Advertisement
Guest User

Untitled

a guest
Nov 22nd, 2015
1,872
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 265.97 KB | None | 0 0
  1.  
  2. Starting Nmap 6.49BETA5 ( https://nmap.org ) at 2015-11-22 05:51 GMT
  3. NSE: Loaded 122 scripts for scanning.
  4. NSE: Script Pre-scanning.
  5. Initiating NSE at 05:51
  6. Completed NSE at 05:51, 0.00s elapsed
  7. Initiating NSE at 05:51
  8. Completed NSE at 05:51, 0.00s elapsed
  9. Initiating Ping Scan at 05:51
  10. Scanning 256 hosts [4 ports/host]
  11. Completed Ping Scan at 05:52, 42.03s elapsed (256 total hosts)
  12. Initiating Parallel DNS resolution of 256 hosts. at 05:52
  13. Completed Parallel DNS resolution of 256 hosts. at 05:52, 13.18s elapsed
  14. Nmap scan report for 94.141.221.0 [host down]
  15. Nmap scan report for 94.141.221.1 [host down]
  16. Nmap scan report for 94.141.221.2 [host down]
  17. Nmap scan report for 94.141.221.4 [host down]
  18. Nmap scan report for 94.141.221.5 [host down]
  19. Nmap scan report for 94.141.221.6 [host down]
  20. Nmap scan report for 94.141.221.7 [host down]
  21. Nmap scan report for 94.141.221.8 [host down]
  22. Nmap scan report for 94.141.221.9 [host down]
  23. Nmap scan report for 94.141.221.11 [host down]
  24. Nmap scan report for 94.141.221.13 [host down]
  25. Nmap scan report for 94.141.221.14 [host down]
  26. Nmap scan report for 94.141.221.15 [host down]
  27. Nmap scan report for 94.141.221.16 [host down]
  28. Nmap scan report for 94.141.221.17 [host down]
  29. Nmap scan report for 94.141.221.20 [host down]
  30. Nmap scan report for 94.141.221.21 [host down]
  31. Nmap scan report for 94.141.221.23 [host down]
  32. Nmap scan report for 94.141.221.25 [host down]
  33. Nmap scan report for 94.141.221.26 [host down]
  34. Nmap scan report for 94.141.221.27 [host down]
  35. Nmap scan report for 94.141.221.29 [host down]
  36. Nmap scan report for 94.141.221.30 [host down]
  37. Nmap scan report for 94.141.221.35 [host down]
  38. Nmap scan report for 94.141.221.36 [host down]
  39. Nmap scan report for 94.141.221.37 [host down]
  40. Nmap scan report for 94.141.221.40 [host down]
  41. Nmap scan report for 94.141.221.41 [host down]
  42. Nmap scan report for 94.141.221.42 [host down]
  43. Nmap scan report for 94.141.221.44 [host down]
  44. Nmap scan report for 94.141.221.47 [host down]
  45. Nmap scan report for 94.141.221.48 [host down]
  46. Nmap scan report for 94.141.221.51 [host down]
  47. Nmap scan report for 94.141.221.52 [host down]
  48. Nmap scan report for 94.141.221.54 [host down]
  49. Nmap scan report for 94.141.221.55 [host down]
  50. Nmap scan report for 94.141.221.57 [host down]
  51. Nmap scan report for 94.141.221.59 [host down]
  52. Nmap scan report for 94.141.221.60 [host down]
  53. Nmap scan report for 94.141.221.61 [host down]
  54. Nmap scan report for 94.141.221.62 [host down]
  55. Nmap scan report for 94.141.221.63 [host down]
  56. Nmap scan report for 94.141.221.64 [host down]
  57. Nmap scan report for 94.141.221.65 [host down]
  58. Nmap scan report for 94.141.221.67 [host down]
  59. Nmap scan report for 94.141.221.69 [host down]
  60. Nmap scan report for 94.141.221.70 [host down]
  61. Nmap scan report for 94.141.221.71 [host down]
  62. Nmap scan report for 94.141.221.72 [host down]
  63. Nmap scan report for 94.141.221.74 [host down]
  64. Nmap scan report for 94.141.221.76 [host down]
  65. Nmap scan report for 94.141.221.77 [host down]
  66. Nmap scan report for 94.141.221.78 [host down]
  67. Nmap scan report for 94.141.221.82 [host down]
  68. Nmap scan report for 94.141.221.83 [host down]
  69. Nmap scan report for 94.141.221.84 [host down]
  70. Nmap scan report for 94.141.221.85 [host down]
  71. Nmap scan report for 94.141.221.86 [host down]
  72. Nmap scan report for 94.141.221.87 [host down]
  73. Nmap scan report for 94.141.221.88 [host down]
  74. Nmap scan report for 94.141.221.89 [host down]
  75. Nmap scan report for 94.141.221.90 [host down]
  76. Nmap scan report for 94.141.221.91 [host down]
  77. Nmap scan report for 94.141.221.92 [host down]
  78. Nmap scan report for 94.141.221.94 [host down]
  79. Nmap scan report for 94.141.221.95 [host down]
  80. Nmap scan report for 94.141.221.96 [host down]
  81. Nmap scan report for 94.141.221.97 [host down]
  82. Nmap scan report for 94.141.221.98 [host down]
  83. Nmap scan report for 94.141.221.100 [host down]
  84. Nmap scan report for 94.141.221.102 [host down]
  85. Nmap scan report for 94.141.221.104 [host down]
  86. Nmap scan report for 94.141.221.105 [host down]
  87. Nmap scan report for 94.141.221.107 [host down]
  88. Nmap scan report for 94.141.221.109 [host down]
  89. Nmap scan report for 94.141.221.110 [host down]
  90. Nmap scan report for 94.141.221.111 [host down]
  91. Nmap scan report for 94.141.221.112 [host down]
  92. Nmap scan report for 94.141.221.117 [host down]
  93. Nmap scan report for 94.141.221.123 [host down]
  94. Nmap scan report for 94.141.221.124 [host down]
  95. Nmap scan report for 94.141.221.125 [host down]
  96. Nmap scan report for 94.141.221.126 [host down]
  97. Nmap scan report for 94.141.221.129 [host down]
  98. Nmap scan report for 94.141.221.130 [host down]
  99. Nmap scan report for 94.141.221.133 [host down]
  100. Nmap scan report for 94.141.221.134 [host down]
  101. Nmap scan report for 94.141.221.135 [host down]
  102. Nmap scan report for 94.141.221.138 [host down]
  103. Nmap scan report for 94.141.221.140 [host down]
  104. Nmap scan report for 94.141.221.141 [host down]
  105. Nmap scan report for 94.141.221.142 [host down]
  106. Nmap scan report for 94.141.221.143 [host down]
  107. Nmap scan report for 94.141.221.145 [host down]
  108. Nmap scan report for 94.141.221.147 [host down]
  109. Nmap scan report for 94.141.221.148 [host down]
  110. Nmap scan report for 94.141.221.149 [host down]
  111. Nmap scan report for 94.141.221.151 [host down]
  112. Nmap scan report for 94.141.221.152 [host down]
  113. Nmap scan report for 94.141.221.153 [host down]
  114. Nmap scan report for 94.141.221.154 [host down]
  115. Nmap scan report for 94.141.221.155 [host down]
  116. Nmap scan report for 94.141.221.156 [host down]
  117. Nmap scan report for 94.141.221.158 [host down]
  118. Nmap scan report for 94.141.221.159 [host down]
  119. Nmap scan report for 94.141.221.160 [host down]
  120. Nmap scan report for 94.141.221.162 [host down]
  121. Nmap scan report for 94.141.221.163 [host down]
  122. Nmap scan report for 94.141.221.164 [host down]
  123. Nmap scan report for 94.141.221.165 [host down]
  124. Nmap scan report for 94.141.221.166 [host down]
  125. Nmap scan report for 94.141.221.167 [host down]
  126. Nmap scan report for 94.141.221.168 [host down]
  127. Nmap scan report for 94.141.221.169 [host down]
  128. Nmap scan report for 94.141.221.170 [host down]
  129. Nmap scan report for 94.141.221.171 [host down]
  130. Nmap scan report for 94.141.221.172 [host down]
  131. Nmap scan report for 94.141.221.173 [host down]
  132. Nmap scan report for 94.141.221.174 [host down]
  133. Nmap scan report for 94.141.221.175 [host down]
  134. Nmap scan report for 94.141.221.176 [host down]
  135. Nmap scan report for 94.141.221.177 [host down]
  136. Nmap scan report for 94.141.221.178 [host down]
  137. Nmap scan report for 94.141.221.180 [host down]
  138. Nmap scan report for 94.141.221.183 [host down]
  139. Nmap scan report for 94.141.221.184 [host down]
  140. Nmap scan report for 94.141.221.185 [host down]
  141. Nmap scan report for 94.141.221.186 [host down]
  142. Nmap scan report for 94.141.221.187 [host down]
  143. Nmap scan report for 94.141.221.188 [host down]
  144. Nmap scan report for 94.141.221.190 [host down]
  145. Nmap scan report for 94.141.221.192 [host down]
  146. Nmap scan report for 94.141.221.194 [host down]
  147. Initiating SYN Stealth Scan at 05:52
  148. Scanning 64 hosts [1000 ports/host]
  149. SYN Stealth Scan Timing: About 0.38% done
  150. adjust_timeouts2: packet supposedly had rtt of 9311997 microseconds. Ignoring time.
  151. adjust_timeouts2: packet supposedly had rtt of 9311997 microseconds. Ignoring time.
  152. adjust_timeouts2: packet supposedly had rtt of 8099911 microseconds. Ignoring time.
  153. adjust_timeouts2: packet supposedly had rtt of 8099911 microseconds. Ignoring time.
  154. adjust_timeouts2: packet supposedly had rtt of 8612769 microseconds. Ignoring time.
  155. adjust_timeouts2: packet supposedly had rtt of 8612769 microseconds. Ignoring time.
  156. Discovered open port 3306/tcp on 94.141.221.66
  157. Discovered open port 993/tcp on 94.141.221.182
  158. Discovered open port 8080/tcp on 94.141.221.191
  159. adjust_timeouts2: packet supposedly had rtt of 9994993 microseconds. Ignoring time.
  160. adjust_timeouts2: packet supposedly had rtt of 9994993 microseconds. Ignoring time.
  161. adjust_timeouts2: packet supposedly had rtt of 8832544 microseconds. Ignoring time.
  162. adjust_timeouts2: packet supposedly had rtt of 8832544 microseconds. Ignoring time.
  163. Discovered open port 8080/tcp on 94.141.221.58
  164. adjust_timeouts2: packet supposedly had rtt of 8946370 microseconds. Ignoring time.
  165. adjust_timeouts2: packet supposedly had rtt of 8946370 microseconds. Ignoring time.
  166. adjust_timeouts2: packet supposedly had rtt of 8132047 microseconds. Ignoring time.
  167. adjust_timeouts2: packet supposedly had rtt of 8132047 microseconds. Ignoring time.
  168. Discovered open port 8080/tcp on 94.141.221.19
  169. Discovered open port 8080/tcp on 94.141.221.101
  170. SYN Stealth Scan Timing: About 0.83% done
  171. adjust_timeouts2: packet supposedly had rtt of 9197965 microseconds. Ignoring time.
  172. adjust_timeouts2: packet supposedly had rtt of 9197965 microseconds. Ignoring time.
  173. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  174. Discovered open port 8080/tcp on 94.141.221.150
  175. Discovered open port 443/tcp on 94.141.221.66
  176. Increasing send delay for 94.141.221.161 from 0 to 5 due to 11 out of 16 dropped probes since last increase.
  177. Discovered open port 8080/tcp on 94.141.221.193
  178. Discovered open port 443/tcp on 94.141.221.68
  179. Discovered open port 80/tcp on 94.141.221.31
  180. Discovered open port 80/tcp on 94.141.221.122
  181. adjust_timeouts2: packet supposedly had rtt of 9559816 microseconds. Ignoring time.
  182. adjust_timeouts2: packet supposedly had rtt of 9559816 microseconds. Ignoring time.
  183. Discovered open port 80/tcp on 94.141.221.157
  184. Discovered open port 80/tcp on 94.141.221.195
  185. Discovered open port 8080/tcp on 94.141.221.139
  186. adjust_timeouts2: packet supposedly had rtt of 9434205 microseconds. Ignoring time.
  187. adjust_timeouts2: packet supposedly had rtt of 9434205 microseconds. Ignoring time.
  188. adjust_timeouts2: packet supposedly had rtt of 9523946 microseconds. Ignoring time.
  189. adjust_timeouts2: packet supposedly had rtt of 9523946 microseconds. Ignoring time.
  190. adjust_timeouts2: packet supposedly had rtt of 9387505 microseconds. Ignoring time.
  191. adjust_timeouts2: packet supposedly had rtt of 9387505 microseconds. Ignoring time.
  192. adjust_timeouts2: packet supposedly had rtt of 9956292 microseconds. Ignoring time.
  193. adjust_timeouts2: packet supposedly had rtt of 9956292 microseconds. Ignoring time.
  194. Discovered open port 80/tcp on 94.141.221.22
  195. adjust_timeouts2: packet supposedly had rtt of 9933898 microseconds. Ignoring time.
  196. adjust_timeouts2: packet supposedly had rtt of 9933898 microseconds. Ignoring time.
  197. SYN Stealth Scan Timing: About 1.29% done; ETC: 07:50 (1:56:28 remaining)
  198. adjust_timeouts2: packet supposedly had rtt of 9837852 microseconds. Ignoring time.
  199. adjust_timeouts2: packet supposedly had rtt of 9837852 microseconds. Ignoring time.
  200. Discovered open port 53/tcp on 94.141.221.182
  201. Discovered open port 80/tcp on 94.141.221.106
  202. Discovered open port 8080/tcp on 94.141.221.53
  203. Discovered open port 443/tcp on 94.141.221.182
  204. Discovered open port 80/tcp on 94.141.221.144
  205. adjust_timeouts2: packet supposedly had rtt of 9490688 microseconds. Ignoring time.
  206. adjust_timeouts2: packet supposedly had rtt of 9490688 microseconds. Ignoring time.
  207. Discovered open port 80/tcp on 94.141.221.115
  208. Discovered open port 80/tcp on 94.141.221.39
  209. adjust_timeouts2: packet supposedly had rtt of 9481923 microseconds. Ignoring time.
  210. adjust_timeouts2: packet supposedly had rtt of 9481923 microseconds. Ignoring time.
  211. Discovered open port 80/tcp on 94.141.221.33
  212. Discovered open port 80/tcp on 94.141.221.24
  213. Discovered open port 21/tcp on 94.141.221.19
  214. Discovered open port 21/tcp on 94.141.221.179
  215. Discovered open port 80/tcp on 94.141.221.12
  216. Discovered open port 80/tcp on 94.141.221.46
  217. Discovered open port 80/tcp on 94.141.221.34
  218. Discovered open port 21/tcp on 94.141.221.144
  219. adjust_timeouts2: packet supposedly had rtt of 8111551 microseconds. Ignoring time.
  220. adjust_timeouts2: packet supposedly had rtt of 8111551 microseconds. Ignoring time.
  221. adjust_timeouts2: packet supposedly had rtt of 8124289 microseconds. Ignoring time.
  222. adjust_timeouts2: packet supposedly had rtt of 8124289 microseconds. Ignoring time.
  223. Discovered open port 80/tcp on 94.141.221.139
  224. adjust_timeouts2: packet supposedly had rtt of 9595634 microseconds. Ignoring time.
  225. adjust_timeouts2: packet supposedly had rtt of 9595634 microseconds. Ignoring time.
  226. adjust_timeouts2: packet supposedly had rtt of 8602199 microseconds. Ignoring time.
  227. adjust_timeouts2: packet supposedly had rtt of 8602199 microseconds. Ignoring time.
  228. Discovered open port 21/tcp on 94.141.221.39
  229. Discovered open port 21/tcp on 94.141.221.116
  230. SYN Stealth Scan Timing: About 1.84% done; ETC: 07:45 (1:50:22 remaining)
  231. Discovered open port 80/tcp on 94.141.221.182
  232. Discovered open port 554/tcp on 94.141.221.31
  233. Discovered open port 21/tcp on 94.141.221.12
  234. Discovered open port 80/tcp on 94.141.221.66
  235. Increasing send delay for 94.141.221.161 from 5 to 10 due to 11 out of 19 dropped probes since last increase.
  236. adjust_timeouts2: packet supposedly had rtt of 10045846 microseconds. Ignoring time.
  237. adjust_timeouts2: packet supposedly had rtt of 10045846 microseconds. Ignoring time.
  238. Discovered open port 80/tcp on 94.141.221.49
  239. adjust_timeouts2: packet supposedly had rtt of 9975289 microseconds. Ignoring time.
  240. adjust_timeouts2: packet supposedly had rtt of 9975289 microseconds. Ignoring time.
  241. adjust_timeouts2: packet supposedly had rtt of 8858056 microseconds. Ignoring time.
  242. adjust_timeouts2: packet supposedly had rtt of 8858056 microseconds. Ignoring time.
  243. adjust_timeouts2: packet supposedly had rtt of 8748484 microseconds. Ignoring time.
  244. adjust_timeouts2: packet supposedly had rtt of 8748484 microseconds. Ignoring time.
  245. Discovered open port 3389/tcp on 94.141.221.68
  246. Discovered open port 80/tcp on 94.141.221.99
  247. Discovered open port 80/tcp on 94.141.221.43
  248. Discovered open port 21/tcp on 94.141.221.53
  249. Increasing send delay for 94.141.221.43 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
  250. Discovered open port 80/tcp on 94.141.221.193
  251. Discovered open port 554/tcp on 94.141.221.115
  252. adjust_timeouts2: packet supposedly had rtt of 8832683 microseconds. Ignoring time.
  253. adjust_timeouts2: packet supposedly had rtt of 8832683 microseconds. Ignoring time.
  254. adjust_timeouts2: packet supposedly had rtt of 9627072 microseconds. Ignoring time.
  255. adjust_timeouts2: packet supposedly had rtt of 9627072 microseconds. Ignoring time.
  256. Discovered open port 21/tcp on 94.141.221.150
  257. Discovered open port 3389/tcp on 94.141.221.75
  258. Discovered open port 21/tcp on 94.141.221.101
  259. Warning: 94.141.221.161 giving up on port because retransmission cap hit (6).
  260. Discovered open port 143/tcp on 94.141.221.182
  261. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  262. Discovered open port 554/tcp on 94.141.221.139
  263. Discovered open port 3389/tcp on 94.141.221.182
  264. Discovered open port 554/tcp on 94.141.221.132
  265. Discovered open port 995/tcp on 94.141.221.182
  266. Discovered open port 21/tcp on 94.141.221.43
  267. Discovered open port 21/tcp on 94.141.221.38
  268. Discovered open port 110/tcp on 94.141.221.182
  269. Discovered open port 554/tcp on 94.141.221.99
  270. adjust_timeouts2: packet supposedly had rtt of 8381522 microseconds. Ignoring time.
  271. adjust_timeouts2: packet supposedly had rtt of 8381522 microseconds. Ignoring time.
  272. adjust_timeouts2: packet supposedly had rtt of 8357715 microseconds. Ignoring time.
  273. adjust_timeouts2: packet supposedly had rtt of 8357715 microseconds. Ignoring time.
  274. Discovered open port 3389/tcp on 94.141.221.49
  275. adjust_timeouts2: packet supposedly had rtt of 10052214 microseconds. Ignoring time.
  276. adjust_timeouts2: packet supposedly had rtt of 10052214 microseconds. Ignoring time.
  277. adjust_timeouts2: packet supposedly had rtt of 8918811 microseconds. Ignoring time.
  278. adjust_timeouts2: packet supposedly had rtt of 8918811 microseconds. Ignoring time.
  279. adjust_timeouts2: packet supposedly had rtt of 8750282 microseconds. Ignoring time.
  280. adjust_timeouts2: packet supposedly had rtt of 8750282 microseconds. Ignoring time.
  281. adjust_timeouts2: packet supposedly had rtt of 9250846 microseconds. Ignoring time.
  282. adjust_timeouts2: packet supposedly had rtt of 9250846 microseconds. Ignoring time.
  283. Increasing send delay for 94.141.221.43 from 5 to 10 due to 11 out of 22 dropped probes since last increase.
  284. adjust_timeouts2: packet supposedly had rtt of 8109891 microseconds. Ignoring time.
  285. adjust_timeouts2: packet supposedly had rtt of 8109891 microseconds. Ignoring time.
  286. adjust_timeouts2: packet supposedly had rtt of 8015198 microseconds. Ignoring time.
  287. adjust_timeouts2: packet supposedly had rtt of 8015198 microseconds. Ignoring time.
  288. adjust_timeouts2: packet supposedly had rtt of 8205762 microseconds. Ignoring time.
  289. adjust_timeouts2: packet supposedly had rtt of 8205762 microseconds. Ignoring time.
  290. adjust_timeouts2: packet supposedly had rtt of 8373143 microseconds. Ignoring time.
  291. adjust_timeouts2: packet supposedly had rtt of 8373143 microseconds. Ignoring time.
  292. adjust_timeouts2: packet supposedly had rtt of 8181459 microseconds. Ignoring time.
  293. adjust_timeouts2: packet supposedly had rtt of 8181459 microseconds. Ignoring time.
  294. adjust_timeouts2: packet supposedly had rtt of 9335180 microseconds. Ignoring time.
  295. adjust_timeouts2: packet supposedly had rtt of 9335180 microseconds. Ignoring time.
  296. adjust_timeouts2: packet supposedly had rtt of 9116243 microseconds. Ignoring time.
  297. adjust_timeouts2: packet supposedly had rtt of 9116243 microseconds. Ignoring time.
  298. adjust_timeouts2: packet supposedly had rtt of 9220061 microseconds. Ignoring time.
  299. adjust_timeouts2: packet supposedly had rtt of 9220061 microseconds. Ignoring time.
  300. adjust_timeouts2: packet supposedly had rtt of 9212804 microseconds. Ignoring time.
  301. adjust_timeouts2: packet supposedly had rtt of 9212804 microseconds. Ignoring time.
  302. adjust_timeouts2: packet supposedly had rtt of 9117969 microseconds. Ignoring time.
  303. adjust_timeouts2: packet supposedly had rtt of 9117969 microseconds. Ignoring time.
  304. adjust_timeouts2: packet supposedly had rtt of 8226571 microseconds. Ignoring time.
  305. adjust_timeouts2: packet supposedly had rtt of 8226571 microseconds. Ignoring time.
  306. SYN Stealth Scan Timing: About 3.97% done; ETC: 07:41 (1:44:24 remaining)
  307. adjust_timeouts2: packet supposedly had rtt of 8070960 microseconds. Ignoring time.
  308. adjust_timeouts2: packet supposedly had rtt of 8070960 microseconds. Ignoring time.
  309. adjust_timeouts2: packet supposedly had rtt of 8536619 microseconds. Ignoring time.
  310. adjust_timeouts2: packet supposedly had rtt of 8536619 microseconds. Ignoring time.
  311. adjust_timeouts2: packet supposedly had rtt of 8566036 microseconds. Ignoring time.
  312. adjust_timeouts2: packet supposedly had rtt of 8566036 microseconds. Ignoring time.
  313. adjust_timeouts2: packet supposedly had rtt of 8436099 microseconds. Ignoring time.
  314. adjust_timeouts2: packet supposedly had rtt of 8436099 microseconds. Ignoring time.
  315. adjust_timeouts2: packet supposedly had rtt of 8339090 microseconds. Ignoring time.
  316. adjust_timeouts2: packet supposedly had rtt of 8339090 microseconds. Ignoring time.
  317. adjust_timeouts2: packet supposedly had rtt of 9457774 microseconds. Ignoring time.
  318. adjust_timeouts2: packet supposedly had rtt of 9457774 microseconds. Ignoring time.
  319. adjust_timeouts2: packet supposedly had rtt of 9787508 microseconds. Ignoring time.
  320. adjust_timeouts2: packet supposedly had rtt of 9787508 microseconds. Ignoring time.
  321. adjust_timeouts2: packet supposedly had rtt of 9523788 microseconds. Ignoring time.
  322. adjust_timeouts2: packet supposedly had rtt of 9523788 microseconds. Ignoring time.
  323. adjust_timeouts2: packet supposedly had rtt of 9152580 microseconds. Ignoring time.
  324. adjust_timeouts2: packet supposedly had rtt of 9152580 microseconds. Ignoring time.
  325. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  326. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  327. adjust_timeouts2: packet supposedly had rtt of 8433991 microseconds. Ignoring time.
  328. adjust_timeouts2: packet supposedly had rtt of 8433991 microseconds. Ignoring time.
  329. adjust_timeouts2: packet supposedly had rtt of 8793443 microseconds. Ignoring time.
  330. adjust_timeouts2: packet supposedly had rtt of 8793443 microseconds. Ignoring time.
  331. adjust_timeouts2: packet supposedly had rtt of 8719439 microseconds. Ignoring time.
  332. adjust_timeouts2: packet supposedly had rtt of 8719439 microseconds. Ignoring time.
  333. adjust_timeouts2: packet supposedly had rtt of 8158902 microseconds. Ignoring time.
  334. adjust_timeouts2: packet supposedly had rtt of 8158902 microseconds. Ignoring time.
  335. adjust_timeouts2: packet supposedly had rtt of 8101015 microseconds. Ignoring time.
  336. adjust_timeouts2: packet supposedly had rtt of 8101015 microseconds. Ignoring time.
  337. adjust_timeouts2: packet supposedly had rtt of 8926541 microseconds. Ignoring time.
  338. adjust_timeouts2: packet supposedly had rtt of 8926541 microseconds. Ignoring time.
  339. adjust_timeouts2: packet supposedly had rtt of 8578906 microseconds. Ignoring time.
  340. adjust_timeouts2: packet supposedly had rtt of 8578906 microseconds. Ignoring time.
  341. SYN Stealth Scan Timing: About 5.06% done; ETC: 07:36 (1:38:49 remaining)
  342. Discovered open port 10002/tcp on 94.141.221.106
  343. adjust_timeouts2: packet supposedly had rtt of 9162604 microseconds. Ignoring time.
  344. adjust_timeouts2: packet supposedly had rtt of 9162604 microseconds. Ignoring time.
  345. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  346. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  347. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  348. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  349. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  350. Discovered open port 10002/tcp on 94.141.221.46
  351. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  352. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  353. adjust_timeouts2: packet supposedly had rtt of 8299091 microseconds. Ignoring time.
  354. adjust_timeouts2: packet supposedly had rtt of 8299091 microseconds. Ignoring time.
  355. adjust_timeouts2: packet supposedly had rtt of 8317803 microseconds. Ignoring time.
  356. adjust_timeouts2: packet supposedly had rtt of 8317803 microseconds. Ignoring time.
  357. adjust_timeouts2: packet supposedly had rtt of 8094160 microseconds. Ignoring time.
  358. adjust_timeouts2: packet supposedly had rtt of 8094160 microseconds. Ignoring time.
  359. adjust_timeouts2: packet supposedly had rtt of 9373749 microseconds. Ignoring time.
  360. adjust_timeouts2: packet supposedly had rtt of 9373749 microseconds. Ignoring time.
  361. adjust_timeouts2: packet supposedly had rtt of 8930326 microseconds. Ignoring time.
  362. adjust_timeouts2: packet supposedly had rtt of 8930326 microseconds. Ignoring time.
  363. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  364. Discovered open port 5566/tcp on 94.141.221.122
  365. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  366. Increasing send delay for 94.141.221.116 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
  367. SYN Stealth Scan Timing: About 6.29% done; ETC: 07:32 (1:33:18 remaining)
  368. adjust_timeouts2: packet supposedly had rtt of 8632035 microseconds. Ignoring time.
  369. adjust_timeouts2: packet supposedly had rtt of 8632035 microseconds. Ignoring time.
  370. adjust_timeouts2: packet supposedly had rtt of 8656463 microseconds. Ignoring time.
  371. adjust_timeouts2: packet supposedly had rtt of 8656463 microseconds. Ignoring time.
  372. adjust_timeouts2: packet supposedly had rtt of 9498135 microseconds. Ignoring time.
  373. adjust_timeouts2: packet supposedly had rtt of 9498135 microseconds. Ignoring time.
  374. adjust_timeouts2: packet supposedly had rtt of 9347588 microseconds. Ignoring time.
  375. adjust_timeouts2: packet supposedly had rtt of 9347588 microseconds. Ignoring time.
  376. adjust_timeouts2: packet supposedly had rtt of 8053252 microseconds. Ignoring time.
  377. adjust_timeouts2: packet supposedly had rtt of 8053252 microseconds. Ignoring time.
  378. Increasing send delay for 94.141.221.121 from 0 to 5 due to 11 out of 22 dropped probes since last increase.
  379. adjust_timeouts2: packet supposedly had rtt of 9818860 microseconds. Ignoring time.
  380. adjust_timeouts2: packet supposedly had rtt of 9818860 microseconds. Ignoring time.
  381. adjust_timeouts2: packet supposedly had rtt of 9706204 microseconds. Ignoring time.
  382. adjust_timeouts2: packet supposedly had rtt of 9706204 microseconds. Ignoring time.
  383. adjust_timeouts2: packet supposedly had rtt of 9089096 microseconds. Ignoring time.
  384. adjust_timeouts2: packet supposedly had rtt of 9089096 microseconds. Ignoring time.
  385. adjust_timeouts2: packet supposedly had rtt of 9379264 microseconds. Ignoring time.
  386. adjust_timeouts2: packet supposedly had rtt of 9379264 microseconds. Ignoring time.
  387. adjust_timeouts2: packet supposedly had rtt of 8152607 microseconds. Ignoring time.
  388. adjust_timeouts2: packet supposedly had rtt of 8152607 microseconds. Ignoring time.
  389. adjust_timeouts2: packet supposedly had rtt of 9638363 microseconds. Ignoring time.
  390. adjust_timeouts2: packet supposedly had rtt of 9638363 microseconds. Ignoring time.
  391. adjust_timeouts2: packet supposedly had rtt of 9516596 microseconds. Ignoring time.
  392. adjust_timeouts2: packet supposedly had rtt of 9516596 microseconds. Ignoring time.
  393. adjust_timeouts2: packet supposedly had rtt of 8981207 microseconds. Ignoring time.
  394. adjust_timeouts2: packet supposedly had rtt of 8981207 microseconds. Ignoring time.
  395. adjust_timeouts2: packet supposedly had rtt of 8210319 microseconds. Ignoring time.
  396. adjust_timeouts2: packet supposedly had rtt of 8210319 microseconds. Ignoring time.
  397. adjust_timeouts2: packet supposedly had rtt of 9417707 microseconds. Ignoring time.
  398. adjust_timeouts2: packet supposedly had rtt of 9417707 microseconds. Ignoring time.
  399. Discovered open port 5431/tcp on 94.141.221.39
  400. adjust_timeouts2: packet supposedly had rtt of 8223853 microseconds. Ignoring time.
  401. adjust_timeouts2: packet supposedly had rtt of 8223853 microseconds. Ignoring time.
  402. adjust_timeouts2: packet supposedly had rtt of 8923431 microseconds. Ignoring time.
  403. adjust_timeouts2: packet supposedly had rtt of 8923431 microseconds. Ignoring time.
  404. adjust_timeouts2: packet supposedly had rtt of 9705674 microseconds. Ignoring time.
  405. adjust_timeouts2: packet supposedly had rtt of 9705674 microseconds. Ignoring time.
  406. adjust_timeouts2: packet supposedly had rtt of 8298740 microseconds. Ignoring time.
  407. adjust_timeouts2: packet supposedly had rtt of 8298740 microseconds. Ignoring time.
  408. adjust_timeouts2: packet supposedly had rtt of 9753850 microseconds. Ignoring time.
  409. adjust_timeouts2: packet supposedly had rtt of 9753850 microseconds. Ignoring time.
  410. adjust_timeouts2: packet supposedly had rtt of 9070019 microseconds. Ignoring time.
  411. adjust_timeouts2: packet supposedly had rtt of 9070019 microseconds. Ignoring time.
  412. adjust_timeouts2: packet supposedly had rtt of 8611626 microseconds. Ignoring time.
  413. adjust_timeouts2: packet supposedly had rtt of 8611626 microseconds. Ignoring time.
  414. adjust_timeouts2: packet supposedly had rtt of 8838435 microseconds. Ignoring time.
  415. adjust_timeouts2: packet supposedly had rtt of 8838435 microseconds. Ignoring time.
  416. adjust_timeouts2: packet supposedly had rtt of 8776980 microseconds. Ignoring time.
  417. adjust_timeouts2: packet supposedly had rtt of 8776980 microseconds. Ignoring time.
  418. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  419. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  420. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  421. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  422. adjust_timeouts2: packet supposedly had rtt of 9418015 microseconds. Ignoring time.
  423. adjust_timeouts2: packet supposedly had rtt of 9418015 microseconds. Ignoring time.
  424. adjust_timeouts2: packet supposedly had rtt of 8304185 microseconds. Ignoring time.
  425. adjust_timeouts2: packet supposedly had rtt of 8304185 microseconds. Ignoring time.
  426. adjust_timeouts2: packet supposedly had rtt of 8148124 microseconds. Ignoring time.
  427. adjust_timeouts2: packet supposedly had rtt of 8148124 microseconds. Ignoring time.
  428. adjust_timeouts2: packet supposedly had rtt of 8678896 microseconds. Ignoring time.
  429. adjust_timeouts2: packet supposedly had rtt of 8678896 microseconds. Ignoring time.
  430. SYN Stealth Scan Timing: About 8.08% done; ETC: 07:28 (1:28:19 remaining)
  431. adjust_timeouts2: packet supposedly had rtt of 8749273 microseconds. Ignoring time.
  432. adjust_timeouts2: packet supposedly had rtt of 8749273 microseconds. Ignoring time.
  433. adjust_timeouts2: packet supposedly had rtt of 8756111 microseconds. Ignoring time.
  434. adjust_timeouts2: packet supposedly had rtt of 8756111 microseconds. Ignoring time.
  435. adjust_timeouts2: packet supposedly had rtt of 8631898 microseconds. Ignoring time.
  436. adjust_timeouts2: packet supposedly had rtt of 8631898 microseconds. Ignoring time.
  437. adjust_timeouts2: packet supposedly had rtt of 9193775 microseconds. Ignoring time.
  438. adjust_timeouts2: packet supposedly had rtt of 9193775 microseconds. Ignoring time.
  439. adjust_timeouts2: packet supposedly had rtt of 9683434 microseconds. Ignoring time.
  440. adjust_timeouts2: packet supposedly had rtt of 9683434 microseconds. Ignoring time.
  441. adjust_timeouts2: packet supposedly had rtt of 9413077 microseconds. Ignoring time.
  442. adjust_timeouts2: packet supposedly had rtt of 9413077 microseconds. Ignoring time.
  443. adjust_timeouts2: packet supposedly had rtt of 9977072 microseconds. Ignoring time.
  444. adjust_timeouts2: packet supposedly had rtt of 9977072 microseconds. Ignoring time.
  445. adjust_timeouts2: packet supposedly had rtt of 9724115 microseconds. Ignoring time.
  446. adjust_timeouts2: packet supposedly had rtt of 9724115 microseconds. Ignoring time.
  447. adjust_timeouts2: packet supposedly had rtt of 9734713 microseconds. Ignoring time.
  448. adjust_timeouts2: packet supposedly had rtt of 9734713 microseconds. Ignoring time.
  449. adjust_timeouts2: packet supposedly had rtt of 8652903 microseconds. Ignoring time.
  450. adjust_timeouts2: packet supposedly had rtt of 8652903 microseconds. Ignoring time.
  451. adjust_timeouts2: packet supposedly had rtt of 8947760 microseconds. Ignoring time.
  452. adjust_timeouts2: packet supposedly had rtt of 8947760 microseconds. Ignoring time.
  453. adjust_timeouts2: packet supposedly had rtt of 9931913 microseconds. Ignoring time.
  454. adjust_timeouts2: packet supposedly had rtt of 9931913 microseconds. Ignoring time.
  455. adjust_timeouts2: packet supposedly had rtt of 9709994 microseconds. Ignoring time.
  456. adjust_timeouts2: packet supposedly had rtt of 9709994 microseconds. Ignoring time.
  457. adjust_timeouts2: packet supposedly had rtt of 9992586 microseconds. Ignoring time.
  458. adjust_timeouts2: packet supposedly had rtt of 9992586 microseconds. Ignoring time.
  459. adjust_timeouts2: packet supposedly had rtt of 9581308 microseconds. Ignoring time.
  460. adjust_timeouts2: packet supposedly had rtt of 9581308 microseconds. Ignoring time.
  461. adjust_timeouts2: packet supposedly had rtt of 9273396 microseconds. Ignoring time.
  462. adjust_timeouts2: packet supposedly had rtt of 9273396 microseconds. Ignoring time.
  463. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  464. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  465. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  466. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  467. adjust_timeouts2: packet supposedly had rtt of 8572561 microseconds. Ignoring time.
  468. adjust_timeouts2: packet supposedly had rtt of 8572561 microseconds. Ignoring time.
  469. adjust_timeouts2: packet supposedly had rtt of 8569735 microseconds. Ignoring time.
  470. adjust_timeouts2: packet supposedly had rtt of 8569735 microseconds. Ignoring time.
  471. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  472. adjust_timeouts2: packet supposedly had rtt of 9470000 microseconds. Ignoring time.
  473. adjust_timeouts2: packet supposedly had rtt of 9470000 microseconds. Ignoring time.
  474. adjust_timeouts2: packet supposedly had rtt of 9873593 microseconds. Ignoring time.
  475. adjust_timeouts2: packet supposedly had rtt of 9873593 microseconds. Ignoring time.
  476. adjust_timeouts2: packet supposedly had rtt of 8837088 microseconds. Ignoring time.
  477. adjust_timeouts2: packet supposedly had rtt of 8837088 microseconds. Ignoring time.
  478. Discovered open port 8080/tcp on 94.141.221.38
  479. adjust_timeouts2: packet supposedly had rtt of 8105726 microseconds. Ignoring time.
  480. adjust_timeouts2: packet supposedly had rtt of 8105726 microseconds. Ignoring time.
  481. Discovered open port 9010/tcp on 94.141.221.22
  482. adjust_timeouts2: packet supposedly had rtt of 10049015 microseconds. Ignoring time.
  483. adjust_timeouts2: packet supposedly had rtt of 10049015 microseconds. Ignoring time.
  484. adjust_timeouts2: packet supposedly had rtt of 9525135 microseconds. Ignoring time.
  485. adjust_timeouts2: packet supposedly had rtt of 9525135 microseconds. Ignoring time.
  486. adjust_timeouts2: packet supposedly had rtt of 8959406 microseconds. Ignoring time.
  487. adjust_timeouts2: packet supposedly had rtt of 8959406 microseconds. Ignoring time.
  488. adjust_timeouts2: packet supposedly had rtt of 8094163 microseconds. Ignoring time.
  489. adjust_timeouts2: packet supposedly had rtt of 8094163 microseconds. Ignoring time.
  490. adjust_timeouts2: packet supposedly had rtt of 9295363 microseconds. Ignoring time.
  491. adjust_timeouts2: packet supposedly had rtt of 9295363 microseconds. Ignoring time.
  492. adjust_timeouts2: packet supposedly had rtt of 9898448 microseconds. Ignoring time.
  493. adjust_timeouts2: packet supposedly had rtt of 9898448 microseconds. Ignoring time.
  494. adjust_timeouts2: packet supposedly had rtt of 9889708 microseconds. Ignoring time.
  495. adjust_timeouts2: packet supposedly had rtt of 9889708 microseconds. Ignoring time.
  496. adjust_timeouts2: packet supposedly had rtt of 9655085 microseconds. Ignoring time.
  497. adjust_timeouts2: packet supposedly had rtt of 9655085 microseconds. Ignoring time.
  498. adjust_timeouts2: packet supposedly had rtt of 8350830 microseconds. Ignoring time.
  499. adjust_timeouts2: packet supposedly had rtt of 8350830 microseconds. Ignoring time.
  500. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  501. adjust_timeouts2: packet supposedly had rtt of 8517173 microseconds. Ignoring time.
  502. adjust_timeouts2: packet supposedly had rtt of 8517173 microseconds. Ignoring time.
  503. adjust_timeouts2: packet supposedly had rtt of 9056069 microseconds. Ignoring time.
  504. adjust_timeouts2: packet supposedly had rtt of 9056069 microseconds. Ignoring time.
  505. adjust_timeouts2: packet supposedly had rtt of 9917943 microseconds. Ignoring time.
  506. adjust_timeouts2: packet supposedly had rtt of 9917943 microseconds. Ignoring time.
  507. adjust_timeouts2: packet supposedly had rtt of 9932981 microseconds. Ignoring time.
  508. adjust_timeouts2: packet supposedly had rtt of 9932981 microseconds. Ignoring time.
  509. adjust_timeouts2: packet supposedly had rtt of 8731428 microseconds. Ignoring time.
  510. adjust_timeouts2: packet supposedly had rtt of 8731428 microseconds. Ignoring time.
  511. adjust_timeouts2: packet supposedly had rtt of 9403406 microseconds. Ignoring time.
  512. adjust_timeouts2: packet supposedly had rtt of 9403406 microseconds. Ignoring time.
  513. adjust_timeouts2: packet supposedly had rtt of 8333164 microseconds. Ignoring time.
  514. adjust_timeouts2: packet supposedly had rtt of 8333164 microseconds. Ignoring time.
  515. adjust_timeouts2: packet supposedly had rtt of 9861554 microseconds. Ignoring time.
  516. adjust_timeouts2: packet supposedly had rtt of 9861554 microseconds. Ignoring time.
  517. adjust_timeouts2: packet supposedly had rtt of 8731671 microseconds. Ignoring time.
  518. adjust_timeouts2: packet supposedly had rtt of 8731671 microseconds. Ignoring time.
  519. adjust_timeouts2: packet supposedly had rtt of 8171455 microseconds. Ignoring time.
  520. adjust_timeouts2: packet supposedly had rtt of 8171455 microseconds. Ignoring time.
  521. adjust_timeouts2: packet supposedly had rtt of 9452449 microseconds. Ignoring time.
  522. adjust_timeouts2: packet supposedly had rtt of 9452449 microseconds. Ignoring time.
  523. SYN Stealth Scan Timing: About 10.38% done; ETC: 07:26 (1:23:29 remaining)
  524. Discovered open port 1864/tcp on 94.141.221.122
  525. adjust_timeouts2: packet supposedly had rtt of 8287051 microseconds. Ignoring time.
  526. adjust_timeouts2: packet supposedly had rtt of 8287051 microseconds. Ignoring time.
  527. adjust_timeouts2: packet supposedly had rtt of 8176358 microseconds. Ignoring time.
  528. adjust_timeouts2: packet supposedly had rtt of 8176358 microseconds. Ignoring time.
  529. adjust_timeouts2: packet supposedly had rtt of 8023773 microseconds. Ignoring time.
  530. adjust_timeouts2: packet supposedly had rtt of 8023773 microseconds. Ignoring time.
  531. Discovered open port 88/tcp on 94.141.221.24
  532. adjust_timeouts2: packet supposedly had rtt of 9209873 microseconds. Ignoring time.
  533. adjust_timeouts2: packet supposedly had rtt of 9209873 microseconds. Ignoring time.
  534. adjust_timeouts2: packet supposedly had rtt of 8590749 microseconds. Ignoring time.
  535. adjust_timeouts2: packet supposedly had rtt of 8590749 microseconds. Ignoring time.
  536. adjust_timeouts2: packet supposedly had rtt of 9133430 microseconds. Ignoring time.
  537. adjust_timeouts2: packet supposedly had rtt of 9133430 microseconds. Ignoring time.
  538. adjust_timeouts2: packet supposedly had rtt of 8197567 microseconds. Ignoring time.
  539. adjust_timeouts2: packet supposedly had rtt of 8197567 microseconds. Ignoring time.
  540. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  541. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  542. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  543. Discovered open port 9010/tcp on 94.141.221.121
  544. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  545. Discovered open port 9010/tcp on 94.141.221.108
  546. adjust_timeouts2: packet supposedly had rtt of 8297798 microseconds. Ignoring time.
  547. adjust_timeouts2: packet supposedly had rtt of 8297798 microseconds. Ignoring time.
  548. adjust_timeouts2: packet supposedly had rtt of 8441002 microseconds. Ignoring time.
  549. adjust_timeouts2: packet supposedly had rtt of 8441002 microseconds. Ignoring time.
  550. adjust_timeouts2: packet supposedly had rtt of 9343292 microseconds. Ignoring time.
  551. adjust_timeouts2: packet supposedly had rtt of 9343292 microseconds. Ignoring time.
  552. adjust_timeouts2: packet supposedly had rtt of 9476931 microseconds. Ignoring time.
  553. adjust_timeouts2: packet supposedly had rtt of 9476931 microseconds. Ignoring time.
  554. adjust_timeouts2: packet supposedly had rtt of 8649520 microseconds. Ignoring time.
  555. adjust_timeouts2: packet supposedly had rtt of 8649520 microseconds. Ignoring time.
  556. adjust_timeouts2: packet supposedly had rtt of 8403144 microseconds. Ignoring time.
  557. adjust_timeouts2: packet supposedly had rtt of 8403144 microseconds. Ignoring time.
  558. adjust_timeouts2: packet supposedly had rtt of 9230715 microseconds. Ignoring time.
  559. adjust_timeouts2: packet supposedly had rtt of 9230715 microseconds. Ignoring time.
  560. adjust_timeouts2: packet supposedly had rtt of 9135401 microseconds. Ignoring time.
  561. adjust_timeouts2: packet supposedly had rtt of 9135401 microseconds. Ignoring time.
  562. adjust_timeouts2: packet supposedly had rtt of 8781759 microseconds. Ignoring time.
  563. adjust_timeouts2: packet supposedly had rtt of 8781759 microseconds. Ignoring time.
  564. adjust_timeouts2: packet supposedly had rtt of 9881102 microseconds. Ignoring time.
  565. adjust_timeouts2: packet supposedly had rtt of 9881102 microseconds. Ignoring time.
  566. adjust_timeouts2: packet supposedly had rtt of 9597854 microseconds. Ignoring time.
  567. adjust_timeouts2: packet supposedly had rtt of 9597854 microseconds. Ignoring time.
  568. adjust_timeouts2: packet supposedly had rtt of 9416796 microseconds. Ignoring time.
  569. adjust_timeouts2: packet supposedly had rtt of 9416796 microseconds. Ignoring time.
  570. adjust_timeouts2: packet supposedly had rtt of 9338333 microseconds. Ignoring time.
  571. adjust_timeouts2: packet supposedly had rtt of 9338333 microseconds. Ignoring time.
  572. adjust_timeouts2: packet supposedly had rtt of 8129628 microseconds. Ignoring time.
  573. adjust_timeouts2: packet supposedly had rtt of 8129628 microseconds. Ignoring time.
  574. adjust_timeouts2: packet supposedly had rtt of 9980346 microseconds. Ignoring time.
  575. adjust_timeouts2: packet supposedly had rtt of 9980346 microseconds. Ignoring time.
  576. adjust_timeouts2: packet supposedly had rtt of 8872226 microseconds. Ignoring time.
  577. adjust_timeouts2: packet supposedly had rtt of 8872226 microseconds. Ignoring time.
  578. adjust_timeouts2: packet supposedly had rtt of 9309324 microseconds. Ignoring time.
  579. adjust_timeouts2: packet supposedly had rtt of 9309324 microseconds. Ignoring time.
  580. adjust_timeouts2: packet supposedly had rtt of 9229083 microseconds. Ignoring time.
  581. adjust_timeouts2: packet supposedly had rtt of 9229083 microseconds. Ignoring time.
  582. adjust_timeouts2: packet supposedly had rtt of 8165044 microseconds. Ignoring time.
  583. adjust_timeouts2: packet supposedly had rtt of 8165044 microseconds. Ignoring time.
  584. adjust_timeouts2: packet supposedly had rtt of 8157229 microseconds. Ignoring time.
  585. adjust_timeouts2: packet supposedly had rtt of 8157229 microseconds. Ignoring time.
  586. adjust_timeouts2: packet supposedly had rtt of 9856594 microseconds. Ignoring time.
  587. adjust_timeouts2: packet supposedly had rtt of 9856594 microseconds. Ignoring time.
  588. adjust_timeouts2: packet supposedly had rtt of 8630353 microseconds. Ignoring time.
  589. adjust_timeouts2: packet supposedly had rtt of 8630353 microseconds. Ignoring time.
  590. adjust_timeouts2: packet supposedly had rtt of 9250125 microseconds. Ignoring time.
  591. adjust_timeouts2: packet supposedly had rtt of 9250125 microseconds. Ignoring time.
  592. adjust_timeouts2: packet supposedly had rtt of 9214775 microseconds. Ignoring time.
  593. adjust_timeouts2: packet supposedly had rtt of 9214775 microseconds. Ignoring time.
  594. adjust_timeouts2: packet supposedly had rtt of 8057130 microseconds. Ignoring time.
  595. adjust_timeouts2: packet supposedly had rtt of 8057130 microseconds. Ignoring time.
  596. adjust_timeouts2: packet supposedly had rtt of 8027416 microseconds. Ignoring time.
  597. adjust_timeouts2: packet supposedly had rtt of 8027416 microseconds. Ignoring time.
  598. adjust_timeouts2: packet supposedly had rtt of 9244432 microseconds. Ignoring time.
  599. adjust_timeouts2: packet supposedly had rtt of 9244432 microseconds. Ignoring time.
  600. adjust_timeouts2: packet supposedly had rtt of 8262582 microseconds. Ignoring time.
  601. adjust_timeouts2: packet supposedly had rtt of 8262582 microseconds. Ignoring time.
  602. adjust_timeouts2: packet supposedly had rtt of 9377097 microseconds. Ignoring time.
  603. adjust_timeouts2: packet supposedly had rtt of 9377097 microseconds. Ignoring time.
  604. adjust_timeouts2: packet supposedly had rtt of 9363278 microseconds. Ignoring time.
  605. adjust_timeouts2: packet supposedly had rtt of 9363278 microseconds. Ignoring time.
  606. adjust_timeouts2: packet supposedly had rtt of 8267162 microseconds. Ignoring time.
  607. adjust_timeouts2: packet supposedly had rtt of 8267162 microseconds. Ignoring time.
  608. adjust_timeouts2: packet supposedly had rtt of 8188812 microseconds. Ignoring time.
  609. adjust_timeouts2: packet supposedly had rtt of 8188812 microseconds. Ignoring time.
  610. adjust_timeouts2: packet supposedly had rtt of 8189808 microseconds. Ignoring time.
  611. adjust_timeouts2: packet supposedly had rtt of 8189808 microseconds. Ignoring time.
  612. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  613. adjust_timeouts2: packet supposedly had rtt of 8374295 microseconds. Ignoring time.
  614. adjust_timeouts2: packet supposedly had rtt of 8374295 microseconds. Ignoring time.
  615. adjust_timeouts2: packet supposedly had rtt of 8330240 microseconds. Ignoring time.
  616. adjust_timeouts2: packet supposedly had rtt of 8330240 microseconds. Ignoring time.
  617. adjust_timeouts2: packet supposedly had rtt of 8366478 microseconds. Ignoring time.
  618. adjust_timeouts2: packet supposedly had rtt of 8366478 microseconds. Ignoring time.
  619. adjust_timeouts2: packet supposedly had rtt of 8052728 microseconds. Ignoring time.
  620. adjust_timeouts2: packet supposedly had rtt of 8052728 microseconds. Ignoring time.
  621. Discovered open port 88/tcp on 94.141.221.182
  622. Discovered open port 88/tcp on 94.141.221.49
  623. Increasing send delay for 94.141.221.121 from 5 to 10 due to 11 out of 22 dropped probes since last increase.
  624. Increasing send delay for 94.141.221.116 from 5 to 10 due to 11 out of 21 dropped probes since last increase.
  625. adjust_timeouts2: packet supposedly had rtt of 8062426 microseconds. Ignoring time.
  626. adjust_timeouts2: packet supposedly had rtt of 8062426 microseconds. Ignoring time.
  627. adjust_timeouts2: packet supposedly had rtt of 8319283 microseconds. Ignoring time.
  628. adjust_timeouts2: packet supposedly had rtt of 8319283 microseconds. Ignoring time.
  629. adjust_timeouts2: packet supposedly had rtt of 8267362 microseconds. Ignoring time.
  630. adjust_timeouts2: packet supposedly had rtt of 8267362 microseconds. Ignoring time.
  631. adjust_timeouts2: packet supposedly had rtt of 8554497 microseconds. Ignoring time.
  632. adjust_timeouts2: packet supposedly had rtt of 8554497 microseconds. Ignoring time.
  633. adjust_timeouts2: packet supposedly had rtt of 9299893 microseconds. Ignoring time.
  634. adjust_timeouts2: packet supposedly had rtt of 9299893 microseconds. Ignoring time.
  635. adjust_timeouts2: packet supposedly had rtt of 8661111 microseconds. Ignoring time.
  636. adjust_timeouts2: packet supposedly had rtt of 8661111 microseconds. Ignoring time.
  637. adjust_timeouts2: packet supposedly had rtt of 8436185 microseconds. Ignoring time.
  638. adjust_timeouts2: packet supposedly had rtt of 8436185 microseconds. Ignoring time.
  639. adjust_timeouts2: packet supposedly had rtt of 8089477 microseconds. Ignoring time.
  640. adjust_timeouts2: packet supposedly had rtt of 8089477 microseconds. Ignoring time.
  641. SYN Stealth Scan Timing: About 13.67% done; ETC: 07:24 (1:18:45 remaining)
  642. adjust_timeouts2: packet supposedly had rtt of 9114678 microseconds. Ignoring time.
  643. adjust_timeouts2: packet supposedly had rtt of 9114678 microseconds. Ignoring time.
  644. adjust_timeouts2: packet supposedly had rtt of 8829038 microseconds. Ignoring time.
  645. adjust_timeouts2: packet supposedly had rtt of 8829038 microseconds. Ignoring time.
  646. adjust_timeouts2: packet supposedly had rtt of 9078099 microseconds. Ignoring time.
  647. adjust_timeouts2: packet supposedly had rtt of 9078099 microseconds. Ignoring time.
  648. adjust_timeouts2: packet supposedly had rtt of 9267047 microseconds. Ignoring time.
  649. adjust_timeouts2: packet supposedly had rtt of 9267047 microseconds. Ignoring time.
  650. adjust_timeouts2: packet supposedly had rtt of 9320451 microseconds. Ignoring time.
  651. adjust_timeouts2: packet supposedly had rtt of 9320451 microseconds. Ignoring time.
  652. adjust_timeouts2: packet supposedly had rtt of 9334744 microseconds. Ignoring time.
  653. adjust_timeouts2: packet supposedly had rtt of 9334744 microseconds. Ignoring time.
  654. adjust_timeouts2: packet supposedly had rtt of 9471291 microseconds. Ignoring time.
  655. adjust_timeouts2: packet supposedly had rtt of 9471291 microseconds. Ignoring time.
  656. adjust_timeouts2: packet supposedly had rtt of 9053589 microseconds. Ignoring time.
  657. adjust_timeouts2: packet supposedly had rtt of 9053589 microseconds. Ignoring time.
  658. adjust_timeouts2: packet supposedly had rtt of 8317383 microseconds. Ignoring time.
  659. adjust_timeouts2: packet supposedly had rtt of 8317383 microseconds. Ignoring time.
  660. adjust_timeouts2: packet supposedly had rtt of 8440567 microseconds. Ignoring time.
  661. adjust_timeouts2: packet supposedly had rtt of 8440567 microseconds. Ignoring time.
  662. Discovered open port 563/tcp on 94.141.221.182
  663. adjust_timeouts2: packet supposedly had rtt of 8844217 microseconds. Ignoring time.
  664. adjust_timeouts2: packet supposedly had rtt of 8844217 microseconds. Ignoring time.
  665. adjust_timeouts2: packet supposedly had rtt of 9521272 microseconds. Ignoring time.
  666. adjust_timeouts2: packet supposedly had rtt of 9521272 microseconds. Ignoring time.
  667. adjust_timeouts2: packet supposedly had rtt of 9039178 microseconds. Ignoring time.
  668. adjust_timeouts2: packet supposedly had rtt of 9039178 microseconds. Ignoring time.
  669. adjust_timeouts2: packet supposedly had rtt of 8400516 microseconds. Ignoring time.
  670. adjust_timeouts2: packet supposedly had rtt of 8400516 microseconds. Ignoring time.
  671. adjust_timeouts2: packet supposedly had rtt of 9149038 microseconds. Ignoring time.
  672. adjust_timeouts2: packet supposedly had rtt of 9149038 microseconds. Ignoring time.
  673. adjust_timeouts2: packet supposedly had rtt of 9116656 microseconds. Ignoring time.
  674. adjust_timeouts2: packet supposedly had rtt of 9116656 microseconds. Ignoring time.
  675. adjust_timeouts2: packet supposedly had rtt of 8154045 microseconds. Ignoring time.
  676. adjust_timeouts2: packet supposedly had rtt of 8154045 microseconds. Ignoring time.
  677. Discovered open port 8002/tcp on 94.141.221.22
  678. adjust_timeouts2: packet supposedly had rtt of 9169711 microseconds. Ignoring time.
  679. adjust_timeouts2: packet supposedly had rtt of 9169711 microseconds. Ignoring time.
  680. adjust_timeouts2: packet supposedly had rtt of 8986294 microseconds. Ignoring time.
  681. adjust_timeouts2: packet supposedly had rtt of 8986294 microseconds. Ignoring time.
  682. adjust_timeouts2: packet supposedly had rtt of 8201030 microseconds. Ignoring time.
  683. adjust_timeouts2: packet supposedly had rtt of 8201030 microseconds. Ignoring time.
  684. adjust_timeouts2: packet supposedly had rtt of 9274744 microseconds. Ignoring time.
  685. adjust_timeouts2: packet supposedly had rtt of 9274744 microseconds. Ignoring time.
  686. adjust_timeouts2: packet supposedly had rtt of 9330368 microseconds. Ignoring time.
  687. adjust_timeouts2: packet supposedly had rtt of 9330368 microseconds. Ignoring time.
  688. adjust_timeouts2: packet supposedly had rtt of 9339531 microseconds. Ignoring time.
  689. adjust_timeouts2: packet supposedly had rtt of 9339531 microseconds. Ignoring time.
  690. adjust_timeouts2: packet supposedly had rtt of 9683685 microseconds. Ignoring time.
  691. adjust_timeouts2: packet supposedly had rtt of 9683685 microseconds. Ignoring time.
  692. adjust_timeouts2: packet supposedly had rtt of 9724899 microseconds. Ignoring time.
  693. adjust_timeouts2: packet supposedly had rtt of 9724899 microseconds. Ignoring time.
  694. adjust_timeouts2: packet supposedly had rtt of 9665043 microseconds. Ignoring time.
  695. adjust_timeouts2: packet supposedly had rtt of 9665043 microseconds. Ignoring time.
  696. adjust_timeouts2: packet supposedly had rtt of 9198584 microseconds. Ignoring time.
  697. adjust_timeouts2: packet supposedly had rtt of 9198584 microseconds. Ignoring time.
  698. adjust_timeouts2: packet supposedly had rtt of 8577548 microseconds. Ignoring time.
  699. adjust_timeouts2: packet supposedly had rtt of 8577548 microseconds. Ignoring time.
  700. adjust_timeouts2: packet supposedly had rtt of 8596607 microseconds. Ignoring time.
  701. adjust_timeouts2: packet supposedly had rtt of 8596607 microseconds. Ignoring time.
  702. adjust_timeouts2: packet supposedly had rtt of 9446639 microseconds. Ignoring time.
  703. adjust_timeouts2: packet supposedly had rtt of 9446639 microseconds. Ignoring time.
  704. adjust_timeouts2: packet supposedly had rtt of 9563525 microseconds. Ignoring time.
  705. adjust_timeouts2: packet supposedly had rtt of 9563525 microseconds. Ignoring time.
  706. adjust_timeouts2: packet supposedly had rtt of 9024417 microseconds. Ignoring time.
  707. adjust_timeouts2: packet supposedly had rtt of 9024417 microseconds. Ignoring time.
  708. adjust_timeouts2: packet supposedly had rtt of 8495307 microseconds. Ignoring time.
  709. adjust_timeouts2: packet supposedly had rtt of 8495307 microseconds. Ignoring time.
  710. adjust_timeouts2: packet supposedly had rtt of 8498955 microseconds. Ignoring time.
  711. adjust_timeouts2: packet supposedly had rtt of 8498955 microseconds. Ignoring time.
  712. adjust_timeouts2: packet supposedly had rtt of 9804593 microseconds. Ignoring time.
  713. adjust_timeouts2: packet supposedly had rtt of 9804593 microseconds. Ignoring time.
  714. adjust_timeouts2: packet supposedly had rtt of 9533421 microseconds. Ignoring time.
  715. adjust_timeouts2: packet supposedly had rtt of 9533421 microseconds. Ignoring time.
  716. adjust_timeouts2: packet supposedly had rtt of 9819705 microseconds. Ignoring time.
  717. adjust_timeouts2: packet supposedly had rtt of 9819705 microseconds. Ignoring time.
  718. adjust_timeouts2: packet supposedly had rtt of 9699582 microseconds. Ignoring time.
  719. adjust_timeouts2: packet supposedly had rtt of 9699582 microseconds. Ignoring time.
  720. adjust_timeouts2: packet supposedly had rtt of 8666868 microseconds. Ignoring time.
  721. adjust_timeouts2: packet supposedly had rtt of 8666868 microseconds. Ignoring time.
  722. adjust_timeouts2: packet supposedly had rtt of 9534336 microseconds. Ignoring time.
  723. adjust_timeouts2: packet supposedly had rtt of 9534336 microseconds. Ignoring time.
  724. adjust_timeouts2: packet supposedly had rtt of 9633988 microseconds. Ignoring time.
  725. adjust_timeouts2: packet supposedly had rtt of 9633988 microseconds. Ignoring time.
  726. adjust_timeouts2: packet supposedly had rtt of 9543584 microseconds. Ignoring time.
  727. adjust_timeouts2: packet supposedly had rtt of 9543584 microseconds. Ignoring time.
  728. adjust_timeouts2: packet supposedly had rtt of 9227613 microseconds. Ignoring time.
  729. adjust_timeouts2: packet supposedly had rtt of 9227613 microseconds. Ignoring time.
  730. adjust_timeouts2: packet supposedly had rtt of 8465738 microseconds. Ignoring time.
  731. adjust_timeouts2: packet supposedly had rtt of 8465738 microseconds. Ignoring time.
  732. adjust_timeouts2: packet supposedly had rtt of 8153534 microseconds. Ignoring time.
  733. adjust_timeouts2: packet supposedly had rtt of 8153534 microseconds. Ignoring time.
  734. adjust_timeouts2: packet supposedly had rtt of 9797490 microseconds. Ignoring time.
  735. adjust_timeouts2: packet supposedly had rtt of 9797490 microseconds. Ignoring time.
  736. adjust_timeouts2: packet supposedly had rtt of 9711184 microseconds. Ignoring time.
  737. adjust_timeouts2: packet supposedly had rtt of 9711184 microseconds. Ignoring time.
  738. adjust_timeouts2: packet supposedly had rtt of 9303393 microseconds. Ignoring time.
  739. adjust_timeouts2: packet supposedly had rtt of 9303393 microseconds. Ignoring time.
  740. adjust_timeouts2: packet supposedly had rtt of 8543899 microseconds. Ignoring time.
  741. adjust_timeouts2: packet supposedly had rtt of 8543899 microseconds. Ignoring time.
  742. SYN Stealth Scan Timing: About 16.13% done; ETC: 07:21 (1:14:11 remaining)
  743. adjust_timeouts2: packet supposedly had rtt of 9655751 microseconds. Ignoring time.
  744. adjust_timeouts2: packet supposedly had rtt of 9655751 microseconds. Ignoring time.
  745. adjust_timeouts2: packet supposedly had rtt of 8462344 microseconds. Ignoring time.
  746. adjust_timeouts2: packet supposedly had rtt of 8462344 microseconds. Ignoring time.
  747. adjust_timeouts2: packet supposedly had rtt of 9616655 microseconds. Ignoring time.
  748. adjust_timeouts2: packet supposedly had rtt of 9616655 microseconds. Ignoring time.
  749. adjust_timeouts2: packet supposedly had rtt of 8459599 microseconds. Ignoring time.
  750. adjust_timeouts2: packet supposedly had rtt of 8459599 microseconds. Ignoring time.
  751. adjust_timeouts2: packet supposedly had rtt of 8067661 microseconds. Ignoring time.
  752. adjust_timeouts2: packet supposedly had rtt of 8067661 microseconds. Ignoring time.
  753. adjust_timeouts2: packet supposedly had rtt of 8055033 microseconds. Ignoring time.
  754. adjust_timeouts2: packet supposedly had rtt of 8055033 microseconds. Ignoring time.
  755. adjust_timeouts2: packet supposedly had rtt of 9495962 microseconds. Ignoring time.
  756. adjust_timeouts2: packet supposedly had rtt of 9495962 microseconds. Ignoring time.
  757. adjust_timeouts2: packet supposedly had rtt of 8281098 microseconds. Ignoring time.
  758. adjust_timeouts2: packet supposedly had rtt of 8281098 microseconds. Ignoring time.
  759. adjust_timeouts2: packet supposedly had rtt of 9764177 microseconds. Ignoring time.
  760. adjust_timeouts2: packet supposedly had rtt of 9764177 microseconds. Ignoring time.
  761. adjust_timeouts2: packet supposedly had rtt of 8675931 microseconds. Ignoring time.
  762. adjust_timeouts2: packet supposedly had rtt of 8675931 microseconds. Ignoring time.
  763. adjust_timeouts2: packet supposedly had rtt of 9858534 microseconds. Ignoring time.
  764. adjust_timeouts2: packet supposedly had rtt of 9858534 microseconds. Ignoring time.
  765. adjust_timeouts2: packet supposedly had rtt of 9951116 microseconds. Ignoring time.
  766. adjust_timeouts2: packet supposedly had rtt of 9951116 microseconds. Ignoring time.
  767. adjust_timeouts2: packet supposedly had rtt of 10726722 microseconds. Ignoring time.
  768. adjust_timeouts2: packet supposedly had rtt of 10726722 microseconds. Ignoring time.
  769. adjust_timeouts2: packet supposedly had rtt of 10169116 microseconds. Ignoring time.
  770. adjust_timeouts2: packet supposedly had rtt of 10169116 microseconds. Ignoring time.
  771. Discovered open port 8002/tcp on 94.141.221.108
  772. adjust_timeouts2: packet supposedly had rtt of 8210018 microseconds. Ignoring time.
  773. adjust_timeouts2: packet supposedly had rtt of 8210018 microseconds. Ignoring time.
  774. adjust_timeouts2: packet supposedly had rtt of 10059362 microseconds. Ignoring time.
  775. adjust_timeouts2: packet supposedly had rtt of 10059362 microseconds. Ignoring time.
  776. adjust_timeouts2: packet supposedly had rtt of 8998857 microseconds. Ignoring time.
  777. adjust_timeouts2: packet supposedly had rtt of 8998857 microseconds. Ignoring time.
  778. adjust_timeouts2: packet supposedly had rtt of 8912792 microseconds. Ignoring time.
  779. adjust_timeouts2: packet supposedly had rtt of 8912792 microseconds. Ignoring time.
  780. SYN Stealth Scan Timing: About 20.62% done; ETC: 07:20 (1:09:45 remaining)
  781. adjust_timeouts2: packet supposedly had rtt of 8989247 microseconds. Ignoring time.
  782. adjust_timeouts2: packet supposedly had rtt of 8989247 microseconds. Ignoring time.
  783. adjust_timeouts2: packet supposedly had rtt of 8436405 microseconds. Ignoring time.
  784. adjust_timeouts2: packet supposedly had rtt of 8436405 microseconds. Ignoring time.
  785. adjust_timeouts2: packet supposedly had rtt of 9021988 microseconds. Ignoring time.
  786. adjust_timeouts2: packet supposedly had rtt of 9021988 microseconds. Ignoring time.
  787. adjust_timeouts2: packet supposedly had rtt of 8891938 microseconds. Ignoring time.
  788. adjust_timeouts2: packet supposedly had rtt of 8891938 microseconds. Ignoring time.
  789. adjust_timeouts2: packet supposedly had rtt of 9738504 microseconds. Ignoring time.
  790. adjust_timeouts2: packet supposedly had rtt of 9738504 microseconds. Ignoring time.
  791. adjust_timeouts2: packet supposedly had rtt of 9666128 microseconds. Ignoring time.
  792. adjust_timeouts2: packet supposedly had rtt of 9666128 microseconds. Ignoring time.
  793. adjust_timeouts2: packet supposedly had rtt of 8704057 microseconds. Ignoring time.
  794. adjust_timeouts2: packet supposedly had rtt of 8704057 microseconds. Ignoring time.
  795. adjust_timeouts2: packet supposedly had rtt of 9254693 microseconds. Ignoring time.
  796. adjust_timeouts2: packet supposedly had rtt of 9254693 microseconds. Ignoring time.
  797. adjust_timeouts2: packet supposedly had rtt of 8561709 microseconds. Ignoring time.
  798. adjust_timeouts2: packet supposedly had rtt of 8561709 microseconds. Ignoring time.
  799. adjust_timeouts2: packet supposedly had rtt of 8110253 microseconds. Ignoring time.
  800. adjust_timeouts2: packet supposedly had rtt of 8110253 microseconds. Ignoring time.
  801. adjust_timeouts2: packet supposedly had rtt of 8111972 microseconds. Ignoring time.
  802. adjust_timeouts2: packet supposedly had rtt of 8111972 microseconds. Ignoring time.
  803. adjust_timeouts2: packet supposedly had rtt of 9301142 microseconds. Ignoring time.
  804. adjust_timeouts2: packet supposedly had rtt of 9301142 microseconds. Ignoring time.
  805. adjust_timeouts2: packet supposedly had rtt of 9400328 microseconds. Ignoring time.
  806. adjust_timeouts2: packet supposedly had rtt of 9400328 microseconds. Ignoring time.
  807. adjust_timeouts2: packet supposedly had rtt of 8120801 microseconds. Ignoring time.
  808. adjust_timeouts2: packet supposedly had rtt of 8120801 microseconds. Ignoring time.
  809. adjust_timeouts2: packet supposedly had rtt of 9909181 microseconds. Ignoring time.
  810. adjust_timeouts2: packet supposedly had rtt of 9909181 microseconds. Ignoring time.
  811. adjust_timeouts2: packet supposedly had rtt of 8762998 microseconds. Ignoring time.
  812. adjust_timeouts2: packet supposedly had rtt of 8762998 microseconds. Ignoring time.
  813. adjust_timeouts2: packet supposedly had rtt of 8369371 microseconds. Ignoring time.
  814. adjust_timeouts2: packet supposedly had rtt of 8369371 microseconds. Ignoring time.
  815. adjust_timeouts2: packet supposedly had rtt of 9641169 microseconds. Ignoring time.
  816. adjust_timeouts2: packet supposedly had rtt of 9641169 microseconds. Ignoring time.
  817. adjust_timeouts2: packet supposedly had rtt of 8521309 microseconds. Ignoring time.
  818. adjust_timeouts2: packet supposedly had rtt of 8521309 microseconds. Ignoring time.
  819. Discovered open port 1099/tcp on 94.141.221.181
  820. Discovered open port 3128/tcp on 94.141.221.66
  821. adjust_timeouts2: packet supposedly had rtt of 9671322 microseconds. Ignoring time.
  822. adjust_timeouts2: packet supposedly had rtt of 9671322 microseconds. Ignoring time.
  823. adjust_timeouts2: packet supposedly had rtt of 8540701 microseconds. Ignoring time.
  824. adjust_timeouts2: packet supposedly had rtt of 8540701 microseconds. Ignoring time.
  825. Discovered open port 81/tcp on 94.141.221.122
  826. SYN Stealth Scan Timing: About 24.35% done; ETC: 07:19 (1:05:18 remaining)
  827. adjust_timeouts2: packet supposedly had rtt of 9761035 microseconds. Ignoring time.
  828. adjust_timeouts2: packet supposedly had rtt of 9761035 microseconds. Ignoring time.
  829. adjust_timeouts2: packet supposedly had rtt of 9080043 microseconds. Ignoring time.
  830. adjust_timeouts2: packet supposedly had rtt of 9080043 microseconds. Ignoring time.
  831. adjust_timeouts2: packet supposedly had rtt of 9516019 microseconds. Ignoring time.
  832. adjust_timeouts2: packet supposedly had rtt of 9516019 microseconds. Ignoring time.
  833. adjust_timeouts2: packet supposedly had rtt of 9802683 microseconds. Ignoring time.
  834. adjust_timeouts2: packet supposedly had rtt of 9802683 microseconds. Ignoring time.
  835. adjust_timeouts2: packet supposedly had rtt of 9406685 microseconds. Ignoring time.
  836. adjust_timeouts2: packet supposedly had rtt of 9406685 microseconds. Ignoring time.
  837. adjust_timeouts2: packet supposedly had rtt of 8383379 microseconds. Ignoring time.
  838. adjust_timeouts2: packet supposedly had rtt of 8383379 microseconds. Ignoring time.
  839. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  840. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  841. Discovered open port 5001/tcp on 94.141.221.195
  842. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  843. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  844. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  845. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  846. Discovered open port 21/tcp on 94.141.221.195
  847. Discovered open port 3306/tcp on 94.141.221.195
  848. Discovered open port 49152/tcp on 94.141.221.191
  849. Discovered open port 5001/tcp on 94.141.221.38
  850. SYN Stealth Scan Timing: About 28.51% done; ETC: 07:18 (1:00:59 remaining)
  851. Discovered open port 8291/tcp on 94.141.221.179
  852. Discovered open port 81/tcp on 94.141.221.116
  853. Discovered open port 6000/tcp on 94.141.221.58
  854. Discovered open port 65000/tcp on 94.141.221.127
  855. Discovered open port 49152/tcp on 94.141.221.182
  856. SYN Stealth Scan Timing: About 32.57% done; ETC: 07:16 (0:56:39 remaining)
  857. Discovered open port 8291/tcp on 94.141.221.101
  858. Discovered open port 636/tcp on 94.141.221.182
  859. Discovered open port 8291/tcp on 94.141.221.38
  860. Discovered open port 49161/tcp on 94.141.221.191
  861. Discovered open port 1025/tcp on 94.141.221.58
  862. Discovered open port 8291/tcp on 94.141.221.150
  863. SYN Stealth Scan Timing: About 37.33% done; ETC: 07:16 (0:52:25 remaining)
  864. Discovered open port 8291/tcp on 94.141.221.49
  865. Increasing send delay for 94.141.221.66 from 0 to 5 due to max_successful_tryno increase to 5
  866. SYN Stealth Scan Timing: About 41.11% done; ETC: 07:14 (0:48:10 remaining)
  867. Increasing send delay for 94.141.221.66 from 5 to 10 due to max_successful_tryno increase to 6
  868. Warning: 94.141.221.66 giving up on port because retransmission cap hit (6).
  869. Discovered open port 1050/tcp on 94.141.221.3
  870. Discovered open port 464/tcp on 94.141.221.182
  871. Discovered open port 4443/tcp on 94.141.221.122
  872. SYN Stealth Scan Timing: About 44.95% done; ETC: 07:12 (0:43:59 remaining)
  873. Discovered open port 49154/tcp on 94.141.221.191
  874. Discovered open port 4002/tcp on 94.141.221.68
  875. Discovered open port 888/tcp on 94.141.221.49
  876. Discovered open port 49157/tcp on 94.141.221.182
  877. SYN Stealth Scan Timing: About 49.36% done; ETC: 07:11 (0:39:59 remaining)
  878. Discovered open port 49155/tcp on 94.141.221.191
  879. SYN Stealth Scan Timing: About 53.45% done; ETC: 07:10 (0:36:02 remaining)
  880. Discovered open port 49154/tcp on 94.141.221.182
  881. SYN Stealth Scan Timing: About 57.51% done; ETC: 07:08 (0:32:05 remaining)
  882. SYN Stealth Scan Timing: About 61.39% done; ETC: 07:06 (0:28:15 remaining)
  883. Discovered open port 2121/tcp on 94.141.221.43
  884. Discovered open port 2869/tcp on 94.141.221.191
  885. Discovered open port 20/tcp on 94.141.221.179
  886. Discovered open port 9011/tcp on 94.141.221.22
  887. Discovered open port 49160/tcp on 94.141.221.191
  888. SYN Stealth Scan Timing: About 65.57% done; ETC: 07:04 (0:24:34 remaining)
  889. Discovered open port 49155/tcp on 94.141.221.182
  890. Discovered open port 8800/tcp on 94.141.221.182
  891. SYN Stealth Scan Timing: About 70.30% done; ETC: 07:03 (0:20:56 remaining)
  892. Discovered open port 49153/tcp on 94.141.221.191
  893. Completed SYN Stealth Scan against 94.141.221.179 in 3058.14s (63 hosts left)
  894. Discovered open port 8000/tcp on 94.141.221.46
  895. Discovered open port 2049/tcp on 94.141.221.113
  896. Discovered open port 8085/tcp on 94.141.221.181
  897. SYN Stealth Scan Timing: About 74.94% done; ETC: 07:01 (0:17:19 remaining)
  898. Discovered open port 8000/tcp on 94.141.221.106
  899. Discovered open port 119/tcp on 94.141.221.182
  900. Discovered open port 9011/tcp on 94.141.221.108
  901. Discovered open port 1688/tcp on 94.141.221.113
  902. Discovered open port 6005/tcp on 94.141.221.113
  903. Discovered open port 9011/tcp on 94.141.221.121
  904. Discovered open port 1048/tcp on 94.141.221.113
  905. Discovered open port 464/tcp on 94.141.221.113
  906. Discovered open port 6007/tcp on 94.141.221.113
  907. Discovered open port 6006/tcp on 94.141.221.113
  908. Discovered open port 88/tcp on 94.141.221.113
  909. Discovered open port 8000/tcp on 94.141.221.127
  910. Discovered open port 1863/tcp on 94.141.221.122
  911. Discovered open port 3268/tcp on 94.141.221.113
  912. Discovered open port 3268/tcp on 94.141.221.182
  913. SYN Stealth Scan Timing: About 79.68% done; ETC: 07:01 (0:13:51 remaining)
  914. Discovered open port 49159/tcp on 94.141.221.182
  915. Discovered open port 10243/tcp on 94.141.221.191
  916. Discovered open port 5500/tcp on 94.141.221.193
  917. Increasing send delay for 94.141.221.191 from 0 to 5 due to max_successful_tryno increase to 5
  918. Increasing send delay for 94.141.221.191 from 5 to 10 due to max_successful_tryno increase to 6
  919. Warning: 94.141.221.191 giving up on port because retransmission cap hit (6).
  920. Discovered open port 808/tcp on 94.141.221.113
  921. Discovered open port 5500/tcp on 94.141.221.53
  922. SYN Stealth Scan Timing: About 84.59% done; ETC: 07:00 (0:10:22 remaining)
  923. Discovered open port 5000/tcp on 94.141.221.46
  924. Discovered open port 5500/tcp on 94.141.221.38
  925. Discovered open port 49153/tcp on 94.141.221.182
  926. Discovered open port 5000/tcp on 94.141.221.106
  927. Completed SYN Stealth Scan against 94.141.221.181 in 3504.79s (62 hosts left)
  928. Discovered open port 5222/tcp on 94.141.221.182
  929. Discovered open port 1047/tcp on 94.141.221.113
  930. Discovered open port 49158/tcp on 94.141.221.182
  931. Completed SYN Stealth Scan against 94.141.221.114 in 3535.67s (61 hosts left)
  932. Completed SYN Stealth Scan against 94.141.221.136 in 3540.09s (60 hosts left)
  933. Discovered open port 49165/tcp on 94.141.221.191
  934. Completed SYN Stealth Scan against 94.141.221.119 in 3581.87s (59 hosts left)
  935. Completed SYN Stealth Scan against 94.141.221.189 in 3583.09s (58 hosts left)
  936. SYN Stealth Scan Timing: About 89.55% done; ETC: 06:59 (0:06:59 remaining)
  937. Discovered open port 8000/tcp on 94.141.221.113
  938. Discovered open port 593/tcp on 94.141.221.182
  939. Discovered open port 3269/tcp on 94.141.221.182
  940. Completed SYN Stealth Scan against 94.141.221.22 in 3682.00s (57 hosts left)
  941. Completed SYN Stealth Scan against 94.141.221.31 in 3684.33s (56 hosts left)
  942. Completed SYN Stealth Scan against 94.141.221.195 in 3697.17s (55 hosts left)
  943. Discovered open port 389/tcp on 94.141.221.182
  944. Discovered open port 161/tcp on 94.141.221.144
  945. Discovered open port 4001/tcp on 94.141.221.68
  946. Completed SYN Stealth Scan against 94.141.221.18 in 3731.08s (54 hosts left)
  947. Completed SYN Stealth Scan against 94.141.221.80 in 3737.09s (53 hosts left)
  948. Completed SYN Stealth Scan against 94.141.221.3 in 3749.09s (52 hosts left)
  949. Completed SYN Stealth Scan against 94.141.221.46 in 3754.50s (51 hosts left)
  950. SYN Stealth Scan Timing: About 94.61% done; ETC: 06:59 (0:03:34 remaining)
  951. Completed SYN Stealth Scan against 94.141.221.106 in 3756.70s (50 hosts left)
  952. Completed SYN Stealth Scan against 94.141.221.34 in 3759.39s (49 hosts left)
  953. Discovered open port 8081/tcp on 94.141.221.93
  954. Completed SYN Stealth Scan against 94.141.221.93 in 3783.93s (48 hosts left)
  955. Completed SYN Stealth Scan against 94.141.221.144 in 3784.97s (47 hosts left)
  956. Completed SYN Stealth Scan against 94.141.221.157 in 3802.00s (46 hosts left)
  957. Completed SYN Stealth Scan against 94.141.221.146 in 3803.93s (45 hosts left)
  958. Completed SYN Stealth Scan against 94.141.221.99 in 3815.01s (44 hosts left)
  959. Completed SYN Stealth Scan against 94.141.221.24 in 3815.61s (43 hosts left)
  960. Increasing send delay for 94.141.221.131 from 0 to 5 due to max_successful_tryno increase to 5
  961. Completed SYN Stealth Scan against 94.141.221.137 in 3858.53s (42 hosts left)
  962. Increasing send delay for 94.141.221.131 from 5 to 10 due to max_successful_tryno increase to 6
  963. Warning: 94.141.221.131 giving up on port because retransmission cap hit (6).
  964. Discovered open port 161/tcp on 94.141.221.12
  965. Completed SYN Stealth Scan against 94.141.221.191 in 3870.22s (41 hosts left)
  966. Completed SYN Stealth Scan against 94.141.221.122 in 3878.66s (40 hosts left)
  967. Completed SYN Stealth Scan against 94.141.221.103 in 3882.64s (39 hosts left)
  968. Discovered open port 593/tcp on 94.141.221.113
  969. Discovered open port 161/tcp on 94.141.221.53
  970. Completed SYN Stealth Scan against 94.141.221.101 in 3902.43s (38 hosts left)
  971. Discovered open port 3269/tcp on 94.141.221.113
  972. Completed SYN Stealth Scan against 94.141.221.32 in 3906.93s (37 hosts left)
  973. Completed SYN Stealth Scan against 94.141.221.81 in 3911.41s (36 hosts left)
  974. Completed SYN Stealth Scan against 94.141.221.58 in 3918.38s (35 hosts left)
  975. Completed SYN Stealth Scan against 94.141.221.182 in 3920.52s (34 hosts left)
  976. Completed SYN Stealth Scan against 94.141.221.115 in 3923.90s (33 hosts left)
  977. Discovered open port 161/tcp on 94.141.221.38
  978. Completed SYN Stealth Scan against 94.141.221.150 in 3928.71s (32 hosts left)
  979. Completed SYN Stealth Scan against 94.141.221.120 in 3929.72s (31 hosts left)
  980. Completed SYN Stealth Scan against 94.141.221.79 in 3930.89s (30 hosts left)
  981. Discovered open port 389/tcp on 94.141.221.113
  982. Completed SYN Stealth Scan against 94.141.221.196 in 3935.49s (29 hosts left)
  983. Completed SYN Stealth Scan against 94.141.221.193 in 3938.46s (28 hosts left)
  984. Completed SYN Stealth Scan against 94.141.221.53 in 3940.47s (27 hosts left)
  985. Completed SYN Stealth Scan against 94.141.221.131 in 3941.45s (26 hosts left)
  986. Completed SYN Stealth Scan against 94.141.221.45 in 3941.99s (25 hosts left)
  987. Completed SYN Stealth Scan against 94.141.221.10 in 3944.37s (24 hosts left)
  988. Completed SYN Stealth Scan against 94.141.221.12 in 3946.28s (23 hosts left)
  989. Completed SYN Stealth Scan against 94.141.221.127 in 3946.28s (22 hosts left)
  990. Completed SYN Stealth Scan against 94.141.221.73 in 3947.17s (21 hosts left)
  991. Completed SYN Stealth Scan against 94.141.221.139 in 3953.20s (20 hosts left)
  992. Completed SYN Stealth Scan against 94.141.221.38 in 3956.80s (19 hosts left)
  993. Completed SYN Stealth Scan against 94.141.221.50 in 3966.05s (18 hosts left)
  994. Completed SYN Stealth Scan against 94.141.221.68 in 3966.62s (17 hosts left)
  995. Completed SYN Stealth Scan against 94.141.221.128 in 3971.28s (16 hosts left)
  996. SYN Stealth Scan Timing: About 98.16% done; ETC: 07:00 (0:01:14 remaining)
  997. Completed SYN Stealth Scan against 94.141.221.121 in 3973.61s (15 hosts left)
  998. Completed SYN Stealth Scan against 94.141.221.33 in 3973.74s (14 hosts left)
  999. Completed SYN Stealth Scan against 94.141.221.39 in 3981.10s (13 hosts left)
  1000. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1001. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1002. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1003. Completed SYN Stealth Scan against 94.141.221.28 in 3989.18s (12 hosts left)
  1004. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1005. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1006. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1007. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1008. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1009. Completed SYN Stealth Scan against 94.141.221.66 in 3989.83s (11 hosts left)
  1010. Discovered open port 8081/tcp on 94.141.221.108
  1011. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1012. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1013. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1014. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1015. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1016. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1017. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1018. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1019. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1020. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1021. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1022. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1023. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1024. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1025. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1026. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1027. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1028. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1029. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1030. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1031. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1032. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1033. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1034. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1035. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1036. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1037. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1038. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1039. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1040. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1041. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1042. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1043. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1044. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1045. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1046. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1047. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1048. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1049. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1050. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1051. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1052. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1053. Discovered open port 8081/tcp on 94.141.221.49
  1054. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1055. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1056. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1057. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1058. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1059. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1060. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1061. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1062. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1063. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1064. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1065. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1066. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1067. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1068. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1069. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1070. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1071. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1072. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1073. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1074. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1075. Completed SYN Stealth Scan against 94.141.221.108 in 4000.27s (10 hosts left)
  1076. adjust_timeouts2: packet supposedly had rtt of 8014708 microseconds. Ignoring time.
  1077. adjust_timeouts2: packet supposedly had rtt of 8014708 microseconds. Ignoring time.
  1078. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1079. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1080. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1081. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1082. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1083. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1084. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1085. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1086. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1087. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1088. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1089. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1090. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1091. adjust_timeouts2: packet supposedly had rtt of 8519186 microseconds. Ignoring time.
  1092. adjust_timeouts2: packet supposedly had rtt of 8519186 microseconds. Ignoring time.
  1093. adjust_timeouts2: packet supposedly had rtt of 8529448 microseconds. Ignoring time.
  1094. adjust_timeouts2: packet supposedly had rtt of 8529448 microseconds. Ignoring time.
  1095. adjust_timeouts2: packet supposedly had rtt of 8519710 microseconds. Ignoring time.
  1096. adjust_timeouts2: packet supposedly had rtt of 8519710 microseconds. Ignoring time.
  1097. adjust_timeouts2: packet supposedly had rtt of 8488708 microseconds. Ignoring time.
  1098. adjust_timeouts2: packet supposedly had rtt of 8488708 microseconds. Ignoring time.
  1099. adjust_timeouts2: packet supposedly had rtt of 8377764 microseconds. Ignoring time.
  1100. adjust_timeouts2: packet supposedly had rtt of 8377764 microseconds. Ignoring time.
  1101. adjust_timeouts2: packet supposedly had rtt of 8407052 microseconds. Ignoring time.
  1102. adjust_timeouts2: packet supposedly had rtt of 8407052 microseconds. Ignoring time.
  1103. adjust_timeouts2: packet supposedly had rtt of 8376661 microseconds. Ignoring time.
  1104. adjust_timeouts2: packet supposedly had rtt of 8376661 microseconds. Ignoring time.
  1105. adjust_timeouts2: packet supposedly had rtt of 8362087 microseconds. Ignoring time.
  1106. adjust_timeouts2: packet supposedly had rtt of 8362087 microseconds. Ignoring time.
  1107. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1108. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1109. adjust_timeouts2: packet supposedly had rtt of 8252433 microseconds. Ignoring time.
  1110. adjust_timeouts2: packet supposedly had rtt of 8252433 microseconds. Ignoring time.
  1111. adjust_timeouts2: packet supposedly had rtt of 8327945 microseconds. Ignoring time.
  1112. adjust_timeouts2: packet supposedly had rtt of 8327945 microseconds. Ignoring time.
  1113. adjust_timeouts2: packet supposedly had rtt of 8231080 microseconds. Ignoring time.
  1114. adjust_timeouts2: packet supposedly had rtt of 8231080 microseconds. Ignoring time.
  1115. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1116. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1117. adjust_timeouts2: packet supposedly had rtt of 8573194 microseconds. Ignoring time.
  1118. adjust_timeouts2: packet supposedly had rtt of 8573194 microseconds. Ignoring time.
  1119. Completed SYN Stealth Scan against 94.141.221.19 in 4004.74s (9 hosts left)
  1120. adjust_timeouts2: packet supposedly had rtt of 9179311 microseconds. Ignoring time.
  1121. adjust_timeouts2: packet supposedly had rtt of 9179311 microseconds. Ignoring time.
  1122. adjust_timeouts2: packet supposedly had rtt of 9188752 microseconds. Ignoring time.
  1123. adjust_timeouts2: packet supposedly had rtt of 9188752 microseconds. Ignoring time.
  1124. adjust_timeouts2: packet supposedly had rtt of 9093485 microseconds. Ignoring time.
  1125. adjust_timeouts2: packet supposedly had rtt of 9093485 microseconds. Ignoring time.
  1126. adjust_timeouts2: packet supposedly had rtt of 9081204 microseconds. Ignoring time.
  1127. adjust_timeouts2: packet supposedly had rtt of 9081204 microseconds. Ignoring time.
  1128. adjust_timeouts2: packet supposedly had rtt of 9084461 microseconds. Ignoring time.
  1129. adjust_timeouts2: packet supposedly had rtt of 9084461 microseconds. Ignoring time.
  1130. adjust_timeouts2: packet supposedly had rtt of 9063781 microseconds. Ignoring time.
  1131. adjust_timeouts2: packet supposedly had rtt of 9063781 microseconds. Ignoring time.
  1132. adjust_timeouts2: packet supposedly had rtt of 8921873 microseconds. Ignoring time.
  1133. adjust_timeouts2: packet supposedly had rtt of 8921873 microseconds. Ignoring time.
  1134. adjust_timeouts2: packet supposedly had rtt of 8401897 microseconds. Ignoring time.
  1135. adjust_timeouts2: packet supposedly had rtt of 8401897 microseconds. Ignoring time.
  1136. adjust_timeouts2: packet supposedly had rtt of 8364607 microseconds. Ignoring time.
  1137. adjust_timeouts2: packet supposedly had rtt of 8364607 microseconds. Ignoring time.
  1138. adjust_timeouts2: packet supposedly had rtt of 8344988 microseconds. Ignoring time.
  1139. adjust_timeouts2: packet supposedly had rtt of 8344988 microseconds. Ignoring time.
  1140. adjust_timeouts2: packet supposedly had rtt of 8312502 microseconds. Ignoring time.
  1141. adjust_timeouts2: packet supposedly had rtt of 8312502 microseconds. Ignoring time.
  1142. adjust_timeouts2: packet supposedly had rtt of 8279321 microseconds. Ignoring time.
  1143. adjust_timeouts2: packet supposedly had rtt of 8279321 microseconds. Ignoring time.
  1144. adjust_timeouts2: packet supposedly had rtt of 8271239 microseconds. Ignoring time.
  1145. adjust_timeouts2: packet supposedly had rtt of 8271239 microseconds. Ignoring time.
  1146. adjust_timeouts2: packet supposedly had rtt of 8248961 microseconds. Ignoring time.
  1147. adjust_timeouts2: packet supposedly had rtt of 8248961 microseconds. Ignoring time.
  1148. adjust_timeouts2: packet supposedly had rtt of 8263322 microseconds. Ignoring time.
  1149. adjust_timeouts2: packet supposedly had rtt of 8263322 microseconds. Ignoring time.
  1150. adjust_timeouts2: packet supposedly had rtt of 8176169 microseconds. Ignoring time.
  1151. adjust_timeouts2: packet supposedly had rtt of 8176169 microseconds. Ignoring time.
  1152. adjust_timeouts2: packet supposedly had rtt of 8175135 microseconds. Ignoring time.
  1153. adjust_timeouts2: packet supposedly had rtt of 8175135 microseconds. Ignoring time.
  1154. adjust_timeouts2: packet supposedly had rtt of 8096444 microseconds. Ignoring time.
  1155. adjust_timeouts2: packet supposedly had rtt of 8096444 microseconds. Ignoring time.
  1156. adjust_timeouts2: packet supposedly had rtt of 8084643 microseconds. Ignoring time.
  1157. adjust_timeouts2: packet supposedly had rtt of 8084643 microseconds. Ignoring time.
  1158. adjust_timeouts2: packet supposedly had rtt of 8074458 microseconds. Ignoring time.
  1159. adjust_timeouts2: packet supposedly had rtt of 8074458 microseconds. Ignoring time.
  1160. adjust_timeouts2: packet supposedly had rtt of 8028931 microseconds. Ignoring time.
  1161. adjust_timeouts2: packet supposedly had rtt of 8028931 microseconds. Ignoring time.
  1162. adjust_timeouts2: packet supposedly had rtt of 8071792 microseconds. Ignoring time.
  1163. adjust_timeouts2: packet supposedly had rtt of 8071792 microseconds. Ignoring time.
  1164. adjust_timeouts2: packet supposedly had rtt of 8023812 microseconds. Ignoring time.
  1165. adjust_timeouts2: packet supposedly had rtt of 8023812 microseconds. Ignoring time.
  1166. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1167. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1168. adjust_timeouts2: packet supposedly had rtt of 8072362 microseconds. Ignoring time.
  1169. adjust_timeouts2: packet supposedly had rtt of 8072362 microseconds. Ignoring time.
  1170. adjust_timeouts2: packet supposedly had rtt of 8247409 microseconds. Ignoring time.
  1171. adjust_timeouts2: packet supposedly had rtt of 8247409 microseconds. Ignoring time.
  1172. adjust_timeouts2: packet supposedly had rtt of 8192574 microseconds. Ignoring time.
  1173. adjust_timeouts2: packet supposedly had rtt of 8192574 microseconds. Ignoring time.
  1174. adjust_timeouts2: packet supposedly had rtt of 8202608 microseconds. Ignoring time.
  1175. adjust_timeouts2: packet supposedly had rtt of 8202608 microseconds. Ignoring time.
  1176. adjust_timeouts2: packet supposedly had rtt of 8398297 microseconds. Ignoring time.
  1177. adjust_timeouts2: packet supposedly had rtt of 8398297 microseconds. Ignoring time.
  1178. adjust_timeouts2: packet supposedly had rtt of 8437814 microseconds. Ignoring time.
  1179. adjust_timeouts2: packet supposedly had rtt of 8437814 microseconds. Ignoring time.
  1180. adjust_timeouts2: packet supposedly had rtt of 8459722 microseconds. Ignoring time.
  1181. adjust_timeouts2: packet supposedly had rtt of 8459722 microseconds. Ignoring time.
  1182. adjust_timeouts2: packet supposedly had rtt of 8666580 microseconds. Ignoring time.
  1183. adjust_timeouts2: packet supposedly had rtt of 8666580 microseconds. Ignoring time.
  1184. adjust_timeouts2: packet supposedly had rtt of 8695535 microseconds. Ignoring time.
  1185. adjust_timeouts2: packet supposedly had rtt of 8695535 microseconds. Ignoring time.
  1186. adjust_timeouts2: packet supposedly had rtt of 8609702 microseconds. Ignoring time.
  1187. adjust_timeouts2: packet supposedly had rtt of 8609702 microseconds. Ignoring time.
  1188. adjust_timeouts2: packet supposedly had rtt of 8628682 microseconds. Ignoring time.
  1189. adjust_timeouts2: packet supposedly had rtt of 8628682 microseconds. Ignoring time.
  1190. adjust_timeouts2: packet supposedly had rtt of 8612646 microseconds. Ignoring time.
  1191. adjust_timeouts2: packet supposedly had rtt of 8612646 microseconds. Ignoring time.
  1192. adjust_timeouts2: packet supposedly had rtt of 8629631 microseconds. Ignoring time.
  1193. adjust_timeouts2: packet supposedly had rtt of 8629631 microseconds. Ignoring time.
  1194. adjust_timeouts2: packet supposedly had rtt of 8621998 microseconds. Ignoring time.
  1195. adjust_timeouts2: packet supposedly had rtt of 8621998 microseconds. Ignoring time.
  1196. adjust_timeouts2: packet supposedly had rtt of 8619687 microseconds. Ignoring time.
  1197. adjust_timeouts2: packet supposedly had rtt of 8619687 microseconds. Ignoring time.
  1198. adjust_timeouts2: packet supposedly had rtt of 8377121 microseconds. Ignoring time.
  1199. adjust_timeouts2: packet supposedly had rtt of 8377121 microseconds. Ignoring time.
  1200. Completed SYN Stealth Scan against 94.141.221.49 in 4007.55s (8 hosts left)
  1201. Completed SYN Stealth Scan against 94.141.221.56 in 4008.27s (7 hosts left)
  1202. Discovered open port 161/tcp on 94.141.221.43
  1203. adjust_timeouts2: packet supposedly had rtt of 8112855 microseconds. Ignoring time.
  1204. adjust_timeouts2: packet supposedly had rtt of 8112855 microseconds. Ignoring time.
  1205. adjust_timeouts2: packet supposedly had rtt of 8107527 microseconds. Ignoring time.
  1206. adjust_timeouts2: packet supposedly had rtt of 8107527 microseconds. Ignoring time.
  1207. adjust_timeouts2: packet supposedly had rtt of 8076397 microseconds. Ignoring time.
  1208. adjust_timeouts2: packet supposedly had rtt of 8076397 microseconds. Ignoring time.
  1209. adjust_timeouts2: packet supposedly had rtt of 8029476 microseconds. Ignoring time.
  1210. adjust_timeouts2: packet supposedly had rtt of 8029476 microseconds. Ignoring time.
  1211. adjust_timeouts2: packet supposedly had rtt of 8029926 microseconds. Ignoring time.
  1212. adjust_timeouts2: packet supposedly had rtt of 8029926 microseconds. Ignoring time.
  1213. adjust_timeouts2: packet supposedly had rtt of 8039271 microseconds. Ignoring time.
  1214. adjust_timeouts2: packet supposedly had rtt of 8039271 microseconds. Ignoring time.
  1215. adjust_timeouts2: packet supposedly had rtt of 8328463 microseconds. Ignoring time.
  1216. adjust_timeouts2: packet supposedly had rtt of 8328463 microseconds. Ignoring time.
  1217. adjust_timeouts2: packet supposedly had rtt of 8292016 microseconds. Ignoring time.
  1218. adjust_timeouts2: packet supposedly had rtt of 8292016 microseconds. Ignoring time.
  1219. adjust_timeouts2: packet supposedly had rtt of 8275458 microseconds. Ignoring time.
  1220. adjust_timeouts2: packet supposedly had rtt of 8275458 microseconds. Ignoring time.
  1221. adjust_timeouts2: packet supposedly had rtt of 8251721 microseconds. Ignoring time.
  1222. adjust_timeouts2: packet supposedly had rtt of 8251721 microseconds. Ignoring time.
  1223. adjust_timeouts2: packet supposedly had rtt of 8212865 microseconds. Ignoring time.
  1224. adjust_timeouts2: packet supposedly had rtt of 8212865 microseconds. Ignoring time.
  1225. adjust_timeouts2: packet supposedly had rtt of 8165548 microseconds. Ignoring time.
  1226. adjust_timeouts2: packet supposedly had rtt of 8165548 microseconds. Ignoring time.
  1227. adjust_timeouts2: packet supposedly had rtt of 8259419 microseconds. Ignoring time.
  1228. adjust_timeouts2: packet supposedly had rtt of 8259419 microseconds. Ignoring time.
  1229. adjust_timeouts2: packet supposedly had rtt of 8177149 microseconds. Ignoring time.
  1230. adjust_timeouts2: packet supposedly had rtt of 8177149 microseconds. Ignoring time.
  1231. adjust_timeouts2: packet supposedly had rtt of 8148977 microseconds. Ignoring time.
  1232. adjust_timeouts2: packet supposedly had rtt of 8148977 microseconds. Ignoring time.
  1233. adjust_timeouts2: packet supposedly had rtt of 8245432 microseconds. Ignoring time.
  1234. adjust_timeouts2: packet supposedly had rtt of 8245432 microseconds. Ignoring time.
  1235. adjust_timeouts2: packet supposedly had rtt of 8261146 microseconds. Ignoring time.
  1236. adjust_timeouts2: packet supposedly had rtt of 8261146 microseconds. Ignoring time.
  1237. adjust_timeouts2: packet supposedly had rtt of 8229134 microseconds. Ignoring time.
  1238. adjust_timeouts2: packet supposedly had rtt of 8229134 microseconds. Ignoring time.
  1239. adjust_timeouts2: packet supposedly had rtt of 8103626 microseconds. Ignoring time.
  1240. adjust_timeouts2: packet supposedly had rtt of 8103626 microseconds. Ignoring time.
  1241. adjust_timeouts2: packet supposedly had rtt of 8101965 microseconds. Ignoring time.
  1242. adjust_timeouts2: packet supposedly had rtt of 8101965 microseconds. Ignoring time.
  1243. adjust_timeouts2: packet supposedly had rtt of 8299687 microseconds. Ignoring time.
  1244. adjust_timeouts2: packet supposedly had rtt of 8299687 microseconds. Ignoring time.
  1245. adjust_timeouts2: packet supposedly had rtt of 8261612 microseconds. Ignoring time.
  1246. adjust_timeouts2: packet supposedly had rtt of 8261612 microseconds. Ignoring time.
  1247. adjust_timeouts2: packet supposedly had rtt of 8198375 microseconds. Ignoring time.
  1248. adjust_timeouts2: packet supposedly had rtt of 8198375 microseconds. Ignoring time.
  1249. Discovered open port 6002/tcp on 94.141.221.113
  1250. Completed SYN Stealth Scan against 94.141.221.75 in 4017.11s (6 hosts left)
  1251. Discovered open port 8008/tcp on 94.141.221.113
  1252. adjust_timeouts2: packet supposedly had rtt of 8093236 microseconds. Ignoring time.
  1253. adjust_timeouts2: packet supposedly had rtt of 8093236 microseconds. Ignoring time.
  1254. adjust_timeouts2: packet supposedly had rtt of 8080208 microseconds. Ignoring time.
  1255. adjust_timeouts2: packet supposedly had rtt of 8080208 microseconds. Ignoring time.
  1256. adjust_timeouts2: packet supposedly had rtt of 8088911 microseconds. Ignoring time.
  1257. adjust_timeouts2: packet supposedly had rtt of 8088911 microseconds. Ignoring time.
  1258. adjust_timeouts2: packet supposedly had rtt of 8045043 microseconds. Ignoring time.
  1259. adjust_timeouts2: packet supposedly had rtt of 8045043 microseconds. Ignoring time.
  1260. adjust_timeouts2: packet supposedly had rtt of 8394546 microseconds. Ignoring time.
  1261. adjust_timeouts2: packet supposedly had rtt of 8394546 microseconds. Ignoring time.
  1262. adjust_timeouts2: packet supposedly had rtt of 8303043 microseconds. Ignoring time.
  1263. adjust_timeouts2: packet supposedly had rtt of 8303043 microseconds. Ignoring time.
  1264. adjust_timeouts2: packet supposedly had rtt of 8530313 microseconds. Ignoring time.
  1265. adjust_timeouts2: packet supposedly had rtt of 8530313 microseconds. Ignoring time.
  1266. adjust_timeouts2: packet supposedly had rtt of 8499064 microseconds. Ignoring time.
  1267. adjust_timeouts2: packet supposedly had rtt of 8499064 microseconds. Ignoring time.
  1268. adjust_timeouts2: packet supposedly had rtt of 8474306 microseconds. Ignoring time.
  1269. adjust_timeouts2: packet supposedly had rtt of 8474306 microseconds. Ignoring time.
  1270. adjust_timeouts2: packet supposedly had rtt of 8456193 microseconds. Ignoring time.
  1271. adjust_timeouts2: packet supposedly had rtt of 8456193 microseconds. Ignoring time.
  1272. adjust_timeouts2: packet supposedly had rtt of 8434425 microseconds. Ignoring time.
  1273. adjust_timeouts2: packet supposedly had rtt of 8434425 microseconds. Ignoring time.
  1274. adjust_timeouts2: packet supposedly had rtt of 8469042 microseconds. Ignoring time.
  1275. adjust_timeouts2: packet supposedly had rtt of 8469042 microseconds. Ignoring time.
  1276. adjust_timeouts2: packet supposedly had rtt of 8429478 microseconds. Ignoring time.
  1277. adjust_timeouts2: packet supposedly had rtt of 8429478 microseconds. Ignoring time.
  1278. adjust_timeouts2: packet supposedly had rtt of 8421439 microseconds. Ignoring time.
  1279. adjust_timeouts2: packet supposedly had rtt of 8421439 microseconds. Ignoring time.
  1280. adjust_timeouts2: packet supposedly had rtt of 8337322 microseconds. Ignoring time.
  1281. adjust_timeouts2: packet supposedly had rtt of 8337322 microseconds. Ignoring time.
  1282. adjust_timeouts2: packet supposedly had rtt of 8390586 microseconds. Ignoring time.
  1283. adjust_timeouts2: packet supposedly had rtt of 8390586 microseconds. Ignoring time.
  1284. Completed SYN Stealth Scan against 94.141.221.43 in 4019.34s (5 hosts left)
  1285. adjust_timeouts2: packet supposedly had rtt of 8353297 microseconds. Ignoring time.
  1286. adjust_timeouts2: packet supposedly had rtt of 8353297 microseconds. Ignoring time.
  1287. adjust_timeouts2: packet supposedly had rtt of 8315674 microseconds. Ignoring time.
  1288. adjust_timeouts2: packet supposedly had rtt of 8315674 microseconds. Ignoring time.
  1289. adjust_timeouts2: packet supposedly had rtt of 8309777 microseconds. Ignoring time.
  1290. adjust_timeouts2: packet supposedly had rtt of 8309777 microseconds. Ignoring time.
  1291. adjust_timeouts2: packet supposedly had rtt of 8316240 microseconds. Ignoring time.
  1292. adjust_timeouts2: packet supposedly had rtt of 8316240 microseconds. Ignoring time.
  1293. adjust_timeouts2: packet supposedly had rtt of 8271820 microseconds. Ignoring time.
  1294. adjust_timeouts2: packet supposedly had rtt of 8271820 microseconds. Ignoring time.
  1295. adjust_timeouts2: packet supposedly had rtt of 8286727 microseconds. Ignoring time.
  1296. adjust_timeouts2: packet supposedly had rtt of 8286727 microseconds. Ignoring time.
  1297. adjust_timeouts2: packet supposedly had rtt of 8254785 microseconds. Ignoring time.
  1298. adjust_timeouts2: packet supposedly had rtt of 8254785 microseconds. Ignoring time.
  1299. adjust_timeouts2: packet supposedly had rtt of 8282768 microseconds. Ignoring time.
  1300. adjust_timeouts2: packet supposedly had rtt of 8282768 microseconds. Ignoring time.
  1301. adjust_timeouts2: packet supposedly had rtt of 8224909 microseconds. Ignoring time.
  1302. adjust_timeouts2: packet supposedly had rtt of 8224909 microseconds. Ignoring time.
  1303. adjust_timeouts2: packet supposedly had rtt of 8209665 microseconds. Ignoring time.
  1304. adjust_timeouts2: packet supposedly had rtt of 8209665 microseconds. Ignoring time.
  1305. adjust_timeouts2: packet supposedly had rtt of 8141404 microseconds. Ignoring time.
  1306. adjust_timeouts2: packet supposedly had rtt of 8141404 microseconds. Ignoring time.
  1307. adjust_timeouts2: packet supposedly had rtt of 8344950 microseconds. Ignoring time.
  1308. adjust_timeouts2: packet supposedly had rtt of 8344950 microseconds. Ignoring time.
  1309. adjust_timeouts2: packet supposedly had rtt of 8285213 microseconds. Ignoring time.
  1310. adjust_timeouts2: packet supposedly had rtt of 8285213 microseconds. Ignoring time.
  1311. adjust_timeouts2: packet supposedly had rtt of 8186703 microseconds. Ignoring time.
  1312. adjust_timeouts2: packet supposedly had rtt of 8186703 microseconds. Ignoring time.
  1313. adjust_timeouts2: packet supposedly had rtt of 8196775 microseconds. Ignoring time.
  1314. adjust_timeouts2: packet supposedly had rtt of 8196775 microseconds. Ignoring time.
  1315. adjust_timeouts2: packet supposedly had rtt of 8379208 microseconds. Ignoring time.
  1316. adjust_timeouts2: packet supposedly had rtt of 8379208 microseconds. Ignoring time.
  1317. adjust_timeouts2: packet supposedly had rtt of 8345346 microseconds. Ignoring time.
  1318. adjust_timeouts2: packet supposedly had rtt of 8345346 microseconds. Ignoring time.
  1319. adjust_timeouts2: packet supposedly had rtt of 8376800 microseconds. Ignoring time.
  1320. adjust_timeouts2: packet supposedly had rtt of 8376800 microseconds. Ignoring time.
  1321. adjust_timeouts2: packet supposedly had rtt of 8350326 microseconds. Ignoring time.
  1322. adjust_timeouts2: packet supposedly had rtt of 8350326 microseconds. Ignoring time.
  1323. adjust_timeouts2: packet supposedly had rtt of 8521458 microseconds. Ignoring time.
  1324. adjust_timeouts2: packet supposedly had rtt of 8521458 microseconds. Ignoring time.
  1325. adjust_timeouts2: packet supposedly had rtt of 8513419 microseconds. Ignoring time.
  1326. adjust_timeouts2: packet supposedly had rtt of 8513419 microseconds. Ignoring time.
  1327. adjust_timeouts2: packet supposedly had rtt of 8482031 microseconds. Ignoring time.
  1328. adjust_timeouts2: packet supposedly had rtt of 8482031 microseconds. Ignoring time.
  1329. adjust_timeouts2: packet supposedly had rtt of 8445301 microseconds. Ignoring time.
  1330. adjust_timeouts2: packet supposedly had rtt of 8445301 microseconds. Ignoring time.
  1331. adjust_timeouts2: packet supposedly had rtt of 8484126 microseconds. Ignoring time.
  1332. adjust_timeouts2: packet supposedly had rtt of 8484126 microseconds. Ignoring time.
  1333. adjust_timeouts2: packet supposedly had rtt of 8435940 microseconds. Ignoring time.
  1334. adjust_timeouts2: packet supposedly had rtt of 8435940 microseconds. Ignoring time.
  1335. adjust_timeouts2: packet supposedly had rtt of 8475744 microseconds. Ignoring time.
  1336. adjust_timeouts2: packet supposedly had rtt of 8475744 microseconds. Ignoring time.
  1337. adjust_timeouts2: packet supposedly had rtt of 8429639 microseconds. Ignoring time.
  1338. adjust_timeouts2: packet supposedly had rtt of 8429639 microseconds. Ignoring time.
  1339. adjust_timeouts2: packet supposedly had rtt of 8439264 microseconds. Ignoring time.
  1340. adjust_timeouts2: packet supposedly had rtt of 8439264 microseconds. Ignoring time.
  1341. adjust_timeouts2: packet supposedly had rtt of 8399319 microseconds. Ignoring time.
  1342. adjust_timeouts2: packet supposedly had rtt of 8399319 microseconds. Ignoring time.
  1343. adjust_timeouts2: packet supposedly had rtt of 8364369 microseconds. Ignoring time.
  1344. adjust_timeouts2: packet supposedly had rtt of 8364369 microseconds. Ignoring time.
  1345. adjust_timeouts2: packet supposedly had rtt of 8381093 microseconds. Ignoring time.
  1346. adjust_timeouts2: packet supposedly had rtt of 8381093 microseconds. Ignoring time.
  1347. adjust_timeouts2: packet supposedly had rtt of 8328975 microseconds. Ignoring time.
  1348. adjust_timeouts2: packet supposedly had rtt of 8328975 microseconds. Ignoring time.
  1349. adjust_timeouts2: packet supposedly had rtt of 8228670 microseconds. Ignoring time.
  1350. adjust_timeouts2: packet supposedly had rtt of 8228670 microseconds. Ignoring time.
  1351. adjust_timeouts2: packet supposedly had rtt of 8336397 microseconds. Ignoring time.
  1352. adjust_timeouts2: packet supposedly had rtt of 8336397 microseconds. Ignoring time.
  1353. Completed SYN Stealth Scan against 94.141.221.113 in 4021.89s (4 hosts left)
  1354. adjust_timeouts2: packet supposedly had rtt of 8757565 microseconds. Ignoring time.
  1355. adjust_timeouts2: packet supposedly had rtt of 8757565 microseconds. Ignoring time.
  1356. adjust_timeouts2: packet supposedly had rtt of 8685300 microseconds. Ignoring time.
  1357. adjust_timeouts2: packet supposedly had rtt of 8685300 microseconds. Ignoring time.
  1358. adjust_timeouts2: packet supposedly had rtt of 8709291 microseconds. Ignoring time.
  1359. adjust_timeouts2: packet supposedly had rtt of 8709291 microseconds. Ignoring time.
  1360. adjust_timeouts2: packet supposedly had rtt of 8676393 microseconds. Ignoring time.
  1361. adjust_timeouts2: packet supposedly had rtt of 8676393 microseconds. Ignoring time.
  1362. adjust_timeouts2: packet supposedly had rtt of 8671105 microseconds. Ignoring time.
  1363. adjust_timeouts2: packet supposedly had rtt of 8671105 microseconds. Ignoring time.
  1364. adjust_timeouts2: packet supposedly had rtt of 8663481 microseconds. Ignoring time.
  1365. adjust_timeouts2: packet supposedly had rtt of 8663481 microseconds. Ignoring time.
  1366. adjust_timeouts2: packet supposedly had rtt of 8550286 microseconds. Ignoring time.
  1367. adjust_timeouts2: packet supposedly had rtt of 8550286 microseconds. Ignoring time.
  1368. adjust_timeouts2: packet supposedly had rtt of 8545900 microseconds. Ignoring time.
  1369. adjust_timeouts2: packet supposedly had rtt of 8545900 microseconds. Ignoring time.
  1370. adjust_timeouts2: packet supposedly had rtt of 8424383 microseconds. Ignoring time.
  1371. adjust_timeouts2: packet supposedly had rtt of 8424383 microseconds. Ignoring time.
  1372. adjust_timeouts2: packet supposedly had rtt of 8528631 microseconds. Ignoring time.
  1373. adjust_timeouts2: packet supposedly had rtt of 8528631 microseconds. Ignoring time.
  1374. adjust_timeouts2: packet supposedly had rtt of 8273128 microseconds. Ignoring time.
  1375. adjust_timeouts2: packet supposedly had rtt of 8273128 microseconds. Ignoring time.
  1376. adjust_timeouts2: packet supposedly had rtt of 8455661 microseconds. Ignoring time.
  1377. adjust_timeouts2: packet supposedly had rtt of 8455661 microseconds. Ignoring time.
  1378. adjust_timeouts2: packet supposedly had rtt of 8400184 microseconds. Ignoring time.
  1379. adjust_timeouts2: packet supposedly had rtt of 8400184 microseconds. Ignoring time.
  1380. adjust_timeouts2: packet supposedly had rtt of 8556761 microseconds. Ignoring time.
  1381. adjust_timeouts2: packet supposedly had rtt of 8556761 microseconds. Ignoring time.
  1382. adjust_timeouts2: packet supposedly had rtt of 8535605 microseconds. Ignoring time.
  1383. adjust_timeouts2: packet supposedly had rtt of 8535605 microseconds. Ignoring time.
  1384. adjust_timeouts2: packet supposedly had rtt of 8511293 microseconds. Ignoring time.
  1385. adjust_timeouts2: packet supposedly had rtt of 8511293 microseconds. Ignoring time.
  1386. adjust_timeouts2: packet supposedly had rtt of 8372286 microseconds. Ignoring time.
  1387. adjust_timeouts2: packet supposedly had rtt of 8372286 microseconds. Ignoring time.
  1388. adjust_timeouts2: packet supposedly had rtt of 8392526 microseconds. Ignoring time.
  1389. adjust_timeouts2: packet supposedly had rtt of 8392526 microseconds. Ignoring time.
  1390. adjust_timeouts2: packet supposedly had rtt of 8371086 microseconds. Ignoring time.
  1391. adjust_timeouts2: packet supposedly had rtt of 8371086 microseconds. Ignoring time.
  1392. adjust_timeouts2: packet supposedly had rtt of 8358342 microseconds. Ignoring time.
  1393. adjust_timeouts2: packet supposedly had rtt of 8358342 microseconds. Ignoring time.
  1394. adjust_timeouts2: packet supposedly had rtt of 8340485 microseconds. Ignoring time.
  1395. adjust_timeouts2: packet supposedly had rtt of 8340485 microseconds. Ignoring time.
  1396. adjust_timeouts2: packet supposedly had rtt of 8307662 microseconds. Ignoring time.
  1397. adjust_timeouts2: packet supposedly had rtt of 8307662 microseconds. Ignoring time.
  1398. adjust_timeouts2: packet supposedly had rtt of 8317926 microseconds. Ignoring time.
  1399. adjust_timeouts2: packet supposedly had rtt of 8317926 microseconds. Ignoring time.
  1400. adjust_timeouts2: packet supposedly had rtt of 8213475 microseconds. Ignoring time.
  1401. adjust_timeouts2: packet supposedly had rtt of 8213475 microseconds. Ignoring time.
  1402. adjust_timeouts2: packet supposedly had rtt of 8232438 microseconds. Ignoring time.
  1403. adjust_timeouts2: packet supposedly had rtt of 8232438 microseconds. Ignoring time.
  1404. adjust_timeouts2: packet supposedly had rtt of 8241383 microseconds. Ignoring time.
  1405. adjust_timeouts2: packet supposedly had rtt of 8241383 microseconds. Ignoring time.
  1406. adjust_timeouts2: packet supposedly had rtt of 8002205 microseconds. Ignoring time.
  1407. adjust_timeouts2: packet supposedly had rtt of 8002205 microseconds. Ignoring time.
  1408. adjust_timeouts2: packet supposedly had rtt of 8002103 microseconds. Ignoring time.
  1409. adjust_timeouts2: packet supposedly had rtt of 8002103 microseconds. Ignoring time.
  1410. adjust_timeouts2: packet supposedly had rtt of 8041141 microseconds. Ignoring time.
  1411. adjust_timeouts2: packet supposedly had rtt of 8041141 microseconds. Ignoring time.
  1412. adjust_timeouts2: packet supposedly had rtt of 8045594 microseconds. Ignoring time.
  1413. adjust_timeouts2: packet supposedly had rtt of 8045594 microseconds. Ignoring time.
  1414. adjust_timeouts2: packet supposedly had rtt of 8066404 microseconds. Ignoring time.
  1415. adjust_timeouts2: packet supposedly had rtt of 8066404 microseconds. Ignoring time.
  1416. adjust_timeouts2: packet supposedly had rtt of 8895391 microseconds. Ignoring time.
  1417. adjust_timeouts2: packet supposedly had rtt of 8895391 microseconds. Ignoring time.
  1418. adjust_timeouts2: packet supposedly had rtt of 8902755 microseconds. Ignoring time.
  1419. adjust_timeouts2: packet supposedly had rtt of 8902755 microseconds. Ignoring time.
  1420. adjust_timeouts2: packet supposedly had rtt of 8852911 microseconds. Ignoring time.
  1421. adjust_timeouts2: packet supposedly had rtt of 8852911 microseconds. Ignoring time.
  1422. adjust_timeouts2: packet supposedly had rtt of 8846524 microseconds. Ignoring time.
  1423. adjust_timeouts2: packet supposedly had rtt of 8846524 microseconds. Ignoring time.
  1424. adjust_timeouts2: packet supposedly had rtt of 8851773 microseconds. Ignoring time.
  1425. adjust_timeouts2: packet supposedly had rtt of 8851773 microseconds. Ignoring time.
  1426. adjust_timeouts2: packet supposedly had rtt of 8607915 microseconds. Ignoring time.
  1427. adjust_timeouts2: packet supposedly had rtt of 8607915 microseconds. Ignoring time.
  1428. adjust_timeouts2: packet supposedly had rtt of 8728755 microseconds. Ignoring time.
  1429. adjust_timeouts2: packet supposedly had rtt of 8728755 microseconds. Ignoring time.
  1430. adjust_timeouts2: packet supposedly had rtt of 9434973 microseconds. Ignoring time.
  1431. adjust_timeouts2: packet supposedly had rtt of 9434973 microseconds. Ignoring time.
  1432. adjust_timeouts2: packet supposedly had rtt of 9405335 microseconds. Ignoring time.
  1433. adjust_timeouts2: packet supposedly had rtt of 9405335 microseconds. Ignoring time.
  1434. adjust_timeouts2: packet supposedly had rtt of 9736497 microseconds. Ignoring time.
  1435. adjust_timeouts2: packet supposedly had rtt of 9736497 microseconds. Ignoring time.
  1436. adjust_timeouts2: packet supposedly had rtt of 9515584 microseconds. Ignoring time.
  1437. adjust_timeouts2: packet supposedly had rtt of 9515584 microseconds. Ignoring time.
  1438. adjust_timeouts2: packet supposedly had rtt of 9489256 microseconds. Ignoring time.
  1439. adjust_timeouts2: packet supposedly had rtt of 9489256 microseconds. Ignoring time.
  1440. adjust_timeouts2: packet supposedly had rtt of 9652223 microseconds. Ignoring time.
  1441. adjust_timeouts2: packet supposedly had rtt of 9652223 microseconds. Ignoring time.
  1442. adjust_timeouts2: packet supposedly had rtt of 9623316 microseconds. Ignoring time.
  1443. adjust_timeouts2: packet supposedly had rtt of 9623316 microseconds. Ignoring time.
  1444. adjust_timeouts2: packet supposedly had rtt of 9574164 microseconds. Ignoring time.
  1445. adjust_timeouts2: packet supposedly had rtt of 9574164 microseconds. Ignoring time.
  1446. adjust_timeouts2: packet supposedly had rtt of 9558953 microseconds. Ignoring time.
  1447. adjust_timeouts2: packet supposedly had rtt of 9558953 microseconds. Ignoring time.
  1448. adjust_timeouts2: packet supposedly had rtt of 9542937 microseconds. Ignoring time.
  1449. adjust_timeouts2: packet supposedly had rtt of 9542937 microseconds. Ignoring time.
  1450. adjust_timeouts2: packet supposedly had rtt of 9604473 microseconds. Ignoring time.
  1451. adjust_timeouts2: packet supposedly had rtt of 9604473 microseconds. Ignoring time.
  1452. adjust_timeouts2: packet supposedly had rtt of 9641254 microseconds. Ignoring time.
  1453. adjust_timeouts2: packet supposedly had rtt of 9641254 microseconds. Ignoring time.
  1454. adjust_timeouts2: packet supposedly had rtt of 9563009 microseconds. Ignoring time.
  1455. adjust_timeouts2: packet supposedly had rtt of 9563009 microseconds. Ignoring time.
  1456. adjust_timeouts2: packet supposedly had rtt of 9561006 microseconds. Ignoring time.
  1457. adjust_timeouts2: packet supposedly had rtt of 9561006 microseconds. Ignoring time.
  1458. adjust_timeouts2: packet supposedly had rtt of 9552085 microseconds. Ignoring time.
  1459. adjust_timeouts2: packet supposedly had rtt of 9552085 microseconds. Ignoring time.
  1460. adjust_timeouts2: packet supposedly had rtt of 9480627 microseconds. Ignoring time.
  1461. adjust_timeouts2: packet supposedly had rtt of 9480627 microseconds. Ignoring time.
  1462. adjust_timeouts2: packet supposedly had rtt of 9607688 microseconds. Ignoring time.
  1463. adjust_timeouts2: packet supposedly had rtt of 9607688 microseconds. Ignoring time.
  1464. adjust_timeouts2: packet supposedly had rtt of 9773702 microseconds. Ignoring time.
  1465. adjust_timeouts2: packet supposedly had rtt of 9773702 microseconds. Ignoring time.
  1466. adjust_timeouts2: packet supposedly had rtt of 9761862 microseconds. Ignoring time.
  1467. adjust_timeouts2: packet supposedly had rtt of 9761862 microseconds. Ignoring time.
  1468. adjust_timeouts2: packet supposedly had rtt of 9759383 microseconds. Ignoring time.
  1469. adjust_timeouts2: packet supposedly had rtt of 9759383 microseconds. Ignoring time.
  1470. adjust_timeouts2: packet supposedly had rtt of 9661992 microseconds. Ignoring time.
  1471. adjust_timeouts2: packet supposedly had rtt of 9661992 microseconds. Ignoring time.
  1472. adjust_timeouts2: packet supposedly had rtt of 9821764 microseconds. Ignoring time.
  1473. adjust_timeouts2: packet supposedly had rtt of 9821764 microseconds. Ignoring time.
  1474. adjust_timeouts2: packet supposedly had rtt of 9668978 microseconds. Ignoring time.
  1475. adjust_timeouts2: packet supposedly had rtt of 9668978 microseconds. Ignoring time.
  1476. adjust_timeouts2: packet supposedly had rtt of 9662738 microseconds. Ignoring time.
  1477. adjust_timeouts2: packet supposedly had rtt of 9662738 microseconds. Ignoring time.
  1478. adjust_timeouts2: packet supposedly had rtt of 9773908 microseconds. Ignoring time.
  1479. adjust_timeouts2: packet supposedly had rtt of 9773908 microseconds. Ignoring time.
  1480. adjust_timeouts2: packet supposedly had rtt of 9717869 microseconds. Ignoring time.
  1481. adjust_timeouts2: packet supposedly had rtt of 9717869 microseconds. Ignoring time.
  1482. adjust_timeouts2: packet supposedly had rtt of 9713951 microseconds. Ignoring time.
  1483. adjust_timeouts2: packet supposedly had rtt of 9713951 microseconds. Ignoring time.
  1484. adjust_timeouts2: packet supposedly had rtt of 9729391 microseconds. Ignoring time.
  1485. adjust_timeouts2: packet supposedly had rtt of 9729391 microseconds. Ignoring time.
  1486. adjust_timeouts2: packet supposedly had rtt of 9695391 microseconds. Ignoring time.
  1487. adjust_timeouts2: packet supposedly had rtt of 9695391 microseconds. Ignoring time.
  1488. adjust_timeouts2: packet supposedly had rtt of 9649889 microseconds. Ignoring time.
  1489. adjust_timeouts2: packet supposedly had rtt of 9649889 microseconds. Ignoring time.
  1490. adjust_timeouts2: packet supposedly had rtt of 9645069 microseconds. Ignoring time.
  1491. adjust_timeouts2: packet supposedly had rtt of 9645069 microseconds. Ignoring time.
  1492. adjust_timeouts2: packet supposedly had rtt of 9659183 microseconds. Ignoring time.
  1493. adjust_timeouts2: packet supposedly had rtt of 9659183 microseconds. Ignoring time.
  1494. adjust_timeouts2: packet supposedly had rtt of 9679052 microseconds. Ignoring time.
  1495. adjust_timeouts2: packet supposedly had rtt of 9679052 microseconds. Ignoring time.
  1496. adjust_timeouts2: packet supposedly had rtt of 9660085 microseconds. Ignoring time.
  1497. adjust_timeouts2: packet supposedly had rtt of 9660085 microseconds. Ignoring time.
  1498. adjust_timeouts2: packet supposedly had rtt of 9655262 microseconds. Ignoring time.
  1499. adjust_timeouts2: packet supposedly had rtt of 9655262 microseconds. Ignoring time.
  1500. adjust_timeouts2: packet supposedly had rtt of 9656147 microseconds. Ignoring time.
  1501. adjust_timeouts2: packet supposedly had rtt of 9656147 microseconds. Ignoring time.
  1502. adjust_timeouts2: packet supposedly had rtt of 9659370 microseconds. Ignoring time.
  1503. adjust_timeouts2: packet supposedly had rtt of 9659370 microseconds. Ignoring time.
  1504. adjust_timeouts2: packet supposedly had rtt of 9652370 microseconds. Ignoring time.
  1505. adjust_timeouts2: packet supposedly had rtt of 9652370 microseconds. Ignoring time.
  1506. adjust_timeouts2: packet supposedly had rtt of 9656931 microseconds. Ignoring time.
  1507. adjust_timeouts2: packet supposedly had rtt of 9656931 microseconds. Ignoring time.
  1508. adjust_timeouts2: packet supposedly had rtt of 9633048 microseconds. Ignoring time.
  1509. adjust_timeouts2: packet supposedly had rtt of 9633048 microseconds. Ignoring time.
  1510. adjust_timeouts2: packet supposedly had rtt of 9608862 microseconds. Ignoring time.
  1511. adjust_timeouts2: packet supposedly had rtt of 9608862 microseconds. Ignoring time.
  1512. adjust_timeouts2: packet supposedly had rtt of 9568066 microseconds. Ignoring time.
  1513. adjust_timeouts2: packet supposedly had rtt of 9568066 microseconds. Ignoring time.
  1514. adjust_timeouts2: packet supposedly had rtt of 9573365 microseconds. Ignoring time.
  1515. adjust_timeouts2: packet supposedly had rtt of 9573365 microseconds. Ignoring time.
  1516. adjust_timeouts2: packet supposedly had rtt of 9526926 microseconds. Ignoring time.
  1517. adjust_timeouts2: packet supposedly had rtt of 9526926 microseconds. Ignoring time.
  1518. adjust_timeouts2: packet supposedly had rtt of 9453956 microseconds. Ignoring time.
  1519. adjust_timeouts2: packet supposedly had rtt of 9453956 microseconds. Ignoring time.
  1520. adjust_timeouts2: packet supposedly had rtt of 9451805 microseconds. Ignoring time.
  1521. adjust_timeouts2: packet supposedly had rtt of 9451805 microseconds. Ignoring time.
  1522. adjust_timeouts2: packet supposedly had rtt of 9397597 microseconds. Ignoring time.
  1523. adjust_timeouts2: packet supposedly had rtt of 9397597 microseconds. Ignoring time.
  1524. adjust_timeouts2: packet supposedly had rtt of 9337097 microseconds. Ignoring time.
  1525. adjust_timeouts2: packet supposedly had rtt of 9337097 microseconds. Ignoring time.
  1526. adjust_timeouts2: packet supposedly had rtt of 9355072 microseconds. Ignoring time.
  1527. adjust_timeouts2: packet supposedly had rtt of 9355072 microseconds. Ignoring time.
  1528. adjust_timeouts2: packet supposedly had rtt of 9266934 microseconds. Ignoring time.
  1529. adjust_timeouts2: packet supposedly had rtt of 9266934 microseconds. Ignoring time.
  1530. adjust_timeouts2: packet supposedly had rtt of 9018785 microseconds. Ignoring time.
  1531. adjust_timeouts2: packet supposedly had rtt of 9018785 microseconds. Ignoring time.
  1532. adjust_timeouts2: packet supposedly had rtt of 9000451 microseconds. Ignoring time.
  1533. adjust_timeouts2: packet supposedly had rtt of 9000451 microseconds. Ignoring time.
  1534. adjust_timeouts2: packet supposedly had rtt of 8991618 microseconds. Ignoring time.
  1535. adjust_timeouts2: packet supposedly had rtt of 8991618 microseconds. Ignoring time.
  1536. adjust_timeouts2: packet supposedly had rtt of 9065387 microseconds. Ignoring time.
  1537. adjust_timeouts2: packet supposedly had rtt of 9065387 microseconds. Ignoring time.
  1538. adjust_timeouts2: packet supposedly had rtt of 9021735 microseconds. Ignoring time.
  1539. adjust_timeouts2: packet supposedly had rtt of 9021735 microseconds. Ignoring time.
  1540. adjust_timeouts2: packet supposedly had rtt of 9026709 microseconds. Ignoring time.
  1541. adjust_timeouts2: packet supposedly had rtt of 9026709 microseconds. Ignoring time.
  1542. adjust_timeouts2: packet supposedly had rtt of 9049103 microseconds. Ignoring time.
  1543. adjust_timeouts2: packet supposedly had rtt of 9049103 microseconds. Ignoring time.
  1544. adjust_timeouts2: packet supposedly had rtt of 9056894 microseconds. Ignoring time.
  1545. adjust_timeouts2: packet supposedly had rtt of 9056894 microseconds. Ignoring time.
  1546. adjust_timeouts2: packet supposedly had rtt of 9063919 microseconds. Ignoring time.
  1547. adjust_timeouts2: packet supposedly had rtt of 9063919 microseconds. Ignoring time.
  1548. adjust_timeouts2: packet supposedly had rtt of 9013905 microseconds. Ignoring time.
  1549. adjust_timeouts2: packet supposedly had rtt of 9013905 microseconds. Ignoring time.
  1550. adjust_timeouts2: packet supposedly had rtt of 9036835 microseconds. Ignoring time.
  1551. adjust_timeouts2: packet supposedly had rtt of 9036835 microseconds. Ignoring time.
  1552. adjust_timeouts2: packet supposedly had rtt of 9020776 microseconds. Ignoring time.
  1553. adjust_timeouts2: packet supposedly had rtt of 9020776 microseconds. Ignoring time.
  1554. adjust_timeouts2: packet supposedly had rtt of 9018942 microseconds. Ignoring time.
  1555. adjust_timeouts2: packet supposedly had rtt of 9018942 microseconds. Ignoring time.
  1556. adjust_timeouts2: packet supposedly had rtt of 9007198 microseconds. Ignoring time.
  1557. adjust_timeouts2: packet supposedly had rtt of 9007198 microseconds. Ignoring time.
  1558. adjust_timeouts2: packet supposedly had rtt of 8987211 microseconds. Ignoring time.
  1559. adjust_timeouts2: packet supposedly had rtt of 8987211 microseconds. Ignoring time.
  1560. adjust_timeouts2: packet supposedly had rtt of 8938984 microseconds. Ignoring time.
  1561. adjust_timeouts2: packet supposedly had rtt of 8938984 microseconds. Ignoring time.
  1562. adjust_timeouts2: packet supposedly had rtt of 8941530 microseconds. Ignoring time.
  1563. adjust_timeouts2: packet supposedly had rtt of 8941530 microseconds. Ignoring time.
  1564. adjust_timeouts2: packet supposedly had rtt of 8896890 microseconds. Ignoring time.
  1565. adjust_timeouts2: packet supposedly had rtt of 8896890 microseconds. Ignoring time.
  1566. adjust_timeouts2: packet supposedly had rtt of 8878151 microseconds. Ignoring time.
  1567. adjust_timeouts2: packet supposedly had rtt of 8878151 microseconds. Ignoring time.
  1568. adjust_timeouts2: packet supposedly had rtt of 8837731 microseconds. Ignoring time.
  1569. adjust_timeouts2: packet supposedly had rtt of 8837731 microseconds. Ignoring time.
  1570. adjust_timeouts2: packet supposedly had rtt of 8792733 microseconds. Ignoring time.
  1571. adjust_timeouts2: packet supposedly had rtt of 8792733 microseconds. Ignoring time.
  1572. adjust_timeouts2: packet supposedly had rtt of 8746685 microseconds. Ignoring time.
  1573. adjust_timeouts2: packet supposedly had rtt of 8746685 microseconds. Ignoring time.
  1574. adjust_timeouts2: packet supposedly had rtt of 8675618 microseconds. Ignoring time.
  1575. adjust_timeouts2: packet supposedly had rtt of 8675618 microseconds. Ignoring time.
  1576. adjust_timeouts2: packet supposedly had rtt of 8768781 microseconds. Ignoring time.
  1577. adjust_timeouts2: packet supposedly had rtt of 8768781 microseconds. Ignoring time.
  1578. adjust_timeouts2: packet supposedly had rtt of 8535434 microseconds. Ignoring time.
  1579. adjust_timeouts2: packet supposedly had rtt of 8535434 microseconds. Ignoring time.
  1580. adjust_timeouts2: packet supposedly had rtt of 8475553 microseconds. Ignoring time.
  1581. adjust_timeouts2: packet supposedly had rtt of 8475553 microseconds. Ignoring time.
  1582. adjust_timeouts2: packet supposedly had rtt of 8478377 microseconds. Ignoring time.
  1583. adjust_timeouts2: packet supposedly had rtt of 8478377 microseconds. Ignoring time.
  1584. adjust_timeouts2: packet supposedly had rtt of 8478741 microseconds. Ignoring time.
  1585. adjust_timeouts2: packet supposedly had rtt of 8478741 microseconds. Ignoring time.
  1586. adjust_timeouts2: packet supposedly had rtt of 8477608 microseconds. Ignoring time.
  1587. adjust_timeouts2: packet supposedly had rtt of 8477608 microseconds. Ignoring time.
  1588. adjust_timeouts2: packet supposedly had rtt of 8454596 microseconds. Ignoring time.
  1589. adjust_timeouts2: packet supposedly had rtt of 8454596 microseconds. Ignoring time.
  1590. adjust_timeouts2: packet supposedly had rtt of 8482565 microseconds. Ignoring time.
  1591. adjust_timeouts2: packet supposedly had rtt of 8482565 microseconds. Ignoring time.
  1592. adjust_timeouts2: packet supposedly had rtt of 8473886 microseconds. Ignoring time.
  1593. adjust_timeouts2: packet supposedly had rtt of 8473886 microseconds. Ignoring time.
  1594. adjust_timeouts2: packet supposedly had rtt of 8421562 microseconds. Ignoring time.
  1595. adjust_timeouts2: packet supposedly had rtt of 8421562 microseconds. Ignoring time.
  1596. adjust_timeouts2: packet supposedly had rtt of 8415916 microseconds. Ignoring time.
  1597. adjust_timeouts2: packet supposedly had rtt of 8415916 microseconds. Ignoring time.
  1598. adjust_timeouts2: packet supposedly had rtt of 8439122 microseconds. Ignoring time.
  1599. adjust_timeouts2: packet supposedly had rtt of 8439122 microseconds. Ignoring time.
  1600. adjust_timeouts2: packet supposedly had rtt of 8435648 microseconds. Ignoring time.
  1601. adjust_timeouts2: packet supposedly had rtt of 8435648 microseconds. Ignoring time.
  1602. adjust_timeouts2: packet supposedly had rtt of 8423673 microseconds. Ignoring time.
  1603. adjust_timeouts2: packet supposedly had rtt of 8423673 microseconds. Ignoring time.
  1604. adjust_timeouts2: packet supposedly had rtt of 8411236 microseconds. Ignoring time.
  1605. adjust_timeouts2: packet supposedly had rtt of 8411236 microseconds. Ignoring time.
  1606. adjust_timeouts2: packet supposedly had rtt of 8385158 microseconds. Ignoring time.
  1607. adjust_timeouts2: packet supposedly had rtt of 8385158 microseconds. Ignoring time.
  1608. SYN Stealth Scan Timing: About 99.16% done; ETC: 07:00 (0:00:34 remaining)
  1609. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1610. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1611. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1612. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1613. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1614. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1615. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1616. RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
  1617. adjust_timeouts2: packet supposedly had rtt of 8275271 microseconds. Ignoring time.
  1618. adjust_timeouts2: packet supposedly had rtt of 8275271 microseconds. Ignoring time.
  1619. adjust_timeouts2: packet supposedly had rtt of 8660644 microseconds. Ignoring time.
  1620. adjust_timeouts2: packet supposedly had rtt of 8660644 microseconds. Ignoring time.
  1621. adjust_timeouts2: packet supposedly had rtt of 9680247 microseconds. Ignoring time.
  1622. adjust_timeouts2: packet supposedly had rtt of 9680247 microseconds. Ignoring time.
  1623. adjust_timeouts2: packet supposedly had rtt of 9665637 microseconds. Ignoring time.
  1624. adjust_timeouts2: packet supposedly had rtt of 9665637 microseconds. Ignoring time.
  1625. adjust_timeouts2: packet supposedly had rtt of 9885846 microseconds. Ignoring time.
  1626. adjust_timeouts2: packet supposedly had rtt of 9885846 microseconds. Ignoring time.
  1627. adjust_timeouts2: packet supposedly had rtt of 9940838 microseconds. Ignoring time.
  1628. adjust_timeouts2: packet supposedly had rtt of 9940838 microseconds. Ignoring time.
  1629. adjust_timeouts2: packet supposedly had rtt of 9912857 microseconds. Ignoring time.
  1630. adjust_timeouts2: packet supposedly had rtt of 9912857 microseconds. Ignoring time.
  1631. adjust_timeouts2: packet supposedly had rtt of 9942766 microseconds. Ignoring time.
  1632. adjust_timeouts2: packet supposedly had rtt of 9942766 microseconds. Ignoring time.
  1633. adjust_timeouts2: packet supposedly had rtt of 9930646 microseconds. Ignoring time.
  1634. adjust_timeouts2: packet supposedly had rtt of 9930646 microseconds. Ignoring time.
  1635. adjust_timeouts2: packet supposedly had rtt of 9926460 microseconds. Ignoring time.
  1636. adjust_timeouts2: packet supposedly had rtt of 9926460 microseconds. Ignoring time.
  1637. adjust_timeouts2: packet supposedly had rtt of 9920835 microseconds. Ignoring time.
  1638. adjust_timeouts2: packet supposedly had rtt of 9920835 microseconds. Ignoring time.
  1639. adjust_timeouts2: packet supposedly had rtt of 9944054 microseconds. Ignoring time.
  1640. adjust_timeouts2: packet supposedly had rtt of 9944054 microseconds. Ignoring time.
  1641. adjust_timeouts2: packet supposedly had rtt of 9944616 microseconds. Ignoring time.
  1642. adjust_timeouts2: packet supposedly had rtt of 9944616 microseconds. Ignoring time.
  1643. adjust_timeouts2: packet supposedly had rtt of 9935390 microseconds. Ignoring time.
  1644. adjust_timeouts2: packet supposedly had rtt of 9935390 microseconds. Ignoring time.
  1645. adjust_timeouts2: packet supposedly had rtt of 9892897 microseconds. Ignoring time.
  1646. adjust_timeouts2: packet supposedly had rtt of 9892897 microseconds. Ignoring time.
  1647. adjust_timeouts2: packet supposedly had rtt of 9909933 microseconds. Ignoring time.
  1648. adjust_timeouts2: packet supposedly had rtt of 9909933 microseconds. Ignoring time.
  1649. adjust_timeouts2: packet supposedly had rtt of 9907554 microseconds. Ignoring time.
  1650. adjust_timeouts2: packet supposedly had rtt of 9907554 microseconds. Ignoring time.
  1651. adjust_timeouts2: packet supposedly had rtt of 9906774 microseconds. Ignoring time.
  1652. adjust_timeouts2: packet supposedly had rtt of 9906774 microseconds. Ignoring time.
  1653. adjust_timeouts2: packet supposedly had rtt of 9904096 microseconds. Ignoring time.
  1654. adjust_timeouts2: packet supposedly had rtt of 9904096 microseconds. Ignoring time.
  1655. adjust_timeouts2: packet supposedly had rtt of 9935597 microseconds. Ignoring time.
  1656. adjust_timeouts2: packet supposedly had rtt of 9935597 microseconds. Ignoring time.
  1657. adjust_timeouts2: packet supposedly had rtt of 9931677 microseconds. Ignoring time.
  1658. adjust_timeouts2: packet supposedly had rtt of 9931677 microseconds. Ignoring time.
  1659. adjust_timeouts2: packet supposedly had rtt of 9933149 microseconds. Ignoring time.
  1660. adjust_timeouts2: packet supposedly had rtt of 9933149 microseconds. Ignoring time.
  1661. adjust_timeouts2: packet supposedly had rtt of 9883805 microseconds. Ignoring time.
  1662. adjust_timeouts2: packet supposedly had rtt of 9883805 microseconds. Ignoring time.
  1663. adjust_timeouts2: packet supposedly had rtt of 9907599 microseconds. Ignoring time.
  1664. adjust_timeouts2: packet supposedly had rtt of 9907599 microseconds. Ignoring time.
  1665. adjust_timeouts2: packet supposedly had rtt of 9897591 microseconds. Ignoring time.
  1666. adjust_timeouts2: packet supposedly had rtt of 9897591 microseconds. Ignoring time.
  1667. adjust_timeouts2: packet supposedly had rtt of 9904803 microseconds. Ignoring time.
  1668. adjust_timeouts2: packet supposedly had rtt of 9904803 microseconds. Ignoring time.
  1669. adjust_timeouts2: packet supposedly had rtt of 9912259 microseconds. Ignoring time.
  1670. adjust_timeouts2: packet supposedly had rtt of 9912259 microseconds. Ignoring time.
  1671. adjust_timeouts2: packet supposedly had rtt of 9840078 microseconds. Ignoring time.
  1672. adjust_timeouts2: packet supposedly had rtt of 9840078 microseconds. Ignoring time.
  1673. adjust_timeouts2: packet supposedly had rtt of 9625050 microseconds. Ignoring time.
  1674. adjust_timeouts2: packet supposedly had rtt of 9625050 microseconds. Ignoring time.
  1675. adjust_timeouts2: packet supposedly had rtt of 9615088 microseconds. Ignoring time.
  1676. adjust_timeouts2: packet supposedly had rtt of 9615088 microseconds. Ignoring time.
  1677. adjust_timeouts2: packet supposedly had rtt of 9629740 microseconds. Ignoring time.
  1678. adjust_timeouts2: packet supposedly had rtt of 9629740 microseconds. Ignoring time.
  1679. adjust_timeouts2: packet supposedly had rtt of 9557957 microseconds. Ignoring time.
  1680. adjust_timeouts2: packet supposedly had rtt of 9557957 microseconds. Ignoring time.
  1681. adjust_timeouts2: packet supposedly had rtt of 9588935 microseconds. Ignoring time.
  1682. adjust_timeouts2: packet supposedly had rtt of 9588935 microseconds. Ignoring time.
  1683. adjust_timeouts2: packet supposedly had rtt of 9629834 microseconds. Ignoring time.
  1684. adjust_timeouts2: packet supposedly had rtt of 9629834 microseconds. Ignoring time.
  1685. adjust_timeouts2: packet supposedly had rtt of 9602262 microseconds. Ignoring time.
  1686. adjust_timeouts2: packet supposedly had rtt of 9602262 microseconds. Ignoring time.
  1687. adjust_timeouts2: packet supposedly had rtt of 9625515 microseconds. Ignoring time.
  1688. adjust_timeouts2: packet supposedly had rtt of 9625515 microseconds. Ignoring time.
  1689. adjust_timeouts2: packet supposedly had rtt of 9597096 microseconds. Ignoring time.
  1690. adjust_timeouts2: packet supposedly had rtt of 9597096 microseconds. Ignoring time.
  1691. adjust_timeouts2: packet supposedly had rtt of 9568078 microseconds. Ignoring time.
  1692. adjust_timeouts2: packet supposedly had rtt of 9568078 microseconds. Ignoring time.
  1693. adjust_timeouts2: packet supposedly had rtt of 9577272 microseconds. Ignoring time.
  1694. adjust_timeouts2: packet supposedly had rtt of 9577272 microseconds. Ignoring time.
  1695. adjust_timeouts2: packet supposedly had rtt of 9511342 microseconds. Ignoring time.
  1696. adjust_timeouts2: packet supposedly had rtt of 9511342 microseconds. Ignoring time.
  1697. adjust_timeouts2: packet supposedly had rtt of 9380516 microseconds. Ignoring time.
  1698. adjust_timeouts2: packet supposedly had rtt of 9380516 microseconds. Ignoring time.
  1699. adjust_timeouts2: packet supposedly had rtt of 9363842 microseconds. Ignoring time.
  1700. adjust_timeouts2: packet supposedly had rtt of 9363842 microseconds. Ignoring time.
  1701. adjust_timeouts2: packet supposedly had rtt of 9346338 microseconds. Ignoring time.
  1702. adjust_timeouts2: packet supposedly had rtt of 9346338 microseconds. Ignoring time.
  1703. adjust_timeouts2: packet supposedly had rtt of 9343741 microseconds. Ignoring time.
  1704. adjust_timeouts2: packet supposedly had rtt of 9343741 microseconds. Ignoring time.
  1705. adjust_timeouts2: packet supposedly had rtt of 9347195 microseconds. Ignoring time.
  1706. adjust_timeouts2: packet supposedly had rtt of 9347195 microseconds. Ignoring time.
  1707. adjust_timeouts2: packet supposedly had rtt of 9343510 microseconds. Ignoring time.
  1708. adjust_timeouts2: packet supposedly had rtt of 9343510 microseconds. Ignoring time.
  1709. adjust_timeouts2: packet supposedly had rtt of 9368317 microseconds. Ignoring time.
  1710. adjust_timeouts2: packet supposedly had rtt of 9368317 microseconds. Ignoring time.
  1711. adjust_timeouts2: packet supposedly had rtt of 9371516 microseconds. Ignoring time.
  1712. adjust_timeouts2: packet supposedly had rtt of 9371516 microseconds. Ignoring time.
  1713. adjust_timeouts2: packet supposedly had rtt of 9373809 microseconds. Ignoring time.
  1714. adjust_timeouts2: packet supposedly had rtt of 9373809 microseconds. Ignoring time.
  1715. adjust_timeouts2: packet supposedly had rtt of 9384810 microseconds. Ignoring time.
  1716. adjust_timeouts2: packet supposedly had rtt of 9384810 microseconds. Ignoring time.
  1717. adjust_timeouts2: packet supposedly had rtt of 9390351 microseconds. Ignoring time.
  1718. adjust_timeouts2: packet supposedly had rtt of 9390351 microseconds. Ignoring time.
  1719. adjust_timeouts2: packet supposedly had rtt of 9392114 microseconds. Ignoring time.
  1720. adjust_timeouts2: packet supposedly had rtt of 9392114 microseconds. Ignoring time.
  1721. adjust_timeouts2: packet supposedly had rtt of 9407363 microseconds. Ignoring time.
  1722. adjust_timeouts2: packet supposedly had rtt of 9407363 microseconds. Ignoring time.
  1723. adjust_timeouts2: packet supposedly had rtt of 9338731 microseconds. Ignoring time.
  1724. adjust_timeouts2: packet supposedly had rtt of 9338731 microseconds. Ignoring time.
  1725. adjust_timeouts2: packet supposedly had rtt of 9365855 microseconds. Ignoring time.
  1726. adjust_timeouts2: packet supposedly had rtt of 9365855 microseconds. Ignoring time.
  1727. adjust_timeouts2: packet supposedly had rtt of 9352358 microseconds. Ignoring time.
  1728. adjust_timeouts2: packet supposedly had rtt of 9352358 microseconds. Ignoring time.
  1729. adjust_timeouts2: packet supposedly had rtt of 9364629 microseconds. Ignoring time.
  1730. adjust_timeouts2: packet supposedly had rtt of 9364629 microseconds. Ignoring time.
  1731. adjust_timeouts2: packet supposedly had rtt of 9358498 microseconds. Ignoring time.
  1732. adjust_timeouts2: packet supposedly had rtt of 9358498 microseconds. Ignoring time.
  1733. adjust_timeouts2: packet supposedly had rtt of 9369037 microseconds. Ignoring time.
  1734. adjust_timeouts2: packet supposedly had rtt of 9369037 microseconds. Ignoring time.
  1735. adjust_timeouts2: packet supposedly had rtt of 9364563 microseconds. Ignoring time.
  1736. adjust_timeouts2: packet supposedly had rtt of 9364563 microseconds. Ignoring time.
  1737. adjust_timeouts2: packet supposedly had rtt of 9374257 microseconds. Ignoring time.
  1738. adjust_timeouts2: packet supposedly had rtt of 9374257 microseconds. Ignoring time.
  1739. adjust_timeouts2: packet supposedly had rtt of 9325682 microseconds. Ignoring time.
  1740. adjust_timeouts2: packet supposedly had rtt of 9325682 microseconds. Ignoring time.
  1741. adjust_timeouts2: packet supposedly had rtt of 9314146 microseconds. Ignoring time.
  1742. adjust_timeouts2: packet supposedly had rtt of 9314146 microseconds. Ignoring time.
  1743. adjust_timeouts2: packet supposedly had rtt of 9310959 microseconds. Ignoring time.
  1744. adjust_timeouts2: packet supposedly had rtt of 9310959 microseconds. Ignoring time.
  1745. adjust_timeouts2: packet supposedly had rtt of 9336925 microseconds. Ignoring time.
  1746. adjust_timeouts2: packet supposedly had rtt of 9336925 microseconds. Ignoring time.
  1747. adjust_timeouts2: packet supposedly had rtt of 9337168 microseconds. Ignoring time.
  1748. adjust_timeouts2: packet supposedly had rtt of 9337168 microseconds. Ignoring time.
  1749. adjust_timeouts2: packet supposedly had rtt of 9256510 microseconds. Ignoring time.
  1750. adjust_timeouts2: packet supposedly had rtt of 9256510 microseconds. Ignoring time.
  1751. adjust_timeouts2: packet supposedly had rtt of 9109425 microseconds. Ignoring time.
  1752. adjust_timeouts2: packet supposedly had rtt of 9109425 microseconds. Ignoring time.
  1753. adjust_timeouts2: packet supposedly had rtt of 9101816 microseconds. Ignoring time.
  1754. adjust_timeouts2: packet supposedly had rtt of 9101816 microseconds. Ignoring time.
  1755. adjust_timeouts2: packet supposedly had rtt of 9112657 microseconds. Ignoring time.
  1756. adjust_timeouts2: packet supposedly had rtt of 9112657 microseconds. Ignoring time.
  1757. adjust_timeouts2: packet supposedly had rtt of 9050885 microseconds. Ignoring time.
  1758. adjust_timeouts2: packet supposedly had rtt of 9050885 microseconds. Ignoring time.
  1759. adjust_timeouts2: packet supposedly had rtt of 9053515 microseconds. Ignoring time.
  1760. adjust_timeouts2: packet supposedly had rtt of 9053515 microseconds. Ignoring time.
  1761. adjust_timeouts2: packet supposedly had rtt of 9060918 microseconds. Ignoring time.
  1762. adjust_timeouts2: packet supposedly had rtt of 9060918 microseconds. Ignoring time.
  1763. adjust_timeouts2: packet supposedly had rtt of 9034683 microseconds. Ignoring time.
  1764. adjust_timeouts2: packet supposedly had rtt of 9034683 microseconds. Ignoring time.
  1765. adjust_timeouts2: packet supposedly had rtt of 9059143 microseconds. Ignoring time.
  1766. adjust_timeouts2: packet supposedly had rtt of 9059143 microseconds. Ignoring time.
  1767. adjust_timeouts2: packet supposedly had rtt of 9030546 microseconds. Ignoring time.
  1768. adjust_timeouts2: packet supposedly had rtt of 9030546 microseconds. Ignoring time.
  1769. adjust_timeouts2: packet supposedly had rtt of 9016996 microseconds. Ignoring time.
  1770. adjust_timeouts2: packet supposedly had rtt of 9016996 microseconds. Ignoring time.
  1771. adjust_timeouts2: packet supposedly had rtt of 9031702 microseconds. Ignoring time.
  1772. adjust_timeouts2: packet supposedly had rtt of 9031702 microseconds. Ignoring time.
  1773. adjust_timeouts2: packet supposedly had rtt of 9048696 microseconds. Ignoring time.
  1774. adjust_timeouts2: packet supposedly had rtt of 9048696 microseconds. Ignoring time.
  1775. adjust_timeouts2: packet supposedly had rtt of 8984807 microseconds. Ignoring time.
  1776. adjust_timeouts2: packet supposedly had rtt of 8984807 microseconds. Ignoring time.
  1777. adjust_timeouts2: packet supposedly had rtt of 8851363 microseconds. Ignoring time.
  1778. adjust_timeouts2: packet supposedly had rtt of 8851363 microseconds. Ignoring time.
  1779. adjust_timeouts2: packet supposedly had rtt of 8847857 microseconds. Ignoring time.
  1780. adjust_timeouts2: packet supposedly had rtt of 8847857 microseconds. Ignoring time.
  1781. adjust_timeouts2: packet supposedly had rtt of 8825222 microseconds. Ignoring time.
  1782. adjust_timeouts2: packet supposedly had rtt of 8825222 microseconds. Ignoring time.
  1783. adjust_timeouts2: packet supposedly had rtt of 8828878 microseconds. Ignoring time.
  1784. adjust_timeouts2: packet supposedly had rtt of 8828878 microseconds. Ignoring time.
  1785. adjust_timeouts2: packet supposedly had rtt of 8830883 microseconds. Ignoring time.
  1786. adjust_timeouts2: packet supposedly had rtt of 8830883 microseconds. Ignoring time.
  1787. adjust_timeouts2: packet supposedly had rtt of 8850150 microseconds. Ignoring time.
  1788. adjust_timeouts2: packet supposedly had rtt of 8850150 microseconds. Ignoring time.
  1789. adjust_timeouts2: packet supposedly had rtt of 8863923 microseconds. Ignoring time.
  1790. adjust_timeouts2: packet supposedly had rtt of 8863923 microseconds. Ignoring time.
  1791. adjust_timeouts2: packet supposedly had rtt of 8888590 microseconds. Ignoring time.
  1792. adjust_timeouts2: packet supposedly had rtt of 8888590 microseconds. Ignoring time.
  1793. adjust_timeouts2: packet supposedly had rtt of 8880496 microseconds. Ignoring time.
  1794. adjust_timeouts2: packet supposedly had rtt of 8880496 microseconds. Ignoring time.
  1795. adjust_timeouts2: packet supposedly had rtt of 8892782 microseconds. Ignoring time.
  1796. adjust_timeouts2: packet supposedly had rtt of 8892782 microseconds. Ignoring time.
  1797. adjust_timeouts2: packet supposedly had rtt of 8903000 microseconds. Ignoring time.
  1798. adjust_timeouts2: packet supposedly had rtt of 8903000 microseconds. Ignoring time.
  1799. adjust_timeouts2: packet supposedly had rtt of 8894839 microseconds. Ignoring time.
  1800. adjust_timeouts2: packet supposedly had rtt of 8894839 microseconds. Ignoring time.
  1801. adjust_timeouts2: packet supposedly had rtt of 8906366 microseconds. Ignoring time.
  1802. adjust_timeouts2: packet supposedly had rtt of 8906366 microseconds. Ignoring time.
  1803. adjust_timeouts2: packet supposedly had rtt of 8859093 microseconds. Ignoring time.
  1804. adjust_timeouts2: packet supposedly had rtt of 8859093 microseconds. Ignoring time.
  1805. adjust_timeouts2: packet supposedly had rtt of 8872100 microseconds. Ignoring time.
  1806. adjust_timeouts2: packet supposedly had rtt of 8872100 microseconds. Ignoring time.
  1807. adjust_timeouts2: packet supposedly had rtt of 8875806 microseconds. Ignoring time.
  1808. adjust_timeouts2: packet supposedly had rtt of 8875806 microseconds. Ignoring time.
  1809. adjust_timeouts2: packet supposedly had rtt of 8868808 microseconds. Ignoring time.
  1810. adjust_timeouts2: packet supposedly had rtt of 8868808 microseconds. Ignoring time.
  1811. adjust_timeouts2: packet supposedly had rtt of 9151447 microseconds. Ignoring time.
  1812. adjust_timeouts2: packet supposedly had rtt of 9151447 microseconds. Ignoring time.
  1813. adjust_timeouts2: packet supposedly had rtt of 9158194 microseconds. Ignoring time.
  1814. adjust_timeouts2: packet supposedly had rtt of 9158194 microseconds. Ignoring time.
  1815. adjust_timeouts2: packet supposedly had rtt of 9169989 microseconds. Ignoring time.
  1816. adjust_timeouts2: packet supposedly had rtt of 9169989 microseconds. Ignoring time.
  1817. adjust_timeouts2: packet supposedly had rtt of 9155567 microseconds. Ignoring time.
  1818. adjust_timeouts2: packet supposedly had rtt of 9155567 microseconds. Ignoring time.
  1819. adjust_timeouts2: packet supposedly had rtt of 9158202 microseconds. Ignoring time.
  1820. adjust_timeouts2: packet supposedly had rtt of 9158202 microseconds. Ignoring time.
  1821. adjust_timeouts2: packet supposedly had rtt of 9149849 microseconds. Ignoring time.
  1822. adjust_timeouts2: packet supposedly had rtt of 9149849 microseconds. Ignoring time.
  1823. adjust_timeouts2: packet supposedly had rtt of 8367622 microseconds. Ignoring time.
  1824. adjust_timeouts2: packet supposedly had rtt of 8367622 microseconds. Ignoring time.
  1825. adjust_timeouts2: packet supposedly had rtt of 8367753 microseconds. Ignoring time.
  1826. adjust_timeouts2: packet supposedly had rtt of 8367753 microseconds. Ignoring time.
  1827. adjust_timeouts2: packet supposedly had rtt of 8379736 microseconds. Ignoring time.
  1828. adjust_timeouts2: packet supposedly had rtt of 8379736 microseconds. Ignoring time.
  1829. adjust_timeouts2: packet supposedly had rtt of 8396557 microseconds. Ignoring time.
  1830. adjust_timeouts2: packet supposedly had rtt of 8396557 microseconds. Ignoring time.
  1831. adjust_timeouts2: packet supposedly had rtt of 8387890 microseconds. Ignoring time.
  1832. adjust_timeouts2: packet supposedly had rtt of 8387890 microseconds. Ignoring time.
  1833. adjust_timeouts2: packet supposedly had rtt of 8396346 microseconds. Ignoring time.
  1834. adjust_timeouts2: packet supposedly had rtt of 8396346 microseconds. Ignoring time.
  1835. adjust_timeouts2: packet supposedly had rtt of 8403319 microseconds. Ignoring time.
  1836. adjust_timeouts2: packet supposedly had rtt of 8403319 microseconds. Ignoring time.
  1837. adjust_timeouts2: packet supposedly had rtt of 8429860 microseconds. Ignoring time.
  1838. adjust_timeouts2: packet supposedly had rtt of 8429860 microseconds. Ignoring time.
  1839. adjust_timeouts2: packet supposedly had rtt of 8028531 microseconds. Ignoring time.
  1840. adjust_timeouts2: packet supposedly had rtt of 8028531 microseconds. Ignoring time.
  1841. adjust_timeouts2: packet supposedly had rtt of 8018914 microseconds. Ignoring time.
  1842. adjust_timeouts2: packet supposedly had rtt of 8018914 microseconds. Ignoring time.
  1843. Discovered open port 100/tcp on 94.141.221.161
  1844. Completed SYN Stealth Scan against 94.141.221.161 in 4104.18s (3 hosts left)
  1845. Completed SYN Stealth Scan against 94.141.221.118 in 4297.78s (2 hosts left)
  1846. Completed SYN Stealth Scan against 94.141.221.116 in 4504.33s (1 host left)
  1847. Increasing send delay for 94.141.221.132 from 0 to 5 due to 289 out of 722 dropped probes since last increase.
  1848. Increasing send delay for 94.141.221.132 from 5 to 10 due to 11 out of 11 dropped probes since last increase.
  1849. Completed SYN Stealth Scan at 07:16, 5000.10s elapsed (64000 total ports)
  1850. Initiating Service scan at 07:16
  1851. Scanning 160 services on 64 hosts
  1852. WARNING: Service 94.141.221.38:5500 had already soft-matched rtsp, but now soft-matched sip; ignoring second value
  1853. WARNING: Service 94.141.221.53:5500 had already soft-matched rtsp, but now soft-matched sip; ignoring second value
  1854. Service scan Timing: About 33.12% done; ETC: 07:17 (0:01:03 remaining)
  1855. Service scan Timing: About 63.75% done; ETC: 07:18 (0:00:54 remaining)
  1856. Service scan Timing: About 78.75% done; ETC: 07:19 (0:00:40 remaining)
  1857. Completed Service scan at 07:21, 294.61s elapsed (160 services on 64 hosts)
  1858. Initiating OS detection (try #1) against 64 hosts
  1859. Completed os scan against 94.141.221.10 in 113.221s (63 hosts left)
  1860. Completed os scan against 94.141.221.32 in 113.221s (62 hosts left)
  1861. Completed os scan against 94.141.221.34 in 113.221s (61 hosts left)
  1862. Completed os scan against 94.141.221.45 in 113.221s (60 hosts left)
  1863. Completed os scan against 94.141.221.73 in 113.221s (59 hosts left)
  1864. Completed os scan against 94.141.221.80 in 113.221s (58 hosts left)
  1865. Completed os scan against 94.141.221.103 in 113.221s (57 hosts left)
  1866. Completed os scan against 94.141.221.114 in 113.221s (56 hosts left)
  1867. Completed os scan against 94.141.221.119 in 113.221s (55 hosts left)
  1868. Completed os scan against 94.141.221.120 in 113.221s (54 hosts left)
  1869. Completed os scan against 94.141.221.128 in 113.221s (53 hosts left)
  1870. Completed os scan against 94.141.221.131 in 113.221s (52 hosts left)
  1871. Completed os scan against 94.141.221.146 in 113.221s (51 hosts left)
  1872. Completed os scan against 94.141.221.189 in 113.221s (50 hosts left)
  1873. Retrying OS detection (try #2) against 50 hosts
  1874. Initiating Traceroute at 07:23
  1875. Completed Traceroute at 07:26, 140.28s elapsed
  1876. Initiating Parallel DNS resolution of 68 hosts. at 07:26
  1877. Completed Parallel DNS resolution of 68 hosts. at 07:26, 13.11s elapsed
  1878. NSE: Script scanning 64 hosts.
  1879. Initiating NSE at 07:26
  1880. Completed NSE at 07:31, 292.28s elapsed
  1881. Initiating NSE at 07:31
  1882. Completed NSE at 07:31, 0.03s elapsed
  1883. Nmap scan report for 94.141.221.3
  1884. Host is up (0.36s latency).
  1885. Not shown: 978 closed ports
  1886. PORT STATE SERVICE VERSION
  1887. 1/tcp filtered tcpmux
  1888. 3/tcp filtered compressnet
  1889. 4/tcp filtered unknown
  1890. 6/tcp filtered unknown
  1891. 7/tcp filtered echo
  1892. 9/tcp filtered discard
  1893. 21/tcp filtered ftp
  1894. 22/tcp filtered ssh
  1895. 23/tcp filtered telnet
  1896. 25/tcp filtered smtp
  1897. 80/tcp filtered http
  1898. 135/tcp filtered msrpc
  1899. 139/tcp filtered netbios-ssn
  1900. 445/tcp filtered microsoft-ds
  1901. 465/tcp filtered smtps
  1902. 587/tcp filtered submission
  1903. 1050/tcp open http mini_httpd 1.19 19dec2003
  1904. | giop-info:
  1905. |_ ERROR: Failed to read Packet.GIOP
  1906. | http-auth:
  1907. | HTTP/1.1 401 Unauthorized
  1908. |_ Digest realm=dirname algorithm=MD5 uri=/ qop=auth nonce=5f6d7579141ef284a3d54245005570a8 opaque=0123456789987654
  1909. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  1910. |_http-server-header: mini_httpd/1.19 19dec2003
  1911. |_http-title: 401 Unauthorized
  1912. 1433/tcp filtered ms-sql-s
  1913. 1720/tcp filtered h323q931
  1914. 1723/tcp filtered pptp
  1915. 2000/tcp filtered cisco-sccp
  1916. 5060/tcp filtered sip
  1917. Aggressive OS guesses: Asus RT-AC66U router (Linux 2.6) (94%), Asus RT-N16 WAP (Linux 2.6) (94%), Asus RT-N66U WAP (Linux 2.6) (94%), Tomato 1.28 (Linux 2.6.22) (94%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (94%), HP P2000 G3 NAS device (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (93%), Linksys WRV54G WAP (93%), Linux 2.4.18 (92%)
  1918. No exact OS matches for host (test conditions non-ideal).
  1919. Uptime guess: 65.963 days (since Thu Sep 17 09:24:25 2015)
  1920. Network Distance: 16 hops
  1921. TCP Sequence Prediction: Difficulty=169 (Good luck!)
  1922. IP ID Sequence Generation: All zeros
  1923.  
  1924. TRACEROUTE (using port 199/tcp)
  1925. HOP RTT ADDRESS
  1926. - Hops 1-10 are the same as for 94.141.221.18
  1927. 11 ... 15
  1928. 16 314.88 ms 94.141.221.3
  1929.  
  1930. Nmap scan report for 94.141.221.10
  1931. Host is up (1.2s latency).
  1932. Not shown: 999 filtered ports
  1933. PORT STATE SERVICE VERSION
  1934. 631/tcp closed ipp
  1935. Too many fingerprints match this host to give specific OS details
  1936.  
  1937. TRACEROUTE (using port 631/tcp)
  1938. HOP RTT ADDRESS
  1939. - Hops 1-10 are the same as for 94.141.221.18
  1940. 11 ... 30
  1941.  
  1942. Nmap scan report for 94.141.221.12
  1943. Host is up (0.40s latency).
  1944. Not shown: 997 filtered ports
  1945. PORT STATE SERVICE VERSION
  1946. 21/tcp open http Apache httpd 2.2.15 ((CentOS))
  1947. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  1948. |_http-server-header: Apache/2.2.15 (CentOS)
  1949. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.12/
  1950. 80/tcp open http Virtual Web 0.9
  1951. |_http-favicon: Unknown favicon MD5: D7C6D6BADE16E3D2417E661EC7E68B93
  1952. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  1953. |_http-server-header: Virtual Web 0.9
  1954. |_http-title: Site doesn't have a title (text/html).
  1955. 161/tcp open http Apache httpd 2.2.15 ((CentOS))
  1956. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  1957. |_http-server-header: Apache/2.2.15 (CentOS)
  1958. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.12/
  1959. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  1960. SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC1%P=x86_64-pc-linux-gnu%
  1961. SF:r(GetRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Virtual\x20Web\x
  1962. SF:200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent-Type:\x20text
  1963. SF:/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html><head><meta\x2
  1964. SF:0HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x20language='jav
  1965. SF:ascript'>parent\.location=\"/login\.htm\"</script></head><body></body><
  1966. SF:/html>")%r(HTTPOptions,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
  1967. SF::\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Req
  1968. SF:uest\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\
  1969. SF:n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HT
  1970. SF:ML>\n")%r(RTSPRequest,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
  1971. SF:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Requ
  1972. SF:est\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n
  1973. SF:</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTM
  1974. SF:L>\n")%r(FourOhFourRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Vi
  1975. SF:rtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent
  1976. SF:-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html>
  1977. SF:<head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x2
  1978. SF:0language='javascript'>parent\.location=\"/login\.htm\"</script></head>
  1979. SF:<body></body></html>")%r(GenericLines,C1,"HTTP/1\.1\x20400\x20Bad\x20Re
  1980. SF:quest\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>40
  1981. SF:0\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Ba
  1982. SF:d\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>
  1983. SF:\x20</BODY></HTML>\n")%r(SIPOptions,114,"HTTP/1\.1\x20200\x20OK\r\nServ
  1984. SF:er:\x20Virtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r
  1985. SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\
  1986. SF:r\n<html><head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><
  1987. SF:script\x20language='javascript'>parent\.location=\"/login\.htm\"</scrip
  1988. SF:t></head><body></body></html>");
  1989. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  1990. Device type: general purpose
  1991. Running (JUST GUESSING): Linux 2.6.X|3.X (87%)
  1992. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
  1993. Aggressive OS guesses: Linux 2.6.32 (87%), Linux 3.10 (87%)
  1994. No exact OS matches for host (test conditions non-ideal).
  1995. Uptime guess: 0.756 days (since Sat Nov 21 13:22:50 2015)
  1996. Network Distance: 16 hops
  1997. TCP Sequence Prediction: Difficulty=238 (Good luck!)
  1998. IP ID Sequence Generation: All zeros
  1999.  
  2000. TRACEROUTE (using port 80/tcp)
  2001. HOP RTT ADDRESS
  2002. - Hops 1-10 are the same as for 94.141.221.18
  2003. 11 ... 15
  2004. 16 362.62 ms 94.141.221.12
  2005.  
  2006. Nmap scan report for 94.141.221.18
  2007. Host is up (0.44s latency).
  2008. All 1000 scanned ports on 94.141.221.18 are filtered
  2009. Too many fingerprints match this host to give specific OS details
  2010. Network Distance: 16 hops
  2011.  
  2012. TRACEROUTE (using proto 1/icmp)
  2013. HOP RTT ADDRESS
  2014. 1 129.35 ms 172.20.32.1
  2015. 2 125.61 ms 208.68.88.113
  2016. 3 154.35 ms bb1.yyz01.3z.ca (208.68.88.1)
  2017. 4 130.38 ms cr1.yyz01.3z.ca (208.68.88.178)
  2018. 5 245.23 ms toro-b1-link.telia.net (213.248.98.241)
  2019. 6 141.54 ms level3-ic-305926-toro-b1.c.telia.net (62.115.41.182)
  2020. 7 215.87 ms ae-226-3602.edge3.London15.Level3.net (4.69.167.94)
  2021. 8 233.35 ms ae-227-3603.edge3.London15.Level3.net (4.69.167.98)
  2022. 9 264.80 ms PCCW-GLOBAL.edge3.London15.Level3.net (212.187.139.86)
  2023. 10 281.39 ms cyprus.te7-8.br03.ldn01.pccwbtn.net (63.218.34.58)
  2024. 11 337.55 ms 82.137.192.225
  2025. 12 ... 15
  2026. 16 345.65 ms 94.141.221.18
  2027.  
  2028. Nmap scan report for 94.141.221.19
  2029. Host is up (0.47s latency).
  2030. Not shown: 867 filtered ports, 131 closed ports
  2031. PORT STATE SERVICE VERSION
  2032. 21/tcp open tcpwrapped
  2033. |_ftp-anon: ERROR: Script execution failed (use -d to debug)
  2034. 8080/tcp open tcpwrapped
  2035. Device type: broadband router|firewall|WAP
  2036. Running (JUST GUESSING): ZyXEL ZyNOS 3.X|4.X (94%), ZyXEL embedded (90%)
  2037. OS CPE: cpe:/o:zyxel:zynos cpe:/o:zyxel:zynos:3 cpe:/h:zyxel:p-2602h-d1a cpe:/o:zyxel:zynos:4
  2038. Aggressive OS guesses: ZyXEL Prestige 660HW-61 ADSL router (ZyNOS 3.40) (94%), ZyXEL ZyWALL 2 firewall or Prestige 660HW-61 ADSL router (ZyNOS 3.62) (90%), ZyXEL ZyNOS 3.40 (90%), ZyXEL P-2602H-D1A DSL modem (90%), ZyXEL Prestige 660HW-D1 wireless ADSL router (89%), ZyXEL ZyWALL 5 firewall (89%), ZyXEL ZyWALL 2, 5, or 70 firewall (ZyNOS 4.04) (88%), ZyXEL G-3000H WAP (ZyNOS 3.50) (86%)
  2039. No exact OS matches for host (test conditions non-ideal).
  2040. Network Distance: 16 hops
  2041. TCP Sequence Prediction: Difficulty=17 (Good luck!)
  2042. IP ID Sequence Generation: Incremental
  2043.  
  2044. TRACEROUTE (using port 199/tcp)
  2045. HOP RTT ADDRESS
  2046. - Hops 1-10 are the same as for 94.141.221.18
  2047. 11 ... 15
  2048. 16 403.53 ms 94.141.221.19
  2049.  
  2050. Nmap scan report for 94.141.221.22
  2051. Host is up (0.38s latency).
  2052. Not shown: 975 closed ports
  2053. PORT STATE SERVICE VERSION
  2054. 1/tcp filtered tcpmux
  2055. 3/tcp filtered compressnet
  2056. 4/tcp filtered unknown
  2057. 6/tcp filtered unknown
  2058. 7/tcp filtered echo
  2059. 9/tcp filtered discard
  2060. 22/tcp filtered ssh
  2061. 23/tcp filtered telnet
  2062. 25/tcp filtered smtp
  2063. 80/tcp open http Boa HTTPd 0.94.14rc21
  2064. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  2065. |_http-server-header: Boa/0.94.14rc21
  2066. |_http-title: main page
  2067. 135/tcp filtered msrpc
  2068. 139/tcp filtered netbios-ssn
  2069. 445/tcp filtered microsoft-ds
  2070. 465/tcp filtered smtps
  2071. 587/tcp filtered submission
  2072. 1433/tcp filtered ms-sql-s
  2073. 1720/tcp filtered h323q931
  2074. 1723/tcp filtered pptp
  2075. 2000/tcp filtered cisco-sccp
  2076. 5060/tcp filtered sip
  2077. 5989/tcp filtered wbem-https
  2078. 6881/tcp filtered bittorrent-tracker
  2079. 8002/tcp open teradataordbms?
  2080. 9010/tcp open sdr?
  2081. 9011/tcp open unknown
  2082. Aggressive OS guesses: Linux 2.6.15 (likely TP-LINK WAP) (90%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (90%), Linux 2.6.9 (CentOS 4.3) (89%), Riverbed Steelhead proxy server (89%), Ruckus ZD1050 WAP (89%), Linux 2.6.20 (89%), Linux 2.6.20 (Ubuntu, x86_64) (89%), Linux 2.6.21 (89%), Linux 2.6.22 (89%), Linux 2.6.27 (Ubuntu 8.10) (89%)
  2083. No exact OS matches for host (test conditions non-ideal).
  2084. Uptime guess: 0.645 days (since Sat Nov 21 16:01:54 2015)
  2085. Network Distance: 17 hops
  2086. TCP Sequence Prediction: Difficulty=175 (Good luck!)
  2087. IP ID Sequence Generation: All zeros
  2088.  
  2089. TRACEROUTE (using port 80/tcp)
  2090. HOP RTT ADDRESS
  2091. - Hops 1-10 are the same as for 94.141.221.18
  2092. 11 ... 16
  2093. 17 384.52 ms 94.141.221.22
  2094.  
  2095. Nmap scan report for 94.141.221.24
  2096. Host is up (0.43s latency).
  2097. Not shown: 998 filtered ports
  2098. PORT STATE SERVICE VERSION
  2099. 80/tcp open http mini_httpd 1.19 19dec2003
  2100. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  2101. |_http-server-header: mini_httpd/1.19 19dec2003
  2102. |_http-title: Site doesn't have a title (text/html; charset=utf-8).
  2103. 88/tcp open http mini_httpd 1.19 19dec2003
  2104. | http-auth:
  2105. | HTTP/1.1 401 Unauthorized
  2106. |_ Basic realm=.
  2107. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  2108. |_http-server-header: mini_httpd/1.19 19dec2003
  2109. |_http-title: 401 Unauthorized
  2110. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2111. Aggressive OS guesses: Linksys WRV54G WAP (92%), Crestron XPanel control system (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (89%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (89%), MikroTik RouterOS 4.9 (Linux 2.6) (88%), Linux 2.4.18 (88%), OpenWrt White Russian 0.9 (Linux 2.4.30) (87%), HP P2000 G3 NAS device (86%), Asus RT-AC66U router (Linux 2.6) (86%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (86%)
  2112. No exact OS matches for host (test conditions non-ideal).
  2113. Uptime guess: 2.630 days (since Thu Nov 19 16:23:30 2015)
  2114. Network Distance: 16 hops
  2115. TCP Sequence Prediction: Difficulty=184 (Good luck!)
  2116. IP ID Sequence Generation: All zeros
  2117.  
  2118. TRACEROUTE (using port 80/tcp)
  2119. HOP RTT ADDRESS
  2120. - Hops 1-10 are the same as for 94.141.221.18
  2121. 11 ... 15
  2122. 16 416.37 ms 94.141.221.24
  2123.  
  2124. Nmap scan report for 94.141.221.28
  2125. Host is up (1.7s latency).
  2126. All 1000 scanned ports on 94.141.221.28 are filtered
  2127. Too many fingerprints match this host to give specific OS details
  2128. Network Distance: 16 hops
  2129.  
  2130. TRACEROUTE (using port 80/tcp)
  2131. HOP RTT ADDRESS
  2132. - Hops 1-10 are the same as for 94.141.221.18
  2133. 11 ... 15
  2134. 16 325.65 ms 94.141.221.28
  2135.  
  2136. Nmap scan report for 94.141.221.31
  2137. Host is up (0.36s latency).
  2138. Not shown: 979 closed ports
  2139. PORT STATE SERVICE VERSION
  2140. 1/tcp filtered tcpmux
  2141. 3/tcp filtered compressnet
  2142. 4/tcp filtered unknown
  2143. 6/tcp filtered unknown
  2144. 7/tcp filtered echo
  2145. 9/tcp filtered discard
  2146. 22/tcp filtered ssh
  2147. 23/tcp filtered telnet
  2148. 25/tcp filtered smtp
  2149. 80/tcp open http Virtual Web 0.9
  2150. |_http-favicon: Unknown favicon MD5: D7C6D6BADE16E3D2417E661EC7E68B93
  2151. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  2152. |_http-server-header: Virtual Web 0.9
  2153. |_http-title: Site doesn't have a title (text/html).
  2154. 135/tcp filtered msrpc
  2155. 139/tcp filtered netbios-ssn
  2156. 445/tcp filtered microsoft-ds
  2157. 465/tcp filtered smtps
  2158. 554/tcp open rtsp D-Link DCS-2130 or Pelco IDE10DN webcam rtspd
  2159. |_rtsp-methods: OPTIONS, DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, GET_PARAMETER, SET_PARAMETER
  2160. 587/tcp filtered submission
  2161. 1433/tcp filtered ms-sql-s
  2162. 1720/tcp filtered h323q931
  2163. 1723/tcp filtered pptp
  2164. 2000/tcp filtered cisco-sccp
  2165. 5060/tcp filtered sip
  2166. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  2167. SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC2%P=x86_64-pc-linux-gnu%
  2168. SF:r(GetRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Virtual\x20Web\x
  2169. SF:200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent-Type:\x20text
  2170. SF:/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html><head><meta\x2
  2171. SF:0HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x20language='jav
  2172. SF:ascript'>parent\.location=\"/login\.htm\"</script></head><body></body><
  2173. SF:/html>")%r(HTTPOptions,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
  2174. SF::\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Req
  2175. SF:uest\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\
  2176. SF:n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HT
  2177. SF:ML>\n")%r(RTSPRequest,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
  2178. SF:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Requ
  2179. SF:est\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n
  2180. SF:</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTM
  2181. SF:L>\n")%r(FourOhFourRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Vi
  2182. SF:rtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent
  2183. SF:-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html>
  2184. SF:<head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x2
  2185. SF:0language='javascript'>parent\.location=\"/login\.htm\"</script></head>
  2186. SF:<body></body></html>")%r(GenericLines,C1,"HTTP/1\.1\x20400\x20Bad\x20Re
  2187. SF:quest\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>40
  2188. SF:0\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Ba
  2189. SF:d\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>
  2190. SF:\x20</BODY></HTML>\n")%r(SIPOptions,114,"HTTP/1\.1\x20200\x20OK\r\nServ
  2191. SF:er:\x20Virtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r
  2192. SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\
  2193. SF:r\n<html><head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><
  2194. SF:script\x20language='javascript'>parent\.location=\"/login\.htm\"</scrip
  2195. SF:t></head><body></body></html>");
  2196. Device type: switch|firewall|WAP|router
  2197. Running (JUST GUESSING): D-Link embedded (87%), SonicWALL SonicOS 4.X (85%), Netgear embedded (85%), Asus Linux 2.6.X (85%), Linux 2.6.X (85%)
  2198. OS CPE: cpe:/h:dlink:des-3526 cpe:/o:sonicwall:sonicos:4 cpe:/h:netgear:wgr614v7 cpe:/o:asus:linux_kernel:2.6 cpe:/h:asus:rt-n16 cpe:/o:linux:linux_kernel:2.6.22
  2199. Aggressive OS guesses: D-Link DES-3526 switch (87%), D-Link DES-3028P switch (86%), SonicWALL TZ 190 firewall (SonicOS Enhanced 4.0) (85%), Netgear WGR614v7 wireless broadband router (85%), Asus RT-AC66U router (Linux 2.6) (85%), Asus RT-N16 WAP (Linux 2.6) (85%), Asus RT-N66U WAP (Linux 2.6) (85%), Tomato 1.28 (Linux 2.6.22) (85%)
  2200. No exact OS matches for host (test conditions non-ideal).
  2201. Uptime guess: 0.861 days (since Sat Nov 21 10:51:32 2015)
  2202. Network Distance: 17 hops
  2203. TCP Sequence Prediction: Difficulty=124 (Good luck!)
  2204. IP ID Sequence Generation: Incrementing by 2
  2205. Service Info: Device: webcam; CPE: cpe:/h:pelco:ide10dn
  2206.  
  2207. TRACEROUTE (using port 113/tcp)
  2208. HOP RTT ADDRESS
  2209. - Hops 1-10 are the same as for 94.141.221.18
  2210. 11 ... 16
  2211. 17 375.02 ms 94.141.221.31
  2212.  
  2213. Nmap scan report for 94.141.221.32
  2214. Host is up (0.37s latency).
  2215. All 1000 scanned ports on 94.141.221.32 are filtered (860) or closed (140)
  2216. Too many fingerprints match this host to give specific OS details
  2217. Network Distance: 16 hops
  2218.  
  2219. TRACEROUTE (using port 80/tcp)
  2220. HOP RTT ADDRESS
  2221. - Hops 1-10 are the same as for 94.141.221.18
  2222. 11 ... 15
  2223. 16 331.61 ms 94.141.221.32
  2224.  
  2225. Nmap scan report for 94.141.221.33
  2226. Host is up (0.37s latency).
  2227. Not shown: 999 filtered ports
  2228. PORT STATE SERVICE VERSION
  2229. 80/tcp open http Virtual Web 0.9
  2230. |_http-favicon: Unknown favicon MD5: D7C6D6BADE16E3D2417E661EC7E68B93
  2231. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  2232. |_http-server-header: Virtual Web 0.9
  2233. |_http-title: Site doesn't have a title (text/html).
  2234. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  2235. SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC1%P=x86_64-pc-linux-gnu%
  2236. SF:r(GetRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Virtual\x20Web\x
  2237. SF:200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent-Type:\x20text
  2238. SF:/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html><head><meta\x2
  2239. SF:0HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x20language='jav
  2240. SF:ascript'>parent\.location=\"/login\.htm\"</script></head><body></body><
  2241. SF:/html>")%r(HTTPOptions,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
  2242. SF::\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Req
  2243. SF:uest\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\
  2244. SF:n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HT
  2245. SF:ML>\n")%r(RTSPRequest,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
  2246. SF:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Requ
  2247. SF:est\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n
  2248. SF:</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTM
  2249. SF:L>\n")%r(FourOhFourRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Vi
  2250. SF:rtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent
  2251. SF:-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html>
  2252. SF:<head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x2
  2253. SF:0language='javascript'>parent\.location=\"/login\.htm\"</script></head>
  2254. SF:<body></body></html>")%r(GenericLines,C1,"HTTP/1\.1\x20400\x20Bad\x20Re
  2255. SF:quest\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>40
  2256. SF:0\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Ba
  2257. SF:d\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>
  2258. SF:\x20</BODY></HTML>\n")%r(SIPOptions,114,"HTTP/1\.1\x20200\x20OK\r\nServ
  2259. SF:er:\x20Virtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r
  2260. SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\
  2261. SF:r\n<html><head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><
  2262. SF:script\x20language='javascript'>parent\.location=\"/login\.htm\"</scrip
  2263. SF:t></head><body></body></html>");
  2264. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2265. Device type: switch|VoIP adapter
  2266. Running (JUST GUESSING): D-Link embedded (91%), 3Com embedded (85%), Allied Telesyn embedded (85%)
  2267. OS CPE: cpe:/h:dlink:des-3028p cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:dvg-4022s
  2268. Aggressive OS guesses: D-Link DES-3028P switch (91%), D-Link DES-3526 switch (90%), D-Link DES-3326 switch (89%), 3Com 3924 switch (85%), Allied Telesyn AT-GS950 or D-Link DES-3226L switch (85%), D-Link DES-3010F or DES-3010G switch (85%), D-Link DES-3010G switch (85%), D-Link DES-3526 or DES-3550 switch (85%), D-Link DES-3550 switch (85%), D-Link DGS-3024 switch (85%)
  2269. No exact OS matches for host (test conditions non-ideal).
  2270. Uptime guess: 0.502 days (since Sat Nov 21 19:28:30 2015)
  2271. Network Distance: 16 hops
  2272. TCP Sequence Prediction: Difficulty=135 (Good luck!)
  2273. IP ID Sequence Generation: Incrementing by 2
  2274.  
  2275. TRACEROUTE (using port 80/tcp)
  2276. HOP RTT ADDRESS
  2277. - Hops 1-10 are the same as for 94.141.221.18
  2278. 11 ... 15
  2279. 16 358.14 ms 94.141.221.33
  2280.  
  2281. Nmap scan report for 94.141.221.34
  2282. Host is up (0.41s latency).
  2283. Not shown: 999 filtered ports
  2284. PORT STATE SERVICE VERSION
  2285. 80/tcp open tcpwrapped
  2286. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2287. Device type: specialized|WAP|phone
  2288. Running: iPXE 1.X, Linksys Linux 2.4.X, Linux 2.6.X, Sony Ericsson embedded
  2289. OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linksys:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6 cpe:/h:sonyericsson:u8i_vivaz
  2290. OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
  2291.  
  2292. TRACEROUTE (using port 80/tcp)
  2293. HOP RTT ADDRESS
  2294. - Hops 1-10 are the same as for 94.141.221.18
  2295. 11 ... 30
  2296.  
  2297. Nmap scan report for 94.141.221.38
  2298. Host is up (0.36s latency).
  2299. Not shown: 975 closed ports
  2300. PORT STATE SERVICE VERSION
  2301. 1/tcp filtered tcpmux
  2302. 3/tcp filtered compressnet
  2303. 4/tcp filtered unknown
  2304. 6/tcp filtered unknown
  2305. 7/tcp filtered echo
  2306. 9/tcp filtered discard
  2307. 21/tcp open http Apache httpd 2.2.15 ((CentOS))
  2308. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  2309. |_http-server-header: Apache/2.2.15 (CentOS)
  2310. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.38/
  2311. 22/tcp filtered ssh
  2312. 23/tcp filtered telnet
  2313. 25/tcp filtered smtp
  2314. 135/tcp filtered msrpc
  2315. 139/tcp filtered netbios-ssn
  2316. 161/tcp open http Apache httpd 2.2.15 ((CentOS))
  2317. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  2318. |_http-server-header: Apache/2.2.15 (CentOS)
  2319. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.38/
  2320. 445/tcp filtered microsoft-ds
  2321. 465/tcp filtered smtps
  2322. 587/tcp filtered submission
  2323. 1433/tcp filtered ms-sql-s
  2324. 1720/tcp filtered h323q931
  2325. 1723/tcp filtered pptp
  2326. 2000/tcp filtered cisco-sccp
  2327. 5001/tcp open http Apache httpd 2.2.15 ((CentOS))
  2328. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  2329. |_http-server-header: Apache/2.2.15 (CentOS)
  2330. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.38/
  2331. 5060/tcp filtered sip
  2332. 5500/tcp open rtsp
  2333. |_rtsp-methods: ERROR: Script execution failed (use -d to debug)
  2334. 8080/tcp open http Tenda N60 WAP http admin
  2335. |_http-methods: No Allow or Public header in OPTIONS response (status code 400)
  2336. |_http-title: Did not follow redirect to http://94.141.221.38/login.asp
  2337. 8291/tcp open http Apache httpd 2.2.15 ((CentOS))
  2338. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  2339. |_http-server-header: Apache/2.2.15 (CentOS)
  2340. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.38/
  2341. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  2342. SF-Port5500-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC3%P=x86_64-pc-linux-gn
  2343. SF:u%r(GenericLines,FC,"\x20501\x20Not\x20Implemented\r\nContent-Type:\x20
  2344. SF:text/html\r\nConnection:\x20close\r\nContent-Length:\x20149\r\nServer:\
  2345. SF:x201\.0\x20\r\n\r\n<HTML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE>
  2346. SF:</HEAD><BODY><H1>Not\x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20
  2347. SF:not\x20implemented\x20by\x20this\x20server\.</BODY></HTML>\r\n")%r(GetR
  2348. SF:equest,EF,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/ht
  2349. SF:ml\r\nConnection:\x20close\r\nContent-Length:\x20134\r\nServer:\x201\.0
  2350. SF:\x20\r\n\r\n<HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY>
  2351. SF:<H1>Not\x20Found</H1>The\x20requested\x20URL\x20was\x20not\x20found\x20
  2352. SF:on\x20this\x20server\.</BODY></HTML>\r\n")%r(HTTPOptions,104,"HTTP/1\.0
  2353. SF:\x20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConnecti
  2354. SF:on:\x20close\r\nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<H
  2355. SF:TML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\
  2356. SF:x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x2
  2357. SF:0by\x20this\x20server\.</BODY></HTML>\r\n")%r(RTSPRequest,104,"RTSP/1\.
  2358. SF:0\x20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConnect
  2359. SF:ion:\x20close\r\nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<
  2360. SF:HTML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not
  2361. SF:\x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x
  2362. SF:20by\x20this\x20server\.</BODY></HTML>\r\n")%r(FourOhFourRequest,EF,"HT
  2363. SF:TP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/html\r\nConnect
  2364. SF:ion:\x20close\r\nContent-Length:\x20134\r\nServer:\x201\.0\x20\r\n\r\n<
  2365. SF:HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY><H1>Not\x20Fo
  2366. SF:und</H1>The\x20requested\x20URL\x20was\x20not\x20found\x20on\x20this\x2
  2367. SF:0server\.</BODY></HTML>\r\n")%r(SIPOptions,103,"SIP/2\.0\x20501\x20Not\
  2368. SF:x20Implemented\r\nContent-Type:\x20text/html\r\nConnection:\x20close\r\
  2369. SF:nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<HTML><HEAD><TITL
  2370. SF:E>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20Implemented<
  2371. SF:/H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\x20
  2372. SF:server\.</BODY></HTML>\r\n");
  2373. Aggressive OS guesses: Linux 2.6.32 (95%), Linux 2.6.32 - 3.13 (94%), Linux 2.6.32 - 2.6.39 (94%), Linux 2.6.32 - 3.1 (94%), Linux 2.6.39 (94%), HP P2000 G3 NAS device (93%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.9 (92%), Linux 3.10 (92%), Linux 3.11 (92%)
  2374. No exact OS matches for host (test conditions non-ideal).
  2375. Uptime guess: 0.064 days (since Sun Nov 22 05:59:29 2015)
  2376. Network Distance: 16 hops
  2377. TCP Sequence Prediction: Difficulty=230 (Good luck!)
  2378. IP ID Sequence Generation: All zeros
  2379. Service Info: Device: WAP; CPE: cpe:/h:tenda:n60
  2380.  
  2381. TRACEROUTE (using port 199/tcp)
  2382. HOP RTT ADDRESS
  2383. - Hops 1-10 are the same as for 94.141.221.18
  2384. 11 ... 15
  2385. 16 338.56 ms 94.141.221.38
  2386.  
  2387. Nmap scan report for 94.141.221.39
  2388. Host is up (0.41s latency).
  2389. Not shown: 978 closed ports
  2390. PORT STATE SERVICE VERSION
  2391. 1/tcp filtered tcpmux
  2392. 3/tcp filtered compressnet
  2393. 4/tcp filtered unknown
  2394. 6/tcp filtered unknown
  2395. 7/tcp filtered echo
  2396. 9/tcp filtered discard
  2397. 21/tcp open tcpwrapped
  2398. |_ftp-anon: ERROR: Script execution failed (use -d to debug)
  2399. 22/tcp filtered ssh
  2400. 23/tcp filtered telnet
  2401. 25/tcp filtered smtp
  2402. 80/tcp open tcpwrapped
  2403. 135/tcp filtered msrpc
  2404. 139/tcp filtered netbios-ssn
  2405. 445/tcp filtered microsoft-ds
  2406. 465/tcp filtered smtps
  2407. 587/tcp filtered submission
  2408. 1433/tcp filtered ms-sql-s
  2409. 1720/tcp filtered h323q931
  2410. 1723/tcp filtered pptp
  2411. 2000/tcp filtered cisco-sccp
  2412. 5060/tcp filtered sip
  2413. 5431/tcp open tcpwrapped
  2414. OS fingerprint not ideal because: maxTimingRatio (1.297600e+01) is greater than 1.4
  2415. No OS matches for host
  2416.  
  2417. TRACEROUTE (using port 199/tcp)
  2418. HOP RTT ADDRESS
  2419. - Hops 1-10 are the same as for 94.141.221.18
  2420. 11 ... 30
  2421.  
  2422. Nmap scan report for 94.141.221.43
  2423. Host is up (0.37s latency).
  2424. Not shown: 858 filtered ports, 138 closed ports
  2425. PORT STATE SERVICE VERSION
  2426. 21/tcp open tcpwrapped
  2427. |_ftp-anon: ERROR: Script execution failed (use -d to debug)
  2428. 80/tcp open tcpwrapped
  2429. 161/tcp open tcpwrapped
  2430. 2121/tcp open tcpwrapped
  2431. OS fingerprint not ideal because: maxTimingRatio (1.283400e+01) is greater than 1.4
  2432. No OS matches for host
  2433.  
  2434. TRACEROUTE (using port 199/tcp)
  2435. HOP RTT ADDRESS
  2436. - Hops 1-10 are the same as for 94.141.221.18
  2437. 11 ... 30
  2438.  
  2439. Nmap scan report for 94.141.221.45
  2440. Host is up (0.36s latency).
  2441. All 1000 scanned ports on 94.141.221.45 are filtered
  2442. Device type: switch|VoIP adapter|VoIP phone
  2443. Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded, HP embedded, Xylan embedded
  2444. OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000 cpe:/h:xylan:omnistack_4024cf
  2445. Too many fingerprints match this host to give specific OS details
  2446. Network Distance: 16 hops
  2447.  
  2448. TRACEROUTE (using proto 1/icmp)
  2449. HOP RTT ADDRESS
  2450. - Hops 1-11 are the same as for 94.141.221.18
  2451. 12 ... 15
  2452. 16 363.33 ms 94.141.221.45
  2453.  
  2454. Nmap scan report for 94.141.221.46
  2455. Host is up (0.36s latency).
  2456. Not shown: 977 closed ports
  2457. PORT STATE SERVICE VERSION
  2458. 1/tcp filtered tcpmux
  2459. 3/tcp filtered compressnet
  2460. 4/tcp filtered unknown
  2461. 6/tcp filtered unknown
  2462. 7/tcp filtered echo
  2463. 9/tcp filtered discard
  2464. 22/tcp filtered ssh
  2465. 23/tcp filtered telnet
  2466. 25/tcp filtered smtp
  2467. 80/tcp open http Boa HTTPd 0.94.13
  2468. |_http-favicon: Unknown favicon MD5: E6D3B3FF180103E14C19E5C297678C9F
  2469. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  2470. |_http-server-header: Boa/0.94.13
  2471. |_http-title: Site doesn't have a title (text/html).
  2472. 135/tcp filtered msrpc
  2473. 139/tcp filtered netbios-ssn
  2474. 445/tcp filtered microsoft-ds
  2475. 465/tcp filtered smtps
  2476. 587/tcp filtered submission
  2477. 1433/tcp filtered ms-sql-s
  2478. 1720/tcp filtered h323q931
  2479. 1723/tcp filtered pptp
  2480. 2000/tcp filtered cisco-sccp
  2481. 5000/tcp open upnp?
  2482. 5060/tcp filtered sip
  2483. 8000/tcp open http-alt?
  2484. 10002/tcp open documentum?
  2485. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  2486. SF-Port5000-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC2%P=x86_64-pc-linux-gn
  2487. SF:u%r(NULL,2C,"\0\0\0\(\0\0\0\0\xcf\x01\x20\0ff774297\0\0\0\0\0\0\0\0\0\0
  2488. SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0")%r(GenericLines,2C,"\0\0\0\(\0\0\0\0\xcf\
  2489. SF:x01\x20\0ff774297\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0")%r(S
  2490. SF:MBProgNeg,2C,"\0\0\0\(\0\0\0\0\xcf\x01\x20\0ff774297\0\0\0\0\0\0\0\0\0\
  2491. SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0")%r(ZendJavaBridge,2C,"\0\0\0\(\0\0\0\0\x
  2492. SF:cf\x01\x20\0ff774297\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0")%
  2493. SF:r(Kerberos,2C,"\0\0\0\(\0\0\0\0\xcf\x01\x20\0ff774297\0\0\0\0\0\0\0\0\0
  2494. SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0");
  2495. Aggressive OS guesses: HP P2000 G3 NAS device (97%), MikroTik RouterOS 6.19 (Linux 3.3.5) (94%), Linux 2.6.32 - 3.13 (94%), Linux 2.6.32 - 2.6.39 (94%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.9 (92%), Linux 2.6.32 (92%), Linux 3.10 (92%), Linux 3.2 (91%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (91%)
  2496. No exact OS matches for host (test conditions non-ideal).
  2497. Uptime guess: 2.807 days (since Thu Nov 19 12:08:31 2015)
  2498. Network Distance: 16 hops
  2499. TCP Sequence Prediction: Difficulty=232 (Good luck!)
  2500. IP ID Sequence Generation: All zeros
  2501.  
  2502. TRACEROUTE (using port 199/tcp)
  2503. HOP RTT ADDRESS
  2504. - Hops 1-10 are the same as for 94.141.221.18
  2505. 11 ... 15
  2506. 16 319.41 ms 94.141.221.46
  2507.  
  2508. Nmap scan report for 94.141.221.49
  2509. Host is up (0.35s latency).
  2510. Not shown: 989 filtered ports
  2511. PORT STATE SERVICE VERSION
  2512. 80/tcp open tcpwrapped
  2513. 88/tcp open http BusyBox httpd
  2514. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  2515. |_http-title: \xE6\x97\xA0\xE6\xA0\x87\xE9\xA2\x98\xE9\xA1\xB5
  2516. 888/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
  2517. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  2518. |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
  2519. |_http-title: ::: Login :::
  2520. 1863/tcp closed msnp
  2521. 1864/tcp closed paradym-31
  2522. 3389/tcp open ms-wbt-server Microsoft Terminal Service
  2523. 4443/tcp closed pharos
  2524. 5190/tcp closed aol
  2525. 5566/tcp closed westec-connect
  2526. 8081/tcp open blackice-icecap?
  2527. 8291/tcp open unknown
  2528. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  2529. SF-Port8081-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC7%P=x86_64-pc-linux-gn
  2530. SF:u%r(GetRequest,4A,"HTTP/1\.1\x20503\x20Service\x20Unavailable\r\nConnec
  2531. SF:tion:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(FourOhFourRequest,4A
  2532. SF:,"HTTP/1\.1\x20503\x20Service\x20Unavailable\r\nConnection:\x20Close\r\
  2533. SF:nContent-Length:\x200\r\n\r\n")%r(SIPOptions,4A,"HTTP/1\.1\x20503\x20Se
  2534. SF:rvice\x20Unavailable\r\nConnection:\x20Close\r\nContent-Length:\x200\r\
  2535. SF:n\r\n")%r(WWWOFFLEctrlstat,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x
  2536. SF:20Error\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(Gen
  2537. SF:ericLines,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConnec
  2538. SF:tion:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(HTTPOptions,4A,"HTTP
  2539. SF:/1\.1\x20503\x20Service\x20Unavailable\r\nConnection:\x20Close\r\nConte
  2540. SF:nt-Length:\x200\r\n\r\n")%r(RTSPRequest,4A,"HTTP/1\.1\x20503\x20Service
  2541. SF:\x20Unavailable\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n
  2542. SF:")%r(RPCCheck,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nCo
  2543. SF:nnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(DNSVersionBindRe
  2544. SF:q,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConnection:\x2
  2545. SF:0Close\r\nContent-Length:\x200\r\n\r\n")%r(DNSStatusRequest,4C,"HTTP/1\
  2546. SF:.1\x20500\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\nCon
  2547. SF:tent-Length:\x200\r\n\r\n")%r(Help,4C,"HTTP/1\.1\x20500\x20Internal\x20
  2548. SF:Server\x20Error\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n
  2549. SF:")%r(SSLSessionReq,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\
  2550. SF:r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(TLSSessionR
  2551. SF:eq,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConnection:\x
  2552. SF:20Close\r\nContent-Length:\x200\r\n\r\n")%r(Kerberos,4C,"HTTP/1\.1\x205
  2553. SF:00\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\nContent-Le
  2554. SF:ngth:\x200\r\n\r\n")%r(SMBProgNeg,4C,"HTTP/1\.1\x20500\x20Internal\x20S
  2555. SF:erver\x20Error\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n"
  2556. SF:)%r(X11Probe,4C,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nCon
  2557. SF:nection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(LPDString,4C,"HTT
  2558. SF:P/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\
  2559. SF:nContent-Length:\x200\r\n\r\n");
  2560. Device type: WAP|general purpose|printer|power-device|storage-misc|remote management|broadband router
  2561. Running (JUST GUESSING): Linux 2.4.X|2.6.X (94%), Epson embedded (91%), Raritan embedded (91%), Linksys Linux 2.4.X (91%), HP embedded (91%), Dell embedded (90%), AVM embedded (89%)
  2562. OS CPE: cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:epson:artisan_810 cpe:/o:linux:linux_kernel:2.6.23 cpe:/o:linksys:linux_kernel:2.4 cpe:/h:hp:p2000_g3 cpe:/h:dell:remote_access_card:5 cpe:/h:avm:fritz%21box_fon_7170
  2563. Aggressive OS guesses: OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), Linux 2.4.21 - 2.4.31 (likely embedded) (93%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (92%), Epson Artisan 810 printer (91%), Linux 2.4.27 (91%), Linux 2.6.23 (91%), Linux 2.6.23-gentoo-r3 (91%), Linux 2.6.8 - 2.6.30 (91%), Raritan Dominion PX DPXR20-20L power control unit (91%), OpenWrt White Russian 0.9 (Linux 2.4.30) (91%)
  2564. No exact OS matches for host (test conditions non-ideal).
  2565. Uptime guess: 72.694 days (since Thu Sep 10 15:51:55 2015)
  2566. Network Distance: 16 hops
  2567. TCP Sequence Prediction: Difficulty=183 (Good luck!)
  2568. IP ID Sequence Generation: All zeros
  2569. Service Info: OSs: Linux, Windows; Devices: media device, webcam; CPE: cpe:/o:linux:linux_kernel, cpe:/h:avtech:avn801, cpe:/o:microsoft:windows
  2570.  
  2571. TRACEROUTE (using port 80/tcp)
  2572. HOP RTT ADDRESS
  2573. - Hops 1-10 are the same as for 94.141.221.18
  2574. 11 ... 15
  2575. 16 313.11 ms 94.141.221.49
  2576.  
  2577. Nmap scan report for 94.141.221.50
  2578. Host is up (1.5s latency).
  2579. All 1000 scanned ports on 94.141.221.50 are filtered
  2580. Too many fingerprints match this host to give specific OS details
  2581. Network Distance: 16 hops
  2582.  
  2583. TRACEROUTE (using port 80/tcp)
  2584. HOP RTT ADDRESS
  2585. - Hops 1-10 are the same as for 94.141.221.18
  2586. 11 ... 15
  2587. 16 341.62 ms 94.141.221.50
  2588.  
  2589. Nmap scan report for 94.141.221.53
  2590. Host is up (0.36s latency).
  2591. Not shown: 977 closed ports
  2592. PORT STATE SERVICE VERSION
  2593. 1/tcp filtered tcpmux
  2594. 3/tcp filtered compressnet
  2595. 4/tcp filtered unknown
  2596. 6/tcp filtered unknown
  2597. 7/tcp filtered echo
  2598. 9/tcp filtered discard
  2599. 21/tcp open http Apache httpd 2.2.15 ((CentOS))
  2600. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  2601. |_http-server-header: Apache/2.2.15 (CentOS)
  2602. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.53/
  2603. 22/tcp filtered ssh
  2604. 23/tcp filtered telnet
  2605. 25/tcp filtered smtp
  2606. 135/tcp filtered msrpc
  2607. 139/tcp filtered netbios-ssn
  2608. 161/tcp open http Apache httpd 2.2.15 ((CentOS))
  2609. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  2610. |_http-server-header: Apache/2.2.15 (CentOS)
  2611. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.53/
  2612. 445/tcp filtered microsoft-ds
  2613. 465/tcp filtered smtps
  2614. 587/tcp filtered submission
  2615. 1433/tcp filtered ms-sql-s
  2616. 1720/tcp filtered h323q931
  2617. 1723/tcp filtered pptp
  2618. 2000/tcp filtered cisco-sccp
  2619. 5060/tcp filtered sip
  2620. 5500/tcp open rtsp
  2621. |_rtsp-methods: ERROR: Script execution failed (use -d to debug)
  2622. 8080/tcp open http Tenda N60 WAP http admin
  2623. |_http-methods: No Allow or Public header in OPTIONS response (status code 400)
  2624. |_http-title: Did not follow redirect to http://94.141.221.53/login.asp
  2625. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  2626. SF-Port5500-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BC9%P=x86_64-pc-linux-gn
  2627. SF:u%r(GenericLines,FC,"\x20501\x20Not\x20Implemented\r\nContent-Type:\x20
  2628. SF:text/html\r\nConnection:\x20close\r\nContent-Length:\x20149\r\nServer:\
  2629. SF:x201\.0\x20\r\n\r\n<HTML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE>
  2630. SF:</HEAD><BODY><H1>Not\x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20
  2631. SF:not\x20implemented\x20by\x20this\x20server\.</BODY></HTML>\r\n")%r(GetR
  2632. SF:equest,EF,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/ht
  2633. SF:ml\r\nConnection:\x20close\r\nContent-Length:\x20134\r\nServer:\x201\.0
  2634. SF:\x20\r\n\r\n<HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY>
  2635. SF:<H1>Not\x20Found</H1>The\x20requested\x20URL\x20was\x20not\x20found\x20
  2636. SF:on\x20this\x20server\.</BODY></HTML>\r\n")%r(HTTPOptions,104,"HTTP/1\.0
  2637. SF:\x20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConnecti
  2638. SF:on:\x20close\r\nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<H
  2639. SF:TML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\
  2640. SF:x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x2
  2641. SF:0by\x20this\x20server\.</BODY></HTML>\r\n")%r(RTSPRequest,104,"RTSP/1\.
  2642. SF:0\x20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConnect
  2643. SF:ion:\x20close\r\nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<
  2644. SF:HTML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not
  2645. SF:\x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x
  2646. SF:20by\x20this\x20server\.</BODY></HTML>\r\n")%r(FourOhFourRequest,EF,"HT
  2647. SF:TP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/html\r\nConnect
  2648. SF:ion:\x20close\r\nContent-Length:\x20134\r\nServer:\x201\.0\x20\r\n\r\n<
  2649. SF:HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY><H1>Not\x20Fo
  2650. SF:und</H1>The\x20requested\x20URL\x20was\x20not\x20found\x20on\x20this\x2
  2651. SF:0server\.</BODY></HTML>\r\n")%r(SIPOptions,103,"SIP/2\.0\x20501\x20Not\
  2652. SF:x20Implemented\r\nContent-Type:\x20text/html\r\nConnection:\x20close\r\
  2653. SF:nContent-Length:\x20149\r\nServer:\x201\.0\x20\r\n\r\n<HTML><HEAD><TITL
  2654. SF:E>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20Implemented<
  2655. SF:/H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\x20
  2656. SF:server\.</BODY></HTML>\r\n");
  2657. Aggressive OS guesses: Linux 2.6.32 (95%), Linux 2.6.32 - 3.13 (94%), Linux 2.6.32 - 2.6.39 (94%), Linux 2.6.32 - 3.1 (94%), Linux 2.6.39 (94%), HP P2000 G3 NAS device (93%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.9 (92%), Linux 3.10 (92%), MikroTik RouterOS 6.19 (Linux 3.3.5) (92%)
  2658. No exact OS matches for host (test conditions non-ideal).
  2659. Uptime guess: 0.195 days (since Sun Nov 22 02:50:46 2015)
  2660. Network Distance: 16 hops
  2661. TCP Sequence Prediction: Difficulty=231 (Good luck!)
  2662. IP ID Sequence Generation: All zeros
  2663. Service Info: Device: WAP; CPE: cpe:/h:tenda:n60
  2664.  
  2665. TRACEROUTE (using port 80/tcp)
  2666. HOP RTT ADDRESS
  2667. - Hops 1-10 are the same as for 94.141.221.18
  2668. 11 ... 15
  2669. 16 368.53 ms 94.141.221.53
  2670.  
  2671. Nmap scan report for 94.141.221.56
  2672. Host is up (1.3s latency).
  2673. All 1000 scanned ports on 94.141.221.56 are filtered
  2674. Too many fingerprints match this host to give specific OS details
  2675. Network Distance: 16 hops
  2676.  
  2677. TRACEROUTE (using port 80/tcp)
  2678. HOP RTT ADDRESS
  2679. - Hops 1-10 are the same as for 94.141.221.18
  2680. 11 ... 15
  2681. 16 337.22 ms 94.141.221.56
  2682.  
  2683. Nmap scan report for 94.141.221.58
  2684. Host is up (0.36s latency).
  2685. Not shown: 974 closed ports
  2686. PORT STATE SERVICE VERSION
  2687. 1/tcp filtered tcpmux
  2688. 3/tcp filtered compressnet
  2689. 4/tcp filtered unknown
  2690. 6/tcp filtered unknown
  2691. 7/tcp filtered echo
  2692. 9/tcp filtered discard
  2693. 22/tcp filtered ssh
  2694. 23/tcp filtered telnet
  2695. 25/tcp filtered smtp
  2696. 135/tcp filtered msrpc
  2697. 139/tcp filtered netbios-ssn
  2698. 445/tcp filtered microsoft-ds
  2699. 465/tcp filtered smtps
  2700. 587/tcp filtered submission
  2701. 1025/tcp open http GM Streaming Server httpd
  2702. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  2703. |_http-title: Site doesn't have a title (text/html).
  2704. 1039/tcp filtered sbl
  2705. 1433/tcp filtered ms-sql-s
  2706. 1720/tcp filtered h323q931
  2707. 1723/tcp filtered pptp
  2708. 2000/tcp filtered cisco-sccp
  2709. 5060/tcp filtered sip
  2710. 5666/tcp filtered nrpe
  2711. 6000/tcp open X11 (access denied)
  2712. 8080/tcp open http lighttpd 1.4.20
  2713. | http-auth:
  2714. | HTTP/1.1 401 Unauthorized
  2715. |_ Basic realm=WEB Remote Viewer
  2716. |_http-methods: No Allow or Public header in OPTIONS response (status code 401)
  2717. |_http-server-header: lighttpd/1.4.20
  2718. |_http-title: 401 - Unauthorized
  2719. 9101/tcp filtered jetdirect
  2720. 50800/tcp filtered unknown
  2721. Aggressive OS guesses: Linux 2.6.8 - 2.6.30 (95%), Asus RT-AC66U router (Linux 2.6) (95%), Asus RT-N16 WAP (Linux 2.6) (95%), Asus RT-N66U WAP (Linux 2.6) (95%), Tomato 1.28 (Linux 2.6.22) (95%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (95%), Linux 2.6.18 - 2.6.27 (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (94%), D-Link DIR-300 NRU router (Linux 2.6.21) (94%)
  2722. No exact OS matches for host (test conditions non-ideal).
  2723. Uptime guess: 2.916 days (since Thu Nov 19 09:32:03 2015)
  2724. Network Distance: 16 hops
  2725. TCP Sequence Prediction: Difficulty=176 (Good luck!)
  2726. IP ID Sequence Generation: All zeros
  2727. Service Info: OS: Unix; Device: webcam
  2728.  
  2729. TRACEROUTE (using port 199/tcp)
  2730. HOP RTT ADDRESS
  2731. - Hops 1-10 are the same as for 94.141.221.18
  2732. 11 ... 15
  2733. 16 307.05 ms 94.141.221.58
  2734.  
  2735. Nmap scan report for 94.141.221.66
  2736. Host is up (0.43s latency).
  2737. Not shown: 977 closed ports
  2738. PORT STATE SERVICE VERSION
  2739. 1/tcp filtered tcpmux
  2740. 3/tcp filtered compressnet
  2741. 4/tcp filtered unknown
  2742. 6/tcp filtered unknown
  2743. 7/tcp filtered echo
  2744. 9/tcp filtered discard
  2745. 22/tcp filtered ssh
  2746. 23/tcp filtered telnet
  2747. 25/tcp filtered smtp
  2748. 80/tcp open http Apache httpd 2.2.15 ((CentOS))
  2749. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  2750. |_http-server-header: Apache/2.2.15 (CentOS)
  2751. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.66/
  2752. 135/tcp filtered msrpc
  2753. 139/tcp filtered netbios-ssn
  2754. 443/tcp open ssl/https Apache/2.2.15 (CentOS)
  2755. | http-cisco-anyconnect:
  2756. |_ ERROR: Not a Cisco ASA or unsupported version
  2757. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  2758. |_http-server-header: Apache/2.2.15 (CentOS)
  2759. | ssl-cert: Subject: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=--
  2760. | Issuer: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=--
  2761. | Public Key type: rsa
  2762. | Public Key bits: 2048
  2763. | Signature Algorithm: sha256WithRSAEncryption
  2764. | Not valid before: 2015-02-25T17:26:42
  2765. | Not valid after: 2016-02-25T17:26:42
  2766. | MD5: 2a40 7563 e2fc 5451 a95a d64c 9cc5 70d2
  2767. |_SHA-1: 9743 cf02 7d98 aa8a 8e41 db6f 9702 ceb5 3e8a 5027
  2768. |_ssl-date: 2015-11-22T15:23:30+00:00; +7h55m14s from scanner time.
  2769. 445/tcp filtered microsoft-ds
  2770. 465/tcp filtered smtps
  2771. 587/tcp filtered submission
  2772. 1433/tcp filtered ms-sql-s
  2773. 1720/tcp filtered h323q931
  2774. 1723/tcp filtered pptp
  2775. 2000/tcp filtered cisco-sccp
  2776. 3128/tcp open http-proxy Squid http proxy 3.1.10
  2777. |_http-methods: No Allow or Public header in OPTIONS response (status code 403)
  2778. |_http-server-header: squid/3.1.10
  2779. |_http-title: ERROR: The requested URL could not be retrieved
  2780. 3306/tcp open mysql MySQL (unauthorized)
  2781. 5060/tcp filtered sip
  2782. Device type: storage-misc|general purpose|firewall
  2783. Running (JUST GUESSING): Synology Linux (92%), Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (90%), Fortinet Linux 2.6.X (85%)
  2784. OS CPE: cpe:/o:synology:linux_kernel cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:watchguard:fireware:11 cpe:/o:fortinet:linux_kernel:2.6
  2785. Aggressive OS guesses: Synology DiskStation Manager 5.1 (92%), Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (90%), Linux 3.4 (90%), WatchGuard Fireware 11.8 (90%), Linux 2.6.32 - 2.6.39 (90%), Linux 3.1 - 3.2 (89%), Linux 2.6.38 (87%), Linux 2.6.37 (86%)
  2786. No exact OS matches for host (test conditions non-ideal).
  2787. Uptime guess: 0.326 days (since Sat Nov 21 23:42:27 2015)
  2788. Network Distance: 17 hops
  2789. TCP Sequence Prediction: Difficulty=238 (Good luck!)
  2790. IP ID Sequence Generation: All zeros
  2791.  
  2792. TRACEROUTE (using port 199/tcp)
  2793. HOP RTT ADDRESS
  2794. - Hops 1-10 are the same as for 94.141.221.18
  2795. 11 ... 16
  2796. 17 424.82 ms 94.141.221.66
  2797.  
  2798. Nmap scan report for 94.141.221.68
  2799. Host is up (0.37s latency).
  2800. Not shown: 996 filtered ports
  2801. PORT STATE SERVICE VERSION
  2802. 443/tcp open ssl/http Microsoft IIS httpd
  2803. | http-cisco-anyconnect:
  2804. |_ ERROR: Not a Cisco ASA or unsupported version
  2805. | ssl-cert: Subject: commonName=h-srv-mail01.hiltisyr.local
  2806. | Issuer: commonName=hiltisyr-CA
  2807. | Public Key type: rsa
  2808. | Public Key bits: 2048
  2809. | Signature Algorithm: sha512WithRSAEncryption
  2810. | Not valid before: 2015-10-19T10:10:39
  2811. | Not valid after: 2017-10-18T10:10:39
  2812. | MD5: 0d01 3504 91dc b0e8 9815 0cf5 724e 5365
  2813. |_SHA-1: 5d61 2c93 8fef 3897 1241 802e 5aa7 c39e 5134 f111
  2814. |_ssl-date: 2015-11-22T07:21:19+00:00; -5m51s from scanner time.
  2815. | sslv2:
  2816. | SSLv2 supported
  2817. | ciphers:
  2818. | SSL2_RC4_128_WITH_MD5
  2819. |_ SSL2_DES_192_EDE3_CBC_WITH_MD5
  2820. 3389/tcp open ms-wbt-server?
  2821. | ssl-cert: Subject: commonName=h-srv-term01.hiltisyr.local
  2822. | Issuer: commonName=h-srv-term01.hiltisyr.local
  2823. | Public Key type: rsa
  2824. | Public Key bits: 2048
  2825. | Signature Algorithm: sha1WithRSAEncryption
  2826. | Not valid before: 2015-10-17T22:47:34
  2827. | Not valid after: 2016-04-17T22:47:34
  2828. | MD5: 681a bfa8 0b95 2d79 2179 5371 9e6c dde8
  2829. |_SHA-1: 5dc1 e3ad 9f96 3d9f b86d e753 6f34 d2db 62ee 3e5f
  2830. |_ssl-date: 2015-11-22T07:22:35+00:00; -5m51s from scanner time.
  2831. 4001/tcp open ms-wbt-server Microsoft Terminal Service
  2832. | ssl-cert: Subject: commonName=h-srv-svc01.hiltisyr.local
  2833. | Issuer: commonName=h-srv-svc01.hiltisyr.local
  2834. | Public Key type: rsa
  2835. | Public Key bits: 2048
  2836. | Signature Algorithm: sha1WithRSAEncryption
  2837. | Not valid before: 2015-08-28T15:19:36
  2838. | Not valid after: 2016-02-27T15:19:36
  2839. | MD5: 6347 f321 a6eb 7fa2 612a ef62 850a 1987
  2840. |_SHA-1: 4525 6f82 d447 32c5 14b5 ead8 3407 667d d3b8 b2ab
  2841. |_ssl-date: 2015-11-22T07:22:31+00:00; -5m50s from scanner time.
  2842. 4002/tcp open mlchat-proxy?
  2843. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2844. Device type: general purpose|phone
  2845. Running (JUST GUESSING): Microsoft Windows Vista|2008|7|Phone (89%)
  2846. OS CPE: cpe:/o:microsoft:windows_vista::- cpe:/o:microsoft:windows_vista::sp1 cpe:/o:microsoft:windows_server_2008::sp1 cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows
  2847. Aggressive OS guesses: Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7 (89%), Microsoft Windows Server 2008 SP1 (88%), Microsoft Windows Server 2008 (88%), Microsoft Windows Server 2008 R2 or Windows 8 (88%), Microsoft Windows 7 SP1 (88%), Microsoft Windows Server 2008 R2 (87%), Microsoft Windows Server 2008 R2 SP1 or Windows 8 (87%), Windows Server 2008 R2 (87%), Microsoft Windows 7 Professional or Windows 8 (87%), Microsoft Windows 7 SP1 or Windows Server 2008 SP1 - SP2 (87%)
  2848. No exact OS matches for host (test conditions non-ideal).
  2849. Uptime guess: 81.726 days (since Tue Sep 1 15:06:32 2015)
  2850. Network Distance: 16 hops
  2851. TCP Sequence Prediction: Difficulty=236 (Good luck!)
  2852. IP ID Sequence Generation: Incremental
  2853. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  2854.  
  2855. TRACEROUTE (using port 443/tcp)
  2856. HOP RTT ADDRESS
  2857. - Hops 1-10 are the same as for 94.141.221.18
  2858. 11 ... 15
  2859. 16 311.57 ms 94.141.221.68
  2860.  
  2861. Nmap scan report for 94.141.221.73
  2862. Host is up (0.49s latency).
  2863. All 1000 scanned ports on 94.141.221.73 are filtered
  2864. Device type: switch|VoIP adapter|VoIP phone
  2865. Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded, HP embedded, Xylan embedded
  2866. OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000 cpe:/h:xylan:omnistack_4024cf
  2867. Too many fingerprints match this host to give specific OS details
  2868. Network Distance: 16 hops
  2869.  
  2870. TRACEROUTE (using proto 1/icmp)
  2871. HOP RTT ADDRESS
  2872. - Hops 1-10 are the same as for 94.141.221.18
  2873. 11 296.30 ms 82.137.192.237
  2874. 12 ... 15
  2875. 16 379.81 ms 94.141.221.73
  2876.  
  2877. Nmap scan report for 94.141.221.75
  2878. Host is up (0.35s latency).
  2879. Not shown: 856 filtered ports, 143 closed ports
  2880. PORT STATE SERVICE VERSION
  2881. 3389/tcp open http mini_httpd 1.19 19dec2003
  2882. | http-auth:
  2883. | HTTP/1.1 401 Unauthorized
  2884. |_ Basic realm=DVR
  2885. | http-cisco-anyconnect:
  2886. |_ ERROR: Not a Cisco ASA or unsupported version
  2887. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  2888. |_http-server-header: mini_httpd/1.19 19dec2003
  2889. |_http-title: 401 Unauthorized
  2890. Device type: general purpose
  2891. Running (JUST GUESSING): Linux 2.6.X (86%)
  2892. OS CPE: cpe:/o:linux:linux_kernel:2.6
  2893. Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (86%)
  2894. No exact OS matches for host (test conditions non-ideal).
  2895. Network Distance: 16 hops
  2896. TCP Sequence Prediction: Difficulty=230 (Good luck!)
  2897. IP ID Sequence Generation: All zeros
  2898.  
  2899. TRACEROUTE (using port 80/tcp)
  2900. HOP RTT ADDRESS
  2901. - Hops 1-10 are the same as for 94.141.221.18
  2902. 11 ... 15
  2903. 16 307.14 ms 94.141.221.75
  2904.  
  2905. Nmap scan report for 94.141.221.79
  2906. Host is up (0.47s latency).
  2907. All 1000 scanned ports on 94.141.221.79 are filtered
  2908. Too many fingerprints match this host to give specific OS details
  2909.  
  2910. TRACEROUTE (using proto 1/icmp)
  2911. HOP RTT ADDRESS
  2912. - Hops 1-11 are the same as for 94.141.221.73
  2913. 12 ... 30
  2914.  
  2915. Nmap scan report for 94.141.221.80
  2916. Host is up (0.47s latency).
  2917. All 1000 scanned ports on 94.141.221.80 are filtered
  2918. Device type: switch|VoIP adapter|VoIP phone
  2919. Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded, HP embedded, Xylan embedded
  2920. OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000 cpe:/h:xylan:omnistack_4024cf
  2921. Too many fingerprints match this host to give specific OS details
  2922. Network Distance: 16 hops
  2923.  
  2924. TRACEROUTE (using proto 1/icmp)
  2925. HOP RTT ADDRESS
  2926. - Hops 1-11 are the same as for 94.141.221.18
  2927. 12 ... 15
  2928. 16 363.68 ms 94.141.221.80
  2929.  
  2930. Nmap scan report for 94.141.221.81
  2931. Host is up (0.44s latency).
  2932. All 1000 scanned ports on 94.141.221.81 are filtered
  2933. Too many fingerprints match this host to give specific OS details
  2934. Network Distance: 16 hops
  2935.  
  2936. TRACEROUTE (using proto 1/icmp)
  2937. HOP RTT ADDRESS
  2938. - Hops 1-11 are the same as for 94.141.221.18
  2939. 12 ... 15
  2940. 16 381.02 ms 94.141.221.81
  2941.  
  2942. Nmap scan report for 94.141.221.93
  2943. Host is up (0.39s latency).
  2944. Not shown: 999 filtered ports
  2945. PORT STATE SERVICE VERSION
  2946. 8081/tcp open http mini_httpd 1.19 19dec2003
  2947. | http-auth:
  2948. | HTTP/1.1 401 Unauthorized
  2949. |_ Basic realm=DVR
  2950. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  2951. |_http-server-header: mini_httpd/1.19 19dec2003
  2952. |_http-title: 401 Unauthorized
  2953. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  2954. Device type: general purpose|WAP|game console|media device
  2955. Running (JUST GUESSING): Linux 2.6.X|3.X (88%), Nintendo embedded (87%), ProVision Linux 2.6.X (85%)
  2956. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:nintendo:wii cpe:/o:provision:linux_kernel:2.6
  2957. Aggressive OS guesses: Linux 2.6.32 - 3.10 (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (87%), DD-WRT v24-sp2 (Linux 3.10) (87%), Nintendo Wii game console (87%), Linux 2.6.32 (86%), ProVision-ISR security DVR (85%)
  2958. No exact OS matches for host (test conditions non-ideal).
  2959. Network Distance: 17 hops
  2960. TCP Sequence Prediction: Difficulty=238 (Good luck!)
  2961. IP ID Sequence Generation: All zeros
  2962.  
  2963. TRACEROUTE (using port 8081/tcp)
  2964. HOP RTT ADDRESS
  2965. - Hops 1-10 are the same as for 94.141.221.18
  2966. 11 ... 16
  2967. 17 353.30 ms 94.141.221.93
  2968.  
  2969. Nmap scan report for 94.141.221.99
  2970. Host is up (0.45s latency).
  2971. Not shown: 979 closed ports
  2972. PORT STATE SERVICE VERSION
  2973. 1/tcp filtered tcpmux
  2974. 3/tcp filtered compressnet
  2975. 4/tcp filtered unknown
  2976. 6/tcp filtered unknown
  2977. 7/tcp filtered echo
  2978. 9/tcp filtered discard
  2979. 22/tcp filtered ssh
  2980. 23/tcp filtered telnet
  2981. 25/tcp filtered smtp
  2982. 80/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
  2983. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  2984. |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
  2985. |_http-title: ::: Login :::
  2986. 135/tcp filtered msrpc
  2987. 139/tcp filtered netbios-ssn
  2988. 445/tcp filtered microsoft-ds
  2989. 465/tcp filtered smtps
  2990. 554/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
  2991. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  2992. |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
  2993. |_http-title: ::: Login :::
  2994. |_rtsp-methods: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, SET_PARAMETER, GET_PARAMETER
  2995. 587/tcp filtered submission
  2996. 1433/tcp filtered ms-sql-s
  2997. 1720/tcp filtered h323q931
  2998. 1723/tcp filtered pptp
  2999. 2000/tcp filtered cisco-sccp
  3000. 5060/tcp filtered sip
  3001. Device type: general purpose|broadband router|firewall
  3002. Running (JUST GUESSING): Linux 2.6.X|3.X (86%), D-Link embedded (85%), IPCop Linux 2.6.X (85%), IPFire Linux 2.6.X (85%)
  3003. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/h:dlink:dsl-2890al cpe:/o:ipcop:linux_kernel:2.6 cpe:/o:ipfire:linux_kernel:2.6
  3004. Aggressive OS guesses: Linux 2.6.32 (86%), Linux 3.0 (86%), D-Link DSL-2890AL ADSL router (85%), IPCop 1.9.19 or IPFire firewall 2.9 (Linux 2.6.32) (85%), OpenWrt Kamikaze 8.09 (Linux 2.6.25.20) (85%), Linux 2.6.36 (85%), Linux 3.2.1 (85%)
  3005. No exact OS matches for host (test conditions non-ideal).
  3006. Network Distance: 17 hops
  3007. TCP Sequence Prediction: Difficulty=225 (Good luck!)
  3008. IP ID Sequence Generation: All zeros
  3009. Service Info: OS: Linux; Device: webcam; CPE: cpe:/h:avtech:avn801, cpe:/o:linux:linux_kernel
  3010.  
  3011. TRACEROUTE (using port 199/tcp)
  3012. HOP RTT ADDRESS
  3013. - Hops 1-10 are the same as for 94.141.221.18
  3014. 11 ... 16
  3015. 17 410.92 ms 94.141.221.99
  3016.  
  3017. Nmap scan report for 94.141.221.101
  3018. Host is up (0.37s latency).
  3019. Not shown: 996 filtered ports
  3020. PORT STATE SERVICE VERSION
  3021. 21/tcp open ftp MikroTik router ftpd 6.29
  3022. 161/tcp closed snmp
  3023. 8080/tcp open http Arris TG862G http config
  3024. | http-auth:
  3025. | HTTP/1.1 401 Unauthorized
  3026. |_ Basic realm=Wi-Fi_Protected_Setup(ANNEX A)
  3027. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  3028. |_http-server-header: <empty>
  3029. |_http-title: Site doesn't have a title (text/html).
  3030. 8291/tcp open unknown
  3031. Aggressive OS guesses: HP P2000 G3 NAS device (96%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 2.6.39 (92%), MikroTik RouterOS 6.19 (Linux 3.3.5) (92%), Linux 3.10 (90%), Linux 2.6.32 - 3.10 (89%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (89%), Linux 3.6 (89%), Linux 3.2 (88%), Linux 2.6.32 - 3.9 (88%)
  3032. No exact OS matches for host (test conditions non-ideal).
  3033. Uptime guess: 1.660 days (since Fri Nov 20 15:41:25 2015)
  3034. Network Distance: 17 hops
  3035. TCP Sequence Prediction: Difficulty=237 (Good luck!)
  3036. IP ID Sequence Generation: All zeros
  3037. Service Info: Devices: router, WAP; CPE: cpe:/h:arris:tg862g
  3038.  
  3039. TRACEROUTE (using port 161/tcp)
  3040. HOP RTT ADDRESS
  3041. - Hops 1-10 are the same as for 94.141.221.18
  3042. 11 ... 16
  3043. 17 333.52 ms 94.141.221.101
  3044.  
  3045. Nmap scan report for 94.141.221.103
  3046. Host is up (0.41s latency).
  3047. All 1000 scanned ports on 94.141.221.103 are filtered (860) or closed (140)
  3048. Too many fingerprints match this host to give specific OS details
  3049. Network Distance: 16 hops
  3050.  
  3051. TRACEROUTE (using port 80/tcp)
  3052. HOP RTT ADDRESS
  3053. - Hops 1-10 are the same as for 94.141.221.18
  3054. 11 ... 15
  3055. 16 346.69 ms 94.141.221.103
  3056.  
  3057. Nmap scan report for 94.141.221.106
  3058. Host is up (0.38s latency).
  3059. Not shown: 977 closed ports
  3060. PORT STATE SERVICE VERSION
  3061. 1/tcp filtered tcpmux
  3062. 3/tcp filtered compressnet
  3063. 4/tcp filtered unknown
  3064. 6/tcp filtered unknown
  3065. 7/tcp filtered echo
  3066. 9/tcp filtered discard
  3067. 22/tcp filtered ssh
  3068. 23/tcp filtered telnet
  3069. 25/tcp filtered smtp
  3070. 80/tcp open http AcIDSoftWebServer/0.1b
  3071. |_http-favicon: Unknown favicon MD5: E6D3B3FF180103E14C19E5C297678C9F
  3072. |_http-methods: No Allow or Public header in OPTIONS response (status code 404)
  3073. |_http-server-header: AcIDSoftWebServer/0.1b
  3074. |_http-title: Site doesn't have a title (text/html).
  3075. 135/tcp filtered msrpc
  3076. 139/tcp filtered netbios-ssn
  3077. 445/tcp filtered microsoft-ds
  3078. 465/tcp filtered smtps
  3079. 587/tcp filtered submission
  3080. 1433/tcp filtered ms-sql-s
  3081. 1720/tcp filtered h323q931
  3082. 1723/tcp filtered pptp
  3083. 2000/tcp filtered cisco-sccp
  3084. 5000/tcp open upnp?
  3085. 5060/tcp filtered sip
  3086. 8000/tcp open http-alt?
  3087. 10002/tcp open documentum?
  3088. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  3089. SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BD4%P=x86_64-pc-linux-gnu%
  3090. SF:r(GetRequest,1390,"HTTP/1\.0\x20200\x20OK\r\nDate:\x20Sun,\x2022\x20Nov
  3091. SF:\x202015\x2009:41:30\x20GMT\r\nServer:\x20AcIDSoftWebServer/0\.1b\r\nAc
  3092. SF:cept-Ranges:\x20bytes\r\nContent-Length:\x2031854\r\nConnection:\x20clo
  3093. SF:se\r\nContent-Type:\x20text/html\r\n\r\n\xef\xbb\xbf<!DOCTYPE\x20html\x
  3094. SF:20PUBLIC\x20\"-//W3C//DTD\x20XHTML\x201\.0\x20Strict//EN\"\x20\"http://
  3095. SF:www\.w3\.org/TR/xhtml1/DTD/xhtml1-strict\.dtd\">\r\n<html>\r\n<head>\r\
  3096. SF:n<meta\x20http-equiv=\"Content-Type\"\x20content=\"text/html;\x20charse
  3097. SF:t=UTF-8\">\r\n<script\x20type=\"text/javascript\"\x20src=\"oem_t\.js\">
  3098. SF:</script>\r\n<script\x20type=\"text/javascript\"\x20src=\"m\.js\"></scr
  3099. SF:ipt>\r\n<link\x20rel=\"stylesheet\"\x20type=\"text/css\"\x20media=\"scr
  3100. SF:een\"\x20href=\"m\.css\"\x20/>\r\n\r\n<script\x20type=\"text/javascript
  3101. SF:\">\r\nvar\x20gt;\r\nvar\x20gdomready=0;\r\nvar\x20gopenall=0;\r\nvar\x
  3102. SF:20gsld;\r\nvar\x20gslda;\r\nvar\x20gsldb;\r\nvar\x20gsldc;\r\nvar\x20gs
  3103. SF:ldd;\r\nvar\x20gca=0;\r\nvar\x20gcb=0;\r\nvar\x20gcc=0;\r\nvar\x20gcd=0
  3104. SF:;\r\nvar\x20gwid=0;\r\nvar\x20gcid=-1;\r\nvar\x20gptz=0;\r\nvar\x20gxh=
  3105. SF:0;\r\nvar\x20gfz=0;\r\nvar\x20gxz=0;\r\nvar\x20gxs=0;\r\nvar\x20gxj=0;\
  3106. SF:r\nvar\x20gdj=0;\r\nvar\x20gdg=0;\r\nvar\x20gchsize=0;\r\nvar\x20HashCo
  3107. SF:okie\x20=\x20")%r(HTTPOptions,94,"HTTP/1\.0\x20404\x20Resource\x20not\x
  3108. SF:20found\r\nContent-Length:\x200\r\nContent-Type:\x20text/html\r\nDate:\
  3109. SF:x20Sun,\x2022\x20Nov\x202015\x2009:41:31\x20GMT\r\nServer:\x20AcIDSoftW
  3110. SF:ebServer/0\.1b\r\n\r\n")%r(RTSPRequest,94,"HTTP/1\.0\x20404\x20Resource
  3111. SF:\x20not\x20found\r\nContent-Length:\x200\r\nContent-Type:\x20text/html\
  3112. SF:r\nDate:\x20Sun,\x2022\x20Nov\x202015\x2009:41:32\x20GMT\r\nServer:\x20
  3113. SF:AcIDSoftWebServer/0\.1b\r\n\r\n")%r(FourOhFourRequest,94,"HTTP/1\.0\x20
  3114. SF:404\x20Resource\x20not\x20found\r\nContent-Length:\x200\r\nContent-Type
  3115. SF::\x20text/html\r\nDate:\x20Sun,\x2022\x20Nov\x202015\x2009:41:38\x20GMT
  3116. SF:\r\nServer:\x20AcIDSoftWebServer/0\.1b\r\n\r\n")%r(SIPOptions,94,"HTTP/
  3117. SF:1\.0\x20404\x20Resource\x20not\x20found\r\nContent-Length:\x200\r\nCont
  3118. SF:ent-Type:\x20text/html\r\nDate:\x20Sun,\x2022\x20Nov\x202015\x2009:42:3
  3119. SF:6\x20GMT\r\nServer:\x20AcIDSoftWebServer/0\.1b\r\n\r\n");
  3120. Aggressive OS guesses: Linux 2.6.9 (91%), Cisco SA520 firewall (Linux 2.6) (90%), Linux 2.6.11 (90%), Linux 2.6.28 (90%), Linux 2.6.30 (90%), Linux 2.6.9 (CentOS 4.4) (90%), Linux 2.6.9 - 2.6.27 (90%), Riverbed Steelhead 200 proxy server (90%), Cisco UC320W PBX (Linux 2.6) (90%), Linux 2.6.18 (90%)
  3121. No exact OS matches for host (test conditions non-ideal).
  3122. Uptime guess: 5.862 days (since Mon Nov 16 10:50:29 2015)
  3123. Network Distance: 17 hops
  3124. TCP Sequence Prediction: Difficulty=169 (Good luck!)
  3125. IP ID Sequence Generation: All zeros
  3126.  
  3127. TRACEROUTE (using port 1025/tcp)
  3128. HOP RTT ADDRESS
  3129. - Hops 1-10 are the same as for 94.141.221.18
  3130. 11 ... 16
  3131. 17 348.91 ms 94.141.221.106
  3132.  
  3133. Nmap scan report for 94.141.221.108
  3134. Host is up (0.36s latency).
  3135. Not shown: 536 filtered ports, 460 closed ports
  3136. PORT STATE SERVICE VERSION
  3137. 8002/tcp open tcpwrapped
  3138. 8081/tcp open tcpwrapped
  3139. 9010/tcp open tcpwrapped
  3140. 9011/tcp open tcpwrapped
  3141. OS fingerprint not ideal because: maxTimingRatio (1.202000e+01) is greater than 1.4
  3142. No OS matches for host
  3143.  
  3144. TRACEROUTE (using port 3306/tcp)
  3145. HOP RTT ADDRESS
  3146. - Hops 1-10 are the same as for 94.141.221.18
  3147. 11 ... 30
  3148.  
  3149. Nmap scan report for 94.141.221.113
  3150. Host is up (0.37s latency).
  3151. Not shown: 738 closed ports, 245 filtered ports
  3152. PORT STATE SERVICE VERSION
  3153. 88/tcp open kerberos-sec Windows 2003 Kerberos (server time: 2015-11-22 07:16:46Z)
  3154. 389/tcp open ldap
  3155. 464/tcp open tcpwrapped
  3156. 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
  3157. 808/tcp open ccproxy-http?
  3158. 1047/tcp open nlockmgr 1-4 (RPC #100021)
  3159. 1048/tcp open mountd 1-3 (RPC #100005)
  3160. 1688/tcp open tcpwrapped
  3161. 2049/tcp open nfs 2-3 (RPC #100003)
  3162. 3268/tcp open ldap
  3163. 3269/tcp open ssl/ldap
  3164. | ssl-cert: Subject: commonName=Aserver.hq.local
  3165. | Issuer: commonName=hq-ASERVER-CA
  3166. | Public Key type: rsa
  3167. | Public Key bits: 2048
  3168. | Signature Algorithm: sha1WithRSAEncryption
  3169. | Not valid before: 2015-07-09T03:53:07
  3170. | Not valid after: 2016-07-08T03:53:07
  3171. | MD5: aa33 b8ad cf1b 0b31 a83f fae3 6420 7319
  3172. |_SHA-1: 5b6a 9ff0 9611 1210 b022 08b2 8f1c 2b9d 74db 9d49
  3173. |_ssl-date: 2015-11-22T07:27:30+00:00; +6s from scanner time.
  3174. | sslv2:
  3175. | SSLv2 supported
  3176. | ciphers:
  3177. | SSL2_RC4_128_WITH_MD5
  3178. |_ SSL2_DES_192_EDE3_CBC_WITH_MD5
  3179. 6002/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
  3180. 6005/tcp open msrpc Microsoft Windows RPC
  3181. 6006/tcp open msrpc Microsoft Windows RPC
  3182. 6007/tcp open msrpc Microsoft Windows RPC
  3183. 8000/tcp open http-alt?
  3184. 8008/tcp open http WindWeb 2.0
  3185. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  3186. |_http-server-header: WindWeb/2.0
  3187. |_http-title: NetVideoOCX
  3188. Device type: general purpose|WAP
  3189. Running (JUST GUESSING): Microsoft Windows 7|Vista|2008|8.1|2012 (93%), Linux 2.6.X (86%), OpenBSD 4.X (85%)
  3190. OS CPE: cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows_vista::sp1:home_premium cpe:/o:microsoft:windows_server_2008 cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2012 cpe:/o:microsoft:windows_8 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:openbsd:openbsd:4.3
  3191. Aggressive OS guesses: Microsoft Windows 7 SP1 (93%), Microsoft Windows Windows 7 SP1 (93%), Microsoft Windows Vista Home Premium SP1, Windows 7, or Windows Server 2008 (93%), Microsoft Windows 7 SP1 or Windows Server 2008 SP2 (92%), Microsoft Windows 7 Ultimate (91%), Microsoft Windows 8.1 (91%), Microsoft Windows Vista SP1 (90%), Windows Server 2008 R2 SP1 (88%), Microsoft Windows 7 SP 1 (88%), Microsoft Windows Server 2008 (88%)
  3192. No exact OS matches for host (test conditions non-ideal).
  3193. Uptime guess: 0.034 days (since Sun Nov 22 06:42:36 2015)
  3194. Network Distance: 16 hops
  3195. TCP Sequence Prediction: Difficulty=236 (Good luck!)
  3196. IP ID Sequence Generation: Busy server or unknown class
  3197. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows_server_2003, cpe:/o:microsoft:windows
  3198.  
  3199. TRACEROUTE (using port 80/tcp)
  3200. HOP RTT ADDRESS
  3201. - Hops 1-10 are the same as for 94.141.221.18
  3202. 11 ... 15
  3203. 16 355.71 ms 94.141.221.113
  3204.  
  3205. Nmap scan report for 94.141.221.114
  3206. Host is up (0.37s latency).
  3207. All 1000 scanned ports on 94.141.221.114 are filtered
  3208. Device type: switch|VoIP adapter|VoIP phone
  3209. Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded, HP embedded, Xylan embedded
  3210. OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000 cpe:/h:xylan:omnistack_4024cf
  3211. Too many fingerprints match this host to give specific OS details
  3212. Network Distance: 16 hops
  3213.  
  3214. TRACEROUTE (using proto 1/icmp)
  3215. HOP RTT ADDRESS
  3216. - Hops 1-11 are the same as for 94.141.221.18
  3217. 12 ... 15
  3218. 16 431.92 ms 94.141.221.114
  3219.  
  3220. Nmap scan report for 94.141.221.115
  3221. Host is up (0.38s latency).
  3222. Not shown: 979 closed ports
  3223. PORT STATE SERVICE VERSION
  3224. 1/tcp filtered tcpmux
  3225. 3/tcp filtered compressnet
  3226. 4/tcp filtered unknown
  3227. 6/tcp filtered unknown
  3228. 7/tcp filtered echo
  3229. 9/tcp filtered discard
  3230. 22/tcp filtered ssh
  3231. 23/tcp filtered telnet
  3232. 25/tcp filtered smtp
  3233. 80/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
  3234. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  3235. |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
  3236. |_http-title: ::: Login :::
  3237. 135/tcp filtered msrpc
  3238. 139/tcp filtered netbios-ssn
  3239. 445/tcp filtered microsoft-ds
  3240. 465/tcp filtered smtps
  3241. 554/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
  3242. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  3243. |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
  3244. |_http-title: ::: Login :::
  3245. |_rtsp-methods: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, SET_PARAMETER
  3246. 587/tcp filtered submission
  3247. 1433/tcp filtered ms-sql-s
  3248. 1720/tcp filtered h323q931
  3249. 1723/tcp filtered pptp
  3250. 2000/tcp filtered cisco-sccp
  3251. 5060/tcp filtered sip
  3252. Device type: general purpose|WAP|remote management|specialized|broadband router|storage-misc|print server|switch
  3253. Running (JUST GUESSING): Linux 2.6.X|2.4.X (93%), AVM embedded (92%), Dell embedded (92%), MontaVista Linux 2.4.X (91%), Connected Data Linux 2.6.X (90%), Google embedded (90%), HP embedded (90%)
  3254. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:avm:fritz%21box_fon_wlan_7170 cpe:/h:dell:remote_access_card:5 cpe:/o:linux:linux_kernel:2.4.21 cpe:/o:montavista:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.4.35 cpe:/o:connecteddata:linux_kernel:2.6
  3255. Aggressive OS guesses: Linux 2.6.15 - 2.6.26 (likely embedded) (93%), AVM FRITZ!Box FON WLAN 7170 WAP (92%), Dell Remote Access Controller 5/I (DRAC 5/I) (92%), Linux 2.4.21 (embedded) (92%), MontaVista embedded Linux 2.4.17 (91%), Linux 2.4.35 (91%), Drobo 5D NAS (Linux 2.6.18) (90%), Dell Integrated Remote Access Controller (iDRAC9) (90%), Google Mini search appliance (90%), HP 4200 PSA (Print Server Appliance) model J4117A (90%)
  3256. No exact OS matches for host (test conditions non-ideal).
  3257. Uptime guess: 2.685 days (since Thu Nov 19 15:04:42 2015)
  3258. Network Distance: 17 hops
  3259. TCP Sequence Prediction: Difficulty=185 (Good luck!)
  3260. IP ID Sequence Generation: All zeros
  3261. Service Info: OS: Linux; Device: webcam; CPE: cpe:/h:avtech:avn801, cpe:/o:linux:linux_kernel
  3262.  
  3263. TRACEROUTE (using port 1025/tcp)
  3264. HOP RTT ADDRESS
  3265. - Hops 1-10 are the same as for 94.141.221.18
  3266. 11 ... 16
  3267. 17 341.73 ms 94.141.221.115
  3268.  
  3269. Nmap scan report for 94.141.221.116
  3270. Host is up (0.69s latency).
  3271. Not shown: 998 filtered ports
  3272. PORT STATE SERVICE VERSION
  3273. 21/tcp open ftp Microsoft ftpd
  3274. | ftp-anon: Anonymous FTP login allowed (FTP code 230)
  3275. | 11-17-15 09:56PM <DIR> Bando POS
  3276. | 09-22-12 04:33PM <DIR> eddata
  3277. |_11-17-15 09:57PM <DIR> \xE3\xE1\xDD\xC7\xCA \xD1\xD6\xE6\xC7\xE4
  3278. 81/tcp open tcpwrapped
  3279. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  3280. Device type: general purpose|media device
  3281. Running (JUST GUESSING): Microsoft Windows 2003|2000|XP (89%), Motorola Windows PocketPC/CE (88%)
  3282. OS CPE: cpe:/o:microsoft:windows_server_2003::sp2 cpe:/o:microsoft:windows_2000::sp4 cpe:/o:microsoft:windows_xp::sp2 cpe:/o:motorola:windows_ce
  3283. Aggressive OS guesses: Microsoft Windows Server 2003 SP2 (89%), Microsoft Windows Server 2003 (89%), Microsoft Windows 2000 SP4 (88%), Microsoft Windows XP SP2 (firewall disabled) (88%), Motorola VIP1200 digital set top box (Windows CE 5.0) (88%), Microsoft Windows XP SP2 (87%), Microsoft Windows XP SP2 or SP3 (87%), Microsoft Windows XP Professional SP3 (86%), Microsoft Windows XP SP3 (86%), Microsoft Windows 2000 (85%)
  3284. No exact OS matches for host (test conditions non-ideal).
  3285. Network Distance: 16 hops
  3286. TCP Sequence Prediction: Difficulty=236 (Good luck!)
  3287. IP ID Sequence Generation: Incremental
  3288. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  3289.  
  3290. TRACEROUTE (using port 80/tcp)
  3291. HOP RTT ADDRESS
  3292. - Hops 1-10 are the same as for 94.141.221.18
  3293. 11 ... 15
  3294. 16 359.55 ms 94.141.221.116
  3295.  
  3296. Nmap scan report for 94.141.221.118
  3297. Host is up (1.9s latency).
  3298. All 1000 scanned ports on 94.141.221.118 are filtered
  3299. Too many fingerprints match this host to give specific OS details
  3300.  
  3301. TRACEROUTE (using port 80/tcp)
  3302. HOP RTT ADDRESS
  3303. - Hops 1-10 are the same as for 94.141.221.18
  3304. 11 ... 30
  3305.  
  3306. Nmap scan report for 94.141.221.119
  3307. Host is up (0.41s latency).
  3308. All 1000 scanned ports on 94.141.221.119 are filtered (860) or closed (140)
  3309. Too many fingerprints match this host to give specific OS details
  3310. Network Distance: 16 hops
  3311.  
  3312. TRACEROUTE (using port 80/tcp)
  3313. HOP RTT ADDRESS
  3314. - Hops 1-10 are the same as for 94.141.221.18
  3315. 11 ... 15
  3316. 16 389.04 ms 94.141.221.119
  3317.  
  3318. Nmap scan report for 94.141.221.120
  3319. Host is up (0.39s latency).
  3320. All 1000 scanned ports on 94.141.221.120 are filtered (860) or closed (140)
  3321. Too many fingerprints match this host to give specific OS details
  3322. Network Distance: 16 hops
  3323.  
  3324. TRACEROUTE (using port 113/tcp)
  3325. HOP RTT ADDRESS
  3326. - Hops 1-10 are the same as for 94.141.221.18
  3327. 11 ... 15
  3328. 16 397.56 ms 94.141.221.120
  3329.  
  3330. Nmap scan report for 94.141.221.121
  3331. Host is up (0.51s latency).
  3332. Not shown: 998 filtered ports
  3333. PORT STATE SERVICE VERSION
  3334. 9010/tcp open sdr?
  3335. 9011/tcp open unknown
  3336. 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
  3337. ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
  3338. SF-Port9010-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516C07%P=x86_64-pc-linux-gn
  3339. SF:u%r(RPCCheck,C,"\xa0\0\0\(\xf0\x0f\0\x01\0\0\0\0")%r(DNSVersionBindReq,
  3340. SF:C,"\xa0\x1e\0\x06\xf0\x0f\0\x01\0\0\0\0")%r(DNSStatusRequest,C,"\xa0\x0
  3341. SF:c\0\0\xf0\x0f\0\x01\0\0\0\0")%r(Kerberos,18,"\xa0\0\0q\xf0\x0f\0\x01\0\
  3342. SF:0\0\0\xa2\x01\x05\xa2\xf0\x0f\0\x01\0\0\0\0")%r(X11Probe,C,"\xec\0\x0b\
  3343. SF:0\xf0\x0f\0\x01\0\0\0\0")%r(NCP,C,"\xe4mdT\xf0\x0f\0\x01\0\0\0\0")%r(WM
  3344. SF:SRequest,24,"\xa1\0\0\xfd\xf0\x0f\0\x01\0\0\0\0\xedMS\x14\xf0\x0f\0\x01
  3345. SF:\0\0\0\0\xa0\0\0\0\xf0\x0f\0\x01\0\0\0\0")%r(afp,C,"\xa0\x03\0\x01\xf0\
  3346. SF:x0f\0\x01\0\0\0\0");
  3347. ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
  3348. SF-Port9011-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516C07%P=x86_64-pc-linux-gn
  3349. SF:u%r(RPCCheck,C,"\xa0\0\0\(\xf0\x0f\0\x01\0\0\0\0")%r(DNSVersionBindReq,
  3350. SF:C,"\xa0\x1e\0\x06\xf0\x0f\0\x01\0\0\0\0")%r(DNSStatusRequest,C,"\xa0\x0
  3351. SF:c\0\0\xf0\x0f\0\x01\0\0\0\0")%r(Kerberos,18,"\xa0\0\0q\xf0\x0f\0\x01\0\
  3352. SF:0\0\0\xa2\x01\x05\xa2\xf0\x0f\0\x01\0\0\0\0")%r(X11Probe,C,"\xec\0\x0b\
  3353. SF:0\xf0\x0f\0\x01\0\0\0\0")%r(NCP,C,"\xe4mdT\xf0\x0f\0\x01\0\0\0\0")%r(WM
  3354. SF:SRequest,24,"\xa1\0\0\xfd\xf0\x0f\0\x01\0\0\0\0\xedMS\x14\xf0\x0f\0\x01
  3355. SF:\0\0\0\0\xa0\0\0\0\xf0\x0f\0\x01\0\0\0\0")%r(afp,C,"\xa0\x03\0\x01\xf0\
  3356. SF:x0f\0\x01\0\0\0\0");
  3357. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  3358. Aggressive OS guesses: Linux 2.6.32 - 3.10 (91%), ProVision-ISR security DVR (91%), Linux 2.6.32 (88%), DD-WRT v24-sp2 (Linux 3.10) (87%), Crestron XPanel control system (87%), Nintendo Wii game console (86%), OpenWrt White Russian 0.9 (Linux 2.4.30) (86%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (86%), Linux 3.2 (86%)
  3359. No exact OS matches for host (test conditions non-ideal).
  3360. Network Distance: 17 hops
  3361. TCP Sequence Prediction: Difficulty=236 (Good luck!)
  3362. IP ID Sequence Generation: All zeros
  3363.  
  3364. TRACEROUTE (using port 443/tcp)
  3365. HOP RTT ADDRESS
  3366. - Hops 1-10 are the same as for 94.141.221.18
  3367. 11 ... 16
  3368. 17 596.49 ms 94.141.221.121
  3369.  
  3370. Nmap scan report for 94.141.221.122
  3371. Host is up (0.38s latency).
  3372. Not shown: 993 filtered ports
  3373. PORT STATE SERVICE VERSION
  3374. 21/tcp closed ftp
  3375. 80/tcp open http micro_httpd (USRobotics router http config)
  3376. |_http-server-header: micro_httpd
  3377. 81/tcp open http Gadspot/Avtech AV787 webcam http config
  3378. |_http-server-header: AV-TECH AV787 Video Web Server
  3379. |_http-title: --- VIDEO WEB SERVER ---
  3380. 1863/tcp open msnp?
  3381. 1864/tcp open tcpwrapped
  3382. 4443/tcp open tcpwrapped
  3383. 5566/tcp open tcpwrapped
  3384. Aggressive OS guesses: Linux 2.4.18 (93%), Lexmark X644e printer (91%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (90%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (90%), Comtrend CT536 wireless ADSL router (89%), Gemtek P360 WAP or Siemens Gigaset SE515dsl wireless broadband router (89%), Asus RT-AC66U router (Linux 2.6) (89%), Asus RT-N16 WAP (Linux 2.6) (89%), Asus RT-N66U WAP (Linux 2.6) (89%), Tomato 1.28 (Linux 2.6.22) (89%)
  3385. No exact OS matches for host (test conditions non-ideal).
  3386. Uptime guess: 0.062 days (since Sun Nov 22 06:01:32 2015)
  3387. Network Distance: 16 hops
  3388. TCP Sequence Prediction: Difficulty=181 (Good luck!)
  3389. IP ID Sequence Generation: All zeros
  3390. Service Info: Devices: broadband router, webcam
  3391.  
  3392. TRACEROUTE (using port 21/tcp)
  3393. HOP RTT ADDRESS
  3394. - Hops 1-10 are the same as for 94.141.221.18
  3395. 11 ... 15
  3396. 16 423.23 ms 94.141.221.122
  3397.  
  3398. Nmap scan report for 94.141.221.127
  3399. Host is up (0.35s latency).
  3400. Not shown: 969 closed ports, 29 filtered ports
  3401. PORT STATE SERVICE VERSION
  3402. 8000/tcp open http mini_httpd 1.19 19dec2003
  3403. | http-auth:
  3404. | HTTP/1.1 401 Unauthorized
  3405. |_ Basic realm=DVR
  3406. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  3407. |_http-server-header: mini_httpd/1.19 19dec2003
  3408. |_http-title: 401 Unauthorized
  3409. 65000/tcp open tcpwrapped
  3410. Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (95%), ProVision-ISR security DVR (94%), Linux 2.6.32 (93%), OpenWrt White Russian 0.9 (Linux 2.4.30) (93%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (93%), HP P2000 G3 NAS device (93%), OpenWrt Kamikaze 8.09 (Linux 2.6.25 - 2.6.26) (92%), Linux 2.6.32 - 3.10 (92%), DD-WRT v24-sp2 (Linux 3.10) (92%), Linux 3.2 (92%)
  3411. No exact OS matches for host (test conditions non-ideal).
  3412. Network Distance: 16 hops
  3413. TCP Sequence Prediction: Difficulty=233 (Good luck!)
  3414. IP ID Sequence Generation: All zeros
  3415.  
  3416. TRACEROUTE (using port 111/tcp)
  3417. HOP RTT ADDRESS
  3418. - Hops 1-10 are the same as for 94.141.221.18
  3419. 11 ... 15
  3420. 16 345.38 ms 94.141.221.127
  3421.  
  3422. Nmap scan report for 94.141.221.128
  3423. Host is up (0.36s latency).
  3424. All 1000 scanned ports on 94.141.221.128 are filtered (860) or closed (140)
  3425. Too many fingerprints match this host to give specific OS details
  3426. Network Distance: 16 hops
  3427.  
  3428. TRACEROUTE (using port 199/tcp)
  3429. HOP RTT ADDRESS
  3430. - Hops 1-10 are the same as for 94.141.221.18
  3431. 11 ... 15
  3432. 16 402.94 ms 94.141.221.128
  3433.  
  3434. Nmap scan report for 94.141.221.131
  3435. Host is up (0.38s latency).
  3436. All 1000 scanned ports on 94.141.221.131 are filtered (853) or closed (147)
  3437. Too many fingerprints match this host to give specific OS details
  3438. Network Distance: 16 hops
  3439.  
  3440. TRACEROUTE (using port 80/tcp)
  3441. HOP RTT ADDRESS
  3442. - Hops 1-10 are the same as for 94.141.221.18
  3443. 11 ... 15
  3444. 16 401.26 ms 94.141.221.131
  3445.  
  3446. Nmap scan report for 94.141.221.132
  3447. Host is up (0.43s latency).
  3448. Not shown: 582 filtered ports, 417 closed ports
  3449. PORT STATE SERVICE VERSION
  3450. 554/tcp open tcpwrapped
  3451. OS fingerprint not ideal because: maxTimingRatio (1.173200e+01) is greater than 1.4
  3452. No OS matches for host
  3453.  
  3454. TRACEROUTE (using port 199/tcp)
  3455. HOP RTT ADDRESS
  3456. - Hops 1-10 are the same as for 94.141.221.18
  3457. 11 ... 30
  3458.  
  3459. Nmap scan report for 94.141.221.136
  3460. Host is up (0.44s latency).
  3461. All 1000 scanned ports on 94.141.221.136 are filtered
  3462. Too many fingerprints match this host to give specific OS details
  3463. Network Distance: 16 hops
  3464.  
  3465. TRACEROUTE (using proto 1/icmp)
  3466. HOP RTT ADDRESS
  3467. - Hops 1-11 are the same as for 94.141.221.73
  3468. 12 ... 15
  3469. 16 402.81 ms 94.141.221.136
  3470.  
  3471. Nmap scan report for 94.141.221.137
  3472. Host is up (0.36s latency).
  3473. All 1000 scanned ports on 94.141.221.137 are filtered
  3474. Too many fingerprints match this host to give specific OS details
  3475. Network Distance: 16 hops
  3476.  
  3477. TRACEROUTE (using proto 1/icmp)
  3478. HOP RTT ADDRESS
  3479. - Hops 1-11 are the same as for 94.141.221.73
  3480. 12 ... 15
  3481. 16 372.74 ms 94.141.221.137
  3482.  
  3483. Nmap scan report for 94.141.221.139
  3484. Host is up (0.39s latency).
  3485. Not shown: 978 closed ports
  3486. PORT STATE SERVICE VERSION
  3487. 1/tcp filtered tcpmux
  3488. 3/tcp filtered compressnet
  3489. 4/tcp filtered unknown
  3490. 6/tcp filtered unknown
  3491. 7/tcp filtered echo
  3492. 9/tcp filtered discard
  3493. 22/tcp filtered ssh
  3494. 23/tcp filtered telnet
  3495. 25/tcp filtered smtp
  3496. 80/tcp open http Realtron WebServer 1.1
  3497. |_http-methods: No Allow or Public header in OPTIONS response (status code 401)
  3498. | http-server-header:
  3499. | Realtron WebServer 1.1
  3500. |_ Virtual Web 0.9
  3501. |_http-title: Authorization Failed
  3502. 135/tcp filtered msrpc
  3503. 139/tcp filtered netbios-ssn
  3504. 445/tcp filtered microsoft-ds
  3505. 465/tcp filtered smtps
  3506. 554/tcp open rtsp
  3507. |_rtsp-methods: OPTIONS, DESCRIBE, SETUP, TEARDOWN, PLAY
  3508. 587/tcp filtered submission
  3509. 1433/tcp filtered ms-sql-s
  3510. 1720/tcp filtered h323q931
  3511. 1723/tcp filtered pptp
  3512. 2000/tcp filtered cisco-sccp
  3513. 5060/tcp filtered sip
  3514. 8080/tcp open http mini_httpd 1.19 19dec2003
  3515. | http-auth:
  3516. | HTTP/1.1 401 Unauthorized
  3517. |_ Basic realm=.
  3518. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  3519. |_http-server-header: mini_httpd/1.19 19dec2003
  3520. |_http-title: 401 Unauthorized
  3521. 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
  3522. ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
  3523. SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BF6%P=x86_64-pc-linux-gnu%
  3524. SF:r(GetRequest,164,"HTTP/1\.0\x20401\x20\r\nServer:Realtron\x20WebServer\
  3525. SF:x201\.1\r\nWWW-Authenticate:\x20Basic\x20realm=\"index\.htm\"\r\n\r\n<H
  3526. SF:TML>\n<HEAD>\n<TITLE>Authorization\x20Failed</TITLE>\n</HEAD>\n<BODY>\n
  3527. SF:<H1>Authorization\x20Failed</H1>\n<P>Without\x20a\x20valid\x20username\
  3528. SF:x20and\x20password,access\x20to\x20this\x20page\x20cannot\x20be\x20gran
  3529. SF:ted\.\nPlease\x20click\x20reload\x20and\x20enter\x20a\x20username\x20an
  3530. SF:d\x20password\x20when\x20prompted\.\n</P>\n</BODY>\n</HTML>\n")%r(HTTPO
  3531. SF:ptions,D4,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r
  3532. SF:\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Ba
  3533. SF:d\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Re
  3534. SF:quest\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</B
  3535. SF:ODY></HTML>\n")%r(RTSPRequest,D4,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
  3536. SF:nConnection:\x20close\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML
  3537. SF:><HEAD><TITLE>400\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Err
  3538. SF:or:\x20400\x20Bad\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20
  3539. SF:is\x20\"\"\.</P>\x20</BODY></HTML>\n")%r(FourOhFourRequest,164,"HTTP/1\
  3540. SF:.0\x20401\x20\r\nServer:Realtron\x20WebServer\x201\.1\r\nWWW-Authentica
  3541. SF:te:\x20Basic\x20realm=\"index\.htm\"\r\n\r\n<HTML>\n<HEAD>\n<TITLE>Auth
  3542. SF:orization\x20Failed</TITLE>\n</HEAD>\n<BODY>\n<H1>Authorization\x20Fail
  3543. SF:ed</H1>\n<P>Without\x20a\x20valid\x20username\x20and\x20password,access
  3544. SF:\x20to\x20this\x20page\x20cannot\x20be\x20granted\.\nPlease\x20click\x2
  3545. SF:0reload\x20and\x20enter\x20a\x20username\x20and\x20password\x20when\x20
  3546. SF:prompted\.\n</P>\n</BODY>\n</HTML>\n")%r(GenericLines,D4,"HTTP/1\.1\x20
  3547. SF:400\x20Bad\x20Request\r\nConnection:\x20close\r\nServer:\x20Virtual\x20
  3548. SF:Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Request\r\n</TITLE>
  3549. SF:</HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n</H1>\x20<P>The
  3550. SF:\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTML>\n")%r(SIPOpt
  3551. SF:ions,164,"HTTP/1\.0\x20401\x20\r\nServer:Realtron\x20WebServer\x201\.1\
  3552. SF:r\nWWW-Authenticate:\x20Basic\x20realm=\"index\.htm\"\r\n\r\n<HTML>\n<H
  3553. SF:EAD>\n<TITLE>Authorization\x20Failed</TITLE>\n</HEAD>\n<BODY>\n<H1>Auth
  3554. SF:orization\x20Failed</H1>\n<P>Without\x20a\x20valid\x20username\x20and\x
  3555. SF:20password,access\x20to\x20this\x20page\x20cannot\x20be\x20granted\.\nP
  3556. SF:lease\x20click\x20reload\x20and\x20enter\x20a\x20username\x20and\x20pas
  3557. SF:sword\x20when\x20prompted\.\n</P>\n</BODY>\n</HTML>\n");
  3558. ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
  3559. SF-Port554-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BF8%P=x86_64-pc-linux-gnu
  3560. SF:%r(GetRequest,4E,"RTSP/1\.0\x20400\x20Bad\x20Request\r\nCache-Control:\
  3561. SF:x20no-cache\r\nServer:\x20Hisilicon\x20Ipcam\r\n\r\n")%r(RTSPRequest,6F
  3562. SF:,"RTSP/1\.0\x20200\x20OK\r\nServer:\x20HiIpcam/V100R003\x20VodServer/1\
  3563. SF:.0\.0\r\nPublic:\x20OPTIONS,\x20DESCRIBE,\x20SETUP,\x20TEARDOWN,\x20PLA
  3564. SF:Y\r\n\r\n")%r(GenericLines,4E,"RTSP/1\.0\x20400\x20Bad\x20Request\r\nCa
  3565. SF:che-Control:\x20no-cache\r\nServer:\x20Hisilicon\x20Ipcam\r\n\r\n")%r(H
  3566. SF:TTPOptions,6F,"RTSP/1\.0\x20200\x20OK\r\nServer:\x20HiIpcam/V100R003\x2
  3567. SF:0VodServer/1\.0\.0\r\nPublic:\x20OPTIONS,\x20DESCRIBE,\x20SETUP,\x20TEA
  3568. SF:RDOWN,\x20PLAY\r\n\r\n")%r(FourOhFourRequest,4E,"RTSP/1\.0\x20400\x20Ba
  3569. SF:d\x20Request\r\nCache-Control:\x20no-cache\r\nServer:\x20Hisilicon\x20I
  3570. SF:pcam\r\n\r\n")%r(SIPOptions,79,"RTSP/1\.0\x20200\x20OK\r\nServer:\x20Hi
  3571. SF:Ipcam/V100R003\x20VodServer/1\.0\.0\r\nCseq:\x2042\r\nPublic:\x20OPTION
  3572. SF:S,\x20DESCRIBE,\x20SETUP,\x20TEARDOWN,\x20PLAY\r\n\r\n");
  3573. Device type: switch
  3574. Running (JUST GUESSING): D-Link embedded (88%)
  3575. OS CPE: cpe:/h:dlink:des-3526
  3576. Aggressive OS guesses: D-Link DES-3526 switch (88%), D-Link DGS-3450 switch (85%)
  3577. No exact OS matches for host (test conditions non-ideal).
  3578. Uptime guess: 17.798 days (since Wed Nov 4 12:22:11 2015)
  3579. Network Distance: 17 hops
  3580. TCP Sequence Prediction: Difficulty=135 (Good luck!)
  3581. IP ID Sequence Generation: Incrementing by 2
  3582.  
  3583. TRACEROUTE (using port 199/tcp)
  3584. HOP RTT ADDRESS
  3585. - Hops 1-10 are the same as for 94.141.221.18
  3586. 11 ... 16
  3587. 17 371.06 ms 94.141.221.139
  3588.  
  3589. Nmap scan report for 94.141.221.144
  3590. Host is up (0.45s latency).
  3591. Not shown: 997 filtered ports
  3592. PORT STATE SERVICE VERSION
  3593. 21/tcp open http Apache httpd 2.2.15 ((CentOS))
  3594. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  3595. |_http-server-header: Apache/2.2.15 (CentOS)
  3596. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.144/
  3597. 80/tcp open http Virtual Web 0.9
  3598. |_http-favicon: Unknown favicon MD5: D7C6D6BADE16E3D2417E661EC7E68B93
  3599. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  3600. |_http-server-header: Virtual Web 0.9
  3601. |_http-title: Site doesn't have a title (text/html).
  3602. 161/tcp open http Apache httpd 2.2.15 ((CentOS))
  3603. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  3604. |_http-server-header: Apache/2.2.15 (CentOS)
  3605. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.144/
  3606. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  3607. SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516BFD%P=x86_64-pc-linux-gnu%
  3608. SF:r(GetRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Virtual\x20Web\x
  3609. SF:200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent-Type:\x20text
  3610. SF:/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html><head><meta\x2
  3611. SF:0HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x20language='jav
  3612. SF:ascript'>parent\.location=\"/login\.htm\"</script></head><body></body><
  3613. SF:/html>")%r(HTTPOptions,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
  3614. SF::\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Req
  3615. SF:uest\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\
  3616. SF:n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HT
  3617. SF:ML>\n")%r(RTSPRequest,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
  3618. SF:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Requ
  3619. SF:est\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n
  3620. SF:</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTM
  3621. SF:L>\n")%r(FourOhFourRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Vi
  3622. SF:rtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent
  3623. SF:-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html>
  3624. SF:<head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x2
  3625. SF:0language='javascript'>parent\.location=\"/login\.htm\"</script></head>
  3626. SF:<body></body></html>")%r(GenericLines,C1,"HTTP/1\.1\x20400\x20Bad\x20Re
  3627. SF:quest\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>40
  3628. SF:0\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Ba
  3629. SF:d\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>
  3630. SF:\x20</BODY></HTML>\n")%r(SIPOptions,114,"HTTP/1\.1\x20200\x20OK\r\nServ
  3631. SF:er:\x20Virtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r
  3632. SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\
  3633. SF:r\n<html><head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><
  3634. SF:script\x20language='javascript'>parent\.location=\"/login\.htm\"</scrip
  3635. SF:t></head><body></body></html>");
  3636. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  3637. Device type: general purpose
  3638. Running (JUST GUESSING): Linux 2.6.X|3.X (88%)
  3639. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
  3640. Aggressive OS guesses: Linux 2.6.32 (88%), Linux 2.6.32 - 3.1 (88%), Linux 3.10 (88%), Linux 3.11 (88%), Linux 3.4 - 3.10 (88%), Linux 3.5 (88%), Linux 3.8 (88%), Linux 2.6.32 - 3.10 (88%), Linux 2.6.32 - 3.13 (88%), Linux 2.6.32 - 3.9 (88%)
  3641. No exact OS matches for host (test conditions non-ideal).
  3642. Uptime guess: 0.017 days (since Sun Nov 22 07:06:26 2015)
  3643. Network Distance: 16 hops
  3644. TCP Sequence Prediction: Difficulty=237 (Good luck!)
  3645. IP ID Sequence Generation: All zeros
  3646.  
  3647. TRACEROUTE (using port 80/tcp)
  3648. HOP RTT ADDRESS
  3649. - Hops 1-10 are the same as for 94.141.221.18
  3650. 11 ... 15
  3651. 16 412.33 ms 94.141.221.144
  3652.  
  3653. Nmap scan report for 94.141.221.146
  3654. Host is up (0.37s latency).
  3655. All 1000 scanned ports on 94.141.221.146 are filtered (860) or closed (140)
  3656. Too many fingerprints match this host to give specific OS details
  3657. Network Distance: 16 hops
  3658.  
  3659. TRACEROUTE (using port 80/tcp)
  3660. HOP RTT ADDRESS
  3661. - Hops 1-10 are the same as for 94.141.221.18
  3662. 11 ... 15
  3663. 16 393.52 ms 94.141.221.146
  3664.  
  3665. Nmap scan report for 94.141.221.150
  3666. Host is up (0.38s latency).
  3667. Not shown: 995 filtered ports
  3668. PORT STATE SERVICE VERSION
  3669. 21/tcp open ftp MikroTik router ftpd 5.26
  3670. 161/tcp closed snmp
  3671. 5001/tcp closed commplex-link
  3672. 8080/tcp open ssl/http-proxy?
  3673. | http-cisco-anyconnect:
  3674. |_ ERROR: Not a Cisco ASA or unsupported version
  3675. |_ssl-date: 2015-11-22T07:27:27+00:00; +3s from scanner time.
  3676. 8291/tcp open unknown
  3677. Aggressive OS guesses: HP P2000 G3 NAS device (98%), Linux 2.6.31 - 2.6.35 (94%), DD-WRT v23 (Linux 2.4.37) (92%), Linux 2.6.35 (92%), DD-WRT v24-sp2 (Linux 2.6.34) (92%), MikroTik RouterOS 5.14 (Linux 2.6.35) (92%), DD-WRT v24-sp1 (Linux 2.4.36) (91%), Linux 2.6.23 - 2.6.38 (90%), Linux 2.6.8 - 2.6.30 (90%), Check Point VPN-1 UTM appliance (89%)
  3678. No exact OS matches for host (test conditions non-ideal).
  3679. Uptime guess: 0.659 days (since Sat Nov 21 15:42:18 2015)
  3680. Network Distance: 16 hops
  3681. TCP Sequence Prediction: Difficulty=178 (Good luck!)
  3682. IP ID Sequence Generation: All zeros
  3683. Service Info: Host: ChamGrill; Device: router
  3684.  
  3685. TRACEROUTE (using port 5001/tcp)
  3686. HOP RTT ADDRESS
  3687. - Hops 1-10 are the same as for 94.141.221.18
  3688. 11 ... 15
  3689. 16 368.49 ms 94.141.221.150
  3690.  
  3691. Nmap scan report for 94.141.221.157
  3692. Host is up (0.40s latency).
  3693. Not shown: 859 filtered ports, 140 closed ports
  3694. PORT STATE SERVICE VERSION
  3695. 80/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
  3696. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  3697. |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
  3698. |_http-title: ::: Login :::
  3699. Device type: general purpose|WAP|broadband router
  3700. Running (JUST GUESSING): Linux 2.6.X (86%), Motorola embedded (86%), MontaVista Linux 2.4.X (85%)
  3701. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:motorola:ap-51xx cpe:/o:montavista:linux_kernel:2.4
  3702. Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (86%), Motorola AP-51xx WAP (86%), MontaVista embedded Linux 2.4.17 (85%)
  3703. No exact OS matches for host (test conditions non-ideal).
  3704. Uptime guess: 0.059 days (since Sun Nov 22 06:05:45 2015)
  3705. Network Distance: 16 hops
  3706. TCP Sequence Prediction: Difficulty=175 (Good luck!)
  3707. IP ID Sequence Generation: All zeros
  3708. Service Info: OS: Linux; Device: webcam; CPE: cpe:/h:avtech:avn801, cpe:/o:linux:linux_kernel
  3709.  
  3710. TRACEROUTE (using port 199/tcp)
  3711. HOP RTT ADDRESS
  3712. - Hops 1-10 are the same as for 94.141.221.18
  3713. 11 ... 15
  3714. 16 376.77 ms 94.141.221.157
  3715.  
  3716. Nmap scan report for 94.141.221.161
  3717. Host is up (0.40s latency).
  3718. Not shown: 755 closed ports, 244 filtered ports
  3719. PORT STATE SERVICE VERSION
  3720. 100/tcp open http Avtech AVN801 network camera 1.0 (UPnP 1.0)
  3721. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  3722. |_http-server-header: Linux/2.x UPnP/1.0 Avtech/1.0
  3723. |_http-title: ::: Login :::
  3724. Aggressive OS guesses: Linux 2.6.8 - 2.6.30 (95%), Asus RT-AC66U router (Linux 2.6) (95%), Asus RT-N16 WAP (Linux 2.6) (95%), Asus RT-N66U WAP (Linux 2.6) (95%), Tomato 1.28 (Linux 2.6.22) (95%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (95%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (95%), Dell Integrated Remote Access Controller (iDRAC6) (94%), Linux 2.4.21 - 2.4.31 (likely embedded) (94%), OpenWrt White Russian 0.9 (Linux 2.4.30) (94%)
  3725. No exact OS matches for host (test conditions non-ideal).
  3726. Uptime guess: 0.038 days (since Sun Nov 22 06:36:26 2015)
  3727. Network Distance: 16 hops
  3728. TCP Sequence Prediction: Difficulty=183 (Good luck!)
  3729. IP ID Sequence Generation: All zeros
  3730. Service Info: OS: Linux; Device: webcam; CPE: cpe:/h:avtech:avn801, cpe:/o:linux:linux_kernel
  3731.  
  3732. TRACEROUTE (using port 199/tcp)
  3733. HOP RTT ADDRESS
  3734. - Hops 1-10 are the same as for 94.141.221.18
  3735. 11 ... 15
  3736. 16 393.54 ms 94.141.221.161
  3737.  
  3738. Nmap scan report for 94.141.221.179
  3739. Host is up (0.36s latency).
  3740. Not shown: 996 filtered ports
  3741. PORT STATE SERVICE VERSION
  3742. 20/tcp open ftp MikroTik router ftpd 6.11
  3743. 21/tcp open ftp MikroTik router ftpd 6.11
  3744. 161/tcp closed snmp
  3745. 8291/tcp open unknown
  3746. Aggressive OS guesses: HP P2000 G3 NAS device (96%), Linux 2.6.32 - 3.13 (93%), Linux 2.6.32 - 2.6.39 (92%), MikroTik RouterOS 6.19 (Linux 3.3.5) (92%), Linux 3.10 (90%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (89%), Linux 3.6 (89%), Linux 3.2 (88%), Linux 2.6.32 - 3.10 (88%), Linux 2.6.32 - 3.9 (88%)
  3747. No exact OS matches for host (test conditions non-ideal).
  3748. Uptime guess: 0.069 days (since Sun Nov 22 05:51:32 2015)
  3749. Network Distance: 16 hops
  3750. TCP Sequence Prediction: Difficulty=235 (Good luck!)
  3751. IP ID Sequence Generation: All zeros
  3752. Service Info: Host: Kiwan Palace; Device: router
  3753.  
  3754. TRACEROUTE (using port 161/tcp)
  3755. HOP RTT ADDRESS
  3756. - Hops 1-10 are the same as for 94.141.221.18
  3757. 11 ... 15
  3758. 16 373.48 ms 94.141.221.179
  3759.  
  3760. Nmap scan report for 94.141.221.181
  3761. Host is up (0.41s latency).
  3762. Not shown: 998 filtered ports
  3763. PORT STATE SERVICE VERSION
  3764. 1099/tcp open http GM Streaming Server httpd
  3765. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  3766. |_http-title: Site doesn't have a title (text/html).
  3767. |_rmi-dumpregistry: Registry listing failed (Handshake failed)
  3768. 8085/tcp open http lighttpd 1.4.20
  3769. | http-auth:
  3770. | HTTP/1.1 401 Unauthorized
  3771. |_ Basic realm=WEB Remote Viewer
  3772. |_http-methods: No Allow or Public header in OPTIONS response (status code 401)
  3773. |_http-server-header: lighttpd/1.4.20
  3774. |_http-title: 401 - Unauthorized
  3775. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  3776. Aggressive OS guesses: OpenWrt White Russian 0.9 (Linux 2.4.30) (92%), D-Link DIR-300 NRU router (Linux 2.6.21) (91%), Dell Chassis Management Controller (CMC) (91%), Linux 2.6.16 - 2.6.20 (91%), Linux 2.6.16 - 2.6.21 (91%), Linux 2.6.18 - 2.6.27 (91%), Linux 2.6.18-8.el5 (Red Hat Enterprise Linux 5) (91%), Linux 2.6.20 (91%), Linux 2.6.20 (Ubuntu, x86_64) (91%), Linux 2.6.21 (91%)
  3777. No exact OS matches for host (test conditions non-ideal).
  3778. Uptime guess: 0.095 days (since Sun Nov 22 05:14:34 2015)
  3779. Network Distance: 16 hops
  3780. TCP Sequence Prediction: Difficulty=174 (Good luck!)
  3781. IP ID Sequence Generation: All zeros
  3782. Service Info: Device: webcam
  3783.  
  3784. TRACEROUTE (using port 1099/tcp)
  3785. HOP RTT ADDRESS
  3786. - Hops 1-10 are the same as for 94.141.221.18
  3787. 11 ... 15
  3788. 16 416.84 ms 94.141.221.181
  3789.  
  3790. Nmap scan report for 94.141.221.182
  3791. Host is up (0.46s latency).
  3792. Not shown: 955 closed ports
  3793. PORT STATE SERVICE VERSION
  3794. 1/tcp filtered tcpmux
  3795. 3/tcp filtered compressnet
  3796. 4/tcp filtered unknown
  3797. 6/tcp filtered unknown
  3798. 7/tcp filtered echo
  3799. 9/tcp filtered discard
  3800. 22/tcp filtered ssh
  3801. 23/tcp filtered telnet
  3802. 25/tcp filtered smtp
  3803. 53/tcp open domain Microsoft DNS
  3804. 80/tcp open http Kerio MailServer http config
  3805. |_http-favicon: Unknown favicon MD5: 94348007B80D9A8F1A4ED5D8CCEA0700
  3806. |_http-methods: No Allow or Public header in OPTIONS response (status code 301)
  3807. | http-robots.txt: 1 disallowed entry
  3808. |_/
  3809. |_http-server-header: Kerio Connect 8.4.3
  3810. | http-title: Kerio Connect client
  3811. |_Requested resource was http://94.141.221.182/webmail/login/
  3812. 88/tcp open kerberos-sec Windows 2003 Kerberos (server time: 2015-11-22 07:19:41Z)
  3813. 110/tcp open pop3 Kerio Connect pop3d 8.4.3
  3814. |_pop3-capabilities: UIDL STLS TOP SASL(CRAM-MD5 PLAIN LOGIN DIGEST-MD5 NTLM) APOP USER
  3815. | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
  3816. | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
  3817. | Public Key type: rsa
  3818. | Public Key bits: 2048
  3819. | Signature Algorithm: sha1WithRSAEncryption
  3820. | Not valid before: 2015-05-10T11:17:45
  3821. | Not valid after: 2016-05-09T11:17:45
  3822. | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
  3823. |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
  3824. |_ssl-date: TLS randomness does not represent time
  3825. 119/tcp open nntp Kerio Connect nntpd 8.4.3
  3826. 135/tcp filtered msrpc
  3827. 139/tcp filtered netbios-ssn
  3828. 143/tcp open imap Kerio Connect imapd 8.4.3
  3829. |_imap-capabilities: NAMESPACE OK UIDPLUS ANNOTATEMORE XLIST LITERAL+ LISTEXT STATUS-COUNTERS IMAP4 IDLE QUOTA SORT AUTH=LOGIN IMAP4rev1 completed AUTH=PLAIN AUTH=NTLMA0001 AUTH=DIGEST-MD5 CAPABILITY ACL AUTH=CRAM-MD5 SPECIAL-USE STARTTLS UNSELECT ANNOTATE ID
  3830. | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
  3831. | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
  3832. | Public Key type: rsa
  3833. | Public Key bits: 2048
  3834. | Signature Algorithm: sha1WithRSAEncryption
  3835. | Not valid before: 2015-05-10T11:17:45
  3836. | Not valid after: 2016-05-09T11:17:45
  3837. | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
  3838. |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
  3839. |_ssl-date: TLS randomness does not represent time
  3840. 389/tcp open ldap
  3841. 443/tcp open ssl/http Kerio MailServer http config
  3842. | http-cisco-anyconnect:
  3843. |_ ERROR: Not a Cisco ASA or unsupported version
  3844. | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
  3845. | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
  3846. | Public Key type: rsa
  3847. | Public Key bits: 2048
  3848. | Signature Algorithm: sha1WithRSAEncryption
  3849. | Not valid before: 2015-05-10T11:17:45
  3850. | Not valid after: 2016-05-09T11:17:45
  3851. | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
  3852. |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
  3853. |_ssl-date: TLS randomness does not represent time
  3854. 445/tcp filtered microsoft-ds
  3855. 464/tcp open kpasswd5?
  3856. 465/tcp filtered smtps
  3857. 563/tcp open ssl/nntp Kerio Connect nntpd 8.4.3
  3858. | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
  3859. | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
  3860. | Public Key type: rsa
  3861. | Public Key bits: 2048
  3862. | Signature Algorithm: sha1WithRSAEncryption
  3863. | Not valid before: 2015-05-10T11:17:45
  3864. | Not valid after: 2016-05-09T11:17:45
  3865. | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
  3866. |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
  3867. |_ssl-date: TLS randomness does not represent time
  3868. 587/tcp filtered submission
  3869. 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
  3870. 636/tcp open tcpwrapped
  3871. 993/tcp open ssl/imap Kerio Connect imapd 8.4.3
  3872. | imap-capabilities:
  3873. |_ ERROR: Failed to connect to server
  3874. | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
  3875. | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
  3876. | Public Key type: rsa
  3877. | Public Key bits: 2048
  3878. | Signature Algorithm: sha1WithRSAEncryption
  3879. | Not valid before: 2015-05-10T11:17:45
  3880. | Not valid after: 2016-05-09T11:17:45
  3881. | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
  3882. |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
  3883. |_ssl-date: TLS randomness does not represent time
  3884. 995/tcp open ssl/pop3 Kerio Connect pop3d 8.4.3
  3885. | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com/countryName=US
  3886. | Issuer: commonName=SERVER.Tempusmaritime.com/countryName=US
  3887. | Public Key type: rsa
  3888. | Public Key bits: 2048
  3889. | Signature Algorithm: sha1WithRSAEncryption
  3890. | Not valid before: 2015-05-10T11:17:45
  3891. | Not valid after: 2016-05-09T11:17:45
  3892. | MD5: 1913 9c44 6a95 e160 a941 2aa4 13d1 7fd4
  3893. |_SHA-1: 9a07 59b6 014c 047f fb63 4534 0841 385d 8773 0da7
  3894. |_ssl-date: TLS randomness does not represent time
  3895. 1433/tcp filtered ms-sql-s
  3896. 1720/tcp filtered h323q931
  3897. 1723/tcp filtered pptp
  3898. 2000/tcp filtered cisco-sccp
  3899. 3268/tcp open ldap
  3900. 3269/tcp open tcpwrapped
  3901. 3389/tcp open ms-wbt-server?
  3902. | ssl-cert: Subject: commonName=SERVER.Tempusmaritime.com
  3903. | Issuer: commonName=SERVER.Tempusmaritime.com
  3904. | Public Key type: rsa
  3905. | Public Key bits: 2048
  3906. | Signature Algorithm: sha1WithRSAEncryption
  3907. | Not valid before: 2015-10-07T20:53:41
  3908. | Not valid after: 2016-04-07T20:53:41
  3909. | MD5: abab 56ff 9541 22c8 bf45 458d b893 6440
  3910. |_SHA-1: 4ecf b264 c8c7 b051 12f2 00d2 7e2c f39c 69cc 45b4
  3911. |_ssl-date: 2015-11-22T07:30:29+00:00; +1m54s from scanner time.
  3912. 5060/tcp filtered sip
  3913. 5222/tcp open xmpp-client Tigase
  3914. | xmpp-info:
  3915. | STARTTLS Failed
  3916. | info:
  3917. | unknown:
  3918. |
  3919. | stream_id: tigase-error-tigase
  3920. | capabilities:
  3921. |
  3922. | errors:
  3923. | host-unknown
  3924. | (timeout)
  3925. | auth_mechanisms:
  3926. |
  3927. | xmpp:
  3928. | lang: en
  3929. | server name: 10.3.0.1
  3930. | version: 1.0
  3931. | compression_methods:
  3932. |
  3933. |_ features:
  3934. 8800/tcp open http Kerio MailServer http config
  3935. |_http-favicon: Unknown favicon MD5: 94348007B80D9A8F1A4ED5D8CCEA0700
  3936. |_http-methods: No Allow or Public header in OPTIONS response (status code 301)
  3937. | http-robots.txt: 1 disallowed entry
  3938. |_/
  3939. |_http-server-header: Kerio Connect 8.4.3
  3940. |_http-title: Did not follow redirect to http://94.141.221.182/webmail/login/
  3941. 49152/tcp open msrpc Microsoft Windows RPC
  3942. 49153/tcp open msrpc Microsoft Windows RPC
  3943. 49154/tcp open msrpc Microsoft Windows RPC
  3944. 49155/tcp open msrpc Microsoft Windows RPC
  3945. 49157/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
  3946. 49158/tcp open msrpc Microsoft Windows RPC
  3947. 49159/tcp open msrpc Microsoft Windows RPC
  3948. Device type: general purpose
  3949. Running (JUST GUESSING): Microsoft Windows 2012|7|8.1 (86%)
  3950. OS CPE: cpe:/o:microsoft:windows_server_2012 cpe:/o:microsoft:windows_7::sp1 cpe:/o:microsoft:windows
  3951. Aggressive OS guesses: Microsoft Windows Server 2012 R2 (86%), Microsoft Windows 7 SP1 (86%), Microsoft Windows 7 Ultimate (85%), Microsoft Windows 8.1 (85%)
  3952. No exact OS matches for host (test conditions non-ideal).
  3953. Uptime guess: 0.415 days (since Sat Nov 21 21:34:02 2015)
  3954. Network Distance: 17 hops
  3955. TCP Sequence Prediction: Difficulty=235 (Good luck!)
  3956. IP ID Sequence Generation: Incremental
  3957. Service Info: Host: SERVER.Tempusmaritime.com; OS: Windows; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_server_2003
  3958.  
  3959. TRACEROUTE (using port 1025/tcp)
  3960. HOP RTT ADDRESS
  3961. - Hops 1-10 are the same as for 94.141.221.18
  3962. 11 ... 16
  3963. 17 434.97 ms 94.141.221.182
  3964.  
  3965. Nmap scan report for 94.141.221.189
  3966. Host is up (0.46s latency).
  3967. All 1000 scanned ports on 94.141.221.189 are filtered
  3968. Device type: switch|VoIP adapter|VoIP phone
  3969. Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded, HP embedded, Xylan embedded
  3970. OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000 cpe:/h:xylan:omnistack_4024cf
  3971. Too many fingerprints match this host to give specific OS details
  3972. Network Distance: 16 hops
  3973.  
  3974. TRACEROUTE (using proto 1/icmp)
  3975. HOP RTT ADDRESS
  3976. - Hops 1-11 are the same as for 94.141.221.18
  3977. 12 ... 15
  3978. 16 363.43 ms 94.141.221.189
  3979.  
  3980. Nmap scan report for 94.141.221.191
  3981. Host is up (0.41s latency).
  3982. Not shown: 953 closed ports, 37 filtered ports
  3983. PORT STATE SERVICE VERSION
  3984. 2869/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
  3985. 8080/tcp open http Boa HTTPd 0.94.13
  3986. | http-auth:
  3987. | HTTP/1.0 401 Unauthorized
  3988. |_ Basic realm=DSL-N12E_C1
  3989. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  3990. |_http-server-header: Boa/0.94.13
  3991. |_http-title: 401 Unauthorized
  3992. 10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
  3993. |_http-methods: No Allow or Public header in OPTIONS response (status code 404)
  3994. |_http-server-header: Microsoft-HTTPAPI/2.0
  3995. |_http-title: Not Found
  3996. 49152/tcp open msrpc Microsoft Windows RPC
  3997. 49153/tcp open msrpc Microsoft Windows RPC
  3998. 49154/tcp open msrpc Microsoft Windows RPC
  3999. 49155/tcp open msrpc Microsoft Windows RPC
  4000. 49160/tcp open msrpc Microsoft Windows RPC
  4001. 49161/tcp open msrpc Microsoft Windows RPC
  4002. 49165/tcp open msrpc Microsoft Windows RPC
  4003. Aggressive OS guesses: Microsoft Windows 7 SP1 (95%), Microsoft Windows 7 SP1 or Windows Server 2008 SP2 (94%), Microsoft Windows Vista Home Premium SP1, Windows 7, or Windows Server 2008 (94%), Microsoft Windows 7 Ultimate (93%), Microsoft Windows 8.1 (93%), Microsoft Windows Windows 7 SP1 (93%), Microsoft Windows Vista SP1 (93%), Microsoft Windows 8.1 Update 1 (91%), Microsoft Windows 7 SP 1 (90%), Microsoft Windows 8 (90%)
  4004. No exact OS matches for host (test conditions non-ideal).
  4005. Uptime guess: 0.066 days (since Sun Nov 22 05:55:52 2015)
  4006. Network Distance: 16 hops
  4007. TCP Sequence Prediction: Difficulty=235 (Good luck!)
  4008. IP ID Sequence Generation: Incremental
  4009. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  4010.  
  4011. TRACEROUTE (using port 80/tcp)
  4012. HOP RTT ADDRESS
  4013. - Hops 1-10 are the same as for 94.141.221.18
  4014. 11 ... 15
  4015. 16 450.63 ms 94.141.221.191
  4016.  
  4017. Nmap scan report for 94.141.221.193
  4018. Host is up (0.46s latency).
  4019. Not shown: 997 filtered ports
  4020. PORT STATE SERVICE VERSION
  4021. 80/tcp open http Netgear DGN1000 router http config
  4022. | http-auth:
  4023. | HTTP/1.1 401 Unauthorized
  4024. |_ Basic realm=NETGEAR DGN1000
  4025. |_http-methods: No Allow or Public header in OPTIONS response (status code 501)
  4026. |_http-server-header: <empty>
  4027. |_http-title: Authorization warning
  4028. 5500/tcp open hotline?
  4029. 8080/tcp open http uc-httpd 1.0.0
  4030. |_http-favicon: Unknown favicon MD5: EC9D1C872C50DD7DA7D826D9C85FC158
  4031. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  4032. | http-open-proxy: Potentially OPEN proxy.
  4033. |_Methods supported:CONNECTION
  4034. |_http-title: NETSuveillance WEB
  4035. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  4036. Device type: router|WAP|storage-misc|general purpose|specialized
  4037. Running (JUST GUESSING): Linksys embedded (91%), Linux 2.4.X|2.6.X (89%), HP embedded (89%), Linksys Linux 2.4.X (88%), Crestron 2-Series (87%)
  4038. OS CPE: cpe:/h:linksys:rv042 cpe:/h:linksys:wrv54g cpe:/o:linux:linux_kernel:2.4 cpe:/h:hp:p2000_g3 cpe:/o:linksys:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:crestron:2_series
  4039. Aggressive OS guesses: Linksys RV042 router (91%), Linksys WRV54G WAP (91%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (89%), HP P2000 G3 NAS device (89%), Linux 2.4.18 (88%), OpenWrt White Russian 0.9 (Linux 2.4.30) (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (88%), Crestron XPanel control system (87%)
  4040. No exact OS matches for host (test conditions non-ideal).
  4041. Uptime guess: 0.097 days (since Sun Nov 22 05:11:06 2015)
  4042. Network Distance: 16 hops
  4043. TCP Sequence Prediction: Difficulty=165 (Good luck!)
  4044. IP ID Sequence Generation: All zeros
  4045. Service Info: Device: router; CPE: cpe:/h:netgear:dgn1000
  4046.  
  4047. TRACEROUTE (using port 80/tcp)
  4048. HOP RTT ADDRESS
  4049. - Hops 1-10 are the same as for 94.141.221.18
  4050. 11 ... 15
  4051. 16 437.90 ms 94.141.221.193
  4052.  
  4053. Nmap scan report for 94.141.221.195
  4054. Host is up (0.49s latency).
  4055. Not shown: 996 filtered ports
  4056. PORT STATE SERVICE VERSION
  4057. 21/tcp open http Apache httpd 2.2.15 ((CentOS))
  4058. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  4059. |_http-server-header: Apache/2.2.15 (CentOS)
  4060. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.195/
  4061. 80/tcp open http Virtual Web 0.9
  4062. |_http-favicon: Unknown favicon MD5: D7C6D6BADE16E3D2417E661EC7E68B93
  4063. |_http-methods: No Allow or Public header in OPTIONS response (status code 200)
  4064. |_http-server-header: Virtual Web 0.9
  4065. |_http-title: Site doesn't have a title (text/html).
  4066. 3306/tcp open http Apache httpd 2.2.15 ((CentOS))
  4067. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  4068. |_http-server-header: Apache/2.2.15 (CentOS)
  4069. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.195/
  4070. |_mysql-info: ERROR: Script execution failed (use -d to debug)
  4071. 5001/tcp open http Apache httpd 2.2.15 ((CentOS))
  4072. |_http-methods: No Allow or Public header in OPTIONS response (status code 303)
  4073. |_http-server-header: Apache/2.2.15 (CentOS)
  4074. |_http-title: Did not follow redirect to http://ultrafi.sawaisp.sy/?url=http://94.141.221.195/
  4075. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  4076. SF-Port80-TCP:V=6.49BETA5%I=7%D=11/22%Time=56516C5B%P=x86_64-pc-linux-gnu%
  4077. SF:r(GetRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Virtual\x20Web\x
  4078. SF:200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent-Type:\x20text
  4079. SF:/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html><head><meta\x2
  4080. SF:0HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x20language='jav
  4081. SF:ascript'>parent\.location=\"/login\.htm\"</script></head><body></body><
  4082. SF:/html>")%r(HTTPOptions,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
  4083. SF::\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Req
  4084. SF:uest\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\
  4085. SF:n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HT
  4086. SF:ML>\n")%r(RTSPRequest,C1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
  4087. SF:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>400\x20Bad\x20Requ
  4088. SF:est\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Bad\x20Request\r\n
  4089. SF:</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>\x20</BODY></HTM
  4090. SF:L>\n")%r(FourOhFourRequest,114,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Vi
  4091. SF:rtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r\nContent
  4092. SF:-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\r\n<html>
  4093. SF:<head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><script\x2
  4094. SF:0language='javascript'>parent\.location=\"/login\.htm\"</script></head>
  4095. SF:<body></body></html>")%r(GenericLines,C1,"HTTP/1\.1\x20400\x20Bad\x20Re
  4096. SF:quest\r\nServer:\x20Virtual\x20Web\x200\.9\r\n\r\n<HTML><HEAD><TITLE>40
  4097. SF:0\x20Bad\x20Request\r\n</TITLE></HEAD>\r\n<BODY><H1>Error:\x20400\x20Ba
  4098. SF:d\x20Request\r\n</H1>\x20<P>The\x20requested\x20Url\x20is\x20\"\"\.</P>
  4099. SF:\x20</BODY></HTML>\n")%r(SIPOptions,114,"HTTP/1\.1\x20200\x20OK\r\nServ
  4100. SF:er:\x20Virtual\x20Web\x200\.9\r\nSet-Cookie:\x20SessionID=;\x20path=/\r
  4101. SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20151\x20\x20\x20\r\n\
  4102. SF:r\n<html><head><meta\x20HTTP-EQUIV=\"Pragma\"\x20CONTENT=\"no-cache\"><
  4103. SF:script\x20language='javascript'>parent\.location=\"/login\.htm\"</scrip
  4104. SF:t></head><body></body></html>");
  4105. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  4106. Device type: general purpose|specialized|storage-misc
  4107. Running (JUST GUESSING): Linux 2.6.X|3.X (91%), Crestron 2-Series (87%), HP embedded (85%)
  4108. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3
  4109. Aggressive OS guesses: Linux 2.6.32 (91%), Linux 2.6.32 - 3.10 (90%), Linux 2.6.32 - 3.9 (90%), Linux 3.11 (89%), Linux 3.5 (89%), Linux 2.6.32 - 3.13 (88%), Linux 2.6.32 - 2.6.39 (87%), Linux 2.6.32 - 3.1 (87%), Linux 2.6.39 (87%), Linux 3.10 (87%)
  4110. No exact OS matches for host (test conditions non-ideal).
  4111. Uptime guess: 0.064 days (since Sun Nov 22 05:59:35 2015)
  4112. Network Distance: 16 hops
  4113. TCP Sequence Prediction: Difficulty=237 (Good luck!)
  4114. IP ID Sequence Generation: All zeros
  4115.  
  4116. TRACEROUTE (using port 80/tcp)
  4117. HOP RTT ADDRESS
  4118. - Hops 1-10 are the same as for 94.141.221.18
  4119. 11 ... 15
  4120. 16 424.32 ms 94.141.221.195
  4121.  
  4122. Nmap scan report for 94.141.221.196
  4123. Host is up (0.37s latency).
  4124. All 1000 scanned ports on 94.141.221.196 are filtered
  4125. Too many fingerprints match this host to give specific OS details
  4126. Network Distance: 16 hops
  4127.  
  4128. TRACEROUTE (using proto 1/icmp)
  4129. HOP RTT ADDRESS
  4130. - Hops 1-11 are the same as for 94.141.221.18
  4131. 12 ... 15
  4132. 16 360.31 ms 94.141.221.196
  4133.  
  4134. Nmap scan report for 94.141.221.197 [host down]
  4135. Nmap scan report for 94.141.221.198 [host down]
  4136. Nmap scan report for 94.141.221.202 [host down]
  4137. Nmap scan report for 94.141.221.203 [host down]
  4138. Nmap scan report for 94.141.221.204 [host down]
  4139. Nmap scan report for 94.141.221.205 [host down]
  4140. Nmap scan report for 94.141.221.208 [host down]
  4141. Nmap scan report for 94.141.221.209 [host down]
  4142. Nmap scan report for 94.141.221.210 [host down]
  4143. Nmap scan report for 94.141.221.211 [host down]
  4144. Nmap scan report for 94.141.221.212 [host down]
  4145. Nmap scan report for 94.141.221.213 [host down]
  4146. Nmap scan report for 94.141.221.214 [host down]
  4147. Nmap scan report for 94.141.221.215 [host down]
  4148. Nmap scan report for 94.141.221.216 [host down]
  4149. Nmap scan report for 94.141.221.217 [host down]
  4150. Nmap scan report for 94.141.221.218 [host down]
  4151. Nmap scan report for 94.141.221.219 [host down]
  4152. Nmap scan report for 94.141.221.220 [host down]
  4153. Nmap scan report for 94.141.221.221 [host down]
  4154. Nmap scan report for 94.141.221.222 [host down]
  4155. Nmap scan report for 94.141.221.223 [host down]
  4156. Nmap scan report for 94.141.221.224 [host down]
  4157. Nmap scan report for 94.141.221.225 [host down]
  4158. Nmap scan report for 94.141.221.226 [host down]
  4159. Nmap scan report for 94.141.221.227 [host down]
  4160. Nmap scan report for 94.141.221.228 [host down]
  4161. Nmap scan report for 94.141.221.229 [host down]
  4162. Nmap scan report for 94.141.221.230 [host down]
  4163. Nmap scan report for 94.141.221.231 [host down]
  4164. Nmap scan report for 94.141.221.232 [host down]
  4165. Nmap scan report for 94.141.221.233 [host down]
  4166. Nmap scan report for 94.141.221.234 [host down]
  4167. Nmap scan report for 94.141.221.235 [host down]
  4168. Nmap scan report for 94.141.221.236 [host down]
  4169. Nmap scan report for 94.141.221.237 [host down]
  4170. Nmap scan report for 94.141.221.238 [host down]
  4171. Nmap scan report for 94.141.221.239 [host down]
  4172. Nmap scan report for 94.141.221.240 [host down]
  4173. Nmap scan report for 94.141.221.241 [host down]
  4174. Nmap scan report for 94.141.221.242 [host down]
  4175. Nmap scan report for 94.141.221.243 [host down]
  4176. Nmap scan report for 94.141.221.244 [host down]
  4177. Nmap scan report for 94.141.221.245 [host down]
  4178. Nmap scan report for 94.141.221.246 [host down]
  4179. Nmap scan report for 94.141.221.247 [host down]
  4180. Nmap scan report for 94.141.221.248 [host down]
  4181. Nmap scan report for 94.141.221.249 [host down]
  4182. Nmap scan report for 94.141.221.250 [host down]
  4183. Nmap scan report for 94.141.221.251 [host down]
  4184. Nmap scan report for 94.141.221.252 [host down]
  4185. Nmap scan report for 94.141.221.253 [host down]
  4186. Nmap scan report for 94.141.221.254 [host down]
  4187. Nmap scan report for 94.141.221.255 [host down]
  4188. Initiating SYN Stealth Scan at 07:31
  4189. Scanning 5 hosts [1000 ports/host]
  4190. Discovered open port 443/tcp on 94.141.221.199
  4191. Discovered open port 80/tcp on 94.141.221.199
  4192. Discovered open port 3389/tcp on 94.141.221.199
  4193. SYN Stealth Scan Timing: About 18.58% done; ETC: 07:34 (0:02:16 remaining)
  4194. Discovered open port 49152/tcp on 94.141.221.199
  4195. Discovered open port 49157/tcp on 94.141.221.199
  4196. Discovered open port 49156/tcp on 94.141.221.199
  4197. Discovered open port 49154/tcp on 94.141.221.199
  4198. SYN Stealth Scan Timing: About 36.86% done; ETC: 07:34 (0:02:00 remaining)
  4199. Discovered open port 49155/tcp on 94.141.221.199
  4200. Discovered open port 7002/tcp on 94.141.221.199
  4201. Discovered open port 49159/tcp on 94.141.221.199
  4202. SYN Stealth Scan Timing: About 55.46% done; ETC: 07:34 (0:01:20 remaining)
  4203. Discovered open port 49153/tcp on 94.141.221.199
  4204. Discovered open port 49158/tcp on 94.141.221.199
  4205. Discovered open port 7001/tcp on 94.141.221.199
  4206. Completed SYN Stealth Scan against 94.141.221.201 in 124.39s (4 hosts left)
  4207. Discovered open port 593/tcp on 94.141.221.199
  4208. Discovered open port 85/tcp on 94.141.221.206
  4209. SYN Stealth Scan Timing: About 68.29% done; ETC: 07:34 (0:01:02 remaining)
  4210. Discovered open port 6002/tcp on 94.141.221.199
  4211. Completed SYN Stealth Scan against 94.141.221.206 in 138.72s (3 hosts left)
  4212. Completed SYN Stealth Scan against 94.141.221.199 in 140.08s (2 hosts left)
  4213. Increasing send delay for 94.141.221.200 from 0 to 5 due to 11 out of 11 dropped probes since last increase.
  4214. SYN Stealth Scan Timing: About 80.20% done; ETC: 07:35 (0:00:47 remaining)
  4215. Completed SYN Stealth Scan against 94.141.221.207 in 194.38s (1 host left)
  4216. SYN Stealth Scan Timing: About 81.78% done; ETC: 07:36 (0:00:53 remaining)
  4217. SYN Stealth Scan Timing: About 82.17% done; ETC: 07:37 (0:01:03 remaining)
  4218. Increasing send delay for 94.141.221.200 from 5 to 10 due to 11 out of 11 dropped probes since last increase.
  4219. SYN Stealth Scan Timing: About 82.65% done; ETC: 07:38 (0:01:15 remaining)
  4220. SYN Stealth Scan Timing: About 83.20% done; ETC: 07:39 (0:01:27 remaining)
  4221. SYN Stealth Scan Timing: About 83.83% done; ETC: 07:41 (0:01:40 remaining)
  4222. SYN Stealth Scan Timing: About 84.56% done; ETC: 07:43 (0:01:53 remaining)
  4223. SYN Stealth Scan Timing: About 85.40% done; ETC: 07:45 (0:02:06 remaining)
  4224. SYN Stealth Scan Timing: About 86.32% done; ETC: 07:47 (0:02:16 remaining)
  4225. SYN Stealth Scan Timing: About 87.31% done; ETC: 07:50 (0:02:25 remaining)
  4226. SYN Stealth Scan Timing: About 88.37% done; ETC: 07:52 (0:02:31 remaining)
  4227. SYN Stealth Scan Timing: About 89.48% done; ETC: 07:55 (0:02:32 remaining)
  4228. SYN Stealth Scan Timing: About 90.61% done; ETC: 07:57 (0:02:30 remaining)
  4229. SYN Stealth Scan Timing: About 91.70% done; ETC: 08:00 (0:02:25 remaining)
  4230. SYN Stealth Scan Timing: About 92.75% done; ETC: 08:02 (0:02:17 remaining)
  4231. SYN Stealth Scan Timing: About 93.75% done; ETC: 08:04 (0:02:06 remaining)
  4232. SYN Stealth Scan Timing: About 94.69% done; ETC: 08:06 (0:01:53 remaining)
  4233. SYN Stealth Scan Timing: About 95.53% done; ETC: 08:08 (0:01:40 remaining)
  4234. SYN Stealth Scan Timing: About 96.28% done; ETC: 08:09 (0:01:26 remaining)
  4235. SYN Stealth Scan Timing: About 96.91% done; ETC: 08:11 (0:01:14 remaining)
  4236. SYN Stealth Scan Timing: About 97.46% done; ETC: 08:12 (0:01:02 remaining)
  4237. SYN Stealth Scan Timing: About 97.92% done; ETC: 08:13 (0:00:52 remaining)
  4238. SYN Stealth Scan Timing: About 98.31% done; ETC: 08:13 (0:00:43 remaining)
  4239. SYN Stealth Scan Timing: About 98.64% done; ETC: 08:14 (0:00:35 remaining)
  4240. Completed SYN Stealth Scan at 08:17, 2745.34s elapsed (5000 total ports)
  4241. Initiating Service scan at 08:17
  4242. Scanning 16 services on 5 hosts
  4243. Service scan Timing: About 50.00% done; ETC: 08:19 (0:01:00 remaining)
  4244. Completed Service scan at 08:19, 145.48s elapsed (16 services on 5 hosts)
  4245. Initiating OS detection (try #1) against 5 hosts
  4246. Retrying OS detection (try #2) against 2 hosts
  4247. Initiating Traceroute at 08:19
  4248. Completed Traceroute at 08:19, 17.91s elapsed
  4249. Initiating Parallel DNS resolution of 14 hosts. at 08:19
  4250. Completed Parallel DNS resolution of 14 hosts. at 08:20, 13.00s elapsed
  4251. NSE: Script scanning 5 hosts.
  4252. Initiating NSE at 08:20
  4253. Completed NSE at 08:21, 77.79s elapsed
  4254. Initiating NSE at 08:21
  4255. Completed NSE at 08:21, 0.01s elapsed
  4256. Nmap scan report for 94.141.221.199
  4257. Host is up (0.33s latency).
  4258. Not shown: 969 closed ports
  4259. PORT STATE SERVICE VERSION
  4260. 1/tcp filtered tcpmux
  4261. 3/tcp filtered compressnet
  4262. 4/tcp filtered unknown
  4263. 6/tcp filtered unknown
  4264. 7/tcp filtered echo
  4265. 9/tcp filtered discard
  4266. 22/tcp filtered ssh
  4267. 23/tcp filtered telnet
  4268. 80/tcp open http Microsoft IIS httpd 7.5
  4269. | http-methods: OPTIONS TRACE GET HEAD POST
  4270. | Potentially risky methods: TRACE
  4271. |_See http://nmap.org/nsedoc/scripts/http-methods.html
  4272. |_http-server-header: Microsoft-IIS/7.5
  4273. |_http-title: IIS7
  4274. 135/tcp filtered msrpc
  4275. 139/tcp filtered netbios-ssn
  4276. 443/tcp open ssl/http Microsoft IIS httpd 7.5
  4277. | http-cisco-anyconnect:
  4278. |_ ERROR: Not a Cisco ASA or unsupported version
  4279. | ssl-cert: Subject: commonName=khserver
  4280. | Issuer: commonName=khserver
  4281. | Public Key type: rsa
  4282. | Public Key bits: 2048
  4283. | Signature Algorithm: sha1WithRSAEncryption
  4284. | Not valid before: 2015-04-23T10:21:57
  4285. | Not valid after: 2025-04-23T00:00:00
  4286. | MD5: 08ce 09ff c17f e662 85ad 7d3c 9651 dd02
  4287. |_SHA-1: 6f1b a6e0 2c16 e585 2dd8 244e 4091 6af4 39d2 c641
  4288. |_ssl-date: 2015-11-22T08:20:16+00:00; +1s from scanner time.
  4289. | sslv2:
  4290. | SSLv2 supported
  4291. | ciphers:
  4292. | SSL2_RC4_128_WITH_MD5
  4293. |_ SSL2_DES_192_EDE3_CBC_WITH_MD5
  4294. |_sstp-discover: SSTP is supported.
  4295. 445/tcp filtered microsoft-ds
  4296. 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
  4297. 1433/tcp filtered ms-sql-s
  4298. 1720/tcp filtered h323q931
  4299. 1723/tcp filtered pptp
  4300. 2000/tcp filtered cisco-sccp
  4301. 3389/tcp open ms-wbt-server Microsoft Terminal Service
  4302. | ssl-cert: Subject: commonName=khserver
  4303. | Issuer: commonName=khserver
  4304. | Public Key type: rsa
  4305. | Public Key bits: 2048
  4306. | Signature Algorithm: sha1WithRSAEncryption
  4307. | Not valid before: 2015-09-20T10:00:23
  4308. | Not valid after: 2016-03-21T10:00:23
  4309. | MD5: cb6a cb51 a2be b508 f5be fab8 1db2 7ce2
  4310. |_SHA-1: aaee 9c3b 1ac6 3ddb 1e31 0862 cece 2103 5cec 92a4
  4311. |_ssl-date: 2015-11-22T08:20:16+00:00; +1s from scanner time.
  4312. 5060/tcp filtered sip
  4313. 6002/tcp open http SafeNet Sentinel Protection Server httpd 7.3
  4314. |_http-server-header: SentinelProtectionServer/7.3
  4315. |_http-title: Sentinel License Monitor
  4316. 7001/tcp open afs3-callback?
  4317. 7002/tcp open http SafeNet Sentinel Keys License Monitor httpd 1.3.2 (Java Console)
  4318. |_http-title: Sentinel License Monitor
  4319. 49152/tcp open msrpc Microsoft Windows RPC
  4320. 49153/tcp open msrpc Microsoft Windows RPC
  4321. 49154/tcp open msrpc Microsoft Windows RPC
  4322. 49155/tcp open msrpc Microsoft Windows RPC
  4323. 49156/tcp open msrpc Microsoft Windows RPC
  4324. 49157/tcp open msrpc Microsoft Windows RPC
  4325. 49158/tcp open unknown
  4326. 49159/tcp open msrpc Microsoft Windows RPC
  4327. Device type: general purpose|printer
  4328. Running (JUST GUESSING): Microsoft Windows 7|8.1|2008|Vista|2012|10 (95%), Lexmark embedded (88%)
  4329. OS CPE: cpe:/o:microsoft:windows_7:::ultimate cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_vista::sp1:home_premium cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows_server_2012 cpe:/h:lexmark:x644e
  4330. Aggressive OS guesses: Microsoft Windows 7 Ultimate (95%), Microsoft Windows 8.1 (95%), Microsoft Windows 7 SP1 or Windows Server 2008 SP2 (95%), Microsoft Windows Windows 7 SP1 (95%), Microsoft Windows Vista Home Premium SP1, Windows 7, or Windows Server 2008 (95%), Microsoft Windows Vista SP1 (95%), Microsoft Windows 7 SP1 (94%), Microsoft Windows 8.1 Update 1 (92%), Microsoft Windows 8 (92%), Microsoft Windows Vista Enterprise (92%)
  4331. No exact OS matches for host (test conditions non-ideal).
  4332. Uptime guess: 29.062 days (since Sat Oct 24 07:51:54 2015)
  4333. Network Distance: 16 hops
  4334. TCP Sequence Prediction: Difficulty=263 (Good luck!)
  4335. IP ID Sequence Generation: Incremental
  4336. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  4337.  
  4338. TRACEROUTE (using port 199/tcp)
  4339. HOP RTT ADDRESS
  4340. - Hops 1-10 are the same as for 94.141.221.18
  4341. 11 ... 15
  4342. 16 404.54 ms 94.141.221.199
  4343.  
  4344. Nmap scan report for 94.141.221.200
  4345. Host is up (0.36s latency).
  4346. All 1000 scanned ports on 94.141.221.200 are filtered
  4347. Too many fingerprints match this host to give specific OS details
  4348.  
  4349. TRACEROUTE (using port 80/tcp)
  4350. HOP RTT ADDRESS
  4351. - Hops 1-10 are the same as for 94.141.221.18
  4352. 11 ... 30
  4353.  
  4354. Nmap scan report for 94.141.221.201
  4355. Host is up (0.39s latency).
  4356. All 1000 scanned ports on 94.141.221.201 are filtered
  4357. Device type: switch|VoIP adapter|VoIP phone
  4358. Running: 3Com embedded, Allied Telesyn embedded, D-Link embedded, Dell embedded, Grandstream embedded
  4359. OS CPE: cpe:/h:3com:3924 cpe:/h:alliedtelesyn:at-gs950 cpe:/h:dlink:des-3226l cpe:/h:dlink:dvg-4022s cpe:/h:dell:powerconnect_2708 cpe:/h:grandstream:gxp2000
  4360. Too many fingerprints match this host to give specific OS details
  4361. Network Distance: 16 hops
  4362.  
  4363. TRACEROUTE (using proto 1/icmp)
  4364. HOP RTT ADDRESS
  4365. - Hops 1-11 are the same as for 94.141.221.18
  4366. 12 ... 15
  4367. 16 481.22 ms 94.141.221.201
  4368.  
  4369. Nmap scan report for 94.141.221.206
  4370. Host is up (0.35s latency).
  4371. Not shown: 999 filtered ports
  4372. PORT STATE SERVICE VERSION
  4373. 85/tcp open http mini_httpd 1.19 19dec2003
  4374. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  4375. Device type: specialized|WAP|phone
  4376. Running: iPXE 1.X, Linksys Linux 2.4.X, Linux 2.6.X, Sony Ericsson embedded
  4377. OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linksys:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6 cpe:/h:sonyericsson:u8i_vivaz
  4378. OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
  4379.  
  4380. TRACEROUTE (using port 85/tcp)
  4381. HOP RTT ADDRESS
  4382. - Hops 1-10 are the same as for 94.141.221.18
  4383. 11 ... 30
  4384.  
  4385. Nmap scan report for 94.141.221.207
  4386. Host is up (0.37s latency).
  4387. All 1000 scanned ports on 94.141.221.207 are filtered (854) or closed (146)
  4388. Too many fingerprints match this host to give specific OS details
  4389. Network Distance: 16 hops
  4390.  
  4391. TRACEROUTE (using port 80/tcp)
  4392. HOP RTT ADDRESS
  4393. - Hops 1-10 are the same as for 94.141.221.18
  4394. 11 ... 15
  4395. 16 431.13 ms 94.141.221.207
  4396.  
  4397. NSE: Script Post-scanning.
  4398. Initiating NSE at 08:21
  4399. Completed NSE at 08:21, 0.00s elapsed
  4400. Initiating NSE at 08:21
  4401. Completed NSE at 08:21, 0.00s elapsed
  4402. Read data files from: /usr/bin/../share/nmap
  4403. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  4404. Nmap done: 256 IP addresses (69 hosts up) scanned in 8975.33 seconds
  4405. Raw packets sent: 178558 (8.055MB) | Rcvd: 241584 (12.675MB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement