Advertisement
Kichiro

Untitled

Mar 28th, 2023
694
0
Never
1
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
JSON 4.12 KB | None | 0 0
  1. Starting Nmap 7.93 ( https://nmap.org ) at 2023-03-28 11:14 RTZ 4 (зима)
  2.  
  3. NSOCK ERROR [0.2240s] ssl_init_helper(): OpenSSL legacy provider failed to load.
  4.  
  5.  
  6.  
  7. NSE: Loaded 155 scripts for scanning.
  8.  
  9. NSE: Script Pre-scanning.
  10.  
  11. Initiating NSE at 11:14
  12.  
  13. Completed NSE at 11:14, 0.00s elapsed
  14.  
  15. Initiating NSE at 11:14
  16.  
  17. Completed NSE at 11:14, 0.00s elapsed
  18.  
  19. Initiating NSE at 11:14
  20.  
  21. Completed NSE at 11:14, 0.00s elapsed
  22.  
  23. Initiating Ping Scan at 11:14
  24.  
  25. Scanning 85.15.161.33 [4 ports]
  26.  
  27. Completed Ping Scan at 11:14, 0.01s elapsed (1 total hosts)
  28.  
  29. Initiating Parallel DNS resolution of 1 host. at 11:14
  30.  
  31. Completed Parallel DNS resolution of 1 host. at 11:14, 0.28s elapsed
  32.  
  33. Initiating SYN Stealth Scan at 11:14
  34.  
  35. Scanning 85.15.161.33 [1000 ports]
  36.  
  37. Discovered open port 23/tcp on 85.15.161.33
  38.  
  39. Discovered open port 21/tcp on 85.15.161.33
  40.  
  41. Discovered open port 80/tcp on 85.15.161.33
  42.  
  43. Discovered open port 53/tcp on 85.15.161.33
  44.  
  45. Discovered open port 22/tcp on 85.15.161.33
  46.  
  47. Discovered open port 8291/tcp on 85.15.161.33
  48.  
  49. Discovered open port 2000/tcp on 85.15.161.33
  50.  
  51. Completed SYN Stealth Scan at 11:14, 0.09s elapsed (1000 total ports)
  52.  
  53. Initiating Service scan at 11:14
  54.  
  55. Scanning 7 services on 85.15.161.33
  56.  
  57. Completed Service scan at 11:17, 156.25s elapsed (7 services on 1 host)
  58.  
  59. Initiating OS detection (try #1) against 85.15.161.33
  60.  
  61. Initiating Traceroute at 11:17
  62.  
  63. Completed Traceroute at 11:17, 0.02s elapsed
  64.  
  65. Initiating Parallel DNS resolution of 1 host. at 11:17
  66.  
  67. Completed Parallel DNS resolution of 1 host. at 11:17, 0.11s elapsed
  68.  
  69. NSE: Script scanning 85.15.161.33.
  70.  
  71. Initiating NSE at 11:17
  72.  
  73. Completed NSE at 11:17, 14.29s elapsed
  74.  
  75. Initiating NSE at 11:17
  76.  
  77. Completed NSE at 11:17, 1.03s elapsed
  78.  
  79. Initiating NSE at 11:17
  80.  
  81. Completed NSE at 11:17, 0.00s elapsed
  82.  
  83. Nmap scan report for 85.15.161.33
  84.  
  85. Host is up (0.00031s latency).
  86.  
  87. Not shown: 993 closed tcp ports (reset)
  88.  
  89. PORT     STATE SERVICE        VERSION
  90.  
  91. 21/tcp   open  ftp            MikroTik router ftpd 6.48.6
  92.  
  93. | ftp-syst:
  94.  
  95. |_  SYST: UNIX MikroTik 6.48.6
  96.  
  97. 22/tcp   open  ssh            MikroTik RouterOS sshd (protocol 2.0)
  98.  
  99. | ssh-hostkey:
  100.  
  101. |   1024 8b5d05f1fbd48d95355f643f189b0cf3 (DSA)
  102.  
  103. |_  2048 3e28523035afc7febb393c04adb42a2f (RSA)
  104.  
  105. 23/tcp   open  telnet         Linux telnetd
  106.  
  107. 53/tcp   open  domain         (generic dns response: NOTIMP)
  108.  
  109. 80/tcp   open  http           MikroTik router config httpd
  110.  
  111. |_http-favicon: Unknown favicon MD5: 77B2F4C09890AB658A72C4BAD8C1077B
  112.  
  113. | http-robots.txt: 1 disallowed entry
  114.  
  115. |_/
  116.  
  117. |_http-title: RouterOS router configuration page
  118.  
  119. | http-methods:
  120.  
  121. |_  Supported Methods: GET HEAD
  122.  
  123. 2000/tcp open  bandwidth-test MikroTik bandwidth-test server
  124.  
  125. 8291/tcp open  unknown
  126.  
  127. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  128.  
  129. SF-Port53-TCP:V=7.93%I=7%D=3/28%Time=642285E5%P=i686-pc-windows-windows%r(
  130.  
  131. SF:DNSVersionBindReqTCP,E,"\0\x0c\0\x06\x81\x84\0\0\0\0\0\0\0\0");
  132.  
  133. Device type: general purpose
  134.  
  135. Running: Linux 2.6.X|3.X
  136.  
  137. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
  138.  
  139. OS details: Linux 2.6.32 - 3.13
  140.  
  141. Uptime guess: 0.026 days (since Tue Mar 28 10:39:35 2023)
  142.  
  143. Network Distance: 1 hop
  144.  
  145. TCP Sequence Prediction: Difficulty=256 (Good luck!)
  146.  
  147. IP ID Sequence Generation: All zeros
  148.  
  149. Service Info: Host: RouterOS; OSs: Linux, RouterOS; Device: router; CPE: cpe:/o:mikrotik:routeros, cpe:/o:linux:linux_kernel
  150.  
  151.  
  152.  
  153. TRACEROUTE (using port 1720/tcp)
  154.  
  155. HOP RTT     ADDRESS
  156.  
  157. 1   0.00 ms 85.15.161.33
  158.  
  159.  
  160.  
  161. NSE: Script Post-scanning.
  162.  
  163. Initiating NSE at 11:17
  164.  
  165. Completed NSE at 11:17, 0.00s elapsed
  166.  
  167. Initiating NSE at 11:17
  168.  
  169. Completed NSE at 11:17, 0.00s elapsed
  170.  
  171. Initiating NSE at 11:17
  172.  
  173. Completed NSE at 11:17, 0.00s elapsed
  174.  
  175. Read data files from: C:\Program Files (x86)\Nmap
  176.  
  177. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  178.  
  179. Nmap done: 1 IP address (1 host up) scanned in 174.22 seconds
  180.  
  181.            Raw packets sent: 1039 (46.550KB) | Rcvd: 1024 (41.666KB)
  182.  
  183.  
Advertisement
Comments
Add Comment
Please, Sign In to add comment
Advertisement