CE (88%)
- OS CPE: cpe:/o:microsoft:windows_server_2003::sp2 cpe:/o:microsoft:windows_2000::sp4 cpe:/o:microsoft:windows_xp::sp2 cpe:/o:motorola:windows_ce
- Aggressive OS guesses: Microsoft Windows Server 2003 SP2 (89%), Microsoft Windows Server 2003 (89%), Microsoft Windows 2000 SP4 (88%), Microsoft Windows XP SP2 (firewall disabled) (88%), Motorola VIP1200 digital set top box (Windows CE 5.0) (88%), Microsoft Windows XP SP2 (87%), Microsoft Windows XP SP2 or SP3 (87%), Microsoft Windows XP Professional SP3 (86%), Microsoft Windows XP SP3 (86%), Microsoft Windows 2000 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=236 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 359.55 ms 94.141.221.116
- Nmap scan report for 94.141.221.118
- Host is up (1.9s latency).
- All 1000 scanned ports on 94.141.221.118 are filtered
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 30
- Nmap scan report for 94.141.221.119
- Host is up (0.41s latency).
- All 1000 scanned ports on 94.141.221.119 are filtered (860) or closed (140)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 389.04 ms 94.141.221.119
- Nmap scan report for 94.141.221.120
- Host is up (0.39s latency).
- All 1000 scanned ports on 94.141.221.120 are filtered (860) or closed (140)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 113/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 397.56 ms 94.141.221.120
- Nmap scan report for 94.141.221.121
- Host is up (0.51s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE VERSION
- 9010/tcp open sdr?
- 9011/tcp open unknown
- 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port9010-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516C07%P=x86_64-pc-linux-gn
- SF:u%r(RPCCheck,C,"\xa0\0\0\(\xf0\x0f\0\x01\0\0\0\0")%r(DNSVersionBindReq,
- SF:C,"\xa0\x1e\0\x06\xf0\x0f\0\x01\0\0\0\0")%r(DNSStatusRequest,C,"\xa0\x0
- SF:c\0\0\xf0\x0f\0\x01\0\0\0\0")%r(Kerberos,18,"\xa0\0\0q\xf0\x0f\0\x01\0\
- SF:0\0\0\xa2\x01\x05\xa2\xf0\x0f\0\x01\0\0\0\0")%r(X11Probe,C,"\xec\0\x0b\
- SF:0\xf0\x0f\0\x01\0\0\0\0")%r(NCP,C,"\xe4mdT\xf0\x0f\0\x01\0\0\0\0")%r(WM
- SF:SRequest,24,"\xa1\0\0\xfd\xf0\x0f\0\x01\0\0\0\0\xedMS\x14\xf0\x0f\0\x01
- SF:\0\0\0\0\xa0\0\0\0\xf0\x0f\0\x01\0\0\0\0")%r(afp,C,"\xa0\x03\0\x01\xf0\
- SF:x0f\0\x01\0\0\0\0");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port9011-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516C07%P=x86_64-pc-linux-gn
- SF:u%r(RPCCheck,C,"\xa0\0\0\(\xf0\x0f\0\x01\0\0\0\0")%r(DNSVersionBindReq,
- SF:C,"\xa0\x1e\0\x06\xf0\x0f\0\x01\0\0\0\0")%r(DNSStatusRequest,C,"\xa0\x0
- SF:c\0\0\xf0\x0f\0\x01\0\0\0\0")%r(Kerberos,18,"\xa0\0\0q\xf0\x0f\0\x01\0\
- SF:0\0\0\xa2\x01\x05\xa2\xf0\x0f\0\x01\0\0\0\0")%r(X11Probe,C,"\xec\0\x0b\
- SF:0\xf0\x0f\0\x01\0\0\0\0")%r(NCP,C,"\xe4mdT\xf0\x0f\0\x01\0\0\0\0")%r(WM
- SF:SRequest,24,"\xa1\0\0\xfd\xf0\x0f\0\x01\0\0\0\0\xedMS\x14\xf0\x0f\0\x01
- SF:\0\0\0\0\xa0\0\0\0\xf0\x0f\0\x01\0\0\0\0")%r(afp,C,"\xa0\x03\0\x01\xf0\
- SF:x0f\0\x01\0\0\0\0");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Linux 2.6.32 - 3.10 (91%), ProVision-ISR security DVR (91%), Linux 2.6.32 (88%), DD-WRT v24-sp2 (Linux 3.10) (87%), Crestron XPanel control system (87%), Nintendo Wii game console (86%), OpenWrt White Russian 0.9 (Linux 2.4.30) (86%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (86%), Linux 3.2 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=236 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 596.49 ms 94.141.221.121
- Nmap scan report for 94.141.221.122
- Host is up (0.38s latency).
- Not shown: 993 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp closed ftp
- 80/tcp open http micro_httpd (USRobotics router http config)
- |_http-server-header: micro_httpd
- 81/tcp open http Gadspot/Avtech AV787 webcam http config
- |_http-server-header: AV-TECH AV787 Video Web Server
- |_http-title: --- VIDEO WEB SERVER ---
- 1863/tcp open msnp?
- 1864/tcp open tcpwrapped
- 4443/tcp open tcpwrapped
- 5566/tcp open tcpwrapped
- Aggressive OS guesses: Linux 2.4.18 (93%), Lexmark X644e printer (91%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (90%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (90%), Comtrend CT536 wireless ADSL router (89%), Gemtek P360 WAP or Siemens Gigaset SE515dsl wireless broadband router (89%), Asus RT-AC66U router (Linux 2.6) (89%), Asus RT-N16 WAP (Linux 2.6) (89%), Asus RT-N66U WAP (Linux 2.6) (89%), Tomato 1.28 (Linux 2.6.22) (89%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.062 days (since Sun Nov 22 06:01:32 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=181 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Devices: broadband router, webcam
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 423.23 ms 94.141.221.122
- Nmap scan report for 94.141.221.127
- Host is up (0.35s latency).
- Not shown: 969 closed ports, 29 filtered ports
- PORT STATE SERVICE VERSION
- 8000/tcp open http mini_httpd 1.19 19dec2003
- | http-auth:
- | HTTP/1.1 401 Unauthorized
- |_ Basic realm=DVR
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: mini_httpd/1.19 19dec2003
- |_http-title: 401 Unauthorized
- 65000/tcp open tcpwrapped
- Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (95%), ProVision-ISR security DVR (94%), Linux 2.6.32 (93%), OpenWrt White Russian 0.9 (Linux 2.4.30) (93%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (93%), HP P2000 G3 NAS device (93%), OpenWrt Kamikaze 8.09 (Linux 2.6.25 - 2.6.26) (92%), Linux 2.6.32 - 3.10 (92%), DD-WRT v24-sp2 (Linux 3.10) (92%), Linux 3.2 (92%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=233 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 111/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 345.38 ms 94.141.221.127
- Nmap scan report for 94.141.221.128
- Host is up (0.36s latency).
- All 1000 scanned ports on 94.141.221.128 are filtered (860) or closed (140)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 402.94 ms 94.141.221.128
- Nmap scan report for 94.141.221.131
- Host is up (0.38s latency).
- All 1000 scanned ports on 94.141.221.131 are filtered (853) or closed (147)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 401.26 ms 94.141.221.131
- Nmap scan report for 94.141.221.132
- Host is up (0.43s latency).
- Not shown: 582 filtered ports, 417 closed ports
- PORT STATE SERVICE VERSION
- 554/tcp open tcpwrapped
- OS fingerprint not ideal because: maxTimingRatio (1.173200e+01) is greater than 1.4
- No OS matches for host
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 30
- Nmap scan report for 94.141.221.136
- Host is up (0.44s latency).
- All 1000 scanned ports on 94.141.221.136 are filtered
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-11 are the same as for 94.141.221.73
- 12 ... 15
- 16 402.81 ms 94.141.221.136
- Nmap scan report for 94.141.221.137
- Host is up (0.36s latency).
- All 1000 scanned ports on 94.141.221.137 are filtered
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-11 are the same as for 94.141.221.73
- 12 ... 15
- 16 372.74 ms 94.141.221.137
- Nmap scan report for 94.141.221.139
- Host is up (0.39s latency).
- Not shown: 978 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 80/tcp open http Realtron WebServer 1.1
- |_http-methods: No Allow or Public header in OPTIONS response (status code 401)
- | http-server-header:
- | Realtron WebServer 1.1
- |_ Virtual Web 0.9
- |_http-title: Authorization Failed
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- 465/tcp filtered smtps
- 554/tcp open rtsp
- |_rtsp-methods: OPTIONS, DESCRIBE, SETUP, TEARDOWN, PLAY
- 587/tcp filtered submission
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 5060/tcp filtered sip
- 8080/tcp open http mini_httpd 1.19 19dec2003
- | http-auth:
- | HTTP/1.1 401 Unauthorized
- |_ Basic realm=.
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: mini_httpd/1.19 19dec2003
- |_http-title: 401 Unauthorized
- 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BF6%P=x86_64-pc-linux-gnu%
- SF:r(GetRequest,164,"HTTP/1\.0\x20401\x20\r\nServer:Realtron\x20WebServer\
- SF:x201\.1\r\nWWW-Authenticate:\x20Basic\x20realm=\"index\.htm\"\r\n\r\n<H
- SF:TML>\n<HEAD>\n<TITLE>Authorization\x20Failed</TITLE>\n</HEAD>\n<BODY>\n
- SF:<H1>Authorization\x20Failed</H1>\n<P>Without\x20a\x20valid\x20username\
- SF:x20and\x20password,access\x20to\x20this\x20page\x20cannot\x20be\x20gran
- SF:ted\.\nPlease\x20click\x20reload\x20and\x20enter\x20a\x20username\x20an
- SF:d\x20password\x20when\x20prompted\.\n</P>\n</BODY>\n</HTML>\n")%r(HTTPO
- SF:ptions,D4,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r
- SF:\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Ba
- SF:d\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Re
- SF:quest\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</B
- SF:ODY></HTML>\n")%r(RTSPRequest,D4,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
- SF:nConnection:\x20close\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML
- SF:><HEAD><TITLE>400\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Err
- SF:or:\x20400\x20Bad\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20
- SF:is\x20\"\"\.</P>\x20</BODY></HTML>\n")%r(FourOhFourRequest,164,"HTTP/1\
- SF:.0\x20401\x20\r\nServer:Realtron\x20WebServer\x201\.1\r\nWWW-Authentica
- SF:te:\x20Basic\x20realm=\"index\.htm\"\r\n\r\n<HTML>\n<HEAD>\n<TITLE>Auth
- SF:orization\x20Failed</TITLE>\n</HEAD>\n<BODY>\n<H1>Authorization\x20Fail
- SF:ed</H1>\n<P>Without\x20a\x20valid\x20username\x20and\x20password,access
- SF:\x20to\x20this\x20page\x20cannot\x20be\x20granted\.\nPlease\x20click\x2
- SF:0reload\x20and\x20enter\x20a\x20username\x20and\x20password\x20when\x20
- SF:prompted\.\n</P>\n</BODY>\n</HTML>\n")%r(GenericLines,D4,"HTTP/1\.1\x20
- SF:400\x20Bad\x20Request\r\nConnection:\x20close\r\nServer:\x20Virtual\x20
- SF:Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Request\r\n</TITLE>
- SF:</HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n</H1>\x20<P>The
- SF:\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTML>\n")%r(SIPOpt
- SF:ions,164,"HTTP/1\.0\x20401\x20\r\nServer:Realtron\x20WebServer\x201\.1\
- SF:r\nWWW-Authenticate:\x20Basic\x20realm=\"index\.htm\"\r\n\r\n<HTML>\n<H
- SF:EAD>\n<TITLE>Authorization\x20Failed</TITLE>\n</HEAD>\n<BODY>\n<H1>Auth
- SF:orization\x20Failed</H1>\n<P>Without\x20a\x20valid\x20username\x20and\x
- SF:20password,access\x20to\x20this\x20page\x20cannot\x20be\x20granted\.\nP
- SF:lease\x20click\x20reload\x20and\x20enter\x20a\x20username\x20and\x20pas
- SF:sword\x20when\x20prompted\.\n</P>\n</BODY>\n</HTML>\n");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port554-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BF8%P=x86_64-pc-linux-gnu
- SF:%r(GetRequest,4E,"RTSP/1\.0\x20400\x20Bad\x20Request\r\nCache-Control:\
- SF:x20no-cache\r\nServer:\x20Hisilicon\x20Ipcam\r\n\r\n")%r(RTSPRequest,6F
- SF:,"RTSP/1\.0\x20200\x20OK\r\nServer:\x20HiIpcam/V100R003\x20VodServer/1\
- SF:.0\.0\r\nPublic:\x20OPTIONS,\x20DESCRIBE,\x20SETUP,\x20TEARDOWN,\x20PLA
- SF:Y\r\n\r\n")%r(GenericLines,4E,"RTSP/1\.0\x20400\x20Bad\x20Request\r\nCa
- SF:che-Control:\x20no-cache\r\nServer:\x20Hisilicon\x20Ipcam\r\n\r\n")%r(H
- SF:TTPOptions,6F,"RTSP/1\.0\x20200\x20OK\r\nServer:\x20HiIpcam/V100R003\x2
- SF:0VodServer/1\.0\.0\r\nPublic:\x20OPTIONS,\x20DESCRIBE,\x20SETUP,\x20TEA
- SF:RDOWN,\x20PLAY\r\n\r\n")%r(FourOhFourRequest,4E,"RTSP/1\.0\x20400\x20Ba
- SF:d\x20Request\r\nCache-Control:\x20no-cache\r\nServer:\x20Hisilicon\x20I
- SF:pcam\r\n\r\n")%r(SIPOptions,79,"RTSP/1\.0\x20200\x20OK\r\nServer:\x20Hi
- SF:Ipcam/V100R003\x20VodServer/1\.0\.0\r\nCseq:\x2042\r\nPublic:\x20OPTION
- SF:S,\x20DESCRIBE,\x20SETUP,\x20TEARDOWN,\x20PLAY\r\n\r\n");
- Device type: switch
- Running (JUST GUESSING): D-Link embedded (88%)
- OS CPE: cpe:/h:dlink:des-3526
- Aggressive OS guesses: D-Link DES-3526 switch (88%), D-Link DGS-3450 switch (85%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 17.798 days (since Wed Nov 4 12:22:11 2015)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=135 (Good luck!)
- IP ID Sequence Generation: Incrementing by 2
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 371.06 ms 94.141.221.139
- Nmap scan report for 94.141.221.144
- Host is up (0.45s latency).
- Not shown: 997 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.144/
- 80/tcp open http Virtual Web 0.9
- |_http-favicon: Unknown favicon MD5: D7C6D6BADE16E3D2417E661EC7E68B93
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Virtual Web 0.9
- |_http-title: Site doesn't have a title (text/html).
- 161/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.144/
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BFD%P=x86_64-pc-linux-gnu%
- SF:r(GetRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Virtual\x20Web\x
- SF:200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent-Type:\x20text
- SF:/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html><head><meta\x2
- SF:0HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x20language='jav
- SF:ascript'>parent\.location=\"/login\.htm\"</script></head><body></body><
- SF:/html>")%r(HTTPOptions,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
- SF::\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Req
- SF:uest\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\
- SF:n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HT
- SF:ML>\n")%r(RTSPRequest,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
- SF:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Requ
- SF:est\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n
- SF:</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTM
- SF:L>\n")%r(FourOhFourRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Vi
- SF:rtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent
- SF:-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html>
- SF:<head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x2
- SF:0language='javascript'>parent\.location=\"/login\.htm\"</script></head>
- SF:<body></body></html>")%r(GenericLines,C1,"HTTP/1\.1\x20400\x20Bad\x20Re
- SF:quest\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>40
- SF:0\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Ba
- SF:d\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>
- SF:\x20</BODY></HTML>\n")%r(SIPOptions,114,"HTTP/1\.1\x20200\x20OK\r\nServ
- SF:er:\x20Virtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r
- SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\
- SF:r\n<html><head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><
- SF:script\x20language='javascript'>parent\.location=\"/login\.htm\"</scrip
- SF:t></head><body></body></html>");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Linux 2.6.X|3.X (88%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
- Aggressive OS guesses: Linux 2.6.32 (88%), Linux 2.6.32 - 3.1 (88%), Linux 3.10 (88%), Linux 3.11 (88%), Linux 3.4 - 3.10 (88%), Linux 3.5 (88%), Linux 3.8 (88%), Linux 2.6.32 - 3.10 (88%), Linux 2.6.32 - 3.13 (88%), Linux 2.6.32 - 3.9 (88%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.017 days (since Sun Nov 22 07:06:26 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=237 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 412.33 ms 94.141.221.144
- Nmap scan report for 94.141.221.146
- Host is up (0.37s latency).
- All 1000 scanned ports on 94.141.221.146 are filtered (860) or closed (140)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 393.52 ms 94.141.221.146
- Nmap scan report for 94.141.221.150
- Host is up (0.38s latency).
- Not shown: 995 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp MikroTik router ftpd 5.26
- 161/tcp closed snmp
- 5001/tcp closed commplex-link
- 8080/tcp open ssl/http-proxy?
- | http-cisco-anyconnect:
- |_ ERROR: Not a Cisco ASA or unsupported version
- |_ssl-date: 2015-11-22T07:27:27+00:00; +3s from scanner time.
- 8291/tcp open unknown
- Aggressive OS guesses: HP P2000 G3 NAS device (98%), Linux 2.6.31 - 2.6.35 (94%), DD-WRT v23 (Linux 2.4.37) (92%), Linux 2.6.35 (92%), DD-WRT v24-sp2 (Linux 2.6.34) (92%), MikroTik RouterOS 5.14 (Linux 2.6.35) (92%), DD-WRT v24-sp1 (Linux 2.4.36) (91%), Linux 2.6.23 - 2.6.38 (90%), Linux 2.6.8 - 2.6.30 (90%), Check Point VPN-1 UTM appliance (89%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.659 days (since Sat Nov 21 15:42:18 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=178 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Host: ChamGrill; Device: router
- TRACEROUTE (using port 5001/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 368.49 ms 94.141.221.150
- Nmap scan report for 94.141.221.157
- Host is up (0.40s latency).
- Not shown: 859 filtered ports, 140 closed ports
- PORT STATE SERVICE VERSION
- 80/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
- |_http-title: ::: Login :::
- Device type: general purpose|WAP|broadband router
- Running (JUST GUESSING): Linux 2.6.X (86%), Motorola embedded (86%), MontaVista Linux 2.4.X (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:motorola:ap-51xx cpe:/o:montavista:linux_kernel:2.4
- Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (86%), Motorola AP-51xx WAP (86%), MontaVista embedded Linux 2.4.17 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.059 days (since Sun Nov 22 06:05:45 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=175 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Linux; Device: webcam; CPE: cpe:/h:avtech:avn801, cpe:/o:linux:linux_kernel
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 376.77 ms 94.141.221.157
- Nmap scan report for 94.141.221.161
- Host is up (0.40s latency).
- Not shown: 755 closed ports, 244 filtered ports
- PORT STATE SERVICE VERSION
- 100/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
- |_http-title: ::: Login :::
- Aggressive OS guesses: Linux 2.6.8 - 2.6.30 (95%), Asus RT-AC66U router (Linux 2.6) (95%), Asus RT-N16 WAP (Linux 2.6) (95%), Asus RT-N66U WAP (Linux 2.6) (95%), Tomato 1.28 (Linux 2.6.22) (95%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (95%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (95%), Dell Integrated Remote Access Controller (iDRAC6) (94%), Linux 2.4.21 - 2.4.31 (likely embedded) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.038 days (since Sun Nov 22 06:36:26 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=183 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Linux; Device: webcam; CPE: cpe:/h:avtech:avn801, cpe:/o:linux:linux_kernel
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 393.54 ms 94.141.221.161
- Nmap scan report for 94.141.221.179
- Host is up (0.36s latency).
- Not shown: 996 filtered ports
- PORT STATE SERVICE VERSION
- 20/tcp open ftp MikroTik router ftpd 6.11
- 21/tcp open ftp MikroTik router ftpd 6.11
- 161/tcp closed snmp
- 8291/tcp open unknown
- Aggressive OS guesses: HP P2000 G3 NAS device (96%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 2.6.39 (92%), MikroTik RouterOS 6.19 (Linux 3.3.5) (92%), Linux 3.10 (90%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (89%), Linux 3.6 (89%), Linux 3.2 (88%), Linux 2.6.32 - 3.10 (88%), Linux 2.6.32 - 3.9 (88%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.069 days (since Sun Nov 22 05:51:32 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=235 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Host: Kiwan Palace; Device: router
- TRACEROUTE (using port 161/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 373.48 ms 94.141.221.179
- Nmap scan report for 94.141.221.181
- Host is up (0.41s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE VERSION
- 1099/tcp open http GM Streaming Server httpd
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-title: Site doesn't have a title (text/html).
- |_rmi-dumpregistry: Registry listing failed (Handshake failed)
- 8085/tcp open http lighttpd 1.4.20
- | http-auth:
- | HTTP/1.1 401 Unauthorized
- |_ Basic realm=WEB Remote Viewer
- |_http-methods: No Allow or Public header in OPTIONS response (status code 401)
- |_http-server-header: lighttpd/1.4.20
- |_http-title: 401 - Unauthorized
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: OpenWrt White Russian 0.9 (Linux 2.4.30) (92%), D-Link DIR-300 NRU router (Linux 2.6.21) (91%), Dell Chassis Management Controller (CMC) (91%), Linux 2.6.16 - 2.6.20 (91%), Linux 2.6.16 - 2.6.21 (91%), Linux 2.6.18 - 2.6.27 (91%), Linux 2.6.18-8.el5 (Red Hat Enterprise Linux 5) (91%), Linux 2.6.20 (91%), Linux 2.6.20 (Ubuntu, x86_64) (91%), Linux 2.6.21 (91%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.095 days (since Sun Nov 22 05:14:34 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=174 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Device: webcam
- TRACEROUTE (using port 1099/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 416.84 ms 94.141.221.181
- Nmap scan report for 94.141.221.182
- Host is up (0.46s latency).
- Not shown: 955 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 25/tcp filtered smtp
- 53/tcp open domain Microsoft DNS
- 80/tcp open http Kerio MailServer http config
- |_http-favicon: Unknown favicon MD5: 94348007B80D9A8F1A4ED5D8CCEA0700
- |_http-methods: No Allow or Public header in OPTIONS response (status code 301)
- | http-robots.txt: 1 disallowed entry
- |_/
- |_http-server-header: Kerio Connect 8.4.3
- | http-title: Kerio Connect client
- |_Requested resource was http://94.141.221.182/webmail/login/
- 88/tcp open kerberos-sec Windows 2003 Kerberos (server time: 2015-11-22 07:19:41Z)
- 110/tcp open pop3 Kerio Connect pop3d 8.4.3
- |_pop3-capabilities: UIDL STLS TOP SASL(CRAM-MD5 PLAIN LOGIN DIGEST-MD5 NTLM) APOP USER
- | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-05-10T11:17:45
- | Not valid after: 2016-05-09T11:17:45
- | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
- |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
- |_ssl-date: TLS randomness does not represent time
- 119/tcp open nntp Kerio Connect nntpd 8.4.3
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 143/tcp open imap Kerio Connect imapd 8.4.3
- |_imap-capabilities: NAMESPACE OK UIDPLUS ANNOTATEMORE XLIST LITERAL+ LISTEXT STATUS-COUNTERS IMAP4 IDLE QUOTA SORT AUTH=LOGIN IMAP4rev1 completed AUTH=PLAIN AUTH=NTLMA0001 AUTH=DIGEST-MD5 CAPABILITY ACL AUTH=CRAM-MD5 SPECIAL-USE STARTTLS UNSELECT ANNOTATE ID
- | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-05-10T11:17:45
- | Not valid after: 2016-05-09T11:17:45
- | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
- |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
- |_ssl-date: TLS randomness does not represent time
- 389/tcp open ldap
- 443/tcp open ssl/http Kerio MailServer http config
- | http-cisco-anyconnect:
- |_ ERROR: Not a Cisco ASA or unsupported version
- | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-05-10T11:17:45
- | Not valid after: 2016-05-09T11:17:45
- | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
- |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
- |_ssl-date: TLS randomness does not represent time
- 445/tcp filtered microsoft-ds
- 464/tcp open kpasswd5?
- 465/tcp filtered smtps
- 563/tcp open ssl/nntp Kerio Connect nntpd 8.4.3
- | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-05-10T11:17:45
- | Not valid after: 2016-05-09T11:17:45
- | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
- |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
- |_ssl-date: TLS randomness does not represent time
- 587/tcp filtered submission
- 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
- 636/tcp open tcpwrapped
- 993/tcp open ssl/imap Kerio Connect imapd 8.4.3
- | imap-capabilities:
- |_ ERROR: Failed to connect to server
- | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-05-10T11:17:45
- | Not valid after: 2016-05-09T11:17:45
- | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
- |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
- |_ssl-date: TLS randomness does not represent time
- 995/tcp open ssl/pop3 Kerio Connect pop3d 8.4.3
- | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-05-10T11:17:45
- | Not valid after: 2016-05-09T11:17:45
- | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
- |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
- |_ssl-date: TLS randomness does not represent time
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 3268/tcp open ldap
- 3269/tcp open tcpwrapped
- 3389/tcp open ms-wbt-server?
- | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com
- | Issuer: commonName=SERVER.Tempusmaritime.com
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-10-07T20:53:41
- | Not valid after: 2016-04-07T20:53:41
- | MD5: abab 56ff 9541 22c8 bf45 458d b893 6440
- |_SHA-1: 4ecf b264 c8c7 b051 12f2 00d2 7e2c f39c 69cc 45b4
- |_ssl-date: 2015-11-22T07:30:29+00:00; +1m54s from scanner time.
- 5060/tcp filtered sip
- 5222/tcp open xmpp-client Tigase
- | xmpp-info:
- | STARTTLS Failed
- | info:
- | unknown:
- |
- | stream_id: tigase-error-tigase
- | capabilities:
- |
- | errors:
- | host-unknown
- | (timeout)
- | auth_mechanisms:
- |
- | xmpp:
- | lang: en
- | server name: 10.3.0.1
- | version: 1.0
- | compression_methods:
- |
- |_ features:
- 8800/tcp open http Kerio MailServer http config
- |_http-favicon: Unknown favicon MD5: 94348007B80D9A8F1A4ED5D8CCEA0700
- |_http-methods: No Allow or Public header in OPTIONS response (status code 301)
- | http-robots.txt: 1 disallowed entry
- |_/
- |_http-server-header: Kerio Connect 8.4.3
- |_http-title: Did not follow redirect to http://94.141.221.182/webmail/login/
- 49152/tcp open msrpc Microsoft Windows RPC
- 49153/tcp open msrpc Microsoft Windows RPC
- 49154/tcp open msrpc Microsoft Windows RPC
- 49155/tcp open msrpc Microsoft Windows RPC
- 49157/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
- 49158/tcp open msrpc Microsoft Windows RPC
- 49159/tcp open msrpc Microsoft Windows RPC
- Device type: general purpose
- Running (JUST GUESSING): Microsoft Windows 2012|7|8.1 (86%)
- OS CPE: cpe:/o:microsoft:windows_server_2012 cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows
- Aggressive OS guesses: Microsoft Windows Server 2012 R2 (86%), Microsoft Windows 7 SP1 (86%), Microsoft Windows 7 Ultimate (85%), Microsoft Windows 8.1 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.415 days (since Sat Nov 21 21:34:02 2015)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=235 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: Host: SERVER.Tempusmaritime.com; OS: Windows; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_server_2003
- TRACEROUTE (using port 1025/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 16
- 17 434.97 ms 94.141.221.182
- Nmap scan report for 94.141.221.189
- Host is up (0.46s latency).
- All 1000 scanned ports on 94.141.221.189 are filtered
- Device type: switch|VoIP adapter|VoIP phone
- Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded, HP embedded, Xylan embedded
- OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000 cpe:/h:xylan:omnistack_4024cf
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-11 are the same as for 94.141.221.18
- 12 ... 15
- 16 363.43 ms 94.141.221.189
- Nmap scan report for 94.141.221.191
- Host is up (0.41s latency).
- Not shown: 953 closed ports, 37 filtered ports
- PORT STATE SERVICE VERSION
- 2869/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
- 8080/tcp open http Boa HTTPd 0.94.13
- | http-auth:
- | HTTP/1.0 401 Unauthorized
- |_ Basic realm=DSL-N12E_C1
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: Boa/0.94.13
- |_http-title: 401 Unauthorized
- 10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
- |_http-methods: No Allow or Public header in OPTIONS response (status code 404)
- |_http-server-header: Microsoft-HTTPAPI/2.0
- |_http-title: Not Found
- 49152/tcp open msrpc Microsoft Windows RPC
- 49153/tcp open msrpc Microsoft Windows RPC
- 49154/tcp open msrpc Microsoft Windows RPC
- 49155/tcp open msrpc Microsoft Windows RPC
- 49160/tcp open msrpc Microsoft Windows RPC
- 49161/tcp open msrpc Microsoft Windows RPC
- 49165/tcp open msrpc Microsoft Windows RPC
- Aggressive OS guesses: Microsoft Windows 7 SP1 (95%), Microsoft Windows 7 SP1 or Windows Server 2008 SP2 (94%), Microsoft Windows Vista Home Premium SP1, Windows 7, or Windows Server 2008 (94%), Microsoft Windows 7 Ultimate (93%), Microsoft Windows 8.1 (93%), Microsoft Windows Windows 7 SP1 (93%), Microsoft Windows Vista SP1 (93%), Microsoft Windows 8.1 Update 1 (91%), Microsoft Windows 7 SP 1 (90%), Microsoft Windows 8 (90%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.066 days (since Sun Nov 22 05:55:52 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=235 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 450.63 ms 94.141.221.191
- Nmap scan report for 94.141.221.193
- Host is up (0.46s latency).
- Not shown: 997 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http Netgear DGN1000 router http config
- | http-auth:
- | HTTP/1.1 401 Unauthorized
- |_ Basic realm=NETGEAR DGN1000
- |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
- |_http-server-header: <empty>
- |_http-title: Authorization warning
- 5500/tcp open hotline?
- 8080/tcp open http uc-httpd 1.0.0
- |_http-favicon: Unknown favicon MD5: EC9D1C872C50DD7DA7D826D9C85FC158
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- | http-open-proxy: Potentially OPEN proxy.
- |_Methods supported:CONNECTION
- |_http-title: NETSuveillance WEB
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: router|WAP|storage-misc|general purpose|specialized
- Running (JUST GUESSING): Linksys embedded (91%), Linux 2.4.X|2.6.X (89%), HP embedded (89%), Linksys Linux 2.4.X (88%), Crestron 2-Series (87%)
- OS CPE: cpe:/h:linksys:rv042 cpe:/h:linksys:wrv54g cpe:/o:linux:linux_kernel:2.4 cpe:/h:hp:p2000_g3 cpe:/o:linksys:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:crestron:2_series
- Aggressive OS guesses: Linksys RV042 router (91%), Linksys WRV54G WAP (91%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (89%), HP P2000 G3 NAS device (89%), Linux 2.4.18 (88%), OpenWrt White Russian 0.9 (Linux 2.4.30) (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (88%), Crestron XPanel control system (87%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.097 days (since Sun Nov 22 05:11:06 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=165 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Device: router; CPE: cpe:/h:netgear:dgn1000
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 437.90 ms 94.141.221.193
- Nmap scan report for 94.141.221.195
- Host is up (0.49s latency).
- Not shown: 996 filtered ports
- PORT STATE SERVICE VERSION
- 21/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.195/
- 80/tcp open http Virtual Web 0.9
- |_http-favicon: Unknown favicon MD5: D7C6D6BADE16E3D2417E661EC7E68B93
- |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
- |_http-server-header: Virtual Web 0.9
- |_http-title: Site doesn't have a title (text/html).
- 3306/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.195/
- |_mysql-info: ERROR: Script execution failed (use -d to debug)
- 5001/tcp open http Apache httpd 2.2.15 ((CentOS))
- |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
- |_http-server-header: Apache/2.2.15 (CentOS)
- |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.195/
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516C5B%P=x86_64-pc-linux-gnu%
- SF:r(GetRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Virtual\x20Web\x
- SF:200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent-Type:\x20text
- SF:/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html><head><meta\x2
- SF:0HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x20language='jav
- SF:ascript'>parent\.location=\"/login\.htm\"</script></head><body></body><
- SF:/html>")%r(HTTPOptions,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
- SF::\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Req
- SF:uest\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\
- SF:n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HT
- SF:ML>\n")%r(RTSPRequest,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
- SF:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Requ
- SF:est\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n
- SF:</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTM
- SF:L>\n")%r(FourOhFourRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Vi
- SF:rtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent
- SF:-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html>
- SF:<head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x2
- SF:0language='javascript'>parent\.location=\"/login\.htm\"</script></head>
- SF:<body></body></html>")%r(GenericLines,C1,"HTTP/1\.1\x20400\x20Bad\x20Re
- SF:quest\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>40
- SF:0\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Ba
- SF:d\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>
- SF:\x20</BODY></HTML>\n")%r(SIPOptions,114,"HTTP/1\.1\x20200\x20OK\r\nServ
- SF:er:\x20Virtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r
- SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\
- SF:r\n<html><head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><
- SF:script\x20language='javascript'>parent\.location=\"/login\.htm\"</scrip
- SF:t></head><body></body></html>");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|specialized|storage-misc
- Running (JUST GUESSING): Linux 2.6.X|3.X (91%), Crestron 2-Series (87%), HP embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3
- Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.32 - 3.10 (90%), Linux 2.6.32 - 3.9 (90%), Linux 3.11 (89%), Linux 3.5 (89%), Linux 2.6.32 - 3.13 (88%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.32 - 3.1 (87%), Linux 2.6.39 (87%), Linux 3.10 (87%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.064 days (since Sun Nov 22 05:59:35 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=237 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 424.32 ms 94.141.221.195
- Nmap scan report for 94.141.221.196
- Host is up (0.37s latency).
- All 1000 scanned ports on 94.141.221.196 are filtered
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-11 are the same as for 94.141.221.18
- 12 ... 15
- 16 360.31 ms 94.141.221.196
- Nmap scan report for 94.141.221.197 [host down]
- Nmap scan report for 94.141.221.198 [host down]
- Nmap scan report for 94.141.221.202 [host down]
- Nmap scan report for 94.141.221.203 [host down]
- Nmap scan report for 94.141.221.204 [host down]
- Nmap scan report for 94.141.221.205 [host down]
- Nmap scan report for 94.141.221.208 [host down]
- Nmap scan report for 94.141.221.209 [host down]
- Nmap scan report for 94.141.221.210 [host down]
- Nmap scan report for 94.141.221.211 [host down]
- Nmap scan report for 94.141.221.212 [host down]
- Nmap scan report for 94.141.221.213 [host down]
- Nmap scan report for 94.141.221.214 [host down]
- Nmap scan report for 94.141.221.215 [host down]
- Nmap scan report for 94.141.221.216 [host down]
- Nmap scan report for 94.141.221.217 [host down]
- Nmap scan report for 94.141.221.218 [host down]
- Nmap scan report for 94.141.221.219 [host down]
- Nmap scan report for 94.141.221.220 [host down]
- Nmap scan report for 94.141.221.221 [host down]
- Nmap scan report for 94.141.221.222 [host down]
- Nmap scan report for 94.141.221.223 [host down]
- Nmap scan report for 94.141.221.224 [host down]
- Nmap scan report for 94.141.221.225 [host down]
- Nmap scan report for 94.141.221.226 [host down]
- Nmap scan report for 94.141.221.227 [host down]
- Nmap scan report for 94.141.221.228 [host down]
- Nmap scan report for 94.141.221.229 [host down]
- Nmap scan report for 94.141.221.230 [host down]
- Nmap scan report for 94.141.221.231 [host down]
- Nmap scan report for 94.141.221.232 [host down]
- Nmap scan report for 94.141.221.233 [host down]
- Nmap scan report for 94.141.221.234 [host down]
- Nmap scan report for 94.141.221.235 [host down]
- Nmap scan report for 94.141.221.236 [host down]
- Nmap scan report for 94.141.221.237 [host down]
- Nmap scan report for 94.141.221.238 [host down]
- Nmap scan report for 94.141.221.239 [host down]
- Nmap scan report for 94.141.221.240 [host down]
- Nmap scan report for 94.141.221.241 [host down]
- Nmap scan report for 94.141.221.242 [host down]
- Nmap scan report for 94.141.221.243 [host down]
- Nmap scan report for 94.141.221.244 [host down]
- Nmap scan report for 94.141.221.245 [host down]
- Nmap scan report for 94.141.221.246 [host down]
- Nmap scan report for 94.141.221.247 [host down]
- Nmap scan report for 94.141.221.248 [host down]
- Nmap scan report for 94.141.221.249 [host down]
- Nmap scan report for 94.141.221.250 [host down]
- Nmap scan report for 94.141.221.251 [host down]
- Nmap scan report for 94.141.221.252 [host down]
- Nmap scan report for 94.141.221.253 [host down]
- Nmap scan report for 94.141.221.254 [host down]
- Nmap scan report for 94.141.221.255 [host down]
- Initiating SYN Stealth Scan at 07:31
- Scanning 5 hosts [1000 ports/host]
- Discovered open port 443/tcp on 94.141.221.199
- Discovered open port 80/tcp on 94.141.221.199
- Discovered open port 3389/tcp on 94.141.221.199
- SYN Stealth Scan Timing: About 18.58% done; ETC: 07:34 (0:02:16 remaining)
- Discovered open port 49152/tcp on 94.141.221.199
- Discovered open port 49157/tcp on 94.141.221.199
- Discovered open port 49156/tcp on 94.141.221.199
- Discovered open port 49154/tcp on 94.141.221.199
- SYN Stealth Scan Timing: About 36.86% done; ETC: 07:34 (0:02:00 remaining)
- Discovered open port 49155/tcp on 94.141.221.199
- Discovered open port 7002/tcp on 94.141.221.199
- Discovered open port 49159/tcp on 94.141.221.199
- SYN Stealth Scan Timing: About 55.46% done; ETC: 07:34 (0:01:20 remaining)
- Discovered open port 49153/tcp on 94.141.221.199
- Discovered open port 49158/tcp on 94.141.221.199
- Discovered open port 7001/tcp on 94.141.221.199
- Completed SYN Stealth Scan against 94.141.221.201 in 124.39s (4 hosts left)
- Discovered open port 593/tcp on 94.141.221.199
- Discovered open port 85/tcp on 94.141.221.206
- SYN Stealth Scan Timing: About 68.29% done; ETC: 07:34 (0:01:02 remaining)
- Discovered open port 6002/tcp on 94.141.221.199
- Completed SYN Stealth Scan against 94.141.221.206 in 138.72s (3 hosts left)
- Completed SYN Stealth Scan against 94.141.221.199 in 140.08s (2 hosts left)
- Increasing send delay for 94.141.221.200 from 0 to 5 due to 11 out of 11 dropped probes since last increase.
- SYN Stealth Scan Timing: About 80.20% done; ETC: 07:35 (0:00:47 remaining)
- Completed SYN Stealth Scan against 94.141.221.207 in 194.38s (1 host left)
- SYN Stealth Scan Timing: About 81.78% done; ETC: 07:36 (0:00:53 remaining)
- SYN Stealth Scan Timing: About 82.17% done; ETC: 07:37 (0:01:03 remaining)
- Increasing send delay for 94.141.221.200 from 5 to 10 due to 11 out of 11 dropped probes since last increase.
- SYN Stealth Scan Timing: About 82.65% done; ETC: 07:38 (0:01:15 remaining)
- SYN Stealth Scan Timing: About 83.20% done; ETC: 07:39 (0:01:27 remaining)
- SYN Stealth Scan Timing: About 83.83% done; ETC: 07:41 (0:01:40 remaining)
- SYN Stealth Scan Timing: About 84.56% done; ETC: 07:43 (0:01:53 remaining)
- SYN Stealth Scan Timing: About 85.40% done; ETC: 07:45 (0:02:06 remaining)
- SYN Stealth Scan Timing: About 86.32% done; ETC: 07:47 (0:02:16 remaining)
- SYN Stealth Scan Timing: About 87.31% done; ETC: 07:50 (0:02:25 remaining)
- SYN Stealth Scan Timing: About 88.37% done; ETC: 07:52 (0:02:31 remaining)
- SYN Stealth Scan Timing: About 89.48% done; ETC: 07:55 (0:02:32 remaining)
- SYN Stealth Scan Timing: About 90.61% done; ETC: 07:57 (0:02:30 remaining)
- SYN Stealth Scan Timing: About 91.70% done; ETC: 08:00 (0:02:25 remaining)
- SYN Stealth Scan Timing: About 92.75% done; ETC: 08:02 (0:02:17 remaining)
- SYN Stealth Scan Timing: About 93.75% done; ETC: 08:04 (0:02:06 remaining)
- SYN Stealth Scan Timing: About 94.69% done; ETC: 08:06 (0:01:53 remaining)
- SYN Stealth Scan Timing: About 95.53% done; ETC: 08:08 (0:01:40 remaining)
- SYN Stealth Scan Timing: About 96.28% done; ETC: 08:09 (0:01:26 remaining)
- SYN Stealth Scan Timing: About 96.91% done; ETC: 08:11 (0:01:14 remaining)
- SYN Stealth Scan Timing: About 97.46% done; ETC: 08:12 (0:01:02 remaining)
- SYN Stealth Scan Timing: About 97.92% done; ETC: 08:13 (0:00:52 remaining)
- SYN Stealth Scan Timing: About 98.31% done; ETC: 08:13 (0:00:43 remaining)
- SYN Stealth Scan Timing: About 98.64% done; ETC: 08:14 (0:00:35 remaining)
- Completed SYN Stealth Scan at 08:17, 2745.34s elapsed (5000 total ports)
- Initiating Service scan at 08:17
- Scanning 16 services on 5 hosts
- Service scan Timing: About 50.00% done; ETC: 08:19 (0:01:00 remaining)
- Completed Service scan at 08:19, 145.48s elapsed (16 services on 5 hosts)
- Initiating OS detection (try #1) against 5 hosts
- Retrying OS detection (try #2) against 2 hosts
- Initiating Traceroute at 08:19
- Completed Traceroute at 08:19, 17.91s elapsed
- Initiating Parallel DNS resolution of 14 hosts. at 08:19
- Completed Parallel DNS resolution of 14 hosts. at 08:20, 13.00s elapsed
- NSE: Script scanning 5 hosts.
- Initiating NSE at 08:20
- Completed NSE at 08:21, 77.79s elapsed
- Initiating NSE at 08:21
- Completed NSE at 08:21, 0.01s elapsed
- Nmap scan report for 94.141.221.199
- Host is up (0.33s latency).
- Not shown: 969 closed ports
- PORT STATE SERVICE VERSION
- 1/tcp filtered tcpmux
- 3/tcp filtered compressnet
- 4/tcp filtered unknown
- 6/tcp filtered unknown
- 7/tcp filtered echo
- 9/tcp filtered discard
- 22/tcp filtered ssh
- 23/tcp filtered telnet
- 80/tcp open http Microsoft IIS httpd 7.5
- | http-methods: OPTIONS TRACE GET HEAD POST
- | Potentially risky methods: TRACE
- |_See http://nmap.org/nsedoc/scripts/http-methods.html
- |_http-server-header: Microsoft-IIS/7.5
- |_http-title: IIS7
- 135/tcp filtered msrpc
- 139/tcp filtered netbios-ssn
- 443/tcp open ssl/http Microsoft IIS httpd 7.5
- | http-cisco-anyconnect:
- |_ ERROR: Not a Cisco ASA or unsupported version
- | ssl-cert: Subject: commonName=khserver
- | Issuer: commonName=khserver
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-04-23T10:21:57
- | Not valid after: 2025-04-23T00:00:00
- | MD5: 08ce 09ff c17f e662 85ad 7d3c 9651 dd02
- |_SHA-1: 6f1b a6e0 2c16 e585 2dd8 244e 4091 6af4 39d2 c641
- |_ssl-date: 2015-11-22T08:20:16+00:00; +1s from scanner time.
- | sslv2:
- | SSLv2 supported
- | ciphers:
- | SSL2_RC4_128_WITH_MD5
- |_ SSL2_DES_192_EDE3_CBC_WITH_MD5
- |_sstp-discover: SSTP is supported.
- 445/tcp filtered microsoft-ds
- 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
- 1433/tcp filtered ms-sql-s
- 1720/tcp filtered h323q931
- 1723/tcp filtered pptp
- 2000/tcp filtered cisco-sccp
- 3389/tcp open ms-wbt-server Microsoft Terminal Service
- | ssl-cert: Subject: commonName=khserver
- | Issuer: commonName=khserver
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha1WithRSAEncryption
- | Not valid before: 2015-09-20T10:00:23
- | Not valid after: 2016-03-21T10:00:23
- | MD5: cb6a cb51 a2be b508 f5be fab8 1db2 7ce2
- |_SHA-1: aaee 9c3b 1ac6 3ddb 1e31 0862 cece 2103 5cec 92a4
- |_ssl-date: 2015-11-22T08:20:16+00:00; +1s from scanner time.
- 5060/tcp filtered sip
- 6002/tcp open http SafeNet Sentinel Protection Server httpd 7.3
- |_http-server-header: SentinelProtectionServer/7.3
- |_http-title: Sentinel License Monitor
- 7001/tcp open afs3-callback?
- 7002/tcp open http SafeNet Sentinel Keys License Monitor httpd 1.3.2 (Java Console)
- |_http-title: Sentinel License Monitor
- 49152/tcp open msrpc Microsoft Windows RPC
- 49153/tcp open msrpc Microsoft Windows RPC
- 49154/tcp open msrpc Microsoft Windows RPC
- 49155/tcp open msrpc Microsoft Windows RPC
- 49156/tcp open msrpc Microsoft Windows RPC
- 49157/tcp open msrpc Microsoft Windows RPC
- 49158/tcp open unknown
- 49159/tcp open msrpc Microsoft Windows RPC
- Device type: general purpose|printer
- Running (JUST GUESSING): Microsoft Windows 7|8.1|2008|Vista|2012|10 (95%), Lexmark embedded (88%)
- OS CPE: cpe:/o:microsoft:windows_7:::ultimate cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_vista::sp1:home_premium cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows_server_2012 cpe:/h:lexmark:x644e
- Aggressive OS guesses: Microsoft Windows 7 Ultimate (95%), Microsoft Windows 8.1 (95%), Microsoft Windows 7 SP1 or Windows Server 2008 SP2 (95%), Microsoft Windows Windows 7 SP1 (95%), Microsoft Windows Vista Home Premium SP1, Windows 7, or Windows Server 2008 (95%), Microsoft Windows Vista SP1 (95%), Microsoft Windows 7 SP1 (94%), Microsoft Windows 8.1 Update 1 (92%), Microsoft Windows 8 (92%), Microsoft Windows Vista Enterprise (92%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 29.062 days (since Sat Oct 24 07:51:54 2015)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=263 (Good luck!)
- IP ID Sequence Generation: Incremental
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 199/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 404.54 ms 94.141.221.199
- Nmap scan report for 94.141.221.200
- Host is up (0.36s latency).
- All 1000 scanned ports on 94.141.221.200 are filtered
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 30
- Nmap scan report for 94.141.221.201
- Host is up (0.39s latency).
- All 1000 scanned ports on 94.141.221.201 are filtered
- Device type: switch|VoIP adapter|VoIP phone
- Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded
- OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- - Hops 1-11 are the same as for 94.141.221.18
- 12 ... 15
- 16 481.22 ms 94.141.221.201
- Nmap scan report for 94.141.221.206
- Host is up (0.35s latency).
- Not shown: 999 filtered ports
- PORT STATE SERVICE VERSION
- 85/tcp open http mini_httpd 1.19 19dec2003
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: specialized|WAP|phone
- Running: iPXE 1.X, Linksys Linux 2.4.X, Linux 2.6.X, Sony Ericsson embedded
- OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linksys:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6 cpe:/h:sonyericsson:u8i_vivaz
- OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
- TRACEROUTE (using port 85/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 30
- Nmap scan report for 94.141.221.207
- Host is up (0.37s latency).
- All 1000 scanned ports on 94.141.221.207 are filtered (854) or closed (146)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- - Hops 1-10 are the same as for 94.141.221.18
- 11 ... 15
- 16 431.13 ms 94.141.221.207
- NSE: Script Post-scanning.
- Initiating NSE at 08:21
- Completed NSE at 08:21, 0.00s elapsed
- Initiating NSE at 08:21
- Completed NSE at 08:21, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 256 IP addresses (69 hosts up) scanned in 8975.33 seconds
- Raw packets sent: 178558 (8.055MB) | Rcvd: 241584 (12.675MB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement