Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.60 ( https://nmap.org ) at 2018-05-12 11:57 CEST
- Nmap scan report for xxxxxxxxxxxx (yyy.yyy.yyy.yyy)
- Host is up (0.036s latency).
- rDNS record for yyy.yyy.yyy.yyy: xxxxxxxxxxxxxxxxxxxx
- Not shown: 923 filtered ports
- PORT STATE SERVICE VERSION
- 9/tcp open tcpwrapped
- 17/tcp open tcpwrapped
- 22/tcp open ssh OpenSSH 6.9 (protocol 2.0)
- 37/tcp open tcpwrapped
- 100/tcp open tcpwrapped
- 146/tcp open tcpwrapped
- 163/tcp open tcpwrapped
- 255/tcp open tcpwrapped
- 406/tcp open tcpwrapped
- 481/tcp open tcpwrapped
- 500/tcp open tcpwrapped
- 543/tcp open tcpwrapped
- 563/tcp open tcpwrapped
- 873/tcp open tcpwrapped
- 1010/tcp open tcpwrapped
- 1044/tcp open tcpwrapped
- 1045/tcp open tcpwrapped
- 1065/tcp open tcpwrapped
- 1083/tcp open tcpwrapped
- 1097/tcp open tcpwrapped
- 1151/tcp open tcpwrapped
- 1218/tcp open tcpwrapped
- 1247/tcp open tcpwrapped
- 1272/tcp open tcpwrapped
- 1322/tcp open tcpwrapped
- 1455/tcp open tcpwrapped
- 1556/tcp open tcpwrapped
- 1875/tcp open tcpwrapped
- 1971/tcp open tcpwrapped
- 2001/tcp open tcpwrapped
- 2049/tcp open tcpwrapped
- 2170/tcp open tcpwrapped
- 2190/tcp open tcpwrapped
- 2809/tcp open tcpwrapped
- 3005/tcp open tcpwrapped
- 3011/tcp open tcpwrapped
- 3013/tcp open tcpwrapped
- 3351/tcp open tcpwrapped
- 3580/tcp open tcpwrapped
- 3659/tcp open tcpwrapped
- 3690/tcp open tcpwrapped
- 3814/tcp open tcpwrapped
- 3878/tcp open tcpwrapped
- 4001/tcp open tcpwrapped
- 4125/tcp open tcpwrapped
- 4446/tcp open tcpwrapped
- 5009/tcp open tcpwrapped
- 5054/tcp open tcpwrapped
- 5802/tcp open tcpwrapped
- 5903/tcp open tcpwrapped
- 6004/tcp open tcpwrapped
- 6881/tcp open tcpwrapped
- 6969/tcp open tcpwrapped
- 7200/tcp open tcpwrapped
- 7402/tcp open tcpwrapped
- 7512/tcp open tcpwrapped
- 8181/tcp open tcpwrapped
- 8651/tcp open tcpwrapped
- 9009/tcp open tcpwrapped
- 9081/tcp open tcpwrapped
- 9503/tcp open tcpwrapped
- 9929/tcp open tcpwrapped
- 10000/tcp open tcpwrapped
- 10004/tcp open tcpwrapped
- 14441/tcp open tcpwrapped
- 16992/tcp open tcpwrapped
- 16993/tcp open tcpwrapped
- 19350/tcp open tcpwrapped
- 22939/tcp open tcpwrapped
- 26214/tcp open tcpwrapped
- 27355/tcp open tcpwrapped
- 27715/tcp open tcpwrapped
- 32775/tcp open tcpwrapped
- 35500/tcp open tcpwrapped
- 49176/tcp open tcpwrapped
- 50800/tcp open tcpwrapped
- 55056/tcp open tcpwrapped
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall
- Running (JUST GUESSING): FreeBSD 6.X (98%), Juniper JUNOS 12.X|10.X (89%), m0n0wall FreeBSD (89%), Netasq embedded (89%)
- OS CPE: cpe:/o:freebsd:freebsd:6.2 cpe:/o:juniper:junos:12 cpe:/o:m0n0wall:freebsd cpe:/o:juniper:junos:10 cpe:/h:netasq:u70
- Aggressive OS guesses: FreeBSD 6.2-RELEASE (98%), Juniper SRX-series firewall (JunOS 12.1) (89%), m0n0wall 1.3b11 - 1.3b15 FreeBSD-based firewall (89%), Juniper SRX100-series or SRX200-series firewall (JUNOS 10.4 - 12.1) (89%), Netasq U70 firewall (89%)
- No exact OS matches for host (test conditions non-ideal).
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 104.01 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement