Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 6.47 ( http://nmap.org ) at 2002-05-19 00:29 UTC
- NSE: Loaded 87 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating Ping Scan at 00:30
- Scanning nextgenupdate.com (141.101.120.90) [4 ports]
- Completed Ping Scan at 00:30, 0.49s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 00:30
- Completed Parallel DNS resolution of 1 host. at 00:30, 0.18s elapsed
- Initiating SYN Stealth Scan at 00:30
- Scanning nextgenupdate.com (141.101.120.90) [1000 ports]
- Discovered open port 80/tcp on 141.101.120.90
- Discovered open port 443/tcp on 141.101.120.90
- adjust_timeouts2: packet supposedly had rtt of 14878098 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of 14878098 microseconds. Ignoring time.
- SYN Stealth Scan Timing: About 2.00% done; ETC: 00:56 (0:26:08 remaining)
- SYN Stealth Scan Timing: About 3.03% done; ETC: 01:04 (0:33:02 remaining)
- SYN Stealth Scan Timing: About 53.60% done; ETC: 00:33 (0:01:20 remaining)
- Discovered open port 8443/tcp on 141.101.120.90
- Completed SYN Stealth Scan at 00:32, 113.64s elapsed (1000 total ports)
- Initiating Service scan at 00:32
- Scanning 3 services on nextgenupdate.com (141.101.120.90)
- Completed Service scan at 00:32, 20.69s elapsed (3 services on 1 host)
- Initiating OS detection (try #1) against nextgenupdate.com (141.101.120.90)
- Retrying OS detection (try #2) against nextgenupdate.com (141.101.120.90)
- Initiating Traceroute at 00:32
- Completed Traceroute at 00:32, 0.03s elapsed
- Initiating Parallel DNS resolution of 4 hosts. at 00:32
- Completed Parallel DNS resolution of 4 hosts. at 00:32, 0.02s elapsed
- NSE: Script scanning 141.101.120.90.
- Initiating NSE at 00:32
- Completed NSE at 00:33, 26.67s elapsed
- Nmap scan report for nextgenupdate.com (141.101.120.90)
- Host is up (0.018s latency).
- Other addresses for nextgenupdate.com (not scanned): 141.101.120.91
- Not shown: 997 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http cloudflare-nginx
- | http-php-version: Logo query returned unknown hash 43bd471d1c5937ba2019b3b44a47bd9a
- | Credits query returned unknown hash 46f0ade74ca09f0b5518480119304ca2
- |_Version from header x-powered-by: PHP/5.3.3
- | http-robots.txt: 37 disallowed entries
- | /administrator/ /images/ /includes/ /installation/
- | /templates/ /forums/calendar.php /forums/cron.php
- | /forums/editpost.php /forums/global.php /forums/image.php
- | /forums/inlinemod.php /forums/joinrequests.php /forums/login.php
- | /forums/member.php /forums/memberlist.php /forums/misc.php
- | /forums/moderator.php /forums/newattachment.php /forums/newreply.php
- | /forums/newthread.php /forums/online.php /forums/poll.php
- | /forums/postings.php /forums/printthread.php /forums/private.php
- | /forums/profile.php /forums/register.php /forums/report.php
- | /forums/reputation.php /forums/search.php /forums/sendmessage.php
- | /forums/showgroups.php /forums/subscription.php /forums/threadrate.php
- |_/forums/usercp.php /forums/usernote.php /forums/archive/
- |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
- | http-waf-detect: IDS/IPS/WAF detected:
- |_nextgenupdate.com:80/?p4yl04d3=<script>alert(document.cookie)</script>
- | http-waf-fingerprint:
- | Detected WAF
- |_ Cloudflare
- 443/tcp open ssl/http cloudflare-nginx
- |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
- | http-waf-fingerprint:
- | Detected WAF
- |_ Cloudflare
- 8443/tcp open http cloudflare-nginx
- |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
- | http-waf-fingerprint:
- | Detected WAF
- |_ Cloudflare
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Aggressive OS guesses: Crestron XPanel control system (90%), Linux 3.2 (89%), OpenWrt White Russian 0.9 (Linux 2.4.30) (88%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (88%), Linux 3.1 (87%), HP P2000 G3 NAS device (87%), Linux 2.6.32 - 3.10 (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%), Linux 2.6.32 - 3.3 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 4 hops
- TCP Sequence Prediction: Difficulty=261 (Good luck!)
- IP ID Sequence Generation: All zeros
- Host script results:
- | ip-geolocation-geoplugin:
- | 141.101.120.90 (nextgenupdate.com)
- | coordinates (lat,lon): 47,8
- |_ state: Unknown, Europe
- |_whois-ip: ERROR: Script execution failed (use -d to debug)
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 10.20 ms 192.168.1.254
- 2 19.16 ms 82-170-59-254.ip.telfort.nl (82.170.59.254)
- 3 22.21 ms cloudflare.equinix-am1.nl-ix.net (193.239.117.114)
- 4 20.59 ms 141.101.120.90
- NSE: Script Post-scanning.
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 183.42 seconds
- Raw packets sent: 3121 (141.110KB) | Rcvd: 110 (5.512KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement