Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- GATHERING DNS INFO
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- CHECKING FOR SUBDOMAIN HIJACKING
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING WHOIS INFO
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING ULTATOOLS DNS INFO
- ====================================================================================•x[2019-11-18](03:41)x•
- Source:
- whois.arin.net
- IP Address:
- 147.135.73.226
- Name:
- OVH-CUST-213345
- Handle:
- NET-147-135-73-224-1
- Registration Date:
- 3/6/19
- Range:
- 147.135.73.224-147.135.73.227
- Customer:
- Bernhard, Stelzl
- Customer Handle:
- C07304450
- Address:
- Bogener Str. 3 b
- City:
- Parkstetten
- State/Province:
- Postal Code:
- 94365
- Country:
- Germany
- Name Servers:
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING DNS INFO
- ====================================================================================•x[2019-11-18](03:41)x•
- [+] Report saved to: /usr/share/sniper/loot/workspace/147.135.73.226/osint/intodns-147.135.73.226.html
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING THEHARVESTER OSINT INFO
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING EMAILS FROM EMAIL-FORMAT.COM
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING DNS ALTERATIONS
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- COLLECTING OSINT FROM ONLINE DOCUMENTS
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING EMAILS VIA METASPLOIT
- ====================================================================================•x[2019-11-18](03:41)x•
- /usr/share/sniper/modes/osint.sh: line 84: msfconsole: command not found
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING DNS SUBDOMAINS VIA SUBLIST3R
- ====================================================================================•x[2019-11-18](03:41)x•
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|
- # Coded By Ahmed Aboul-Ela - @aboul3la
- Error: Please enter a valid domain
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING DNS SUBDOMAINS VIA AMASS
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING REVERSE WHOIS DNS SUBDOMAINS VIA AMASS
- ====================================================================================•x[2019-11-18](03:41)x•
- /usr/share/sniper/modes/recon.sh: line 22: amass: command not found
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING DNS SUBDOMAINS VIA SUBFINDER (THIS COULD TAKE A WHILE...)
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- BRUTE FORCING DNS SUBDOMAINS VIA DNSCAN (THIS COULD TAKE A WHILE...)
- ====================================================================================•x[2019-11-18](03:41)x•
- [*] Processing domain 147.135.73.226
- [*] Using system resolvers ['127.0.0.53']
- [+] Getting nameservers
- [-] Getting nameservers failed
- [-] Zone transfer failed
- [*] Scanning 147.135.73.226 for A records
- ╔═╗╦═╗╔╦╗╔═╗╦ ╦
- ║ ╠╦╝ ║ ╚═╗╠═╣
- ╚═╝╩╚═ ╩o╚═╝╩ ╩
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING CERTIFICATE SUBDOMAINS
- ====================================================================================•x[2019-11-18](03:41)x•
- [+] Domains saved to: /usr/share/sniper/loot/workspace/147.135.73.226/domains/domains-147.135.73.226-full.txt
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING PROJECT SONAR SUBDOMAINS
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING ALTDNS SUBDOMAINS
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- GATHERING DNSGEN SUBDOMAINS
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- RUNNING MASSDNS ON SUBDOMAINS
- ====================================================================================•x[2019-11-18](03:41)x•
- Privileges have been dropped to "nobody:nogroup" for security reasons.
- Processed queries: 0
- Received packets: 0
- Progress: 0.00% (00 h 00 min 00 sec / 00 h 00 min 00 sec)
- Current incoming rate: 0 pps, average: 0 pps
- Current success rate: 0 pps, average: 0 pps
- Finished total: 0, success: 0 (0.00%)
- Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
- Failures: 0: 0.00%, 1: 0.00%, 2: 0.00%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0. 00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00% , 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 4 5: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 0 ( 0.00%) | 0 ( 0.00%)
- NXDOMAIN: | 0 ( 0.00%) | 0 ( 0.00%)
- SERVFAIL: | 0 ( 0.00%) | 0 ( 0.00%)
- REFUSED: | 0 ( 0.00%) | 0 ( 0.00%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 468
- Received packets: 542
- Progress: 100.00% (00 h 00 min 01 sec / 00 h 00 min 01 sec)
- Current incoming rate: 541 pps, average: 541 pps
- Current success rate: 387 pps, average: 387 pps
- Finished total: 388, success: 388 (100.00%)
- Mismatched domains: 4 (0.74%), IDs: 0 (0.00%)
- Failures: 0: 57.47%, 1: 42.53%, 2: 17.01%, 3: 2.84%, 4: 0.77%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0. 00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00% , 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 35 ( 9.02%) | 35 ( 6.51%)
- NXDOMAIN: | 349 ( 89.95%) | 352 ( 65.43%)
- SERVFAIL: | 4 ( 1.03%) | 4 ( 0.74%)
- REFUSED: | 0 ( 0.00%) | 147 ( 27.32%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 468
- Received packets: 645
- Progress: 100.00% (00 h 00 min 02 sec / 00 h 00 min 02 sec)
- Current incoming rate: 102 pps, average: 321 pps
- Current success rate: 70 pps, average: 229 pps
- Finished total: 459, success: 459 (100.00%)
- Mismatched domains: 11 (1.72%), IDs: 0 (0.00%)
- Failures: 0: 48.58%, 1: 24.84%, 2: 15.03%, 3: 8.28%, 4: 3.70%, 5: 0.87%, 6: 0.65%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0. 00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00% , 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 42 ( 9.15%) | 42 ( 6.56%)
- NXDOMAIN: | 412 ( 89.76%) | 422 ( 65.94%)
- SERVFAIL: | 5 ( 1.09%) | 5 ( 0.78%)
- REFUSED: | 0 ( 0.00%) | 171 ( 26.72%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 468
- Received packets: 660
- Progress: 100.00% (00 h 00 min 03 sec / 00 h 00 min 03 sec)
- Current incoming rate: 14 pps, average: 219 pps
- Current success rate: 6 pps, average: 154 pps
- Finished total: 466, success: 466 (100.00%)
- Mismatched domains: 17 (2.60%), IDs: 0 (0.00%)
- Failures: 0: 47.85%, 1: 24.46%, 2: 14.81%, 3: 7.51%, 4: 2.79%, 5: 1.93%, 6: 0.86%, 7: 0.00%, 8: 0.21%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0. 00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00% , 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 42 ( 9.01%) | 42 ( 6.41%)
- NXDOMAIN: | 418 ( 89.70%) | 434 ( 66.26%)
- SERVFAIL: | 6 ( 1.29%) | 6 ( 0.92%)
- REFUSED: | 0 ( 0.00%) | 173 ( 26.41%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- Processed queries: 468
- Received packets: 663
- Progress: 100.00% (00 h 00 min 04 sec / 00 h 00 min 04 sec)
- Current incoming rate: 3 pps, average: 168 pps
- Current success rate: 2 pps, average: 118 pps
- Finished total: 468, success: 468 (100.00%)
- Mismatched domains: 18 (2.74%), IDs: 0 (0.00%)
- Failures: 0: 47.65%, 1: 24.36%, 2: 14.74%, 3: 7.48%, 4: 2.78%, 5: 1.92%, 6: 0.64%, 7: 0.21%, 8: 0.00%, 9: 0.00%, 10: 0.21%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0. 00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00% , 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
- Response: | Success: | Total:
- OK: | 42 ( 8.97%) | 42 ( 6.38%)
- NXDOMAIN: | 420 ( 89.74%) | 437 ( 66.41%)
- SERVFAIL: | 6 ( 1.28%) | 6 ( 0.91%)
- REFUSED: | 0 ( 0.00%) | 173 ( 26.29%)
- FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
- ====================================================================================•x[2019-11-18](03:41)x•
- CHECKING FOR EMAIL SECURITY
- ====================================================================================•x[2019-11-18](03:41)x•
- [+] 147.135.73.226 has no SPF record!
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for 147.135.73.226!
- ====================================================================================•x[2019-11-18](03:41)x•
- CHECKING FOR CNAME SUBDOMAIN HIJACKING
- ====================================================================================•x[2019-11-18](03:41)x•
- ====================================================================================•x[2019-11-18](03:41)x•
- STARTING SUBOVER HIJACKING SCAN
- ====================================================================================•x[2019-11-18](03:41)x•
- /usr/share/sniper/modes/recon.sh: line 130: cd: /root/go/src/github.com/Ice3man543/SubOver: No such file or directory
- /usr/share/sniper/modes/recon.sh: line 131: subover: command not found
- ====================================================================================•x[2019-11-18](03:41)x•
- STARTING SUBJACK HIJACKING SCAN
- ====================================================================================•x[2019-11-18](03:41)x•
- /usr/share/sniper/modes/recon.sh: line 145: /root/go/bin/subjack: No such file or directory
- ====================================================================================•x[2019-11-18](03:41)x•
- STARTING PUBLIC S3 BUCKET SCAN
- /usr/share/sniper/modes/recon.sh: line 155: cd: /usr/share/sniper/plugins/slurp/: No such file or directory
- ====================================================================================•x[2019-11-18](03:41)x•
- /usr/share/sniper/modes/recon.sh: line 156: ./slurp-linux-amd64: No such file or directory
- ====================================================================================•x[2019-11-18](03:41)x•
- STARTING SUBNET RETRIEVAL
- ====================================================================================•x[2019-11-18](03:41)x•
- 5.39.0.0/17
- 5.135.0.0/16
- 5.196.0.0/16
- 8.7.244.0/24
- 8.18.128.0/24
- 8.18.172.0/24
- 8.20.110.0/24
- 8.21.41.0/24
- 8.24.8.0/21
- 8.26.94.0/24
- 8.29.224.0/24
- 8.30.208.0/21
- 8.33.96.0/21
- 8.33.128.0/21
- 8.33.136.0/24
- 8.33.137.0/24
- 23.92.224.0/19
- 37.59.0.0/16
- 37.60.48.0/21
- 37.60.56.0/21
- 37.187.0.0/16
- 46.105.0.0/16
- 46.105.0.0/17
- 46.105.128.0/18
- 46.105.192.0/23
- 46.105.192.0/20
- 46.105.192.0/22
- 46.105.194.0/23
- 46.105.196.0/23
- 46.105.198.0/24
- 46.105.199.0/24
- 46.105.200.0/24
- 46.105.201.0/24
- 46.105.202.0/24
- 46.105.203.0/24
- 46.105.204.0/22
- 46.105.205.0/24
- 46.105.208.0/20
- 46.105.224.0/19
- 46.244.32.0/20
- 51.38.0.0/16
- 51.68.0.0/16
- 51.75.0.0/16
- 51.77.0.0/16
- 51.79.0.0/17
- 51.79.128.0/17
- 51.81.0.0/17
- 51.81.128.0/17
- 51.83.0.0/16
- 51.89.0.0/16
- 51.91.0.0/16
- 51.161.0.0/17
- 51.161.128.0/17
- 51.254.0.0/15
- 54.36.0.0/16
- 54.37.0.0/16
- 54.38.0.0/16
- 54.39.0.0/16
- 79.137.0.0/17
- 79.137.64.0/18
- 85.190.81.0/24
- 87.98.128.0/17
- 91.90.88.0/21
- 91.90.88.0/24
- 91.90.89.0/24
- 91.90.90.0/24
- 91.90.91.0/24
- 91.90.92.0/24
- 91.90.93.0/24
- 91.90.94.0/24
- 91.90.95.0/24
- 91.121.0.0/16
- 91.134.0.0/16
- 92.222.0.0/16
- 92.246.224.0/19
- 94.23.0.0/16
- 103.5.12.0/22
- 107.189.64.0/18
- 137.74.0.0/16
- 139.99.0.0/17
- 139.99.128.0/17
- 142.4.192.0/19
- 142.44.128.0/17
- 144.2.32.0/19
- 144.217.0.0/16
- 145.239.0.0/16
- 147.135.0.0/17
- 147.135.128.0/17
- 149.56.0.0/16
- 149.202.0.0/16
- 151.80.0.0/16
- 158.69.0.0/16
- 164.132.0.0/16
- 167.114.0.0/17
- 167.114.128.0/18
- 167.114.192.0/19
- 167.114.224.0/19
- 176.31.0.0/16
- 176.31.176.0/22
- 176.31.184.0/22
- 176.31.188.0/22
- 178.32.0.0/15
- 178.32.133.0/24
- 178.32.134.0/24
- 178.32.135.0/24
- 185.12.32.0/23
- 185.45.160.0/22
- 185.228.96.0/22
- 185.228.96.0/24
- 185.228.97.0/24
- 185.228.98.0/24
- 185.228.99.0/24
- 185.243.16.0/24
- 188.165.0.0/16
- 192.95.0.0/18
- 192.99.0.0/16
- 192.240.152.0/21
- 193.70.0.0/17
- 193.104.19.0/25
- 193.104.19.0/24
- 193.104.56.0/24
- 193.109.63.0/24
- 195.110.30.0/23
- 195.246.232.0/23
- 198.27.64.0/18
- 198.27.64.0/20
- 198.27.80.0/21
- 198.27.88.0/22
- 198.27.92.0/24
- 198.27.93.0/24
- 198.27.94.0/23
- 198.27.96.0/19
- 198.50.128.0/17
- 198.100.144.0/20
- 198.245.48.0/20
- 205.218.49.0/24
- 213.32.0.0/17
- 213.186.32.0/19
- 213.251.128.0/18
- 216.32.192.0/24
- 216.32.194.0/24
- 216.32.213.0/24
- 216.32.216.0/24
- 216.32.218.0/24
- 216.32.220.0/24
- 217.182.0.0/16
- ====================================================================================•x[2019-11-18](03:41)x•
- PINGING HOST
- ====================================================================================•x[2019-11-18](03:41)x•
- PING 147.135.73.226 (147.135.73.226) 56(84) bytes of data.
- 64 bytes from 147.135.73.226: icmp_seq=1 ttl=52 time=15.2 ms
- --- 147.135.73.226 ping statistics ---
- 1 packets transmitted, 1 received, 0% packet loss, time 0ms
- rtt min/avg/max/mdev = 15.252/15.252/15.252/0.000 ms
- ====================================================================================•x[2019-11-18](03:41)x•
- RUNNING TCP PORT SCAN
- ====================================================================================•x[2019-11-18](03:41)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 03:41 UTC
- WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
- Stats: 0:00:44 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 68.17% done; ETC: 03:42 (0:00:21 remaining)
- Stats: 0:00:47 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 68.89% done; ETC: 03:42 (0:00:21 remaining)
- Stats: 0:00:49 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 69.35% done; ETC: 03:42 (0:00:22 remaining)
- Stats: 0:00:59 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.03% done; ETC: 03:43 (0:00:24 remaining)
- Stats: 0:01:00 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.14% done; ETC: 03:43 (0:00:24 remaining)
- Stats: 0:01:00 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.23% done; ETC: 03:43 (0:00:24 remaining)
- Stats: 0:01:01 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.31% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:01 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.34% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:02 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.40% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:02 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.49% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:02 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.54% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:03 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.60% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:03 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.69% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:04 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.75% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:04 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.83% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:04 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.86% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:04 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.89% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:05 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 71.95% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:05 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.03% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:06 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.06% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:06 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.09% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:06 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.12% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:06 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.15% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:06 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.18% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:06 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.18% done; ETC: 03:43 (0:00:25 remaining)
- Stats: 0:01:06 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.21% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:07 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.24% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:07 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.26% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:07 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.29% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:07 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.32% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:07 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.35% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:07 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.38% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:08 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.41% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:08 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.44% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:08 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.47% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:08 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 72.47% done; ETC: 03:43 (0:00:26 remaining)
- Stats: 0:01:45 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 75.69% done; ETC: 03:44 (0:00:34 remaining)
- Stats: 0:01:47 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 75.84% done; ETC: 03:44 (0:00:34 remaining)
- Stats: 0:01:48 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 75.84% done; ETC: 03:44 (0:00:34 remaining)
- Stats: 0:01:48 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 75.86% done; ETC: 03:44 (0:00:34 remaining)
- Stats: 0:01:49 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 75.89% done; ETC: 03:44 (0:00:35 remaining)
- Stats: 0:01:50 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 75.92% done; ETC: 03:44 (0:00:35 remaining)
- Stats: 0:01:50 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 75.95% done; ETC: 03:44 (0:00:35 remaining)
- Stats: 0:01:55 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 76.12% done; ETC: 03:44 (0:00:36 remaining)
- Stats: 0:01:55 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 76.15% done; ETC: 03:44 (0:00:36 remaining)
- Stats: 0:01:56 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 76.18% done; ETC: 03:44 (0:00:36 remaining)
- Stats: 0:01:57 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 76.21% done; ETC: 03:44 (0:00:37 remaining)
- Stats: 0:01:57 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 76.24% done; ETC: 03:44 (0:00:36 remaining)
- Stats: 0:01:58 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 76.27% done; ETC: 03:44 (0:00:37 remaining)
- Stats: 0:01:59 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 76.30% done; ETC: 03:44 (0:00:37 remaining)
- Stats: 0:01:59 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 76.32% done; ETC: 03:44 (0:00:37 remaining)
- Stats: 0:02:00 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 76.35% done; ETC: 03:44 (0:00:37 remaining)
- Stats: 0:02:36 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 78.02% done; ETC: 03:45 (0:00:44 remaining)
- Stats: 0:02:38 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 78.05% done; ETC: 03:45 (0:00:44 remaining)
- Stats: 0:05:49 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 83.64% done; ETC: 03:48 (0:01:08 remaining)
- Stats: 0:05:52 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 83.70% done; ETC: 03:48 (0:01:09 remaining)
- Stats: 0:08:46 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 88.45% done; ETC: 03:51 (0:01:09 remaining)
- Stats: 0:08:47 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 88.45% done; ETC: 03:51 (0:01:09 remaining)
- Stats: 0:08:48 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 88.48% done; ETC: 03:51 (0:01:09 remaining)
- Stats: 0:09:41 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 89.89% done; ETC: 03:52 (0:01:05 remaining)
- Stats: 0:09:42 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 89.89% done; ETC: 03:52 (0:01:05 remaining)
- Stats: 0:09:43 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 89.92% done; ETC: 03:52 (0:01:05 remaining)
- Stats: 0:10:29 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 91.13% done; ETC: 03:53 (0:01:01 remaining)
- Stats: 0:10:30 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 91.16% done; ETC: 03:53 (0:01:01 remaining)
- Stats: 0:10:31 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 91.19% done; ETC: 03:53 (0:01:01 remaining)
- Stats: 0:11:10 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 92.19% done; ETC: 03:53 (0:00:57 remaining)
- Stats: 0:11:11 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 92.22% done; ETC: 03:53 (0:00:57 remaining)
- Stats: 0:11:43 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 93.06% done; ETC: 03:54 (0:00:52 remaining)
- Stats: 0:11:44 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 93.09% done; ETC: 03:54 (0:00:52 remaining)
- Stats: 0:13:04 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 95.19% done; ETC: 03:55 (0:00:40 remaining)
- Stats: 0:14:04 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 96.77% done; ETC: 03:56 (0:00:28 remaining)
- Stats: 0:14:07 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 96.83% done; ETC: 03:56 (0:00:28 remaining)
- Stats: 0:14:15 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.06% done; ETC: 03:56 (0:00:26 remaining)
- Stats: 0:14:19 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.15% done; ETC: 03:56 (0:00:25 remaining)
- Stats: 0:14:23 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.26% done; ETC: 03:56 (0:00:24 remaining)
- Stats: 0:14:24 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.29% done; ETC: 03:56 (0:00:24 remaining)
- Stats: 0:14:25 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.32% done; ETC: 03:56 (0:00:24 remaining)
- Stats: 0:14:26 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.35% done; ETC: 03:56 (0:00:24 remaining)
- Stats: 0:14:27 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.38% done; ETC: 03:56 (0:00:23 remaining)
- Stats: 0:14:28 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.38% done; ETC: 03:56 (0:00:23 remaining)
- Stats: 0:14:29 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.41% done; ETC: 03:56 (0:00:23 remaining)
- Stats: 0:14:30 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.44% done; ETC: 03:56 (0:00:23 remaining)
- Stats: 0:14:31 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 97.47% done; ETC: 03:56 (0:00:23 remaining)
- Stats: 0:18:43 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan
- SYN Stealth Scan Timing: About 99.99% done; ETC: 04:00 (0:00:00 remaining)
- Nmap scan report for ip226.ip-147-135-73.us (147.135.73.226)
- Host is up (0.012s latency).
- Not shown: 195 filtered ports, 5 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 7/tcp open echo
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp open telnet
- 53/tcp open domain
- 67/tcp open dhcps
- 68/tcp open dhcpc
- 88/tcp open kerberos-sec
- 110/tcp open pop3
- 111/tcp open rpcbind
- 113/tcp open ident
- 135/tcp open msrpc
- 138/tcp open netbios-dgm
- 139/tcp open netbios-ssn
- 143/tcp open imap
- 161/tcp open snmp
- 162/tcp open snmptrap
- 179/tcp open bgp
- 222/tcp open rsh-spx
- 384/tcp open arns
- 389/tcp open ldap
- 402/tcp open genie
- 443/tcp open https
- 444/tcp open snpp
- 446/tcp open ddm-rdb
- 465/tcp open smtps
- 500/tcp open isakmp
- 502/tcp open mbap
- 512/tcp open exec
- 513/tcp open login
- 514/tcp open shell
- 515/tcp open printer
- 540/tcp open uucp
- 548/tcp open afp
- 554/tcp open rtsp
- 587/tcp open submission
- 617/tcp open sco-dtmgr
- 631/tcp open ipp
- 705/tcp open agentx
- 771/tcp open rtip
- 783/tcp open spamassassin
- 873/tcp open rsync
- 888/tcp open accessbuilder
- 902/tcp open iss-realsecure
- 910/tcp open kink
- 993/tcp open imaps
- 995/tcp open pop3s
- 998/tcp open busboy
- 999/tcp open garcon
- 1000/tcp open cadlock
- 1024/tcp open kdm
- 1035/tcp open multidropper
- 1098/tcp open rmiactivation
- 1102/tcp open adobeserver-1
- 1103/tcp open xaudio
- 1128/tcp open saphostctrl
- 1129/tcp open saphostctrls
- 1158/tcp open lsnr
- 1199/tcp open dmidi
- 1211/tcp open groove-dpp
- 1311/tcp open rxmon
- 1352/tcp open lotusnotes
- 1434/tcp open ms-sql-m
- 1440/tcp open eicon-slp
- 1471/tcp open csdmbase
- 1494/tcp open citrix-ica
- 1521/tcp open oracle
- 1530/tcp open rap-service
- 1533/tcp open virtual-places
- 1582/tcp open msims
- 1720/tcp open h323q931
- 1723/tcp open pptp
- 1811/tcp open scientia-sdb
- 2002/tcp open globe
- 2049/tcp open nfs
- 2100/tcp open amiganetfs
- 2181/tcp open eforward
- 2222/tcp open EtherNetIP-1
- 2323/tcp open 3d-nfsd
- 2362/tcp open digiman
- 2381/tcp open compaq-https
- 2525/tcp open ms-v-worlds
- 2598/tcp open citriximaclient
- 2638/tcp open sybase
- 2947/tcp open gpsd
- 2967/tcp open symantec-av
- 3037/tcp open hp-san-mgmt
- 3217/tcp open unite
- 3268/tcp open globalcatLDAP
- 3269/tcp open globalcatLDAPssl
- 3273/tcp open sxmp
- 3306/tcp open mysql
- 3389/tcp open ms-wbt-server
- 3465/tcp open edm-mgr-cntrl
- 3628/tcp open ept-machine
- 3632/tcp open distccd
- 3690/tcp open svn
- 3780/tcp open nnp
- 3790/tcp open quickbooksrds
- 3900/tcp open udt_os
- 4000/tcp open remoteanything
- 4002/tcp open mlchat-proxy
- 4433/tcp open vop
- 4444/tcp open krb524
- 4445/tcp open upnotifyp
- 4659/tcp open playsta2-lob
- 4848/tcp open appserv-http
- 5001/tcp open commplex-link
- 5009/tcp open airport-admin
- 5038/tcp open unknown
- 5040/tcp open unknown
- 5051/tcp open ida-agent
- 5060/tcp open sip
- 5093/tcp open sentinel-lm
- 5168/tcp open scte30
- 5247/tcp open capwap-data
- 5355/tcp open llmnr
- 5405/tcp open pcduo
- 5432/tcp open postgresql
- 5433/tcp open pyrrho
- 5466/tcp open unknown
- 5554/tcp open sgi-esphttp
- 5580/tcp open tmosms0
- 5666/tcp open nrpe
- 5800/tcp open vnc-http
- 5814/tcp open spt-automation
- 5900/tcp open vnc
- 5901/tcp open vnc-1
- 5902/tcp open vnc-2
- 5904/tcp open unknown
- 5906/tcp open unknown
- 5908/tcp open unknown
- 5910/tcp open cm
- 5920/tcp open unknown
- 5984/tcp open couchdb
- 5986/tcp open wsmans
- 5999/tcp open ncd-conf
- 6000/tcp open X11
- 6060/tcp open x11
- 6070/tcp open messageasap
- 6082/tcp open p25cai
- 6095/tcp open unknown
- 6101/tcp open backupexec
- 6161/tcp open patrol-ism
- 6262/tcp open unknown
- 6405/tcp open boe-pagesvr
- 6443/tcp open sun-sr-https
- 6542/tcp open unknown
- 6988/tcp open unknown
- 6996/tcp open unknown
- 7000/tcp open afs3-fileserver
- 7002/tcp open afs3-prserver
- 7021/tcp open dpserveadmin
- 7144/tcp open unknown
- 7181/tcp open janus-disc
- 7210/tcp open unknown
- 7414/tcp open unknown
- 7443/tcp open oracleas-https
- 7510/tcp open ovhpas
- 7580/tcp open unknown
- 7700/tcp open em7-secom
- 7770/tcp open unknown
- 7777/tcp open cbt
- 7778/tcp open interwise
- 7787/tcp open popup-reminders
- 7800/tcp open asr
- 7878/tcp open owms
- 7879/tcp open unknown
- 7902/tcp open tnos-dp
- 8001/tcp open vcom-tunnel
- 8008/tcp open http
- 8014/tcp open unknown
- 8020/tcp open intu-ec-svcdisc
- 8028/tcp open unknown
- 8030/tcp open unknown
- 8050/tcp open unknown
- 8051/tcp open rocrail
- 8080/tcp open http-proxy
- 8081/tcp open blackice-icecap
- 8082/tcp open blackice-alerts
- 8085/tcp open unknown
- 8086/tcp open d-s-n
- 8088/tcp open radan-http
- 8089/tcp open unknown
- 8090/tcp open opsmessaging
- 8095/tcp open unknown
- 8101/tcp open ldoms-migr
- 8161/tcp open patrol-snmp
- 8180/tcp open unknown
- 8220/tcp open unknown
- 8222/tcp open unknown
- 8300/tcp open tmi
- 8303/tcp open unknown
- 8400/tcp open cvd
- 8445/tcp open copy
- 8701/tcp open unknown
- 8787/tcp open msgsrvr
- 8800/tcp open sunwebadmin
- 8834/tcp open nessus-xmlrpc
- 8880/tcp open cddbp-alt
- 8888/tcp open sun-answerbook
- 8890/tcp open ddi-tcp-3
- 8901/tcp open jmb-cds2
- 8902/tcp open unknown
- 8980/tcp open nod-provider
- 8983/tcp open unknown
- 8999/tcp open bctp
- 9000/tcp open cslistener
- 9003/tcp open unknown
- 9004/tcp open unknown
- 9010/tcp open sdr
- 9050/tcp open tor-socks
- 9084/tcp open aurora
- 9090/tcp open zeus-admin
- 9111/tcp open DragonIDSConsole
- 9152/tcp open ms-sql2000
- 9391/tcp open unknown
- 9495/tcp open unknown
- 9500/tcp open ismserver
- 9711/tcp open unknown
- 9788/tcp open unknown
- 9809/tcp open unknown
- 9811/tcp open unknown
- 9812/tcp open unknown
- 9813/tcp open unknown
- 9814/tcp open unknown
- 9875/tcp open sapv1
- 9876/tcp open sd
- 9910/tcp open unknown
- 9991/tcp open issa
- 9999/tcp open abyss
- 10000/tcp open snet-sensor-mgmt
- 10008/tcp open octopus
- 10051/tcp open zabbix-trapper
- 10099/tcp open unknown
- 10162/tcp open snmptls-trap
- 10443/tcp open unknown
- 10628/tcp open unknown
- 11000/tcp open irisa
- 11099/tcp open unknown
- 11460/tcp open unknown
- 12000/tcp open cce4x
- 12203/tcp open unknown
- 12345/tcp open netbus
- 12397/tcp open unknown
- 13013/tcp open unknown
- 13364/tcp open unknown
- 13500/tcp open unknown
- 14000/tcp open scotty-ft
- 14330/tcp open unknown
- 15000/tcp open hydap
- 15001/tcp open unknown
- 16000/tcp open fmsas
- 16102/tcp open unknown
- 17200/tcp open unknown
- 18980/tcp open unknown
- 19810/tcp open unknown
- 20101/tcp open unknown
- 20111/tcp open unknown
- 23423/tcp open unknown
- 23943/tcp open unknown
- 25025/tcp open unknown
- 26000/tcp open quake
- 26122/tcp open unknown
- 26256/tcp open unknown
- 27000/tcp open flexlm0
- 27960/tcp open unknown
- 28222/tcp open unknown
- 28784/tcp open unknown
- 30000/tcp open ndmps
- 31099/tcp open unknown
- 33000/tcp open unknown
- 34443/tcp open unknown
- 37777/tcp open unknown
- 40007/tcp open unknown
- 41080/tcp open unknown
- 41523/tcp open unknown
- 44334/tcp open tinyfw
- 46823/tcp open unknown
- 48080/tcp open unknown
- 48899/tcp open unknown
- 49180/tcp open unknown
- 50000/tcp open ibm-db2
- 50001/tcp open unknown
- 50002/tcp open iiimsf
- 50003/tcp open unknown
- 50004/tcp open unknown
- 50013/tcp open unknown
- 50500/tcp open unknown
- 50501/tcp open unknown
- 50502/tcp open unknown
- 52302/tcp open unknown
- 52869/tcp open unknown
- 53413/tcp open unknown
- 62078/tcp open iphone-sync
- 62514/tcp open unknown
- Nmap done: 1 IP address (1 host up) scanned in 1153.06 seconds
- ====================================================================================•x[2019-11-18](04:00)x•
- RUNNING UDP PORT SCAN
- ====================================================================================•x[2019-11-18](04:00)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 04:00 UTC
- Nmap scan report for ip226.ip-147-135-73.us (147.135.73.226)
- Host is up.
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp open|filtered netbios-ns
- 138/udp open|filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 500/udp open|filtered isakmp
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 5.07 seconds
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING INTRUSIVE SCANS
- ====================================================================================•x[2019-11-18](04:01)x•
- + -- --=[Port 21 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING NMAP SCRIPTS
- ====================================================================================•x[2019-11-18](04:01)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 04:01 UTC
- NSE: failed to initialize the script engine:
- /usr/bin/../share/nmap/nse_main.lua:821: '/usr/share/nmap/scripts/vulscan/vulscan.nse' did not match a category, filename, or directory
- stack traceback:
- [C]: in function 'error'
- /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
- /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
- [C]: in ?
- QUITTING!
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING METASPLOIT FTP VERSION SCANNER
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 184: msfconsole: command not found
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING METASPLOIT ANONYMOUS FTP SCANNER
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 190: msfconsole: command not found
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING VSFTPD 2.3.4 BACKDOOR EXPLOIT
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 196: msfconsole: command not found
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING PROFTPD 1.3.3C BACKDOOR EXPLOIT
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 202: msfconsole: command not found
- + -- --=[Port 22 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING SSH AUDIT
- ====================================================================================•x[2019-11-18](04:01)x•
- [exception] cannot connect to 147.135.73.226 port 22: timed out
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING NMAP SCRIPTS
- ====================================================================================•x[2019-11-18](04:01)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 04:01 UTC
- NSE: failed to initialize the script engine:
- /usr/bin/../share/nmap/nse_main.lua:821: '/usr/share/nmap/scripts/vulscan/vulscan.nse' did not match a category, filename, or directory
- stack traceback:
- [C]: in function 'libssh2-utility.error'
- /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
- /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
- [C]: in ?
- QUITTING!
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING SSH VERSION SCANNER
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 240: msfconsole: command not found
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING OPENSSH USER ENUM SCANNER
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 246: msfconsole: command not found
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING LIBSSH AUTH BYPASS EXPLOIT CVE-2018-10933
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 252: msfconsole: command not found
- + -- --=[Port 23 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING NMAP SCRIPTS
- ====================================================================================•x[2019-11-18](04:01)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 04:01 UTC
- NSE: failed to initialize the script engine:
- /usr/bin/../share/nmap/nse_main.lua:821: '/usr/share/nmap/scripts/vulscan/vulscan.nse' did not match a category, filename, or directory
- stack traceback:
- [C]: in function 'error'
- /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
- /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
- [C]: in ?
- QUITTING!
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING METASPLOIT MODULES
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 273: msfconsole: command not found
- + -- --=[Port 25 closed... skipping.
- + -- --=[Port 53 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING NMAP SCRIPTS
- ====================================================================================•x[2019-11-18](04:01)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 04:01 UTC
- NSE: failed to initialize the script engine:
- /usr/bin/../share/nmap/nse_main.lua:821: '/usr/share/nmap/scripts/vulscan/vulscan.nse' did not match a category, filename, or directory
- stack traceback:
- [C]: in function 'error'
- /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
- /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
- [C]: in ?
- QUITTING!
- + -- --=[Port 67 closed... skipping.
- + -- --=[Port 68 closed... skipping.
- + -- --=[Port 69 closed... skipping.
- + -- --=[Port 79 closed... skipping.
- + -- --=[Port 80 closed... skipping.
- + -- --=[Port 110 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING NMAP SCRIPTS
- ====================================================================================•x[2019-11-18](04:01)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 04:01 UTC
- NSE: failed to initialize the script engine:
- /usr/bin/../share/nmap/nse_main.lua:821: '/usr/share/nmap/scripts/vulscan/vulscan.nse' did not match a category, filename, or directory
- stack traceback:
- [C]: in function 'error'
- /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
- /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
- [C]: in ?
- QUITTING!
- + -- --=[Port 111 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING METASPLOIT MODULES
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 481: msfconsole: command not found
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING SHOW MOUNT
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 489: showmount: command not found
- modes/normal.sh: line 490: showmount: command not found
- modes/normal.sh: line 491: showmount: command not found
- + -- --=[Port 123 closed... skipping.
- + -- --=[Port 135 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING RPCINFO
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 517: rpcinfo: command not found
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING NMAP SCRIPTS
- ====================================================================================•x[2019-11-18](04:01)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 04:01 UTC
- NSE: failed to initialize the script engine:
- /usr/bin/../share/nmap/nse_main.lua:821: '/usr/share/nmap/scripts/vulscan/vulscan.nse' did not match a category, filename, or directory
- stack traceback:
- [C]: in function 'error'
- /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
- /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
- [C]: in ?
- QUITTING!
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING METASPLOIT MODULES
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 529: msfconsole: command not found
- + -- --=[Port 137 closed... skipping.
- + -- --=[Port 139 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING SMB ENUMERATION
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 572: enum4linux: command not found
- Traceback (most recent call last):
- File "/usr/share/sniper/bin/samrdump.py", line 21, in <module>
- from impacket.examples import logger
- ImportError: No module named impacket.examples
- modes/normal.sh: line 574: nbtscan: command not found
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING NMAP SCRIPTS
- ====================================================================================•x[2019-11-18](04:01)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 04:01 UTC
- NSE: failed to initialize the script engine:
- /usr/bin/../share/nmap/nse_main.lua:821: '/usr/share/nmap/scripts/vulscan/vulscan.nse' did not match a category, filename, or directory
- stack traceback:
- [C]: in function 'error'
- /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
- /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
- [C]: in ?
- QUITTING!
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING METASPLOIT MODULES
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 586: msfconsole: command not found
- + -- --=[Port 161 closed... skipping.
- + -- --=[Port 162 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING NMAP SCRIPTS
- ====================================================================================•x[2019-11-18](04:01)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 04:01 UTC
- NSE: failed to initialize the script engine:
- /usr/bin/../share/nmap/nse_main.lua:821: '/usr/share/nmap/scripts/vulners' did not match a category, filename, or directory
- stack traceback:
- [C]: in function 'error'
- /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
- /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
- [C]: in ?
- QUITTING!
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING METASPLOIT MODULES
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 628: msfconsole: command not found
- + -- --=[Port 264 closed... skipping.
- + -- --=[Port 389 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING NMAP SCRIPTS
- ====================================================================================•x[2019-11-18](04:01)x•
- Starting Nmap 7.60 ( https://nmap.org ) at 2019-11-18 04:01 UTC
- NSE: failed to initialize the script engine:
- /usr/bin/../share/nmap/nse_main.lua:821: '/usr/share/nmap/scripts/vulscan/vulscan.nse' did not match a category, filename, or directory
- stack traceback:
- [C]: in function 'error'
- /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
- /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
- [C]: in ?
- QUITTING!
- ====================================================================================•x[2019-11-18](04:01)x•
- RUNNING LDAP ANONYMOUS SEARCH QUERY
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 664: ldapsearch: command not found
- + -- --=[Port 443 opened... running tests...
- ====================================================================================•x[2019-11-18](04:01)x•
- CHECKING HTTP HEADERS AND METHODS
- ====================================================================================•x[2019-11-18](04:01)x•
- ====================================================================================•x[2019-11-18](04:01)x•
- DISPLAYING META GENERATOR TAGS
- ====================================================================================•x[2019-11-18](04:01)x•
- ====================================================================================•x[2019-11-18](04:01)x•
- DISPLAYING COMMENTS
- ====================================================================================•x[2019-11-18](04:01)x•
- ====================================================================================•x[2019-11-18](04:01)x•
- DISPLAYING SITE LINKS
- ====================================================================================•x[2019-11-18](04:01)x•
- ====================================================================================•x[2019-11-18](04:01)x•
- CHECKING FOR WAF
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 702: wafw00f: command not found
- ====================================================================================•x[2019-11-18](04:01)x•
- GATHERING HTTP INFO
- ====================================================================================•x[2019-11-18](04:01)x•
- modes/normal.sh: line 711: whatweb: command not found
- ====================================================================================•x[2019-11-18](04:01)x•
- files ovh ;) got brute scan by homesecurity sqaud talk shit get bruted i7cas suppodly unhitable ip === 147.135.119.218
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement