Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- =======================================================================================================================================
- Hostname wre.gov.sd ISP HostDime.com, Inc.
- Continent North America Flag
- US
- Country United States Country Code US
- Region Florida Local time 01 May 2019 23:52 EDT
- City Orlando Postal Code 32826
- IP Address 138.128.160.2 Latitude 28.581
- Longitude -81.189
- =======================================================================================================================================
- #######################################################################################################################################
- > wre.gov.sd
- Server: 38.132.106.139
- Address: 38.132.106.139#53
- Non-authoritative answer:
- Name: wre.gov.sd
- Address: 138.128.160.2
- >
- #######################################################################################################################################
- HostIP:138.128.160.2
- HostName:wre.gov.sd
- Gathered Inet-whois information for 138.128.160.2
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 138.128.144.0 - 138.130.255.255
- netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
- descr: IPv4 address block not managed by the RIPE NCC
- remarks: ------------------------------------------------------
- remarks:
- remarks: For registration information,
- remarks: you can consult the following sources:
- remarks:
- remarks: IANA
- remarks: http://www.iana.org/assignments/ipv4-address-space
- remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
- remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
- remarks:
- remarks: AFRINIC (Africa)
- remarks: http://www.afrinic.net/ whois.afrinic.net
- remarks:
- remarks: APNIC (Asia Pacific)
- remarks: http://www.apnic.net/ whois.apnic.net
- remarks:
- remarks: ARIN (Northern America)
- remarks: http://www.arin.net/ whois.arin.net
- remarks:
- remarks: LACNIC (Latin America and the Carribean)
- remarks: http://www.lacnic.net/ whois.lacnic.net
- remarks:
- remarks: ------------------------------------------------------
- country: EU # Country is really world wide
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- status: ALLOCATED UNSPECIFIED
- mnt-by: RIPE-NCC-HM-MNT
- created: 2019-01-07T10:49:49Z
- last-modified: 2019-01-07T10:49:49Z
- source: RIPE
- role: Internet Assigned Numbers Authority
- address: see http://www.iana.org.
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- nic-hdl: IANA1-RIPE
- remarks: For more information on IANA services
- remarks: go to IANA web site at http://www.iana.org.
- mnt-by: RIPE-NCC-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2001-09-22T09:31:27Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.93.2 (BLAARKOP)
- Gathered Inic-whois information for wre.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Error: Unable to connect - Invalid Host
- ERROR: Connection to InicWhois Server sd.whois-servers.net failed
- close error
- Gathered Netcraft information for wre.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Retrieving Netcraft.com information for wre.gov.sd
- Netcraft.com Information gathered
- Gathered Subdomain information for wre.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 possible subdomain(s) for host wre.gov.sd, Searched 0 pages containing 0 results
- Gathered E-Mail information for wre.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- Searching Google.com:80...
- Searching Altavista.com:80...
- Found 0 E-Mail(s) for host wre.gov.sd, Searched 0 pages containing 0 results
- Gathered TCP Port information for 138.128.160.2
- ---------------------------------------------------------------------------------------------------------------------------------------
- Port State
- 21/tcp open
- 53/tcp open
- 80/tcp open
- 110/tcp open
- 143/tcp open
- Portscan Finished: Scanned 150 ports, 4 ports were in state closed
- #######################################################################################################################################
- [i] Scanning Site: http://wre.gov.sd
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title: وزارة الموارد المائية والري والكهرباء |
- [+] IP address: 138.128.160.2
- [+] Web Server: Could Not Detect
- [+] CMS: WordPress
- [+] Cloudflare: Not Detected
- [+] Robots File: Found
- -------------[ contents ]----------------
- User-agent: *
- Disallow: /wp-admin/
- Allow: /wp-admin/admin-ajax.php
- -----------[end of contents]-------------
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 138.128.160.2
- [i] Country: United States
- [i] State: Florida
- [i] City: Orlando
- [i] Latitude: 28.5807
- [i] Longitude: -81.1893
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 200 OK
- [i] Date: Thu, 02 May 2019 04:19:06 GMT
- [i] X-Powered-By: PHP/5.6.40
- [i] Link: <http://wre.gov.sd/wp-json/>; rel="https://api.w.org/"
- [i] Set-Cookie: qtrans_front_language=ar; expires=Fri, 01-May-2020 04:19:06 GMT; Max-Age=31536000; path=/
- [i] Vary: Accept-Encoding
- [i] Referrer-Policy: no-referrer-when-downgrade
- [i] Content-Type: text/html; charset=UTF-8
- [i] Connection: close
- D N S L O O K U P
- =======================================================================================================================================
- wre.gov.sd. 14399 IN TXT "v=spf1 +a +mx +ip4:66.7.212.159 ?all"
- wre.gov.sd. 14399 IN MX 0 wre.gov.sd.
- wre.gov.sd. 21599 IN SOA ns1.click-grafix.com. karouri.gmail.com. 2019031803 3600 7200 1209600 86400
- wre.gov.sd. 21599 IN NS ns1.click-grafix.com.
- wre.gov.sd. 21599 IN NS ns2.click-grafix.com.
- wre.gov.sd. 14399 IN A 138.128.160.2
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 138.128.160.2
- Network = 138.128.160.2 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 138.128.160.2 - 138.128.160.2 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 04:19 UTC
- Nmap scan report for wre.gov.sd (138.128.160.2)
- Host is up (0.034s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp closed ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.25 seconds
- #######################################################################################################################################
- [?] Enter the target: example( http://domain.com )
- http://wre.gov.sd/
- [!] IP Address : 138.128.160.2
- [!] wre.gov.sd doesn't seem to use a CMS
- [+] Honeypot Probabilty: 30%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for wre.gov.sd
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/wre.gov.sd
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp closed ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.28 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns1.click-grafix.com. (138.128.160.3) AS33182 HostDime.com, Inc. United States
- ns2.click-grafix.com. (138.128.160.4) AS33182 HostDime.com, Inc. United States
- [+] MX Records
- 0 (138.128.160.2) AS33182 HostDime.com, Inc. United States
- [+] Host Records (A)
- wre.gov.sdHTTP: (server.click-grafix.com) (138.128.160.2) AS33182 HostDime.com, Inc. United States
- [+] TXT Records
- "v=spf1 +a +mx +ip4:66.7.212.159 ?all"
- [+] DNS Map: https://dnsdumpster.com/static/map/re.gov.sd.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- [+] Emails found:
- ---------------------------------------------------------------------------------------------------------------------------------------
- info@wre.gov.sd
- musa@wre.gov.sd
- tabita.shokai@wre.gov.sd
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 138.128.160.2:www.wre.gov.sd
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- 138.128.160.2 click.sd
- 138.128.160.2 paradisehotel
- 138.128.160.2 mahgoubsons
- 138.128.160.2 sudanports.gov.sd
- 138.128.160.2 www.apg-sd.com
- 138.128.160.2 www.radmed
- 138.128.160.2 sudapet
- 138.128.160.2 bashayerpl.com
- 138.128.160.2 raheeg
- 138.128.160.2 saria
- 138.128.160.2 www.ariab
- 138.128.160.2 www.sudanpile.com
- 138.128.160.2 fasrc.org
- 138.128.160.2 mohe.gov.sd
- 138.128.160.2 aou.edu.sd
- 138.128.160.2 wre.gov.sd
- 138.128.160.2 iec.gov.sd
- 138.128.160.2 www.tpsudan.gov.sd
- 138.128.160.2 saudisb.sd
- 138.128.160.2 sudapost.sd
- 138.128.160.2 www.mofdgoia.gov.sd
- 138.128.160.2 www.ssia.sd
- #######################################################################################################################################
- Enter Address Website = wre.gov.sd
- Reversing IP With HackTarget 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] 138.128.160.2
- [+] aacpd.org
- [+] aayan.com.qa
- [+] abanos.net
- [+] abdeenandco.com
- [+] adding-sd.com
- [+] advocatemakki.com
- [+] adyagroup.net
- [+] agrogate-holdings.com
- [+] ahqsudan.com
- [+] alanfalgroup.com
- [+] alanfaljabra.com
- [+] albadaael.com
- [+] albarakafinancial.com
- [+] alfala.com
- [+] alitimadgroup.com
- [+] aljazeerabank.com.sd
- [+] almadadgroup.com
- [+] almamoonoil.com
- [+] aloaloa.com
- [+] alomergroup.com
- [+] alrawabi.yassirkambalgroup.com
- [+] alsundusiamedical.com
- [+] alwatanyia.com
- [+] alwathbagroup.com
- [+] alzawaya-medical.com
- [+] anpm.co
- [+] aou.edu.sd
- [+] apg-sd.com
- [+] app.advocatemakki.com
- [+] apple-login.org.rakhie.net
- [+] arabiawork.com
- [+] arech.apg-sd.com
- [+] arenboutique.com
- [+] ariabmining.net
- [+] ar.nileuniversity-edu.com
- [+] aseel.yassirkambalgroup.com
- [+] aseelcomplex.yassirkambalgroup.com
- [+] ashrafelsharif.com
- [+] audit.gov.sd
- [+] badawi.alzawaya-medical.com
- [+] bajrawiafab.com
- [+] bargos.apg-sd.com
- [+] basma-ocf.org
- [+] beautyconceptlounge.com
- [+] benzcenter.net
- [+] berigdar.berigdargroup.com
- [+] berigdar.com
- [+] berigdargroup.com
- [+] berimalegal.com
- [+] bivetsud.com
- [+] bmcproject.net
- [+] brandavenue.net
- [+] casiexpress.net
- [+] cctctraining.com
- [+] citi.online.yam-cdc.com
- [+] clarionlaserclinic.ie
- [+] click.sd
- [+] clickgrafix.co
- [+] clicksd.info
- [+] click-grafix.com
- [+] codon-med.com
- [+] conference.sudanesephysicians.org
- [+] cpanel.aacpd.org
- [+] cpanel.aayan.com.qa
- [+] cpanel.abanos.net
- [+] cpanel.abdeenandco.com
- [+] cpanel.adyagroup.net
- [+] cpanel.ahqsudan.com
- [+] cpanel.alanfalgroup.com
- [+] cpanel.alanfaljabra.com
- [+] cpanel.albadaael.com
- [+] cpanel.albarakafinancial.com
- [+] cpanel.alfala.com
- [+] cpanel.alitimadgroup.com
- [+] cpanel.almadadgroup.com
- [+] cpanel.almamoonoil.com
- [+] cpanel.aloaloa.com
- [+] cpanel.alomergroup.com
- [+] cpanel.alsundusiamedical.com
- [+] cpanel.alwatanyia.com
- [+] cpanel.alwathbagroup.com
- [+] cpanel.anpm.co
- [+] cpanel.ariabmining.net
- [+] cpanel.ashrafelsharif.com
- [+] cpanel.bajrawiafab.com
- [+] cpanel.beautyconceptlounge.com
- [+] cpanel.benzcenter.net
- [+] cpanel.berigdargroup.com
- [+] cpanel.berigdar.com
- [+] cpanel.berimalegal.com
- [+] cpanel.bivetsud.com
- [+] cpanel.bmcproject.net
- [+] cpanel.brandavenue.net
- [+] cpanel.casiexpress.net
- [+] cpanel.cctctraining.com
- [+] cpanel.clarionlaserclinic.ie
- [+] cpanel.clickgrafix.co
- [+] cpanel.clicksd.info
- [+] cpanel.dallahpharma.net
- [+] cpanel.dandaradentalcenter.com
- [+] cpanel.difafvillage.com
- [+] cpanel.dirnour.com
- [+] cpanel.ecogroupsd.com
- [+] cpanel.eims.ae
- [+] cpanel.elgadal.com
- [+] cpanel.elitihadlogistics.com
- [+] cpanel.elprincesudan.com
- [+] cpanel.eltagtrading.com
- [+] cpanel.emitradingco.com
- [+] cpanel.fasrc.org
- [+] cpanel.forwomenbywomen.org
- [+] cpanel.gdsudan.com
- [+] cpanel.giadservices.com
- [+] cpanel.higleig.com
- [+] cpanel.hishamkarouri.com
- [+] cpanel.hopemedicalsd.com
- [+] cpanel.ideagp.com
- [+] cpanel.indonileexport.com
- [+] cpanel.indonile.com
- [+] cpanel.ingawetrading.com
- [+] cpanel.jubaauto.com
- [+] cpanel.ktcesudan.com
- [+] cpanel.ladconsult.com
- [+] cpanel.lanjico.com
- [+] cpanel.lowcosttravelcenter.com
- [+] cpanel.lulamab.com
- [+] cpanel.lunatusmed.com
- [+] cpanel.mahgoubsons.com
- [+] cpanel.mamedmedical.com
- [+] cpanel.marwacoenterprises.com
- [+] cpanel.medanico.com
- [+] cpanel.mieragspace.com
- [+] cpanel.moontrade.net
- [+] cpanel.mssmanal.com
- [+] cpanel.mudalala.qa
- [+] cpanel.musanadaholding.com
- [+] cpanel.nagi.photo
- [+] cpanel.nilecement.org
- [+] cpanel.nisosd.com
- [+] cpanel.niss.tech
- [+] cpanel.nlicfinance.com
- [+] cpanel.npetroleum.com
- [+] cpanel.nuspetro.com
- [+] cpanel.olgaecs.com
- [+] cpanel.osamaalgadee.com
- [+] cpanel.pawfreight.com
- [+] cpanel.petroall.net
- [+] cpanel.radmedco.com
- [+] cpanel.raheeg.com
- [+] cpanel.rakhie.net
- [+] cpanel.rcctsd.com
- [+] cpanel.rocketeng.net
- [+] cpanel.sabintod.com
- [+] cpanel.sangsl.com
- [+] cpanel.scmsltd.com
- [+] cpanel.senahypermarket.com
- [+] cpanel.shakak.org
- [+] cpanel.shirouqpaints.net
- [+] cpanel.shoyum.com
- [+] cpanel.sinnarshipping.com
- [+] cpanel.skhcsudan.com
- [+] cpanel.smacosd.com
- [+] cpanel.srptechnology.com
- [+] cpanel.stiltgroup.org
- [+] cpanel.sudanbcisd.net
- [+] cpanel.sudanesephysicians.org
- [+] cpanel.sudanpile.com
- [+] cpanel.sudanwork.com
- [+] cpanel.tawakolmedical.com
- [+] cpanel.tawseelsudan.com
- [+] cpanel.tbmlawfirm.com
- [+] cpanel.tharjatheng.com
- [+] cpanel.transways.ae
- [+] cpanel.tstmatjar.com
- [+] cpanel.vittoriopierino.com
- [+] cpanel.wgarasud.com
- [+] cpanel.yasminycl.com
- [+] cpanel.yassirkambalgroup.com
- [+] cpanel.yathribyp.com
- [+] cpanel.zawayabricks.com
- [+] cpanel.adding-sd.com
- [+] cpanel.agrogate-holdings.com
- [+] cpanel.alzawaya-medical.com
- [+] cpanel.apg-sd.com
- [+] cpanel.basma-ocf.org
- [+] cpanel.click-grafix.com
- [+] cpanel.codon-med.com
- [+] cpanel.crimsonlights-sd.com
- [+] cpanel.das-diesel.com
- [+] cpanel.elmohandis-paints.com
- [+] cpanel.etegahat-ap.com
- [+] cpanel.extra-pharma.com
- [+] cpanel.farha-sd.com
- [+] cpanel.flynas-sudan.com
- [+] cpanel.focusschool-sd.com
- [+] cpanel.geocad-sd.com
- [+] cpanel.gladiator-bdc.com
- [+] cpanel.gpo-sd.com
- [+] cpanel.hamza-farm.com
- [+] cpanel.hcs-sd.com
- [+] cpanel.ideal-sdn.com
- [+] cpanel.khartoum-int.net
- [+] cpanel.kmc-sd.com
- [+] cpanel.maak-sd.com
- [+] cpanel.manar-group.com
- [+] cpanel.mechatronic-sd.com
- [+] cpanel.medicare-sd.com
- [+] cpanel.medpharma-sd.com
- [+] cpanel.nileuniversity-edu.com
- [+] cpanel.numberone-sd.com
- [+] cpanel.oit-sd.com
- [+] cpanel.osool-sd.com
- [+] cpanel.paradisehotels-sd.com
- [+] cpanel.pts-sd.com
- [+] cpanel.rittal-sd.com
- [+] cpanel.skyart-sd.com
- [+] cpanel.soed-sd.org
- [+] cpanel.summit-schools.com
- [+] cpanel.supergeneral-sd.com
- [+] cpanel.tanglewood-sd.com
- [+] cpanel.whitewaters-sd.com
- [+] cpanel.yam-cdc.com
- [+] crimsonlights-sd.com
- [+] dallahpharma.alwathbagroup.com
- [+] dallahpharma.net
- [+] dandaradentalcenter.com
- [+] das-diesel.com
- [+] design.alwatanyia.com
- [+] difafvillage.com
- [+] digitalmarketingafrica.net
- [+] dindir.higleig.com
- [+] dirnour.com
- [+] dps.com.sd
- [+] easyhotel.advocatemakki.com
- [+] ecogroupsd.com
- [+] edge.ideagp.com
- [+] eims.ae
- [+] elgadal.com
- [+] elitihadlogistics.com
- [+] elmohandis-paints.com
- [+] elprincesudan.com
- [+] eltagtrading.com
- [+] emitradingco.com
- [+] engcouncil.sd
- [+] etegahat-ap.com
- [+] exams.nileuniversity-edu.com
- [+] extra-pharma.com
- [+] farha-sd.com
- [+] farha-sd.tanglewood-sd.com
- [+] fasrc.org
- [+] flynas-sudan.com
- [+] focusschool-sd.com
- [+] forwomenbywomen.org
- [+] fresh.yassirkambalgroup.com
- [+] gadc01.goldenarrow.sd
- [+] gdsudan.com
- [+] geocad-sd.com
- [+] giadservices.com
- [+] gladiator-bdc.com
- [+] goldenarrow.sd
- [+] gpo-sd.com
- [+] green.yassirkambalgroup.com
- [+] hamza-farm.com
- [+] hcs-sd.com
- [+] higleig.com
- [+] hopemedicalsd.com
- [+] ideagp.com
- [+] ideal-sdn.com
- [+] iec.gov.sd
- [+] indonile.com
- [+] indonileexport.com
- [+] ingawetrading.com
- [+] it.alanfalgroup.com
- [+] jubaauto.com
- [+] kambalexport.com
- [+] khartoum-int.net
- [+] khmedical.edu.sd
- [+] kmc-sd.com
- [+] ktcesudan.com
- [+] ladconsult.com
- [+] lanjico.com
- [+] lowcosttravelcenter.com
- [+] lulamab.com
- [+] lunatusmed.com
- [+] mahgoubsons.com
- [+] mail.pawfreight.com
- [+] mamedmedical.com
- [+] manar-group.com
- [+] marwacoenterprises.com
- [+] mdisam.paradisehotels-sd.com
- [+] mechatronic-sd.com
- [+] med.gov.sd
- [+] medanico.com
- [+] medicare-sd.com
- [+] medpharma-sd.com
- [+] mieragspace.com
- [+] milestonesd.com
- [+] mohe.gov.sd
- [+] moodle.nileuniversity-edu.com
- [+] moontrade.net
- [+] mssmanal.com
- [+] mudalala.qa
- [+] musanadaholding.com
- [+] nagi.photo
- [+] nilecement.org
- [+] nileuniversity-edu.com
- [+] nisosd.com
- [+] niss.tech
- [+] nlicfinance.com
- [+] npetroleum.com
- [+] numberone-sd.com
- [+] nuspetro.com
- [+] oau.edu.sd
- [+] oit-sd.com
- [+] olgaecs.com
- [+] omiga.yassirkambalgroup.com
- [+] openskies247.com
- [+] osamaalgadee.com
- [+] osool-sd.com
- [+] owner.advocatemakki.com
- [+] paradisehotels-sd.com
- [+] pawfreight.com
- [+] petroall.net
- [+] portal.iec.gov.sd
- [+] powerblue.yassirkambalgroup.com
- [+] pts-sd.com
- [+] radmedco.com
- [+] raheeg.com
- [+] rakhie.net
- [+] rcctsd.com
- [+] reports.lowcosttravelcenter.com
- [+] rikaz.sd
- [+] rittal-sd.com
- [+] rocketeng.net
- [+] rotana.mechatronic-sd.com
- [+] sabintod.com
- [+] saliglobal.org
- [+] sangsl.com
- [+] saria.sd
- [+] sarrealways.com
- [+] saudisb.sd
- [+] scmsltd.com
- [+] secure-paypal.org.rakhie.net
- [+] senahypermarket.com
- [+] server2.click-grafix.com
- [+] server.click-grafix.com
- [+] sgsuae.com
- [+] shakak.org
- [+] shirouqpaints.net
- [+] shoyum.com
- [+] sidcotel.sd
- [+] sinnarshipping.com
- [+] skhcsudan.com
- [+] skyart-sd.com
- [+] smacosd.com
- [+] soed-sd.org
- [+] sonic.yassirkambalgroup.com
- [+] srptechnology.com
- [+] ssia.sd
- [+] stiltgroup.org
- [+] students.nileuniversity-edu.com
- [+] sudanbcisd.net
- [+] sudanesephysicians.org
- [+] sudanpile.com
- [+] sudanports.gov.sd
- [+] sudanwork.com
- [+] sudapet.sd
- [+] sudapost.sd
- [+] summit-schools.com
- [+] supergeneral-sd.com
- [+] tadamonbank-sd.com
- [+] talawiet.org.sd
- [+] tanglewood-sd.com
- [+] tawakolmedical.com
- [+] tbmlawfirm.com
- [+] test.almamoonoil.com
- [+] test.mechatronic-sd.com
- [+] tharjatheng.com
- [+] tpsudan.gov.sd
- [+] transways.ae
- [+] tstmatjar.com
- [+] vittoriopierino.com
- [+] webdisk.aacpd.org
- [+] webdisk.aayan.com.qa
- [+] webdisk.abanos.net
- [+] webdisk.abdeenandco.com
- [+] webdisk.advocatemakki.com
- [+] webdisk.adyagroup.net
- [+] webdisk.ahqsudan.com
- [+] webdisk.alanfalgroup.com
- [+] webdisk.alanfaljabra.com
- [+] webdisk.albadaael.com
- [+] webdisk.albarakafinancial.com
- [+] webdisk.alfala.com
- [+] webdisk.alitimadgroup.com
- [+] webdisk.almadadgroup.com
- [+] webdisk.almamoonoil.com
- [+] webdisk.aloaloa.com
- [+] webdisk.alomergroup.com
- [+] webdisk.alsundusiamedical.com
- [+] webdisk.alwatanyia.com
- [+] webdisk.alwathbagroup.com
- [+] webdisk.anpm.co
- [+] webdisk.arenboutique.com
- [+] webdisk.ariabmining.net
- [+] webdisk.ashrafelsharif.com
- [+] webdisk.bajrawiafab.com
- [+] webdisk.beautyconceptlounge.com
- [+] webdisk.benzcenter.net
- [+] webdisk.berigdargroup.com
- [+] webdisk.berigdar.com
- [+] webdisk.berimalegal.com
- [+] webdisk.bivetsud.com
- [+] webdisk.bmcproject.net
- [+] webdisk.brandavenue.net
- [+] webdisk.casiexpress.net
- [+] webdisk.cctctraining.com
- [+] webdisk.clarionlaserclinic.ie
- [+] webdisk.clickgrafix.co
- [+] webdisk.clicksd.info
- [+] webdisk.dallahpharma.net
- [+] webdisk.dandaradentalcenter.com
- [+] webdisk.difafvillage.com
- [+] webdisk.dirnour.com
- [+] webdisk.ecogroupsd.com
- [+] webdisk.eims.ae
- [+] webdisk.elgadal.com
- [+] webdisk.elitihadlogistics.com
- [+] webdisk.elprincesudan.com
- [+] webdisk.eltagtrading.com
- [+] webdisk.emitradingco.com
- [+] webdisk.fasrc.org
- [+] webdisk.forwomenbywomen.org
- [+] webdisk.gdsudan.com
- [+] webdisk.giadservices.com
- [+] webdisk.higleig.com
- [+] webdisk.hishamkarouri.com
- [+] webdisk.hopemedicalsd.com
- [+] webdisk.ideagp.com
- [+] webdisk.indonileexport.com
- [+] webdisk.indonile.com
- [+] webdisk.ingawetrading.com
- [+] webdisk.jubaauto.com
- [+] webdisk.ktcesudan.com
- [+] webdisk.ladconsult.com
- [+] webdisk.lanjico.com
- [+] webdisk.lowcosttravelcenter.com
- [+] webdisk.lulamab.com
- [+] webdisk.lunatusmed.com
- [+] webdisk.mahgoubsons.com
- [+] webdisk.mamedmedical.com
- [+] webdisk.marwacoenterprises.com
- [+] webdisk.medanico.com
- [+] webdisk.mieragspace.com
- [+] webdisk.moontrade.net
- [+] webdisk.mssmanal.com
- [+] webdisk.mudalala.qa
- [+] webdisk.musanadaholding.com
- [+] webdisk.nagi.photo
- [+] webdisk.nilecement.org
- [+] webdisk.nisosd.com
- [+] webdisk.niss.tech
- [+] webdisk.nlicfinance.com
- [+] webdisk.npetroleum.com
- [+] webdisk.nuspetro.com
- [+] webdisk.olgaecs.com
- [+] webdisk.osamaalgadee.com
- [+] webdisk.pawfreight.com
- [+] webdisk.petroall.net
- [+] webdisk.radmedco.com
- [+] webdisk.raheeg.com
- [+] webdisk.rakhie.net
- [+] webdisk.rcctsd.com
- [+] webdisk.rocketeng.net
- [+] webdisk.sabintod.com
- [+] webdisk.sangsl.com
- [+] webdisk.scmsltd.com
- [+] webdisk.senahypermarket.com
- [+] webdisk.shakak.org
- [+] webdisk.shirouqpaints.net
- [+] webdisk.shoyum.com
- [+] webdisk.sinnarshipping.com
- [+] webdisk.skhcsudan.com
- [+] webdisk.smacosd.com
- [+] webdisk.srptechnology.com
- [+] webdisk.stiltgroup.org
- [+] webdisk.sudanbcisd.net
- [+] webdisk.sudanesephysicians.org
- [+] webdisk.sudanpile.com
- [+] webdisk.sudanwork.com
- [+] webdisk.tawakolmedical.com
- [+] webdisk.tawseelsudan.com
- [+] webdisk.tbmlawfirm.com
- [+] webdisk.tharjatheng.com
- [+] webdisk.transways.ae
- [+] webdisk.tstmatjar.com
- [+] webdisk.vittoriopierino.com
- [+] webdisk.wgarasud.com
- [+] webdisk.yasminycl.com
- [+] webdisk.yassirkambalgroup.com
- [+] webdisk.yathribyp.com
- [+] webdisk.zawayabricks.com
- [+] webdisk.adding-sd.com
- [+] webdisk.agrogate-holdings.com
- [+] webdisk.alzawaya-medical.com
- [+] webdisk.apg-sd.com
- [+] webdisk.basma-ocf.org
- [+] webdisk.click-grafix.com
- [+] webdisk.codon-med.com
- [+] webdisk.crimsonlights-sd.com
- [+] webdisk.das-diesel.com
- [+] webdisk.elmohandis-paints.com
- [+] webdisk.etegahat-ap.com
- [+] webdisk.extra-pharma.com
- [+] webdisk.farha-sd.com
- [+] webdisk.flynas-sudan.com
- [+] webdisk.focusschool-sd.com
- [+] webdisk.geocad-sd.com
- [+] webdisk.gladiator-bdc.com
- [+] webdisk.gpo-sd.com
- [+] webdisk.hamza-farm.com
- [+] webdisk.hcs-sd.com
- [+] webdisk.ideal-sdn.com
- [+] webdisk.khartoum-int.net
- [+] webdisk.kmc-sd.com
- [+] webdisk.maak-sd.com
- [+] webdisk.manar-group.com
- [+] webdisk.mechatronic-sd.com
- [+] webdisk.medicare-sd.com
- [+] webdisk.medpharma-sd.com
- [+] webdisk.nileuniversity-edu.com
- [+] webdisk.numberone-sd.com
- [+] webdisk.oit-sd.com
- [+] webdisk.osool-sd.com
- [+] webdisk.paradisehotels-sd.com
- [+] webdisk.pts-sd.com
- [+] webdisk.rittal-sd.com
- [+] webdisk.skyart-sd.com
- [+] webdisk.soed-sd.org
- [+] webdisk.summit-schools.com
- [+] webdisk.supergeneral-sd.com
- [+] webdisk.tanglewood-sd.com
- [+] webdisk.whitewaters-sd.com
- [+] webdisk.yam-cdc.com
- [+] webmail.aacpd.org
- [+] webmail.aayan.com.qa
- [+] webmail.abanos.net
- [+] webmail.abdeenandco.com
- [+] webmail.advocatemakki.com
- [+] webmail.adyagroup.net
- [+] webmail.ahqsudan.com
- [+] webmail.alanfalgroup.com
- [+] webmail.alanfaljabra.com
- [+] webmail.albadaael.com
- [+] webmail.albarakafinancial.com
- [+] webmail.alfala.com
- [+] webmail.alitimadgroup.com
- [+] webmail.almadadgroup.com
- [+] webmail.almamoonoil.com
- [+] webmail.aloaloa.com
- [+] webmail.alomergroup.com
- [+] webmail.alsundusiamedical.com
- [+] webmail.alwatanyia.com
- [+] webmail.alwathbagroup.com
- [+] webmail.anpm.co
- [+] webmail.arenboutique.com
- [+] webmail.ariabmining.net
- [+] webmail.ashrafelsharif.com
- [+] webmail.bajrawiafab.com
- [+] webmail.beautyconceptlounge.com
- [+] webmail.benzcenter.net
- [+] webmail.berigdargroup.com
- [+] webmail.berigdar.com
- [+] webmail.berimalegal.com
- [+] webmail.bivetsud.com
- [+] webmail.bmcproject.net
- [+] webmail.brandavenue.net
- [+] webmail.casiexpress.net
- [+] webmail.cctctraining.com
- [+] webmail.clarionlaserclinic.ie
- [+] webmail.clickgrafix.co
- [+] webmail.clicksd.info
- [+] webmail.dallahpharma.net
- [+] webmail.dandaradentalcenter.com
- [+] webmail.difafvillage.com
- [+] webmail.ecogroupsd.com
- [+] webmail.eims.ae
- [+] webmail.elgadal.com
- [+] webmail.elitihadlogistics.com
- [+] webmail.elprincesudan.com
- [+] webmail.eltagtrading.com
- [+] webmail.emitradingco.com
- [+] webmail.fasrc.org
- [+] webmail.forwomenbywomen.org
- [+] webmail.gdsudan.com
- [+] webmail.giadservices.com
- [+] webmail.higleig.com
- [+] webmail.hishamkarouri.com
- [+] webmail.hopemedicalsd.com
- [+] webmail.ideagp.com
- [+] webmail.indonileexport.com
- [+] webmail.indonile.com
- [+] webmail.ingawetrading.com
- [+] webmail.jubaauto.com
- [+] webmail.ktcesudan.com
- [+] webmail.ladconsult.com
- [+] webmail.lanjico.com
- [+] webmail.lowcosttravelcenter.com
- [+] webmail.lulamab.com
- [+] webmail.lunatusmed.com
- [+] webmail.mahgoubsons.com
- [+] webmail.mamedmedical.com
- [+] webmail.marwacoenterprises.com
- [+] webmail.medanico.com
- [+] webmail.mieragspace.com
- [+] webmail.moontrade.net
- [+] webmail.mssmanal.com
- [+] webmail.mudalala.qa
- [+] webmail.musanadaholding.com
- [+] webmail.nagi.photo
- [+] webmail.nilecement.org
- [+] webmail.nisosd.com
- [+] webmail.niss.tech
- [+] webmail.nlicfinance.com
- [+] webmail.npetroleum.com
- [+] webmail.nuspetro.com
- [+] webmail.olgaecs.com
- [+] webmail.osamaalgadee.com
- [+] webmail.pawfreight.com
- [+] webmail.petroall.net
- [+] webmail.radmedco.com
- [+] webmail.raheeg.com
- [+] webmail.rakhie.net
- [+] webmail.rcctsd.com
- [+] webmail.rocketeng.net
- [+] webmail.sabintod.com
- [+] webmail.sangsl.com
- [+] webmail.scmsltd.com
- [+] webmail.senahypermarket.com
- [+] webmail.shakak.org
- [+] webmail.shirouqpaints.net
- [+] webmail.shoyum.com
- [+] webmail.sinnarshipping.com
- [+] webmail.skhcsudan.com
- [+] webmail.smacosd.com
- [+] webmail.srptechnology.com
- [+] webmail.stiltgroup.org
- [+] webmail.sudanbcisd.net
- [+] webmail.sudanesephysicians.org
- [+] webmail.sudanpile.com
- [+] webmail.sudanwork.com
- [+] webmail.tawakolmedical.com
- [+] webmail.tawseelsudan.com
- [+] webmail.tbmlawfirm.com
- [+] webmail.tharjatheng.com
- [+] webmail.transways.ae
- [+] webmail.tstmatjar.com
- [+] webmail.vittoriopierino.com
- [+] webmail.wgarasud.com
- [+] webmail.yasminycl.com
- [+] webmail.yassirkambalgroup.com
- [+] webmail.yathribyp.com
- [+] webmail.zawayabricks.com
- [+] webmail.adding-sd.com
- [+] webmail.agrogate-holdings.com
- [+] webmail.alzawaya-medical.com
- [+] webmail.apg-sd.com
- [+] webmail.basma-ocf.org
- [+] webmail.click-grafix.com
- [+] webmail.codon-med.com
- [+] webmail.crimsonlights-sd.com
- [+] webmail.das-diesel.com
- [+] webmail.elmohandis-paints.com
- [+] webmail.etegahat-ap.com
- [+] webmail.extra-pharma.com
- [+] webmail.farha-sd.com
- [+] webmail.flynas-sudan.com
- [+] webmail.focusschool-sd.com
- [+] webmail.geocad-sd.com
- [+] webmail.gladiator-bdc.com
- [+] webmail.gpo-sd.com
- [+] webmail.hamza-farm.com
- [+] webmail.hcs-sd.com
- [+] webmail.ideal-sdn.com
- [+] webmail.khartoum-int.net
- [+] webmail.kmc-sd.com
- [+] webmail.maak-sd.com
- [+] webmail.manar-group.com
- [+] webmail.mechatronic-sd.com
- [+] webmail.medicare-sd.com
- [+] webmail.medpharma-sd.com
- [+] webmail.nileuniversity-edu.com
- [+] webmail.numberone-sd.com
- [+] webmail.oit-sd.com
- [+] webmail.osool-sd.com
- [+] webmail.paradisehotels-sd.com
- [+] webmail.pts-sd.com
- [+] webmail.rittal-sd.com
- [+] webmail.skyart-sd.com
- [+] webmail.soed-sd.org
- [+] webmail.summit-schools.com
- [+] webmail.supergeneral-sd.com
- [+] webmail.tanglewood-sd.com
- [+] webmail.whitewaters-sd.com
- [+] webmail.yam-cdc.com
- [+] westvilledevelopers.co.za
- [+] wgarasud.com
- [+] whitewaters-sd.com
- [+] whm.click-grafix.com
- [+] wre.gov.sd
- [+] www.alrawabi.yassirkambalgroup.com
- [+] www.app.advocatemakki.com
- [+] www.aseelcomplex.yassirkambalgroup.com
- [+] www.aseel.yassirkambalgroup.com
- [+] www.berigdar.berigdargroup.com
- [+] www.conference.sudanesephysicians.org
- [+] www.dallahpharma.alwathbagroup.com
- [+] www.design.alwatanyia.com
- [+] www.dindir.higleig.com
- [+] www.easyhotel.advocatemakki.com
- [+] www.edge.ideagp.com
- [+] www.fresh.yassirkambalgroup.com
- [+] www.green.yassirkambalgroup.com
- [+] www.it.alanfalgroup.com
- [+] www.mahgoubsons.com
- [+] www.mail.pawfreight.com
- [+] www.omiga.yassirkambalgroup.com
- [+] www.owner.advocatemakki.com
- [+] www.powerblue.yassirkambalgroup.com
- [+] www.reports.lowcosttravelcenter.com
- [+] www.sonic.yassirkambalgroup.com
- [+] www.test.almamoonoil.com
- [+] www.apple-login.org.rakhie.net
- [+] www.arech.apg-sd.com
- [+] www.ar.nileuniversity-edu.com
- [+] www.badawi.alzawaya-medical.com
- [+] www.bargos.apg-sd.com
- [+] www.citi.online.yam-cdc.com
- [+] www.exams.nileuniversity-edu.com
- [+] www.farha-sd.tanglewood-sd.com
- [+] www.mdisam.paradisehotels-sd.com
- [+] www.moodle.nileuniversity-edu.com
- [+] www.rotana.mechatronic-sd.com
- [+] www.secure-paypal.org.rakhie.net
- [+] www.students.nileuniversity-edu.com
- [+] www.test.mechatronic-sd.com
- [+] yam-cdc.com
- [+] yasminycl.com
- [+] yassirkambalgroup.com
- [+] yathribyp.com
- [+] zawayabricks.com
- #######################################################################################################################################
- Reverse IP With YouGetSignal 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [*] IP: 138.128.160.2
- [*] Domain: wre.gov.sd
- [*] Total Domains: 49
- [+] adding-sd.com
- [+] alfala.com
- [+] aljazeerabank.com.sd
- [+] aloaloa.com
- [+] aou.edu.sd
- [+] apg-sd.com
- [+] audit.gov.sd
- [+] bajafar.sd
- [+] benzcenter.net
- [+] click.sd
- [+] cm.sd
- [+] cpd.gov.sd
- [+] eims.ae
- [+] engcouncil.sd
- [+] giadservices.com
- [+] gpo-sd.com
- [+] iec.gov.sd
- [+] indonileexport.com
- [+] khairport.gov.sd
- [+] khmedical.edu.sd
- [+] mofdgoia.gov.sd
- [+] mohe.gov.sd
- [+] mssmanal.com
- [+] nileuniversity-edu.com
- [+] petroall.net
- [+] sahl.gov.sd
- [+] sdac.gov.sd
- [+] sidcotel.sd
- [+] ssia.sd
- [+] sudafast.edu.sd
- [+] sudan.gov.sd
- [+] sudanap.org
- [+] sudanconsumers.org
- [+] sudanports.gov.sd
- [+] sudapet.sd
- [+] sudapost.sd
- [+] tpsudan.gov.sd
- [+] wre.gov.sd
- [+] www.aljazeerabank.com.sd
- [+] www.cpd.gov.sd
- [+] www.dandaradentalcenter.com
- [+] www.goldenarrow.sd
- [+] www.iec.gov.sd
- [+] www.khmedical.edu.sd
- [+] www.mohe.gov.sd
- [+] www.studentwelfare.sd
- [+] www.sudan.gov.sd
- [+] www.sudapet.sd
- [+] www.tararealestate.sd
- #######################################################################################################################################
- Geo IP Lookup 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] IP Address: 138.128.160.2
- [+] Country: United States
- [+] State: Florida
- [+] City: Orlando
- [+] Latitude: 28.5807
- [+] Longitude: -81.1893
- #######################################################################################################################################
- Bypass Cloudflare 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [!] CloudFlare Bypass 138.128.160.2 | ftp.wre.gov.sd
- [!] CloudFlare Bypass 138.128.160.2 | cpanel.wre.gov.sd
- [!] CloudFlare Bypass 138.128.160.2 | webmail.wre.gov.sd
- [!] CloudFlare Bypass 127.0.0.1 | localhost.wre.gov.sd
- [!] CloudFlare Bypass 138.128.160.2 | mail.wre.gov.sd
- [!] CloudFlare Bypass 138.128.160.2 | www.wre.gov.sd
- [!] CloudFlare Bypass 138.128.160.2 | test.wre.gov.sd
- #######################################################################################################################################
- DNS Lookup 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] wre.gov.sd. 14399 IN TXT "v=spf1 +a +mx +ip4:66.7.212.159 ?all"
- [+] wre.gov.sd. 14399 IN MX 0 wre.gov.sd.
- [+] wre.gov.sd. 21599 IN SOA ns1.click-grafix.com. karouri.gmail.com. 2019031803 3600 7200 1209600 86400
- [+] wre.gov.sd. 21599 IN NS ns1.click-grafix.com.
- [+] wre.gov.sd. 21599 IN NS ns2.click-grafix.com.
- [+] wre.gov.sd. 14399 IN A 138.128.160.2
- #######################################################################################################################################
- Show HTTP Header 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] HTTP/1.1 200 OK
- [+] Date: Thu, 02 May 2019 04:18:51 GMT
- [+] Server: Apache
- [+] X-Powered-By: PHP/5.6.40
- [+] Link: ; rel="https://api.w.org/"
- [+] Set-Cookie: qtrans_front_language=ar; expires=Fri, 01-May-2020 04:18:51 GMT; Max-Age=31536000; path=/
- [+] Referrer-Policy: no-referrer-when-downgrade
- [+] Connection: close
- [+] Content-Type: text/html; charset=UTF-8
- #######################################################################################################################################
- Port Scan 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 04:18 UTC
- Nmap scan report for wre.gov.sd (138.128.160.2)
- Host is up (0.058s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp closed ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 2.12 seconds
- #######################################################################################################################################
- Robot.txt 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- User-agent: *
- Disallow: /wp-admin/
- Allow: /wp-admin/admin-ajax.php
- #######################################################################################################################################
- Traceroute 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Start: 2019-05-02T04:19:20+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.201 0.0% 3 0.8 3.1 0.8 6.1 2.7
- 2.|-- 45.79.12.0 0.0% 3 5.2 2.5 0.9 5.2 2.3
- 3.|-- ae-37.a01.dllstx04.us.bb.gin.ntt.net 0.0% 3 2.8 2.0 1.6 2.8 0.7
- 4.|-- ae-9.r10.dllstx09.us.bb.gin.ntt.net 0.0% 3 1.2 1.4 1.2 1.5 0.2
- 5.|-- ??? 100.0 3 0.0 0.0 0.0 0.0 0.0
- 6.|-- ae-1-8.bar1.Orlando1.Level3.net 33.3% 3 38.4 38.5 38.4 38.6 0.2
- 7.|-- HOSTDIME.bar1.Orlando1.Level3.net 0.0% 3 42.7 41.8 40.5 42.7 1.2
- 8.|-- xe-1-3-core2.orl.hostdime.com 0.0% 3 40.5 51.6 40.5 58.4 9.6
- 9.|-- server.click-grafix.com 33.3% 3 38.6 38.6 38.6 38.6 0.0
- #######################################################################################################################################
- Ping 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-05-02 04:19 UTC
- SENT (0.1110s) ICMP [104.237.144.6 > 138.128.160.2 Echo request (type=8/code=0) id=4251 seq=1] IP [ttl=64 id=5032 iplen=28 ]
- RCVD (0.3098s) ICMP [138.128.160.2 > 104.237.144.6 Echo reply (type=0/code=0) id=4251 seq=1] IP [ttl=54 id=28490 iplen=28 ]
- SENT (1.1119s) ICMP [104.237.144.6 > 138.128.160.2 Echo request (type=8/code=0) id=4251 seq=2] IP [ttl=64 id=5032 iplen=28 ]
- RCVD (1.3296s) ICMP [138.128.160.2 > 104.237.144.6 Echo reply (type=0/code=0) id=4251 seq=2] IP [ttl=54 id=28663 iplen=28 ]
- SENT (2.1137s) ICMP [104.237.144.6 > 138.128.160.2 Echo request (type=8/code=0) id=4251 seq=3] IP [ttl=64 id=5032 iplen=28 ]
- RCVD (2.3496s) ICMP [138.128.160.2 > 104.237.144.6 Echo reply (type=0/code=0) id=4251 seq=3] IP [ttl=54 id=29631 iplen=28 ]
- SENT (3.1155s) ICMP [104.237.144.6 > 138.128.160.2 Echo request (type=8/code=0) id=4251 seq=4] IP [ttl=64 id=5032 iplen=28 ]
- RCVD (3.1657s) ICMP [138.128.160.2 > 104.237.144.6 Echo reply (type=0/code=0) id=4251 seq=4] IP [ttl=54 id=30374 iplen=28 ]
- Max rtt: 235.657ms | Min rtt: 50.201ms | Avg rtt: 175.547ms
- Raw packets sent: 4 (112B) | Rcvd: 4 (184B) | Lost: 0 (0.00%)
- Nping done: 1 IP address pinged in 3.17 seconds
- #######################################################################################################################################
- Page Admin Finder 'wre.gov.sd'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Avilable Links :
- Find Page >> http://wre.gov.sd/admin/
- Find Page >> http://wre.gov.sd/admin/index.php
- Find Page >> http://wre.gov.sd/wp-login.php
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P4-3-Debian <<>> wre.gov.sd
- ;; global options: +cmd
- ;; Got answer:
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13103
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; OPT PSEUDOSECTION:
- ; EDNS: version: 0, flags:; udp: 4096
- ;; QUESTION SECTION:
- ;wre.gov.sd. IN A
- ;; ANSWER SECTION:
- wre.gov.sd. 13679 IN A 138.128.160.2
- ;; Query time: 36 msec
- ;; SERVER: 38.132.106.139#53(38.132.106.139)
- ;; WHEN: jeu mai 02 00:42:56 EDT 2019
- ;; MSG SIZE rcvd: 55
- #######################################################################################################################################
- ; <<>> DiG 9.11.5-P4-3-Debian <<>> +trace wre.gov.sd
- ;; global options: +cmd
- . 82515 IN NS m.root-servers.net.
- . 82515 IN NS e.root-servers.net.
- . 82515 IN NS k.root-servers.net.
- . 82515 IN NS b.root-servers.net.
- . 82515 IN NS c.root-servers.net.
- . 82515 IN NS l.root-servers.net.
- . 82515 IN NS h.root-servers.net.
- . 82515 IN NS d.root-servers.net.
- . 82515 IN NS j.root-servers.net.
- . 82515 IN NS f.root-servers.net.
- . 82515 IN NS g.root-servers.net.
- . 82515 IN NS a.root-servers.net.
- . 82515 IN NS i.root-servers.net.
- . 82515 IN RRSIG NS 8 0 518400 20190514170000 20190501160000 25266 . w4ssTvTC9iBkFkqxTfOYUUzNPGYa6X8OafW9aSqZemGH5DXIrB7qHOf2 5wje3SBrkIEEbDa6EfNdcwIzMOf5XhhuwfM5dnO8tKSfnKpasFHMrBHG S3ugP+fPEGuIWtol0nyjdVqcbbDtlWWLBSX6KJs/no3vGbzlAbLZJap4 0XaRFnoWJLz0kDceA8QXeuuh//zpeHCHyzv/OJ8lmPSdBeRUmMLm/Kab Lm4zG+UJSYH3HCLkUNAvDylul5uUoue3jiZTKjwK+MxjdqUQa/FyPXow gN8goiu8cUKc6OAUnWn0dV6T/cDZC5Lj0O/Oaj+9rV7nGNTETqNwhcQt JWHhqw==
- ;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 31 ms
- sd. 172800 IN NS ans2.canar.sd.
- sd. 172800 IN NS ans1.sis.sd.
- sd. 172800 IN NS ns-sd.afrinic.net.
- sd. 172800 IN NS ns1.uaenic.ae.
- sd. 172800 IN NS ans1.canar.sd.
- sd. 172800 IN NS sd.cctld.authdns.ripe.net.
- sd. 172800 IN NS ns2.uaenic.ae.
- sd. 86400 IN NSEC se. NS RRSIG NSEC
- sd. 86400 IN RRSIG NSEC 8 1 86400 20190514170000 20190501160000 25266 . RvWMl899QG/w8chpHW82ngDehj9ubgmK53QxZzcDub+gqGYHTtZSY67i Cv7IAvZb3XIHN+lbYe3c+nl3mIEzL1iSlDhtYmJtI6Z3abJBSu6S6ILk RHn3xyixJO9YMgXwGCn/TehgPbCqBE+NlI5GC9saGA5sa2UPvyMqLMTB reU28UtE5UzyyyNHGmuB0Ft6eONuuHrFfFuAAOFGyKTS9smX3kmyu78q P2Ys7Xxp2pnPefEQa54S8ZJ9tVFjoQw+VPvPQDF5IbmWUoGm6mcJj6pW CRm0JuA/UjZ2JS9HGwL64HzuZpy+M4LbCclsYG0uE9ugv0D9YPLkExN1 IpuUUg==
- ;; Received 725 bytes from 192.112.36.4#53(g.root-servers.net) in 57 ms
- ;; Received 67 bytes from 195.229.0.186#53(ns2.uaenic.ae) in 220 ms
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: wre.gov.sd
- [-] DNSSEC is not configured for wre.gov.sd
- [*] SOA ns1.click-grafix.com 138.128.160.3
- [*] NS ns1.click-grafix.com 138.128.160.3
- [*] Bind Version for 138.128.160.3 9.9.4-RedHat-9.9.4-73.el7_6
- [*] NS ns2.click-grafix.com 138.128.160.4
- [*] Bind Version for 138.128.160.4 9.9.4-RedHat-9.9.4-73.el7_6
- [*] MX wre.gov.sd 138.128.160.2
- [*] A wre.gov.sd 138.128.160.2
- [*] TXT wre.gov.sd v=spf1 +a +mx +ip4:66.7.212.159 ?all
- [*] Enumerating SRV Records
- [-] No SRV Records Found for wre.gov.sd
- [+] 0 Records Found
- #######################################################################################################################################
- [*] Processing domain wre.gov.sd
- [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
- [+] Getting nameservers
- 138.128.160.3 - ns1.click-grafix.com
- 138.128.160.4 - ns2.click-grafix.com
- [-] Zone transfer failed
- [+] TXT records found
- "v=spf1 +a +mx +ip4:66.7.212.159 ?all"
- [+] MX records found, added to target list
- 0 wre.gov.sd.
- [*] Scanning wre.gov.sd for A records
- 138.128.160.2 - wre.gov.sd
- 138.128.160.2 - cpanel.wre.gov.sd
- 138.128.160.2 - ftp.wre.gov.sd
- 127.0.0.1 - localhost.wre.gov.sd
- 138.128.160.2 - mail.wre.gov.sd
- 138.128.160.2 - test.wre.gov.sd
- 138.128.160.2 - webdisk.wre.gov.sd
- 138.128.160.2 - webmail.wre.gov.sd
- 138.128.160.2 - whm.wre.gov.sd
- 138.128.160.2 - www.wre.gov.sd
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 138.128.160.2 200 alias ftp.wre.gov.sd
- 138.128.160.2 200 host wre.gov.sd
- 127.0.0.1 host localhost.wre.gov.sd
- 138.128.160.2 200 alias mail.wre.gov.sd
- 138.128.160.2 200 host wre.gov.sd
- 138.128.160.2 200 host test.wre.gov.sd
- 138.128.160.2 301 host webmail.wre.gov.sd
- 138.128.160.2 alias www.wre.gov.sd
- 138.128.160.2 host wre.gov.sd
- #######################################################################################################################################
- [+] Testing domain
- www.wre.gov.sd 138.128.160.2
- [+] Dns resolving
- Domain name Ip address Name server
- wre.gov.sd 138.128.160.2 server.click-grafix.com
- Found 1 host(s) for wre.gov.sd
- [+] Testing wildcard
- Ok, no wildcard found.
- [+] Scanning for subdomain on wre.gov.sd
- [!] Wordlist not specified. I scannig with my internal wordlist...
- Estimated time about 59.59 seconds
- Subdomain Ip address Name server
- ftp.wre.gov.sd 138.128.160.2 server.click-grafix.com
- localhost.wre.gov.sd 127.0.0.1 localhost
- mail.wre.gov.sd 138.128.160.2 server.click-grafix.com
- test.wre.gov.sd 138.128.160.2 server.click-grafix.com
- webmail.wre.gov.sd 138.128.160.2 server.click-grafix.com
- www.wre.gov.sd 138.128.160.2 server.click-grafix.com
- #######################################################################################################################################
- =======================================================================================================================================
- | E-mails:
- | [+] E-mail Found: m@tidakada.com
- | [+] E-mail Found: sarvita@outshinesolutions.com
- | [+] E-mail Found: mailman@wre.gov.sd
- | [+] E-mail Found: info@sedc.com.sd
- | [+] E-mail Found: farisalradi@gmail.com
- | [+] E-mail Found: ray.s@letsbefamous.com
- | [+] E-mail Found: typetalk@boutrosfonts.com
- | [+] E-mail Found: mail@yoursite.com
- | [+] E-mail Found: mathewhendry@hotmail.com
- | [+] E-mail Found: webmaster@romeolab.com
- | [+] E-mail Found: info@getid3.org
- | [+] E-mail Found: by.marcis@gmail.com
- | [+] E-mail Found: info@wre.gov.sd
- | [+] E-mail Found: pat@example.com
- | [+] E-mail Found: info@wpwebshop.com
- | [+] E-mail Found: david@shellcreeper.com
- | [+] E-mail Found: pri@wre.gov.sd
- | [+] E-mail Found: david.warna@gmail.com
- | [+] E-mail Found: yaser@englize.com
- | [+] E-mail Found: lordamar@gmail.com
- | [+] E-mail Found: wordpress@blogos.dk
- | [+] E-mail Found: robert.buj@gmail.com
- | [+] E-mail Found: no@no.com
- | [+] E-mail Found: kopasof@gmail.com
- | [+] E-mail Found: kpdecker@gmail.com
- | [+] E-mail Found: jncs12@gmail.com
- =======================================================================================================================================
- | External hosts:
- | [+] External Host Found: http://www.redseastate.gov.sd
- | [+] External Host Found: http://www.nilebasin.org
- | [+] External Host Found: https://planet.wordpress.org
- | [+] External Host Found: https://developer.wordpress.org
- | [+] External Host Found: https://httpd.apache.org
- | [+] External Host Found: https://www.mysql.com
- | [+] External Host Found: https://make.wordpress.org
- | [+] External Host Found: http://matiasventura.com
- | [+] External Host Found: https://codex.wordpress.org
- | [+] External Host Found: http://html5shim.googlecode.com
- | [+] External Host Found: https://gravatar.com
- | [+] External Host Found: http://esudan.gov.sd
- | [+] External Host Found: https://"gravatar.com">Gravatar<
- | [+] External Host Found: http://www.gnu.org
- | [+] External Host Found: http://#
- | [+] External Host Found: https://github.com
- | [+] External Host Found: http://ajax.googleapis.com
- | [+] External Host Found: https://cdnjs.cloudflare.com
- | [+] External Host Found: https://wordpress.org
- | [+] External Host Found: http://www.sedc.com.sd
- | [+] External Host Found: http://www.ersad.gov.sd
- | [+] External Host Found: http://www.egezira.gov.sd
- | [+] External Host Found: http://www.nic.gov.sd
- | [+] External Host Found: http://www.sudan.gov.sd
- | [+] External Host Found: http://css3-mediaqueries-js.googlecode.com
- | [+] External Host Found: http://tools.wmflabs.org
- | [+] External Host Found: https://secure.php.net
- | [+] External Host Found: http://moc.co
- | [+] External Host Found: http://mcit.gov.sd
- | [+] External Host Found: http://ar.wikipedia.org
- | [+] External Host Found: http://www.fjajpress.com
- | [+] External Host Found: https://popup-builder.com
- | [+] External Host Found: http://www.kibfsudan.gov.sd
- | [+] External Host Found: http://erasudan.com
- | [+] External Host Found: https://maxcdn.bootstrapcdn.com
- =======================================================================================================================================
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- wre.gov.sd -----
- Host's addresses:
- __________________
- wre.gov.sd. 12007 IN A 138.128.160.2
- Name Servers:
- ______________
- ns2.click-grafix.com. 81755 IN A 138.128.160.4
- ns1.click-grafix.com. 13670 IN A 138.128.160.3
- Mail (MX) Servers:
- ___________________
- wre.gov.sd. 12007 IN A 138.128.160.2
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for wre.gov.sd on ns2.click-grafix.com ...
- Trying Zone Transfer for wre.gov.sd on ns1.click-grafix.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- ===============================================
- -=Subfinder v1.1.3 github.com/subfinder/subfinder
- ===============================================
- Running Source: Ask
- Running Source: Archive.is
- Running Source: Baidu
- Running Source: Bing
- Running Source: CertDB
- Running Source: CertificateTransparency
- Running Source: Certspotter
- Running Source: Commoncrawl
- Running Source: Crt.sh
- Running Source: Dnsdb
- Running Source: DNSDumpster
- Running Source: DNSTable
- Running Source: Dogpile
- Running Source: Exalead
- Running Source: Findsubdomains
- Running Source: Googleter
- Running Source: Hackertarget
- Running Source: Ipv4Info
- Running Source: PTRArchive
- Running Source: Sitedossier
- Running Source: Threatcrowd
- Running Source: ThreatMiner
- Running Source: WaybackArchive
- Running Source: Yahoo
- Running enumeration on wre.gov.sd
- dnsdb: Unexpected return status 503
- dogpile: Get https://www.dogpile.com/search/web?q=wre.gov.sd&qsi=1: EOF
- waybackarchive: parse http://web.archive.org/cdx/search/cdx?url=*.wre.gov.sd/*&output=json&fl=original&collapse=urlkey&page=: net/url: invalid control character in URL
- Starting Bruteforcing of wre.gov.sd with 9985 words
- Total 11 Unique subdomains found for wre.gov.sd
- .wre.gov.sd
- cpanel.wre.gov.sd
- ftp.wre.gov.sd
- localhost.wre.gov.sd
- mail.wre.gov.sd
- test.wre.gov.sd
- webdisk.wre.gov.sd
- webmail.wre.gov.sd
- whm.wre.gov.sd
- www.wre.gov.sd
- www.wre.gov.sd
- #######################################################################################################################################
- [*] Processing domain wre.gov.sd
- [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
- [+] Getting nameservers
- 138.128.160.3 - ns1.click-grafix.com
- 138.128.160.4 - ns2.click-grafix.com
- [-] Zone transfer failed
- [+] TXT records found
- "v=spf1 +a +mx +ip4:66.7.212.159 ?all"
- [+] MX records found, added to target list
- 0 wre.gov.sd.
- [*] Scanning wre.gov.sd for A records
- 138.128.160.2 - wre.gov.sd
- 138.128.160.2 - ftp.wre.gov.sd
- 127.0.0.1 - localhost.wre.gov.sd
- 138.128.160.2 - mail.wre.gov.sd
- 138.128.160.2 - test.wre.gov.sd
- 138.128.160.2 - webmail.wre.gov.sd
- 138.128.160.2 - www.wre.gov.sd
- #######################################################################################################################################
- [*] Found SPF record:
- [*] v=spf1 +a +mx +ip4:66.7.212.159 ?all
- [+] SPF record has no All string
- [*] Checking SPF include mechanisms
- [*] Include mechanisms are not strong
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for wre.gov.sd!
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 00:33 EDT
- Nmap scan report for wre.gov.sd (138.128.160.2)
- Host is up (0.064s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- Not shown: 457 filtered ports, 9 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 53/tcp open domain
- 80/tcp open http
- 110/tcp open pop3
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 00:33 EDT
- Nmap scan report for wre.gov.sd (138.128.160.2)
- Host is up (0.030s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 00:33 EDT
- Nmap scan report for wre.gov.sd (138.128.160.2)
- Host is up (0.066s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- PORT STATE SERVICE VERSION
- 21/tcp open ftp Pure-FTPd
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6
- Aggressive OS guesses: Linux 3.10 - 3.12 (91%), Linux 4.4 (91%), Linux 4.9 (91%), Linux 2.6.18 - 2.6.22 (86%), Linux 3.10 (86%), Linux 3.10 - 3.16 (86%), Linux 3.10 - 4.11 (85%), Linux 3.11 - 4.1 (85%), Linux 3.2 - 4.9 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 27.22 ms 10.248.200.1
- 2 27.48 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 36.56 ms xe-0-0-1-0.agg2.qc1.ca.m247.com (37.120.128.166)
- 4 27.27 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 28.38 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 28.00 ms be2090.ccr22.ymq01.atlas.cogentco.com (154.54.45.117)
- 7 32.80 ms be2088.ccr21.alb02.atlas.cogentco.com (154.54.43.18)
- 8 35.78 ms be2915.ccr41.jfk02.atlas.cogentco.com (154.54.40.62)
- 9 44.02 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
- 10 55.48 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
- 11 57.03 ms be2785.rcr21.jax01.atlas.cogentco.com (154.54.28.110)
- 12 60.93 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 13 62.74 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 14 64.71 ms 38.104.89.26
- 15 63.94 ms xe-1-3-core2.orl.hostdime.com (72.29.88.46)
- 16 67.43 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 00:45 EDT
- Nmap scan report for wre.gov.sd (138.128.160.2)
- Host is up (0.063s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- PORT STATE SERVICE VERSION
- 53/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-73.el7_6
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|storage-misc|firewall
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (92%), Synology DiskStation Manager 5.X (87%), WatchGuard Fireware 11.X (85%), FreeBSD 6.X (85%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/o:freebsd:freebsd:6.2
- Aggressive OS guesses: Linux 3.10 - 3.12 (92%), Linux 4.4 (92%), Linux 2.6.18 - 2.6.22 (90%), Linux 4.9 (90%), Linux 2.6.18 (87%), Linux 3.10 - 3.16 (87%), Linux 3.10 - 4.11 (87%), Linux 3.11 - 4.1 (87%), Linux 3.2 - 4.9 (87%), Linux 4.0 (87%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Host script results:
- | dns-brute:
- |_ DNS Brute-force hostnames: No results.
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 30.35 ms 10.248.200.1
- 2 44.71 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 34.56 ms xe-0-0-1-0.agg2.qc1.ca.m247.com (37.120.128.166)
- 4 30.40 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 30.74 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 30.72 ms be2089.ccr21.ymq01.atlas.cogentco.com (154.54.45.113)
- 7 36.56 ms be2088.ccr21.alb02.atlas.cogentco.com (154.54.43.18)
- 8 38.76 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
- 9 47.11 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
- 10 57.43 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
- 11 57.00 ms be2784.rcr21.jax01.atlas.cogentco.com (154.54.28.106)
- 12 59.97 ms be3641.rcr52.mco01.atlas.cogentco.com (154.24.22.125)
- 13 61.14 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 14 63.78 ms 38.104.89.26
- 15 68.92 ms xe-1-3-core2.orl.hostdime.com (72.29.88.46)
- 16 63.79 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://wre.gov.sd...
- _______________________________ SITE INFO ________________________________
- IP Title
- 138.128.160.2 وزارة الموارد المائية والري والكهرباء |
- ________________________________ VERSION _________________________________
- Name Versions Type
- WordPress 4.9.10 CMS
- PHP 5.6.40 Platform
- ______________________________ INTERESTING _______________________________
- URL Note Type
- /readme.html Readme file Interesting
- /robots.txt robots.txt index Interesting
- /login/ Login Page Interesting
- _________________________________ TOOLS __________________________________
- Name Link Software
- wpscan https://github.com/wpscanteam/wpscan WordPress
- CMSmap https://github.com/Dionach/CMSmap WordPress
- __________________________________________________________________________
- Time: 213.6 sec Urls: 293 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Thu, 02 May 2019 04:51:24 GMT
- X-Powered-By: PHP/5.6.40
- Link: <http://wre.gov.sd/wp-json/>; rel="https://api.w.org/"
- Set-Cookie: qtrans_front_language=ar; expires=Fri, 01-May-2020 04:51:26 GMT; Max-Age=31536000; path=/
- Referrer-Policy: no-referrer-when-downgrade
- Content-Type: text/html; charset=UTF-8
- Connection: keep-alive
- HTTP/1.1 200 OK
- Date: Thu, 02 May 2019 04:51:28 GMT
- X-Powered-By: PHP/5.6.40
- Link: <http://wre.gov.sd/wp-json/>; rel="https://api.w.org/"
- Set-Cookie: qtrans_front_language=ar; expires=Fri, 01-May-2020 04:51:30 GMT; Max-Age=31536000; path=/
- Referrer-Policy: no-referrer-when-downgrade
- Content-Type: text/html; charset=UTF-8
- Connection: keep-alive
- #######################################################################################################################################
- jQuery 1.4.1
- jQuery Migrate
- Google Font API
- W3 Total Cache
- PHP 5.6.40
- jQuery UI
- WordPress
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 00:52 EDT
- Nmap scan report for wre.gov.sd (138.128.160.2)
- Host is up (0.034s latency).
- rDNS record for 138.128.160.2: server.click-grafix.com
- PORT STATE SERVICE VERSION
- 110/tcp open pop3 Dovecot pop3d
- | pop3-brute:
- | Accounts: No valid accounts found
- | Statistics: Performed 71 guesses in 55 seconds, average tps: 1.2
- |_ ERROR: Failed to connect.
- |_pop3-capabilities: TOP STLS CAPA SASL(PLAIN LOGIN) UIDL PIPELINING AUTH-RESP-CODE USER RESP-CODES
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|storage-misc|firewall
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (92%), Synology DiskStation Manager 5.X (86%), WatchGuard Fireware 11.X (86%), FreeBSD 6.X (85%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/o:freebsd:freebsd:6.2
- Aggressive OS guesses: Linux 3.10 - 3.12 (92%), Linux 4.4 (92%), Linux 4.9 (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 3.10 (87%), Linux 3.10 - 3.16 (87%), Linux 4.0 (87%), Linux 2.6.18 (86%), Linux 3.10 - 4.11 (86%), Linux 3.11 - 4.1 (86%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 1 hop
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 27.03 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- https://wre.gov.sd [200 OK] All-in-one-SEO-Pack[2.12], Apache, Cookies[qtrans_front_language], Country[UNITED STATES][US], Email[info@wre.gov.sd], Google-API[ajax/libs/jquery/1.4.1/jquery.min.js], HTML5, HTTPServer[Apache], IP[138.128.160.2], JQuery[1.12.4], MetaGenerator[WordPress 4.9.10,qTranslate-X 3.4.6.8], PHP[5.6.40], PoweredBy[:], Script[text/javascript], Title[وزارة الموارد المائية والري والكهرباء |], UncommonHeaders[link,referrer-policy], WordPress[4.9.10], X-Powered-By[PHP/5.6.40]
- #######################################################################################################################################
- jQuery 1.4.1
- jQuery Migrate
- Google Font API
- Apache
- PHP 5.6.40
- W3 Total Cache
- jQuery UI
- WordPress
- #######################################################################################################################################
- Version: 1.11.13-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 138.128.160.2
- Testing SSL server wre.gov.sd on port 443 using SNI name wre.gov.sd
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: med.gov.sd
- Altnames: DNS:med.gov.sd, DNS:mail.med.gov.sd, DNS:mail.wre.gov.sd, DNS:wre.gov.sd, DNS:www.med.gov.sd, DNS:www.wre.gov.sd
- Issuer: med.gov.sd
- Not valid before: Aug 12 18:01:00 2017 GMT
- Not valid after: Aug 12 18:01:00 2018 GMT
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 01:05 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.067s latency).
- Not shown: 460 filtered ports, 9 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 53/tcp open domain
- 80/tcp open http
- 143/tcp open imap
- 443/tcp open https
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 01:05 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.028s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 01:05 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.066s latency).
- PORT STATE SERVICE VERSION
- 53/tcp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- |_dns-fuzz: Server didn't response to our probe, can't fuzz
- | dns-nsec-enum:
- |_ No NSEC records found
- | dns-nsec3-enum:
- |_ DNSSEC NSEC3 not supported
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-73.el7_6
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (89%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.9 cpe:/o:linux:linux_kernel:2.6
- Aggressive OS guesses: Linux 3.10 - 3.12 (89%), Linux 4.9 (89%), Linux 4.4 (88%), Linux 2.6.18 - 2.6.22 (86%), Linux 3.11 - 4.1 (85%), Linux 3.2 - 4.9 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 16 hops
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- Host script results:
- | dns-brute:
- | DNS Brute-force hostnames:
- | www.click-grafix.com - 138.128.160.2
- | ftp.click-grafix.com - 138.128.160.2
- | ns1.click-grafix.com - 138.128.160.3
- | ns2.click-grafix.com - 138.128.160.4
- | server.click-grafix.com - 138.128.160.2
- |_ mail.click-grafix.com - 138.128.160.2
- TRACEROUTE (using port 53/tcp)
- HOP RTT ADDRESS
- 1 21.82 ms 10.248.200.1
- 2 22.17 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 29.31 ms xe-0-0-1-0.agg2.qc1.ca.m247.com (37.120.128.166)
- 4 21.89 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 22.63 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 22.67 ms be2089.ccr21.ymq01.atlas.cogentco.com (154.54.45.113)
- 7 27.63 ms be2088.ccr21.alb02.atlas.cogentco.com (154.54.43.18)
- 8 30.64 ms be2916.ccr42.jfk02.atlas.cogentco.com (154.54.41.62)
- 9 38.44 ms be2807.ccr42.dca01.atlas.cogentco.com (154.54.40.110)
- 10 48.74 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
- 11 59.48 ms be2785.rcr21.jax01.atlas.cogentco.com (154.54.28.110)
- 12 64.78 ms be3641.rcr52.mco01.atlas.cogentco.com (154.24.22.125)
- 13 65.53 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 14 67.49 ms 38.104.89.26
- 15 77.50 ms xe-1-3-core2.orl.hostdime.com (72.29.88.46)
- 16 67.76 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 01:06 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.063s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 27.29 ms 10.248.200.1
- 2 53.89 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 46.09 ms xe-0-0-1-0.agg2.qc1.ca.m247.com (37.120.128.166)
- 4 27.71 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 27.97 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 27.95 ms be2089.ccr21.ymq01.atlas.cogentco.com (154.54.45.113)
- 7 33.33 ms be2088.ccr21.alb02.atlas.cogentco.com (154.54.43.18)
- 8 35.92 ms be2915.ccr41.jfk02.atlas.cogentco.com (154.54.40.62)
- 9 37.19 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
- 10 47.97 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
- 11 56.04 ms be2784.rcr21.jax01.atlas.cogentco.com (154.54.28.106)
- 12 59.96 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 13 60.17 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 14 62.00 ms 38.104.89.26
- 15 158.80 ms xe-1-3-core2.orl.hostdime.com (72.29.88.46)
- 16 63.95 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 01:08 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.064s latency).
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 22.21 ms 10.248.200.1
- 2 22.57 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 35.42 ms xe-0-0-1-0.agg2.qc1.ca.m247.com (37.120.128.166)
- 4 22.27 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 22.91 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 22.88 ms be2089.ccr21.ymq01.atlas.cogentco.com (154.54.45.113)
- 7 27.87 ms be2088.ccr21.alb02.atlas.cogentco.com (154.54.43.18)
- 8 30.81 ms be2915.ccr41.jfk02.atlas.cogentco.com (154.54.40.62)
- 9 38.47 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
- 10 55.97 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
- 11 56.42 ms be2784.rcr21.jax01.atlas.cogentco.com (154.54.28.106)
- 12 59.59 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 13 60.79 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 14 62.73 ms 38.104.89.26
- 15 157.76 ms xe-1-3-core2.orl.hostdime.com (72.29.88.46)
- 16 62.45 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 01:10 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.063s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 26.82 ms 10.248.200.1
- 2 27.36 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 70.79 ms xe-0-0-1-0.agg2.qc1.ca.m247.com (37.120.128.166)
- 4 27.21 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 27.59 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 27.80 ms be2089.ccr21.ymq01.atlas.cogentco.com (154.54.45.113)
- 7 26.69 ms be2088.ccr21.alb02.atlas.cogentco.com (154.54.43.18)
- 8 29.66 ms be2915.ccr41.jfk02.atlas.cogentco.com (154.54.40.62)
- 9 36.66 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
- 10 47.37 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
- 11 59.26 ms be2784.rcr21.jax01.atlas.cogentco.com (154.54.28.106)
- 12 65.83 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 13 65.82 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 14 67.43 ms 38.104.89.26
- 15 120.39 ms xe-1-3-core2.orl.hostdime.com (72.29.88.46)
- 16 65.93 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Thu, 02 May 2019 05:12:44 GMT
- Last-Modified: Wed, 30 Jan 2019 02:03:25 GMT
- ETag: "70a0253-a3-580a350ab9540"
- Accept-Ranges: bytes
- Content-Length: 163
- Content-Type: text/html
- Connection: keep-alive
- HTTP/1.1 200 OK
- Date: Thu, 02 May 2019 05:12:45 GMT
- Last-Modified: Wed, 30 Jan 2019 02:03:25 GMT
- ETag: "70a0253-a3-580a350ab9540"
- Accept-Ranges: bytes
- Content-Length: 163
- Content-Type: text/html
- Connection: keep-alive
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 01:12 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.063s latency).
- PORT STATE SERVICE VERSION
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 23.36 ms 10.248.200.1
- 2 23.81 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 38.11 ms xe-0-0-1-0.agg2.qc1.ca.m247.com (37.120.128.166)
- 4 23.65 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 24.27 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 24.24 ms be2089.ccr21.ymq01.atlas.cogentco.com (154.54.45.113)
- 7 29.12 ms be2088.ccr21.alb02.atlas.cogentco.com (154.54.43.18)
- 8 31.95 ms be2915.ccr41.jfk02.atlas.cogentco.com (154.54.40.62)
- 9 39.37 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
- 10 50.60 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
- 11 58.37 ms be2784.rcr21.jax01.atlas.cogentco.com (154.54.28.106)
- 12 60.40 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 13 61.60 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 14 63.44 ms 38.104.89.26
- 15 207.80 ms xe-1-3-core2.orl.hostdime.com (72.29.88.46)
- 16 63.44 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 01:14 EDT
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.042s latency).
- PORT STATE SERVICE VERSION
- 161/tcp filtered snmp
- 161/udp open|filtered snmp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 16 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 26.07 ms 10.248.200.1
- 2 26.13 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 42.24 ms xe-0-0-1-0.agg2.qc1.ca.m247.com (37.120.128.166)
- 4 26.55 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 26.53 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 26.18 ms be2089.ccr21.ymq01.atlas.cogentco.com (154.54.45.113)
- 7 31.69 ms be2088.ccr21.alb02.atlas.cogentco.com (154.54.43.18)
- 8 34.48 ms be2915.ccr41.jfk02.atlas.cogentco.com (154.54.40.62)
- 9 41.73 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
- 10 54.19 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
- 11 61.75 ms be2784.rcr21.jax01.atlas.cogentco.com (154.54.28.106)
- 12 67.04 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 13 67.04 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 14 76.93 ms 38.104.89.26
- 15 194.16 ms xe-1-3-core2.orl.hostdime.com (72.29.88.46)
- 16 64.13 ms server.click-grafix.com (138.128.160.2)
- #######################################################################################################################################
- OWL Carousel
- Bootstrap
- prettyPhoto
- Apache
- PHP 5.6.40
- jQuery 3.3.1
- #######################################################################################################################################
- Version: 1.11.13-static
- OpenSSL 1.0.2-chacha (1.0.2g-dev)
- Connected to 138.128.160.2
- Testing SSL server 138.128.160.2 on port 443 using SNI name 138.128.160.2
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Secure session renegotiation supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLS 1.2 not vulnerable to heartbleed
- TLS 1.1 not vulnerable to heartbleed
- TLS 1.0 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 2048 bits
- Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 2048 bits
- Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.2 112 bits DES-CBC3-SHA
- Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.1 256 bits AES256-SHA
- Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.1 128 bits AES128-SHA
- Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.1 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.1 112 bits DES-CBC3-SHA
- Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 2048 bits
- Accepted TLSv1.0 256 bits AES256-SHA
- Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 2048 bits
- Accepted TLSv1.0 128 bits AES128-SHA
- Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
- Accepted TLSv1.0 112 bits EDH-RSA-DES-CBC3-SHA DHE 2048 bits
- Accepted TLSv1.0 112 bits DES-CBC3-SHA
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: abaad.sd
- Altnames: DNS:abaad.sd, DNS:mail.abaad.sd, DNS:www.abaad.sd
- Issuer: abaad.sd
- Not valid before: Aug 12 11:26:16 2017 GMT
- Not valid after: Aug 12 11:26:16 2018 GMT
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 01:19 EDT
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 01:19
- Completed NSE at 01:19, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 01:19
- Completed NSE at 01:19, 0.00s elapsed
- Initiating Ping Scan at 01:19
- Scanning 138.128.160.2 [4 ports]
- Completed Ping Scan at 01:19, 0.06s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 01:19
- Completed Parallel DNS resolution of 1 host. at 01:19, 0.03s elapsed
- Initiating Connect Scan at 01:19
- Scanning server.click-grafix.com (138.128.160.2) [65535 ports]
- Discovered open port 80/tcp on 138.128.160.2
- Discovered open port 53/tcp on 138.128.160.2
- Discovered open port 443/tcp on 138.128.160.2
- Discovered open port 143/tcp on 138.128.160.2
- Discovered open port 993/tcp on 138.128.160.2
- Discovered open port 587/tcp on 138.128.160.2
- Discovered open port 2083/tcp on 138.128.160.2
- Discovered open port 2095/tcp on 138.128.160.2
- Discovered open port 2077/tcp on 138.128.160.2
- Discovered open port 2082/tcp on 138.128.160.2
- Discovered open port 2079/tcp on 138.128.160.2
- Discovered open port 2087/tcp on 138.128.160.2
- Discovered open port 2080/tcp on 138.128.160.2
- Connect Scan Timing: About 51.88% done; ETC: 01:20 (0:00:37 remaining)
- Connect Scan Timing: About 42.34% done; ETC: 01:22 (0:01:35 remaining)
- Connect Scan Timing: About 59.11% done; ETC: 01:22 (0:01:09 remaining)
- Discovered open port 2078/tcp on 138.128.160.2
- Discovered open port 2096/tcp on 138.128.160.2
- Discovered open port 465/tcp on 138.128.160.2
- Discovered open port 1157/tcp on 138.128.160.2
- Connect Scan Timing: About 78.23% done; ETC: 01:22 (0:00:40 remaining)
- Connect Scan Timing: About 84.02% done; ETC: 01:22 (0:00:36 remaining)
- Discovered open port 2086/tcp on 138.128.160.2
- Completed Connect Scan at 01:22, 214.51s elapsed (65535 total ports)
- Initiating Service scan at 01:22
- Scanning 18 services on server.click-grafix.com (138.128.160.2)
- Service scan Timing: About 61.11% done; ETC: 01:26 (0:01:32 remaining)
- Completed Service scan at 01:25, 145.88s elapsed (18 services on 1 host)
- Initiating OS detection (try #1) against server.click-grafix.com (138.128.160.2)
- adjust_timeouts2: packet supposedly had rtt of -685565 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -685565 microseconds. Ignoring time.
- Retrying OS detection (try #2) against server.click-grafix.com (138.128.160.2)
- adjust_timeouts2: packet supposedly had rtt of -688589 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -688589 microseconds. Ignoring time.
- Initiating Traceroute at 01:25
- Completed Traceroute at 01:25, 0.30s elapsed
- Initiating Parallel DNS resolution of 16 hosts. at 01:25
- Completed Parallel DNS resolution of 16 hosts. at 01:25, 2.53s elapsed
- NSE: Script scanning 138.128.160.2.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 01:25
- NSE Timing: About 99.22% done; ETC: 01:25 (0:00:00 remaining)
- NSE Timing: About 99.47% done; ETC: 01:26 (0:00:00 remaining)
- Completed NSE at 01:26, 70.27s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 01:26
- Completed NSE at 01:26, 1.08s elapsed
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up, received reset ttl 64 (0.067s latency).
- Scanned at 2019-05-02 01:19:16 EDT for 439s
- Not shown: 63511 filtered ports, 2006 closed ports
- Reason: 63511 no-responses and 2006 conn-refused
- PORT STATE SERVICE REASON VERSION
- 53/tcp open domain syn-ack ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-73.el7_6
- 80/tcp open http syn-ack Fortinet FortiGate 50B or FortiWifi 60C or 80C firewall http config
- | http-methods:
- | Supported Methods: OPTIONS HEAD GET POST TRACE
- |_ Potentially risky methods: TRACE
- |_http-title: Site doesn't have a title (text/html).
- 143/tcp open imap syn-ack Dovecot imapd
- |_imap-capabilities: NAMESPACE STARTTLS AUTH=LOGINA0001 capabilities listed ENABLE LITERAL+ Pre-login post-login IMAP4rev1 AUTH=PLAIN IDLE SASL-IR have ID LOGIN-REFERRALS more OK
- |_ssl-date: TLS randomness does not represent time
- 443/tcp open ssl/http syn-ack Apache httpd (PHP 5.6.40)
- | http-methods:
- | Supported Methods: OPTIONS HEAD GET POST TRACE
- |_ Potentially risky methods: TRACE
- |_http-server-header: Apache
- |_http-title: Site doesn't have a title (text/html).
- | ssl-cert: Subject: commonName=abaad.sd
- | Subject Alternative Name: DNS:abaad.sd, DNS:mail.abaad.sd, DNS:www.abaad.sd
- | Issuer: commonName=abaad.sd
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-08-12T11:26:16
- | Not valid after: 2018-08-12T11:26:16
- | MD5: 78ae d5d8 edd0 888b fec7 66d8 0056 3b28
- | SHA-1: 416a 957b 5935 e3d6 4c9c 2ee7 6f20 b970 269e 26a3
- | -----BEGIN CERTIFICATE-----
- | MIIDJDCCAgygAwIBAgIFAOx/YEowDQYJKoZIhvcNAQELBQAwEzERMA8GA1UEAwwI
- | YWJhYWQuc2QwHhcNMTcwODEyMTEyNjE2WhcNMTgwODEyMTEyNjE2WjATMREwDwYD
- | VQQDDAhhYmFhZC5zZDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMDM
- | hJz/G2HEm8jAf+I1DAmSdfiiNOZSNE31cQc/32KppLnMEoZE2rflf8pwF/MHZi4V
- | rWmtYNCeKLIH50bEL5eeLZBNa2xJf7lbAjvLSzVFus+nzH8B9MAjAuiLu4DuJSkX
- | Ld6sS0CACCeicThyxqhQJtjdJJLTMcd6BPJMdJXRznQNC5zEZQoOfRSzoLojIckl
- | 4FIrYhSSTm2MGy0FbpvV61kpb2a9pOi3+Zw4ZcUslbAZ00xtHTaG9fr/IS+d56rd
- | 9VuuThACMcTb/K5W5PutioiqoTPE8eh8q9OPu8A1IlcAffpKGuUqze5iSAtbU7Aa
- | TUenAQFoiPQPuhxsbDECAwEAAaN/MH0wHQYDVR0OBBYEFNreitXDTP70QyKQDCQj
- | Z8IWfFM7MB8GA1UdIwQYMBaAFNreitXDTP70QyKQDCQjZ8IWfFM7MAkGA1UdEwQC
- | MAAwMAYDVR0RBCkwJ4IIYWJhYWQuc2SCDW1haWwuYWJhYWQuc2SCDHd3dy5hYmFh
- | ZC5zZDANBgkqhkiG9w0BAQsFAAOCAQEAJdFK5DKTRSfkSTWe+E9oqV5+dwesfRdA
- | yyEDSv0zHn8ByPjC5ZfCOadmuZ7f2Z7tQVxvhfQS20NPXjzLut7/zuzH2GlXItwT
- | EZX/bZWueBB8crmtfTwFdnHDfk/lYs6vXwPy+xYpReuUGUqeDAuWpuxYgmTnzSsV
- | isZxoWqxXPOmpLao1wSf+SAmBZogUKiB/FmCLdcpmekX+HSQuQzYvouSfbKX1wbd
- | CfWHi5/Qe66YXFHIIyQJKaEdaNyFgwaJsyRhXTMiMvwVX27SYQJFdnuVdxBM/NwL
- | IYruPIROB+wvh4JDEW1dr/JnlYr1+czZad2ZGGm1H2xU7wIcWiSK3Q==
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 465/tcp open ssl/smtp syn-ack Exim smtpd 4.91
- | smtp-commands: server.click-grafix.com Hello server.click-grafix.com [176.113.74.56], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
- |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=server.click-grafix.com/organizationalUnitName=PositiveSSL
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US/localityName=Houston
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-07-24T00:00:00
- | Not valid after: 2019-07-24T23:59:59
- | MD5: ef36 53dc cdf1 d27c e2d0 51c4 6362 d6d4
- | SHA-1: 5187 e008 54ad a324 08d4 0e7b d84f e8f2 393e f965
- | -----BEGIN CERTIFICATE-----
- | MIIGQTCCBSmgAwIBAgIQT8KCl+8zC7CQ9uYDxKIzzTANBgkqhkiG9w0BAQsFADBy
- | MQswCQYDVQQGEwJVUzELMAkGA1UECBMCVFgxEDAOBgNVBAcTB0hvdXN0b24xFTAT
- | BgNVBAoTDGNQYW5lbCwgSW5jLjEtMCsGA1UEAxMkY1BhbmVsLCBJbmMuIENlcnRp
- | ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE4MDcyNDAwMDAwMFoXDTE5MDcyNDIzNTk1
- | OVowWzEhMB8GA1UECxMYRG9tYWluIENvbnRyb2wgVmFsaWRhdGVkMRQwEgYDVQQL
- | EwtQb3NpdGl2ZVNTTDEgMB4GA1UEAxMXc2VydmVyLmNsaWNrLWdyYWZpeC5jb20w
- | ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/fYpGJ02yX0eUG2ihh+im
- | 4DFiPfcFjX9vXOEAW93ToJNROXhCyRpd23JSO86fgQEiP4TKKMbnFYMnruTrOBKQ
- | OGpFXjvFItBqjYBSdePxNcvCpU6inBzN3ZUpqw3WHCi+qoHUzkqE27gkaoygdtuL
- | jl1EihNp0s/wBRt63AE+eU3re1KxOy1eBi3PEvP7+AIhWEqd2iyfHjfNRu3tlRgj
- | O3W/y3CnhuEOyyX4LOwxPvkQHDGSSxqiiqoH0zEnHGbIQYA2c2AnRQ3yOnjn13ZC
- | r48pR3b52/mpW8s6aJDmjdHUnbemv0k9Ijj8JpS5UBvzcKD0alLY3rrKi8B7vvg9
- | AgMBAAGjggLoMIIC5DAfBgNVHSMEGDAWgBR+A1plQWunfgrhuJ0I6h2OHWrHZTAd
- | BgNVHQ4EFgQU2Y+20s8w+YOm4cOKR3iXmedjQtYwDgYDVR0PAQH/BAQDAgWgMAwG
- | A1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1Ud
- | IARIMEYwOgYLKwYBBAGyMQECAjQwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1
- | cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIBMEwGA1UdHwRFMEMwQaA/oD2GO2h0
- | dHA6Ly9jcmwuY29tb2RvY2EuY29tL2NQYW5lbEluY0NlcnRpZmljYXRpb25BdXRo
- | b3JpdHkuY3JsMH0GCCsGAQUFBwEBBHEwbzBHBggrBgEFBQcwAoY7aHR0cDovL2Ny
- | dC5jb21vZG9jYS5jb20vY1BhbmVsSW5jQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5j
- | cnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTA/BgNVHREE
- | ODA2ghdzZXJ2ZXIuY2xpY2stZ3JhZml4LmNvbYIbd3d3LnNlcnZlci5jbGljay1n
- | cmFmaXguY29tMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHcA7ku9t3XOYLrhQmkf
- | q+GeZqMPfl+wctiDAMR7iXqo/csAAAFkyjfecAAABAMASDBGAiEA1gkICLUOquHw
- | AbNuhRP932fABvQx/+D0Qtu7lAgKv0oCIQDMLECO0bYVBaBlw4p77z18sp6AZJpR
- | ahZtv+puBgXVqQB1AHR+2oMxrTMQkSGcziVPQnDCv/1eQiAIxjc1eeYQe8xWAAAB
- | ZMo33q0AAAQDAEYwRAIgTfm2myATuvcT4nGzpxhuDgAZn2e+aBu22mYZZwgMB3IC
- | IAjo+/G1DzbhaInmiI27aPg5Srwh7CcoPJhywc3He6EzMA0GCSqGSIb3DQEBCwUA
- | A4IBAQA0wnmt9+d7pK/TtY+V+WeqpJ/v0EOAJYRQiP5ThRfjifn4SP+vVi7kc6dr
- | gmkG35Ti9xlNI9H6Hmwc1zDHJuwyom3YaaKm01tq4i3stIZVsAQUxQO4gXoK3PUX
- | ChLIa88YomTA6ZXJTftzbmZ1bwNAtwfWgzdQmhSZD7uP8x93qoB+KkLzBTV716cV
- | pBcac3fq6sVIfnGlxNtQwFHClfuR/kWu1s/Efsj0ftRSNi9Yu1jjWny4OZ6Pfmli
- | RzZ3EDSRfGtYYxaGIU9JRJClVUC8Ax335PlsodeibkYSMIrYAdXVLhbM0dPrZGje
- | BOfeO+nIKr9fTlkEPMP6DkTuTxC1
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 587/tcp open smtp syn-ack Exim smtpd 4.91
- | smtp-commands: server.click-grafix.com Hello server.click-grafix.com [176.113.74.56], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=server.click-grafix.com/organizationalUnitName=PositiveSSL
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US/localityName=Houston
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-07-24T00:00:00
- | Not valid after: 2019-07-24T23:59:59
- | MD5: ef36 53dc cdf1 d27c e2d0 51c4 6362 d6d4
- | SHA-1: 5187 e008 54ad a324 08d4 0e7b d84f e8f2 393e f965
- | -----BEGIN CERTIFICATE-----
- | MIIGQTCCBSmgAwIBAgIQT8KCl+8zC7CQ9uYDxKIzzTANBgkqhkiG9w0BAQsFADBy
- | MQswCQYDVQQGEwJVUzELMAkGA1UECBMCVFgxEDAOBgNVBAcTB0hvdXN0b24xFTAT
- | BgNVBAoTDGNQYW5lbCwgSW5jLjEtMCsGA1UEAxMkY1BhbmVsLCBJbmMuIENlcnRp
- | ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE4MDcyNDAwMDAwMFoXDTE5MDcyNDIzNTk1
- | OVowWzEhMB8GA1UECxMYRG9tYWluIENvbnRyb2wgVmFsaWRhdGVkMRQwEgYDVQQL
- | EwtQb3NpdGl2ZVNTTDEgMB4GA1UEAxMXc2VydmVyLmNsaWNrLWdyYWZpeC5jb20w
- | ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/fYpGJ02yX0eUG2ihh+im
- | 4DFiPfcFjX9vXOEAW93ToJNROXhCyRpd23JSO86fgQEiP4TKKMbnFYMnruTrOBKQ
- | OGpFXjvFItBqjYBSdePxNcvCpU6inBzN3ZUpqw3WHCi+qoHUzkqE27gkaoygdtuL
- | jl1EihNp0s/wBRt63AE+eU3re1KxOy1eBi3PEvP7+AIhWEqd2iyfHjfNRu3tlRgj
- | O3W/y3CnhuEOyyX4LOwxPvkQHDGSSxqiiqoH0zEnHGbIQYA2c2AnRQ3yOnjn13ZC
- | r48pR3b52/mpW8s6aJDmjdHUnbemv0k9Ijj8JpS5UBvzcKD0alLY3rrKi8B7vvg9
- | AgMBAAGjggLoMIIC5DAfBgNVHSMEGDAWgBR+A1plQWunfgrhuJ0I6h2OHWrHZTAd
- | BgNVHQ4EFgQU2Y+20s8w+YOm4cOKR3iXmedjQtYwDgYDVR0PAQH/BAQDAgWgMAwG
- | A1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1Ud
- | IARIMEYwOgYLKwYBBAGyMQECAjQwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1
- | cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIBMEwGA1UdHwRFMEMwQaA/oD2GO2h0
- | dHA6Ly9jcmwuY29tb2RvY2EuY29tL2NQYW5lbEluY0NlcnRpZmljYXRpb25BdXRo
- | b3JpdHkuY3JsMH0GCCsGAQUFBwEBBHEwbzBHBggrBgEFBQcwAoY7aHR0cDovL2Ny
- | dC5jb21vZG9jYS5jb20vY1BhbmVsSW5jQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5j
- | cnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTA/BgNVHREE
- | ODA2ghdzZXJ2ZXIuY2xpY2stZ3JhZml4LmNvbYIbd3d3LnNlcnZlci5jbGljay1n
- | cmFmaXguY29tMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHcA7ku9t3XOYLrhQmkf
- | q+GeZqMPfl+wctiDAMR7iXqo/csAAAFkyjfecAAABAMASDBGAiEA1gkICLUOquHw
- | AbNuhRP932fABvQx/+D0Qtu7lAgKv0oCIQDMLECO0bYVBaBlw4p77z18sp6AZJpR
- | ahZtv+puBgXVqQB1AHR+2oMxrTMQkSGcziVPQnDCv/1eQiAIxjc1eeYQe8xWAAAB
- | ZMo33q0AAAQDAEYwRAIgTfm2myATuvcT4nGzpxhuDgAZn2e+aBu22mYZZwgMB3IC
- | IAjo+/G1DzbhaInmiI27aPg5Srwh7CcoPJhywc3He6EzMA0GCSqGSIb3DQEBCwUA
- | A4IBAQA0wnmt9+d7pK/TtY+V+WeqpJ/v0EOAJYRQiP5ThRfjifn4SP+vVi7kc6dr
- | gmkG35Ti9xlNI9H6Hmwc1zDHJuwyom3YaaKm01tq4i3stIZVsAQUxQO4gXoK3PUX
- | ChLIa88YomTA6ZXJTftzbmZ1bwNAtwfWgzdQmhSZD7uP8x93qoB+KkLzBTV716cV
- | pBcac3fq6sVIfnGlxNtQwFHClfuR/kWu1s/Efsj0ftRSNi9Yu1jjWny4OZ6Pfmli
- | RzZ3EDSRfGtYYxaGIU9JRJClVUC8Ax335PlsodeibkYSMIrYAdXVLhbM0dPrZGje
- | BOfeO+nIKr9fTlkEPMP6DkTuTxC1
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 993/tcp open ssl/imaps? syn-ack
- |_ssl-date: TLS randomness does not represent time
- 1157/tcp open ssh syn-ack OpenSSH 7.4 (protocol 2.0)
- | ssh-hostkey:
- | 2048 dd:76:ae:9c:27:5b:3b:d5:21:05:1d:ab:8e:b8:be:83 (RSA)
- | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDNqsLBZAzq1TYBDQwN5chzIXMlb0AR8a1C3j0xC4xUaiPlF8i0YueuVFPMPuPOgCnMIzVUB0Zss4wqCrRpeedsr4M5e8kpde40sTAKbrKb5NfmhBSWkb3VjSyOOreeQFgVriqHyHAI778yrMYxtc6psP3ZQ82ObeBjWC3sW6rf1G4cLx2puAaVSqz0QMBWKvv9uaASxHu0RDL5lAIYL7YJsS5oLQQNtDni2mNP2XMd8ju5VTYinKhLtDudLvDjGb/eMt9DnhPrIVlXHsagBkCte2m6D7NSoyNSsYXQf6JZ5PjwO+nADsH3neet4vVvJZnMqzwIvEfCUBXRT23gK2N
- | 256 33:45:20:dc:87:90:71:23:82:e3:6b:eb:2c:66:4d:d1 (ECDSA)
- | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGNnq9X7ZxT0LAgexbPzLU6vXgiBNKIoHWeeeKISFgMFnLcE/hjlQQfFRrV79mKZKz9N7020HLkBhohs1o52y00=
- | 256 fa:d4:58:a1:a3:bf:61:c2:40:eb:f4:ca:81:9d:c0:7d (ED25519)
- |_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAWVvCbUj6matw15tFBYoctI3NTFjQXWshA+rHCQR88u
- 2077/tcp open tsrmagt? syn-ack
- | fingerprint-strings:
- | SIPOptions:
- | HTTP/1.1 302 Moved
- | Date: Thu, 02 May 2019 05:24:23 GMT
- | Server: cPanel
- | Persistent-Auth: false
- | Host: server.click-grafix.com:2077
- | Cache-Control: no-cache, no-store, must-revalidate, private
- | Connection: close
- | Location: https://server.click-grafix.com:2078sip:nm
- | Vary: Accept-Encoding
- | Expires: Fri, 01 Jan 1990 00:00:00 GMT
- |_ X-Redirect-Reason: requiressl
- 2078/tcp open ssl/http syn-ack cPanel httpd (unauthorized)
- | http-auth:
- | HTTP/1.1 401 Unauthorized\x0D
- |_ Basic realm=Restricted Area
- | http-methods:
- | Supported Methods: PROPPATCH DELETE MOVE PUT HEAD UNLOCK POST OPTIONS PROPFIND GET COPY MKCOL LOCK
- |_ Potentially risky methods: PROPPATCH DELETE MOVE PUT UNLOCK PROPFIND COPY MKCOL LOCK
- |_http-server-header: cPanel
- |_http-title: Site doesn't have a title (text/html; charset="utf-8").
- | http-webdav-scan:
- | Server Type: cPanel
- | WebDAV type: Unkown
- | Server Date: Thu, 02 May 2019 05:25:24 GMT
- |_ Allowed Methods: PROPPATCH, DELETE, MOVE, PUT, HEAD, UNLOCK, POST, OPTIONS, PROPFIND, GET, COPY, MKCOL, LOCK
- | ssl-cert: Subject: commonName=server.click-grafix.com/organizationalUnitName=PositiveSSL
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US/localityName=Houston
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-07-24T00:00:00
- | Not valid after: 2019-07-24T23:59:59
- | MD5: ef36 53dc cdf1 d27c e2d0 51c4 6362 d6d4
- | SHA-1: 5187 e008 54ad a324 08d4 0e7b d84f e8f2 393e f965
- | -----BEGIN CERTIFICATE-----
- | MIIGQTCCBSmgAwIBAgIQT8KCl+8zC7CQ9uYDxKIzzTANBgkqhkiG9w0BAQsFADBy
- | MQswCQYDVQQGEwJVUzELMAkGA1UECBMCVFgxEDAOBgNVBAcTB0hvdXN0b24xFTAT
- | BgNVBAoTDGNQYW5lbCwgSW5jLjEtMCsGA1UEAxMkY1BhbmVsLCBJbmMuIENlcnRp
- | ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE4MDcyNDAwMDAwMFoXDTE5MDcyNDIzNTk1
- | OVowWzEhMB8GA1UECxMYRG9tYWluIENvbnRyb2wgVmFsaWRhdGVkMRQwEgYDVQQL
- | EwtQb3NpdGl2ZVNTTDEgMB4GA1UEAxMXc2VydmVyLmNsaWNrLWdyYWZpeC5jb20w
- | ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/fYpGJ02yX0eUG2ihh+im
- | 4DFiPfcFjX9vXOEAW93ToJNROXhCyRpd23JSO86fgQEiP4TKKMbnFYMnruTrOBKQ
- | OGpFXjvFItBqjYBSdePxNcvCpU6inBzN3ZUpqw3WHCi+qoHUzkqE27gkaoygdtuL
- | jl1EihNp0s/wBRt63AE+eU3re1KxOy1eBi3PEvP7+AIhWEqd2iyfHjfNRu3tlRgj
- | O3W/y3CnhuEOyyX4LOwxPvkQHDGSSxqiiqoH0zEnHGbIQYA2c2AnRQ3yOnjn13ZC
- | r48pR3b52/mpW8s6aJDmjdHUnbemv0k9Ijj8JpS5UBvzcKD0alLY3rrKi8B7vvg9
- | AgMBAAGjggLoMIIC5DAfBgNVHSMEGDAWgBR+A1plQWunfgrhuJ0I6h2OHWrHZTAd
- | BgNVHQ4EFgQU2Y+20s8w+YOm4cOKR3iXmedjQtYwDgYDVR0PAQH/BAQDAgWgMAwG
- | A1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1Ud
- | IARIMEYwOgYLKwYBBAGyMQECAjQwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1
- | cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIBMEwGA1UdHwRFMEMwQaA/oD2GO2h0
- | dHA6Ly9jcmwuY29tb2RvY2EuY29tL2NQYW5lbEluY0NlcnRpZmljYXRpb25BdXRo
- | b3JpdHkuY3JsMH0GCCsGAQUFBwEBBHEwbzBHBggrBgEFBQcwAoY7aHR0cDovL2Ny
- | dC5jb21vZG9jYS5jb20vY1BhbmVsSW5jQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5j
- | cnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTA/BgNVHREE
- | ODA2ghdzZXJ2ZXIuY2xpY2stZ3JhZml4LmNvbYIbd3d3LnNlcnZlci5jbGljay1n
- | cmFmaXguY29tMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHcA7ku9t3XOYLrhQmkf
- | q+GeZqMPfl+wctiDAMR7iXqo/csAAAFkyjfecAAABAMASDBGAiEA1gkICLUOquHw
- | AbNuhRP932fABvQx/+D0Qtu7lAgKv0oCIQDMLECO0bYVBaBlw4p77z18sp6AZJpR
- | ahZtv+puBgXVqQB1AHR+2oMxrTMQkSGcziVPQnDCv/1eQiAIxjc1eeYQe8xWAAAB
- | ZMo33q0AAAQDAEYwRAIgTfm2myATuvcT4nGzpxhuDgAZn2e+aBu22mYZZwgMB3IC
- | IAjo+/G1DzbhaInmiI27aPg5Srwh7CcoPJhywc3He6EzMA0GCSqGSIb3DQEBCwUA
- | A4IBAQA0wnmt9+d7pK/TtY+V+WeqpJ/v0EOAJYRQiP5ThRfjifn4SP+vVi7kc6dr
- | gmkG35Ti9xlNI9H6Hmwc1zDHJuwyom3YaaKm01tq4i3stIZVsAQUxQO4gXoK3PUX
- | ChLIa88YomTA6ZXJTftzbmZ1bwNAtwfWgzdQmhSZD7uP8x93qoB+KkLzBTV716cV
- | pBcac3fq6sVIfnGlxNtQwFHClfuR/kWu1s/Efsj0ftRSNi9Yu1jjWny4OZ6Pfmli
- | RzZ3EDSRfGtYYxaGIU9JRJClVUC8Ax335PlsodeibkYSMIrYAdXVLhbM0dPrZGje
- | BOfeO+nIKr9fTlkEPMP6DkTuTxC1
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 2079/tcp open idware-router? syn-ack
- | fingerprint-strings:
- | SIPOptions:
- | HTTP/1.1 302 Moved
- | Date: Thu, 02 May 2019 05:24:23 GMT
- | Server: cPanel
- | Persistent-Auth: false
- | Host: server.click-grafix.com:2079
- | Cache-Control: no-cache, no-store, must-revalidate, private
- | Connection: close
- | Location: https://server.click-grafix.com:2080sip:nm
- | Vary: Accept-Encoding
- | Expires: Fri, 01 Jan 1990 00:00:00 GMT
- |_ X-Redirect-Reason: requiressl
- 2080/tcp open ssl/http syn-ack cPanel httpd (unauthorized)
- | http-auth:
- | HTTP/1.1 401 Unauthorized\x0D
- |_ Basic realm=Restricted Area
- |_http-server-header: cPanel
- |_http-title: Site doesn't have a title (text/html; charset="utf-8").
- | ssl-cert: Subject: commonName=server.click-grafix.com/organizationalUnitName=PositiveSSL
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US/localityName=Houston
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-07-24T00:00:00
- | Not valid after: 2019-07-24T23:59:59
- | MD5: ef36 53dc cdf1 d27c e2d0 51c4 6362 d6d4
- | SHA-1: 5187 e008 54ad a324 08d4 0e7b d84f e8f2 393e f965
- | -----BEGIN CERTIFICATE-----
- | MIIGQTCCBSmgAwIBAgIQT8KCl+8zC7CQ9uYDxKIzzTANBgkqhkiG9w0BAQsFADBy
- | MQswCQYDVQQGEwJVUzELMAkGA1UECBMCVFgxEDAOBgNVBAcTB0hvdXN0b24xFTAT
- | BgNVBAoTDGNQYW5lbCwgSW5jLjEtMCsGA1UEAxMkY1BhbmVsLCBJbmMuIENlcnRp
- | ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE4MDcyNDAwMDAwMFoXDTE5MDcyNDIzNTk1
- | OVowWzEhMB8GA1UECxMYRG9tYWluIENvbnRyb2wgVmFsaWRhdGVkMRQwEgYDVQQL
- | EwtQb3NpdGl2ZVNTTDEgMB4GA1UEAxMXc2VydmVyLmNsaWNrLWdyYWZpeC5jb20w
- | ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/fYpGJ02yX0eUG2ihh+im
- | 4DFiPfcFjX9vXOEAW93ToJNROXhCyRpd23JSO86fgQEiP4TKKMbnFYMnruTrOBKQ
- | OGpFXjvFItBqjYBSdePxNcvCpU6inBzN3ZUpqw3WHCi+qoHUzkqE27gkaoygdtuL
- | jl1EihNp0s/wBRt63AE+eU3re1KxOy1eBi3PEvP7+AIhWEqd2iyfHjfNRu3tlRgj
- | O3W/y3CnhuEOyyX4LOwxPvkQHDGSSxqiiqoH0zEnHGbIQYA2c2AnRQ3yOnjn13ZC
- | r48pR3b52/mpW8s6aJDmjdHUnbemv0k9Ijj8JpS5UBvzcKD0alLY3rrKi8B7vvg9
- | AgMBAAGjggLoMIIC5DAfBgNVHSMEGDAWgBR+A1plQWunfgrhuJ0I6h2OHWrHZTAd
- | BgNVHQ4EFgQU2Y+20s8w+YOm4cOKR3iXmedjQtYwDgYDVR0PAQH/BAQDAgWgMAwG
- | A1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1Ud
- | IARIMEYwOgYLKwYBBAGyMQECAjQwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1
- | cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIBMEwGA1UdHwRFMEMwQaA/oD2GO2h0
- | dHA6Ly9jcmwuY29tb2RvY2EuY29tL2NQYW5lbEluY0NlcnRpZmljYXRpb25BdXRo
- | b3JpdHkuY3JsMH0GCCsGAQUFBwEBBHEwbzBHBggrBgEFBQcwAoY7aHR0cDovL2Ny
- | dC5jb21vZG9jYS5jb20vY1BhbmVsSW5jQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5j
- | cnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTA/BgNVHREE
- | ODA2ghdzZXJ2ZXIuY2xpY2stZ3JhZml4LmNvbYIbd3d3LnNlcnZlci5jbGljay1n
- | cmFmaXguY29tMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHcA7ku9t3XOYLrhQmkf
- | q+GeZqMPfl+wctiDAMR7iXqo/csAAAFkyjfecAAABAMASDBGAiEA1gkICLUOquHw
- | AbNuhRP932fABvQx/+D0Qtu7lAgKv0oCIQDMLECO0bYVBaBlw4p77z18sp6AZJpR
- | ahZtv+puBgXVqQB1AHR+2oMxrTMQkSGcziVPQnDCv/1eQiAIxjc1eeYQe8xWAAAB
- | ZMo33q0AAAQDAEYwRAIgTfm2myATuvcT4nGzpxhuDgAZn2e+aBu22mYZZwgMB3IC
- | IAjo+/G1DzbhaInmiI27aPg5Srwh7CcoPJhywc3He6EzMA0GCSqGSIb3DQEBCwUA
- | A4IBAQA0wnmt9+d7pK/TtY+V+WeqpJ/v0EOAJYRQiP5ThRfjifn4SP+vVi7kc6dr
- | gmkG35Ti9xlNI9H6Hmwc1zDHJuwyom3YaaKm01tq4i3stIZVsAQUxQO4gXoK3PUX
- | ChLIa88YomTA6ZXJTftzbmZ1bwNAtwfWgzdQmhSZD7uP8x93qoB+KkLzBTV716cV
- | pBcac3fq6sVIfnGlxNtQwFHClfuR/kWu1s/Efsj0ftRSNi9Yu1jjWny4OZ6Pfmli
- | RzZ3EDSRfGtYYxaGIU9JRJClVUC8Ax335PlsodeibkYSMIrYAdXVLhbM0dPrZGje
- | BOfeO+nIKr9fTlkEPMP6DkTuTxC1
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 2082/tcp open infowave? syn-ack
- | fingerprint-strings:
- | SIPOptions:
- | HTTP/1.1 301 Moved
- | Content-length: 129
- | Location: https://server.click-grafix.com:2083/sip%3anm
- | Content-type: text/html; charset="utf-8"
- | Cache-Control: no-cache, no-store, must-revalidate, private
- |_ <html><head><META HTTP-EQUIV="refresh" CONTENT="2;URL=https://server.click-grafix.com:2083/sip%3anm"></head><body></body></html>
- 2083/tcp open ssl/radsec? syn-ack
- | fingerprint-strings:
- | GetRequest:
- | HTTP/1.0 401 Access Denied
- | Connection: close
- | Content-Type: text/html; charset="utf-8"
- | Date: Thu, 02 May 2019 05:23:15 GMT
- | Cache-Control: no-cache, no-store, must-revalidate, private
- | Pragma: no-cache
- | WWW-Authenticate: Basic realm="cPanel"
- | Set-Cookie: cprelogin=no; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2083; secure
- | Set-Cookie: cpsession=%3ap305Jnn7gJKFwOGS%2c5f62cfb5635924f8424bd10a3cb4abd4; HttpOnly; path=/; port=2083; secure
- | Set-Cookie: roundcube_sessid=expired; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2083; secure
- | Set-Cookie: roundcube_sessauth=expired; HttpOnly; domain=server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2083; secure
- | Set-Cookie: Horde=expired; HttpOnly; domain=.server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2083; secure
- | Set-Cookie: horde_secret_key=expired; Ht
- | HTTPOptions:
- | HTTP/1.0 401 Access Denied
- | Connection: close
- | Content-Type: text/html; charset="utf-8"
- | Date: Thu, 02 May 2019 05:23:15 GMT
- | Cache-Control: no-cache, no-store, must-revalidate, private
- | Pragma: no-cache
- | WWW-Authenticate: Basic realm="cPanel"
- | Set-Cookie: cprelogin=no; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2083; secure
- | Set-Cookie: cpsession=%3adEOErmUfX5ZDH3Yj%2c89614a85004a4bc8d57aa24a1fe23b5b; HttpOnly; path=/; port=2083; secure
- | Set-Cookie: roundcube_sessid=expired; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2083; secure
- | Set-Cookie: roundcube_sessauth=expired; HttpOnly; domain=server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2083; secure
- | Set-Cookie: Horde=expired; HttpOnly; domain=.server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2083; secure
- |_ Set-Cookie: horde_secret_key=expired; Ht
- | ssl-cert: Subject: commonName=server.click-grafix.com/organizationalUnitName=PositiveSSL
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US/localityName=Houston
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-07-24T00:00:00
- | Not valid after: 2019-07-24T23:59:59
- | MD5: ef36 53dc cdf1 d27c e2d0 51c4 6362 d6d4
- | SHA-1: 5187 e008 54ad a324 08d4 0e7b d84f e8f2 393e f965
- | -----BEGIN CERTIFICATE-----
- | MIIGQTCCBSmgAwIBAgIQT8KCl+8zC7CQ9uYDxKIzzTANBgkqhkiG9w0BAQsFADBy
- | MQswCQYDVQQGEwJVUzELMAkGA1UECBMCVFgxEDAOBgNVBAcTB0hvdXN0b24xFTAT
- | BgNVBAoTDGNQYW5lbCwgSW5jLjEtMCsGA1UEAxMkY1BhbmVsLCBJbmMuIENlcnRp
- | ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE4MDcyNDAwMDAwMFoXDTE5MDcyNDIzNTk1
- | OVowWzEhMB8GA1UECxMYRG9tYWluIENvbnRyb2wgVmFsaWRhdGVkMRQwEgYDVQQL
- | EwtQb3NpdGl2ZVNTTDEgMB4GA1UEAxMXc2VydmVyLmNsaWNrLWdyYWZpeC5jb20w
- | ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/fYpGJ02yX0eUG2ihh+im
- | 4DFiPfcFjX9vXOEAW93ToJNROXhCyRpd23JSO86fgQEiP4TKKMbnFYMnruTrOBKQ
- | OGpFXjvFItBqjYBSdePxNcvCpU6inBzN3ZUpqw3WHCi+qoHUzkqE27gkaoygdtuL
- | jl1EihNp0s/wBRt63AE+eU3re1KxOy1eBi3PEvP7+AIhWEqd2iyfHjfNRu3tlRgj
- | O3W/y3CnhuEOyyX4LOwxPvkQHDGSSxqiiqoH0zEnHGbIQYA2c2AnRQ3yOnjn13ZC
- | r48pR3b52/mpW8s6aJDmjdHUnbemv0k9Ijj8JpS5UBvzcKD0alLY3rrKi8B7vvg9
- | AgMBAAGjggLoMIIC5DAfBgNVHSMEGDAWgBR+A1plQWunfgrhuJ0I6h2OHWrHZTAd
- | BgNVHQ4EFgQU2Y+20s8w+YOm4cOKR3iXmedjQtYwDgYDVR0PAQH/BAQDAgWgMAwG
- | A1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1Ud
- | IARIMEYwOgYLKwYBBAGyMQECAjQwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1
- | cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIBMEwGA1UdHwRFMEMwQaA/oD2GO2h0
- | dHA6Ly9jcmwuY29tb2RvY2EuY29tL2NQYW5lbEluY0NlcnRpZmljYXRpb25BdXRo
- | b3JpdHkuY3JsMH0GCCsGAQUFBwEBBHEwbzBHBggrBgEFBQcwAoY7aHR0cDovL2Ny
- | dC5jb21vZG9jYS5jb20vY1BhbmVsSW5jQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5j
- | cnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTA/BgNVHREE
- | ODA2ghdzZXJ2ZXIuY2xpY2stZ3JhZml4LmNvbYIbd3d3LnNlcnZlci5jbGljay1n
- | cmFmaXguY29tMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHcA7ku9t3XOYLrhQmkf
- | q+GeZqMPfl+wctiDAMR7iXqo/csAAAFkyjfecAAABAMASDBGAiEA1gkICLUOquHw
- | AbNuhRP932fABvQx/+D0Qtu7lAgKv0oCIQDMLECO0bYVBaBlw4p77z18sp6AZJpR
- | ahZtv+puBgXVqQB1AHR+2oMxrTMQkSGcziVPQnDCv/1eQiAIxjc1eeYQe8xWAAAB
- | ZMo33q0AAAQDAEYwRAIgTfm2myATuvcT4nGzpxhuDgAZn2e+aBu22mYZZwgMB3IC
- | IAjo+/G1DzbhaInmiI27aPg5Srwh7CcoPJhywc3He6EzMA0GCSqGSIb3DQEBCwUA
- | A4IBAQA0wnmt9+d7pK/TtY+V+WeqpJ/v0EOAJYRQiP5ThRfjifn4SP+vVi7kc6dr
- | gmkG35Ti9xlNI9H6Hmwc1zDHJuwyom3YaaKm01tq4i3stIZVsAQUxQO4gXoK3PUX
- | ChLIa88YomTA6ZXJTftzbmZ1bwNAtwfWgzdQmhSZD7uP8x93qoB+KkLzBTV716cV
- | pBcac3fq6sVIfnGlxNtQwFHClfuR/kWu1s/Efsj0ftRSNi9Yu1jjWny4OZ6Pfmli
- | RzZ3EDSRfGtYYxaGIU9JRJClVUC8Ax335PlsodeibkYSMIrYAdXVLhbM0dPrZGje
- | BOfeO+nIKr9fTlkEPMP6DkTuTxC1
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 2086/tcp open gnunet? syn-ack
- | fingerprint-strings:
- | SIPOptions:
- | HTTP/1.1 301 Moved
- | Content-length: 129
- | Location: https://server.click-grafix.com:2087/sip%3anm
- | Content-type: text/html; charset="utf-8"
- | Cache-Control: no-cache, no-store, must-revalidate, private
- |_ <html><head><META HTTP-EQUIV="refresh" CONTENT="2;URL=https://server.click-grafix.com:2087/sip%3anm"></head><body></body></html>
- 2087/tcp open ssl/eli? syn-ack
- | fingerprint-strings:
- | GetRequest:
- | HTTP/1.0 401 Access Denied
- | Connection: close
- | Content-Type: text/html; charset="utf-8"
- | Date: Thu, 02 May 2019 05:23:15 GMT
- | Cache-Control: no-cache, no-store, must-revalidate, private
- | Pragma: no-cache
- | WWW-Authenticate: Basic realm="Web Host Manager"
- | Set-Cookie: whostmgrrelogin=no; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: whostmgrsession=%3aIG6j26ZH_AJ70mcz%2c4bc7424834c047dd78ca6334fe3103ef; HttpOnly; path=/; port=2087; secure
- | Set-Cookie: roundcube_sessid=expired; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: roundcube_sessauth=expired; HttpOnly; domain=server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: Horde=expired; HttpOnly; domain=.server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: horde_
- | HTTPOptions:
- | HTTP/1.0 401 Access Denied
- | Connection: close
- | Content-Type: text/html; charset="utf-8"
- | Date: Thu, 02 May 2019 05:23:15 GMT
- | Cache-Control: no-cache, no-store, must-revalidate, private
- | Pragma: no-cache
- | WWW-Authenticate: Basic realm="Web Host Manager"
- | Set-Cookie: whostmgrrelogin=no; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: whostmgrsession=%3aScs_IGvflCRCT_9P%2cd4b23069ca392f10ffc04198a7764005; HttpOnly; path=/; port=2087; secure
- | Set-Cookie: roundcube_sessid=expired; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: roundcube_sessauth=expired; HttpOnly; domain=server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- | Set-Cookie: Horde=expired; HttpOnly; domain=.server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2087; secure
- |_ Set-Cookie: horde_
- | ssl-cert: Subject: commonName=server.click-grafix.com/organizationalUnitName=PositiveSSL
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US/localityName=Houston
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-07-24T00:00:00
- | Not valid after: 2019-07-24T23:59:59
- | MD5: ef36 53dc cdf1 d27c e2d0 51c4 6362 d6d4
- | SHA-1: 5187 e008 54ad a324 08d4 0e7b d84f e8f2 393e f965
- | -----BEGIN CERTIFICATE-----
- | MIIGQTCCBSmgAwIBAgIQT8KCl+8zC7CQ9uYDxKIzzTANBgkqhkiG9w0BAQsFADBy
- | MQswCQYDVQQGEwJVUzELMAkGA1UECBMCVFgxEDAOBgNVBAcTB0hvdXN0b24xFTAT
- | BgNVBAoTDGNQYW5lbCwgSW5jLjEtMCsGA1UEAxMkY1BhbmVsLCBJbmMuIENlcnRp
- | ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE4MDcyNDAwMDAwMFoXDTE5MDcyNDIzNTk1
- | OVowWzEhMB8GA1UECxMYRG9tYWluIENvbnRyb2wgVmFsaWRhdGVkMRQwEgYDVQQL
- | EwtQb3NpdGl2ZVNTTDEgMB4GA1UEAxMXc2VydmVyLmNsaWNrLWdyYWZpeC5jb20w
- | ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/fYpGJ02yX0eUG2ihh+im
- | 4DFiPfcFjX9vXOEAW93ToJNROXhCyRpd23JSO86fgQEiP4TKKMbnFYMnruTrOBKQ
- | OGpFXjvFItBqjYBSdePxNcvCpU6inBzN3ZUpqw3WHCi+qoHUzkqE27gkaoygdtuL
- | jl1EihNp0s/wBRt63AE+eU3re1KxOy1eBi3PEvP7+AIhWEqd2iyfHjfNRu3tlRgj
- | O3W/y3CnhuEOyyX4LOwxPvkQHDGSSxqiiqoH0zEnHGbIQYA2c2AnRQ3yOnjn13ZC
- | r48pR3b52/mpW8s6aJDmjdHUnbemv0k9Ijj8JpS5UBvzcKD0alLY3rrKi8B7vvg9
- | AgMBAAGjggLoMIIC5DAfBgNVHSMEGDAWgBR+A1plQWunfgrhuJ0I6h2OHWrHZTAd
- | BgNVHQ4EFgQU2Y+20s8w+YOm4cOKR3iXmedjQtYwDgYDVR0PAQH/BAQDAgWgMAwG
- | A1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1Ud
- | IARIMEYwOgYLKwYBBAGyMQECAjQwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1
- | cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIBMEwGA1UdHwRFMEMwQaA/oD2GO2h0
- | dHA6Ly9jcmwuY29tb2RvY2EuY29tL2NQYW5lbEluY0NlcnRpZmljYXRpb25BdXRo
- | b3JpdHkuY3JsMH0GCCsGAQUFBwEBBHEwbzBHBggrBgEFBQcwAoY7aHR0cDovL2Ny
- | dC5jb21vZG9jYS5jb20vY1BhbmVsSW5jQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5j
- | cnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTA/BgNVHREE
- | ODA2ghdzZXJ2ZXIuY2xpY2stZ3JhZml4LmNvbYIbd3d3LnNlcnZlci5jbGljay1n
- | cmFmaXguY29tMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHcA7ku9t3XOYLrhQmkf
- | q+GeZqMPfl+wctiDAMR7iXqo/csAAAFkyjfecAAABAMASDBGAiEA1gkICLUOquHw
- | AbNuhRP932fABvQx/+D0Qtu7lAgKv0oCIQDMLECO0bYVBaBlw4p77z18sp6AZJpR
- | ahZtv+puBgXVqQB1AHR+2oMxrTMQkSGcziVPQnDCv/1eQiAIxjc1eeYQe8xWAAAB
- | ZMo33q0AAAQDAEYwRAIgTfm2myATuvcT4nGzpxhuDgAZn2e+aBu22mYZZwgMB3IC
- | IAjo+/G1DzbhaInmiI27aPg5Srwh7CcoPJhywc3He6EzMA0GCSqGSIb3DQEBCwUA
- | A4IBAQA0wnmt9+d7pK/TtY+V+WeqpJ/v0EOAJYRQiP5ThRfjifn4SP+vVi7kc6dr
- | gmkG35Ti9xlNI9H6Hmwc1zDHJuwyom3YaaKm01tq4i3stIZVsAQUxQO4gXoK3PUX
- | ChLIa88YomTA6ZXJTftzbmZ1bwNAtwfWgzdQmhSZD7uP8x93qoB+KkLzBTV716cV
- | pBcac3fq6sVIfnGlxNtQwFHClfuR/kWu1s/Efsj0ftRSNi9Yu1jjWny4OZ6Pfmli
- | RzZ3EDSRfGtYYxaGIU9JRJClVUC8Ax335PlsodeibkYSMIrYAdXVLhbM0dPrZGje
- | BOfeO+nIKr9fTlkEPMP6DkTuTxC1
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 2095/tcp open nbx-ser? syn-ack
- | fingerprint-strings:
- | SIPOptions:
- | HTTP/1.1 301 Moved
- | Content-length: 129
- | Location: https://server.click-grafix.com:2096/sip%3anm
- | Content-type: text/html; charset="utf-8"
- | Cache-Control: no-cache, no-store, must-revalidate, private
- |_ <html><head><META HTTP-EQUIV="refresh" CONTENT="2;URL=https://server.click-grafix.com:2096/sip%3anm"></head><body></body></html>
- 2096/tcp open ssl/nbx-dir? syn-ack
- | fingerprint-strings:
- | GetRequest:
- | HTTP/1.0 401 Access Denied
- | Connection: close
- | Content-Type: text/html; charset="utf-8"
- | Date: Thu, 02 May 2019 05:23:15 GMT
- | Cache-Control: no-cache, no-store, must-revalidate, private
- | Pragma: no-cache
- | WWW-Authenticate: Basic realm="WebMail"
- | Set-Cookie: webmailrelogin=no; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2096; secure
- | Set-Cookie: webmailsession=%3a8R8FrB2to39cWEy4%2cecc8de0824cdeea5fb53f07f9777e8bb; HttpOnly; path=/; port=2096; secure
- | Set-Cookie: roundcube_sessid=expired; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2096; secure
- | Set-Cookie: roundcube_sessauth=expired; HttpOnly; domain=server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2096; secure
- | Set-Cookie: Horde=expired; HttpOnly; domain=.server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2096; secure
- | Set-Cookie: horde_secret_key=
- | HTTPOptions:
- | HTTP/1.0 401 Access Denied
- | Connection: close
- | Content-Type: text/html; charset="utf-8"
- | Date: Thu, 02 May 2019 05:23:15 GMT
- | Cache-Control: no-cache, no-store, must-revalidate, private
- | Pragma: no-cache
- | WWW-Authenticate: Basic realm="WebMail"
- | Set-Cookie: webmailrelogin=no; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2096; secure
- | Set-Cookie: webmailsession=%3aMQCwmKFs9NrgDUNm%2c1ac580b80b3341580deeffb8444cfe8a; HttpOnly; path=/; port=2096; secure
- | Set-Cookie: roundcube_sessid=expired; HttpOnly; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2096; secure
- | Set-Cookie: roundcube_sessauth=expired; HttpOnly; domain=server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2096; secure
- | Set-Cookie: Horde=expired; HttpOnly; domain=.server.click-grafix.com; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; port=2096; secure
- |_ Set-Cookie: horde_secret_key=
- | ssl-cert: Subject: commonName=server.click-grafix.com/organizationalUnitName=PositiveSSL
- | Subject Alternative Name: DNS:server.click-grafix.com, DNS:www.server.click-grafix.com
- | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US/localityName=Houston
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-07-24T00:00:00
- | Not valid after: 2019-07-24T23:59:59
- | MD5: ef36 53dc cdf1 d27c e2d0 51c4 6362 d6d4
- | SHA-1: 5187 e008 54ad a324 08d4 0e7b d84f e8f2 393e f965
- | -----BEGIN CERTIFICATE-----
- | MIIGQTCCBSmgAwIBAgIQT8KCl+8zC7CQ9uYDxKIzzTANBgkqhkiG9w0BAQsFADBy
- | MQswCQYDVQQGEwJVUzELMAkGA1UECBMCVFgxEDAOBgNVBAcTB0hvdXN0b24xFTAT
- | BgNVBAoTDGNQYW5lbCwgSW5jLjEtMCsGA1UEAxMkY1BhbmVsLCBJbmMuIENlcnRp
- | ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE4MDcyNDAwMDAwMFoXDTE5MDcyNDIzNTk1
- | OVowWzEhMB8GA1UECxMYRG9tYWluIENvbnRyb2wgVmFsaWRhdGVkMRQwEgYDVQQL
- | EwtQb3NpdGl2ZVNTTDEgMB4GA1UEAxMXc2VydmVyLmNsaWNrLWdyYWZpeC5jb20w
- | ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/fYpGJ02yX0eUG2ihh+im
- | 4DFiPfcFjX9vXOEAW93ToJNROXhCyRpd23JSO86fgQEiP4TKKMbnFYMnruTrOBKQ
- | OGpFXjvFItBqjYBSdePxNcvCpU6inBzN3ZUpqw3WHCi+qoHUzkqE27gkaoygdtuL
- | jl1EihNp0s/wBRt63AE+eU3re1KxOy1eBi3PEvP7+AIhWEqd2iyfHjfNRu3tlRgj
- | O3W/y3CnhuEOyyX4LOwxPvkQHDGSSxqiiqoH0zEnHGbIQYA2c2AnRQ3yOnjn13ZC
- | r48pR3b52/mpW8s6aJDmjdHUnbemv0k9Ijj8JpS5UBvzcKD0alLY3rrKi8B7vvg9
- | AgMBAAGjggLoMIIC5DAfBgNVHSMEGDAWgBR+A1plQWunfgrhuJ0I6h2OHWrHZTAd
- | BgNVHQ4EFgQU2Y+20s8w+YOm4cOKR3iXmedjQtYwDgYDVR0PAQH/BAQDAgWgMAwG
- | A1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1Ud
- | IARIMEYwOgYLKwYBBAGyMQECAjQwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1
- | cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIBMEwGA1UdHwRFMEMwQaA/oD2GO2h0
- | dHA6Ly9jcmwuY29tb2RvY2EuY29tL2NQYW5lbEluY0NlcnRpZmljYXRpb25BdXRo
- | b3JpdHkuY3JsMH0GCCsGAQUFBwEBBHEwbzBHBggrBgEFBQcwAoY7aHR0cDovL2Ny
- | dC5jb21vZG9jYS5jb20vY1BhbmVsSW5jQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5j
- | cnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTA/BgNVHREE
- | ODA2ghdzZXJ2ZXIuY2xpY2stZ3JhZml4LmNvbYIbd3d3LnNlcnZlci5jbGljay1n
- | cmFmaXguY29tMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHcA7ku9t3XOYLrhQmkf
- | q+GeZqMPfl+wctiDAMR7iXqo/csAAAFkyjfecAAABAMASDBGAiEA1gkICLUOquHw
- | AbNuhRP932fABvQx/+D0Qtu7lAgKv0oCIQDMLECO0bYVBaBlw4p77z18sp6AZJpR
- | ahZtv+puBgXVqQB1AHR+2oMxrTMQkSGcziVPQnDCv/1eQiAIxjc1eeYQe8xWAAAB
- | ZMo33q0AAAQDAEYwRAIgTfm2myATuvcT4nGzpxhuDgAZn2e+aBu22mYZZwgMB3IC
- | IAjo+/G1DzbhaInmiI27aPg5Srwh7CcoPJhywc3He6EzMA0GCSqGSIb3DQEBCwUA
- | A4IBAQA0wnmt9+d7pK/TtY+V+WeqpJ/v0EOAJYRQiP5ThRfjifn4SP+vVi7kc6dr
- | gmkG35Ti9xlNI9H6Hmwc1zDHJuwyom3YaaKm01tq4i3stIZVsAQUxQO4gXoK3PUX
- | ChLIa88YomTA6ZXJTftzbmZ1bwNAtwfWgzdQmhSZD7uP8x93qoB+KkLzBTV716cV
- | pBcac3fq6sVIfnGlxNtQwFHClfuR/kWu1s/Efsj0ftRSNi9Yu1jjWny4OZ6Pfmli
- | RzZ3EDSRfGtYYxaGIU9JRJClVUC8Ax335PlsodeibkYSMIrYAdXVLhbM0dPrZGje
- | BOfeO+nIKr9fTlkEPMP6DkTuTxC1
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 8 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port2077-TCP:V=7.70%I=7%D=5/2%Time=5CCA7F0A%P=x86_64-pc-linux-gnu%r(SIP
- SF:Options,16B,"HTTP/1\.1\x20302\x20Moved\r\nDate:\x20Thu,\x2002\x20May\x2
- SF:02019\x2005:24:23\x20GMT\r\nServer:\x20cPanel\r\nPersistent-Auth:\x20fa
- SF:lse\r\nHost:\x20server\.click-grafix\.com:2077\r\nCache-Control:\x20no-
- SF:cache,\x20no-store,\x20must-revalidate,\x20private\r\nConnection:\x20cl
- SF:ose\r\nLocation:\x20https://server\.click-grafix\.com:2078sip:nm\r\nVar
- SF:y:\x20Accept-Encoding\r\nExpires:\x20Fri,\x2001\x20Jan\x201990\x2000:00
- SF::00\x20GMT\r\nX-Redirect-Reason:\x20requiressl\r\n\r\n");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port2079-TCP:V=7.70%I=7%D=5/2%Time=5CCA7F0A%P=x86_64-pc-linux-gnu%r(SIP
- SF:Options,16B,"HTTP/1\.1\x20302\x20Moved\r\nDate:\x20Thu,\x2002\x20May\x2
- SF:02019\x2005:24:23\x20GMT\r\nServer:\x20cPanel\r\nPersistent-Auth:\x20fa
- SF:lse\r\nHost:\x20server\.click-grafix\.com:2079\r\nCache-Control:\x20no-
- SF:cache,\x20no-store,\x20must-revalidate,\x20private\r\nConnection:\x20cl
- SF:ose\r\nLocation:\x20https://server\.click-grafix\.com:2080sip:nm\r\nVar
- SF:y:\x20Accept-Encoding\r\nExpires:\x20Fri,\x2001\x20Jan\x201990\x2000:00
- SF::00\x20GMT\r\nX-Redirect-Reason:\x20requiressl\r\n\r\n");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port2082-TCP:V=7.70%I=7%D=5/2%Time=5CCA7F0A%P=x86_64-pc-linux-gnu%r(SIP
- SF:Options,14C,"HTTP/1\.1\x20301\x20Moved\r\nContent-length:\x20129\r\nLoc
- SF:ation:\x20https://server\.click-grafix\.com:2083/sip%3anm\r\nContent-ty
- SF:pe:\x20text/html;\x20charset=\"utf-8\"\r\nCache-Control:\x20no-cache,\x
- SF:20no-store,\x20must-revalidate,\x20private\r\n\r\n<html><head><META\x20
- SF:HTTP-EQUIV=\"refresh\"\x20CONTENT=\"2;URL=https://server\.click-grafix\
- SF:.com:2083/sip%3anm\"></head><body></body></html>\n");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port2083-TCP:V=7.70%T=SSL%I=7%D=5/2%Time=5CCA7EC6%P=x86_64-pc-linux-gnu
- SF:%r(GetRequest,95C3,"HTTP/1\.0\x20401\x20Access\x20Denied\r\nConnection:
- SF:\x20close\r\nContent-Type:\x20text/html;\x20charset=\"utf-8\"\r\nDate:\
- SF:x20Thu,\x2002\x20May\x202019\x2005:23:15\x20GMT\r\nCache-Control:\x20no
- SF:-cache,\x20no-store,\x20must-revalidate,\x20private\r\nPragma:\x20no-ca
- SF:che\r\nWWW-Authenticate:\x20Basic\x20realm=\"cPanel\"\r\nSet-Cookie:\x2
- SF:0cprelogin=no;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-1970\x2000:00:01\
- SF:x20GMT;\x20path=/;\x20port=2083;\x20secure\r\nSet-Cookie:\x20cpsession=
- SF:%3ap305Jnn7gJKFwOGS%2c5f62cfb5635924f8424bd10a3cb4abd4;\x20HttpOnly;\x2
- SF:0path=/;\x20port=2083;\x20secure\r\nSet-Cookie:\x20roundcube_sessid=exp
- SF:ired;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x
- SF:20path=/;\x20port=2083;\x20secure\r\nSet-Cookie:\x20roundcube_sessauth=
- SF:expired;\x20HttpOnly;\x20domain=server\.click-grafix\.com;\x20expires=T
- SF:hu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20path=/;\x20port=2083;\x20secu
- SF:re\r\nSet-Cookie:\x20Horde=expired;\x20HttpOnly;\x20domain=\.server\.cl
- SF:ick-grafix\.com;\x20expires=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20
- SF:path=/;\x20port=2083;\x20secure\r\nSet-Cookie:\x20horde_secret_key=expi
- SF:red;\x20Ht")%r(HTTPOptions,95C3,"HTTP/1\.0\x20401\x20Access\x20Denied\r
- SF:\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=\"utf-
- SF:8\"\r\nDate:\x20Thu,\x2002\x20May\x202019\x2005:23:15\x20GMT\r\nCache-C
- SF:ontrol:\x20no-cache,\x20no-store,\x20must-revalidate,\x20private\r\nPra
- SF:gma:\x20no-cache\r\nWWW-Authenticate:\x20Basic\x20realm=\"cPanel\"\r\nS
- SF:et-Cookie:\x20cprelogin=no;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-1970
- SF:\x2000:00:01\x20GMT;\x20path=/;\x20port=2083;\x20secure\r\nSet-Cookie:\
- SF:x20cpsession=%3adEOErmUfX5ZDH3Yj%2c89614a85004a4bc8d57aa24a1fe23b5b;\x2
- SF:0HttpOnly;\x20path=/;\x20port=2083;\x20secure\r\nSet-Cookie:\x20roundcu
- SF:be_sessid=expired;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-1970\x2000:00
- SF::01\x20GMT;\x20path=/;\x20port=2083;\x20secure\r\nSet-Cookie:\x20roundc
- SF:ube_sessauth=expired;\x20HttpOnly;\x20domain=server\.click-grafix\.com;
- SF:\x20expires=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20path=/;\x20port=
- SF:2083;\x20secure\r\nSet-Cookie:\x20Horde=expired;\x20HttpOnly;\x20domain
- SF:=\.server\.click-grafix\.com;\x20expires=Thu,\x2001-Jan-1970\x2000:00:0
- SF:1\x20GMT;\x20path=/;\x20port=2083;\x20secure\r\nSet-Cookie:\x20horde_se
- SF:cret_key=expired;\x20Ht");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port2086-TCP:V=7.70%I=7%D=5/2%Time=5CCA7F0A%P=x86_64-pc-linux-gnu%r(SIP
- SF:Options,14C,"HTTP/1\.1\x20301\x20Moved\r\nContent-length:\x20129\r\nLoc
- SF:ation:\x20https://server\.click-grafix\.com:2087/sip%3anm\r\nContent-ty
- SF:pe:\x20text/html;\x20charset=\"utf-8\"\r\nCache-Control:\x20no-cache,\x
- SF:20no-store,\x20must-revalidate,\x20private\r\n\r\n<html><head><META\x20
- SF:HTTP-EQUIV=\"refresh\"\x20CONTENT=\"2;URL=https://server\.click-grafix\
- SF:.com:2087/sip%3anm\"></head><body></body></html>\n");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port2087-TCP:V=7.70%T=SSL%I=7%D=5/2%Time=5CCA7EC6%P=x86_64-pc-linux-gnu
- SF:%r(GetRequest,4000,"HTTP/1\.0\x20401\x20Access\x20Denied\r\nConnection:
- SF:\x20close\r\nContent-Type:\x20text/html;\x20charset=\"utf-8\"\r\nDate:\
- SF:x20Thu,\x2002\x20May\x202019\x2005:23:15\x20GMT\r\nCache-Control:\x20no
- SF:-cache,\x20no-store,\x20must-revalidate,\x20private\r\nPragma:\x20no-ca
- SF:che\r\nWWW-Authenticate:\x20Basic\x20realm=\"Web\x20Host\x20Manager\"\r
- SF:\nSet-Cookie:\x20whostmgrrelogin=no;\x20HttpOnly;\x20expires=Thu,\x2001
- SF:-Jan-1970\x2000:00:01\x20GMT;\x20path=/;\x20port=2087;\x20secure\r\nSet
- SF:-Cookie:\x20whostmgrsession=%3aIG6j26ZH_AJ70mcz%2c4bc7424834c047dd78ca6
- SF:334fe3103ef;\x20HttpOnly;\x20path=/;\x20port=2087;\x20secure\r\nSet-Coo
- SF:kie:\x20roundcube_sessid=expired;\x20HttpOnly;\x20expires=Thu,\x2001-Ja
- SF:n-1970\x2000:00:01\x20GMT;\x20path=/;\x20port=2087;\x20secure\r\nSet-Co
- SF:okie:\x20roundcube_sessauth=expired;\x20HttpOnly;\x20domain=server\.cli
- SF:ck-grafix\.com;\x20expires=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20p
- SF:ath=/;\x20port=2087;\x20secure\r\nSet-Cookie:\x20Horde=expired;\x20Http
- SF:Only;\x20domain=\.server\.click-grafix\.com;\x20expires=Thu,\x2001-Jan-
- SF:1970\x2000:00:01\x20GMT;\x20path=/;\x20port=2087;\x20secure\r\nSet-Cook
- SF:ie:\x20horde_")%r(HTTPOptions,4000,"HTTP/1\.0\x20401\x20Access\x20Denie
- SF:d\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=\"u
- SF:tf-8\"\r\nDate:\x20Thu,\x2002\x20May\x202019\x2005:23:15\x20GMT\r\nCach
- SF:e-Control:\x20no-cache,\x20no-store,\x20must-revalidate,\x20private\r\n
- SF:Pragma:\x20no-cache\r\nWWW-Authenticate:\x20Basic\x20realm=\"Web\x20Hos
- SF:t\x20Manager\"\r\nSet-Cookie:\x20whostmgrrelogin=no;\x20HttpOnly;\x20ex
- SF:pires=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20path=/;\x20port=2087;\
- SF:x20secure\r\nSet-Cookie:\x20whostmgrsession=%3aScs_IGvflCRCT_9P%2cd4b23
- SF:069ca392f10ffc04198a7764005;\x20HttpOnly;\x20path=/;\x20port=2087;\x20s
- SF:ecure\r\nSet-Cookie:\x20roundcube_sessid=expired;\x20HttpOnly;\x20expir
- SF:es=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20path=/;\x20port=2087;\x20
- SF:secure\r\nSet-Cookie:\x20roundcube_sessauth=expired;\x20HttpOnly;\x20do
- SF:main=server\.click-grafix\.com;\x20expires=Thu,\x2001-Jan-1970\x2000:00
- SF::01\x20GMT;\x20path=/;\x20port=2087;\x20secure\r\nSet-Cookie:\x20Horde=
- SF:expired;\x20HttpOnly;\x20domain=\.server\.click-grafix\.com;\x20expires
- SF:=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20path=/;\x20port=2087;\x20se
- SF:cure\r\nSet-Cookie:\x20horde_");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port2095-TCP:V=7.70%I=7%D=5/2%Time=5CCA7F0A%P=x86_64-pc-linux-gnu%r(SIP
- SF:Options,14C,"HTTP/1\.1\x20301\x20Moved\r\nContent-length:\x20129\r\nLoc
- SF:ation:\x20https://server\.click-grafix\.com:2096/sip%3anm\r\nContent-ty
- SF:pe:\x20text/html;\x20charset=\"utf-8\"\r\nCache-Control:\x20no-cache,\x
- SF:20no-store,\x20must-revalidate,\x20private\r\n\r\n<html><head><META\x20
- SF:HTTP-EQUIV=\"refresh\"\x20CONTENT=\"2;URL=https://server\.click-grafix\
- SF:.com:2096/sip%3anm\"></head><body></body></html>\n");
- ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
- SF-Port2096-TCP:V=7.70%T=SSL%I=7%D=5/2%Time=5CCA7EC5%P=x86_64-pc-linux-gnu
- SF:%r(GetRequest,4000,"HTTP/1\.0\x20401\x20Access\x20Denied\r\nConnection:
- SF:\x20close\r\nContent-Type:\x20text/html;\x20charset=\"utf-8\"\r\nDate:\
- SF:x20Thu,\x2002\x20May\x202019\x2005:23:15\x20GMT\r\nCache-Control:\x20no
- SF:-cache,\x20no-store,\x20must-revalidate,\x20private\r\nPragma:\x20no-ca
- SF:che\r\nWWW-Authenticate:\x20Basic\x20realm=\"WebMail\"\r\nSet-Cookie:\x
- SF:20webmailrelogin=no;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-1970\x2000:
- SF:00:01\x20GMT;\x20path=/;\x20port=2096;\x20secure\r\nSet-Cookie:\x20webm
- SF:ailsession=%3a8R8FrB2to39cWEy4%2cecc8de0824cdeea5fb53f07f9777e8bb;\x20H
- SF:ttpOnly;\x20path=/;\x20port=2096;\x20secure\r\nSet-Cookie:\x20roundcube
- SF:_sessid=expired;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-1970\x2000:00:0
- SF:1\x20GMT;\x20path=/;\x20port=2096;\x20secure\r\nSet-Cookie:\x20roundcub
- SF:e_sessauth=expired;\x20HttpOnly;\x20domain=server\.click-grafix\.com;\x
- SF:20expires=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20path=/;\x20port=20
- SF:96;\x20secure\r\nSet-Cookie:\x20Horde=expired;\x20HttpOnly;\x20domain=\
- SF:.server\.click-grafix\.com;\x20expires=Thu,\x2001-Jan-1970\x2000:00:01\
- SF:x20GMT;\x20path=/;\x20port=2096;\x20secure\r\nSet-Cookie:\x20horde_secr
- SF:et_key=")%r(HTTPOptions,964D,"HTTP/1\.0\x20401\x20Access\x20Denied\r\nC
- SF:onnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=\"utf-8\"
- SF:\r\nDate:\x20Thu,\x2002\x20May\x202019\x2005:23:15\x20GMT\r\nCache-Cont
- SF:rol:\x20no-cache,\x20no-store,\x20must-revalidate,\x20private\r\nPragma
- SF::\x20no-cache\r\nWWW-Authenticate:\x20Basic\x20realm=\"WebMail\"\r\nSet
- SF:-Cookie:\x20webmailrelogin=no;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-1
- SF:970\x2000:00:01\x20GMT;\x20path=/;\x20port=2096;\x20secure\r\nSet-Cooki
- SF:e:\x20webmailsession=%3aMQCwmKFs9NrgDUNm%2c1ac580b80b3341580deeffb8444c
- SF:fe8a;\x20HttpOnly;\x20path=/;\x20port=2096;\x20secure\r\nSet-Cookie:\x2
- SF:0roundcube_sessid=expired;\x20HttpOnly;\x20expires=Thu,\x2001-Jan-1970\
- SF:x2000:00:01\x20GMT;\x20path=/;\x20port=2096;\x20secure\r\nSet-Cookie:\x
- SF:20roundcube_sessauth=expired;\x20HttpOnly;\x20domain=server\.click-graf
- SF:ix\.com;\x20expires=Thu,\x2001-Jan-1970\x2000:00:01\x20GMT;\x20path=/;\
- SF:x20port=2096;\x20secure\r\nSet-Cookie:\x20Horde=expired;\x20HttpOnly;\x
- SF:20domain=\.server\.click-grafix\.com;\x20expires=Thu,\x2001-Jan-1970\x2
- SF:000:00:01\x20GMT;\x20path=/;\x20port=2096;\x20secure\r\nSet-Cookie:\x20
- SF:horde_secret_key=");
- Device type: general purpose|storage-misc|firewall
- Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (93%), Synology DiskStation Manager 5.X (87%), WatchGuard Fireware 11.X (87%), FreeBSD 6.X (86%)
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/o:freebsd:freebsd:6.2
- OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
- Aggressive OS guesses: Linux 3.10 - 3.12 (93%), Linux 4.4 (93%), Linux 4.9 (90%), Linux 3.10 - 3.16 (88%), Linux 4.0 (88%), Linux 3.11 - 4.1 (87%), Linux 2.6.32 (87%), Linux 2.6.39 (87%), Linux 3.4 (87%), Linux 3.5 (87%)
- No exact OS matches for host (test conditions non-ideal).
- TCP/IP fingerprint:
- SCAN(V=7.70%E=4%D=5/2%OT=53%CT=22%CU=%PV=N%DS=16%DC=T%G=N%TM=5CCA7F8B%P=x86_64-pc-linux-gnu)
- SEQ(SP=106%GCD=1%ISR=10C%TI=Z%TS=A)
- OPS(O1=M44FST11NW7%O2=M44FST11NW7%O3=M44FNNT11NW7%O4=M44FST11NW7%O5=M44FST11NW7%O6=M44FST11)
- WIN(W1=7120%W2=7120%W3=7120%W4=7120%W5=7120%W6=7120)
- ECN(R=Y%DF=Y%TG=40%W=7210%O=M44FNNSNW7%CC=Y%Q=)
- T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
- T2(R=N)
- T3(R=N)
- T4(R=N)
- T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
- T6(R=N)
- T7(R=N)
- U1(R=N)
- IE(R=Y%DFI=N%TG=40%CD=S)
- Uptime guess: 28.659 days (since Wed Apr 3 09:37:16 2019)
- Network Distance: 16 hops
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OSs: Linux, FortiOS; Device: firewall; CPE: cpe:/o:redhat:enterprise_linux:7, cpe:/h:fortinet:fortiwifi:80c
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 22.02 ms 10.248.200.1
- 2 22.43 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
- 3 42.39 ms xe-0-0-1-0.agg2.qc1.ca.m247.com (37.120.128.166)
- 4 22.41 ms vlan304.as032.buc.ro.m247.com (77.243.185.226)
- 5 22.48 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
- 6 22.85 ms be2089.ccr21.ymq01.atlas.cogentco.com (154.54.45.113)
- 7 27.65 ms be2088.ccr21.alb02.atlas.cogentco.com (154.54.43.18)
- 8 30.86 ms be2915.ccr41.jfk02.atlas.cogentco.com (154.54.40.62)
- 9 38.08 ms be2806.ccr41.dca01.atlas.cogentco.com (154.54.40.106)
- 10 48.93 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
- 11 56.15 ms be2784.rcr21.jax01.atlas.cogentco.com (154.54.28.106)
- 12 59.15 ms be3639.rcr51.mco01.atlas.cogentco.com (154.24.19.133)
- 13 60.08 ms te0-0-1-0.nr11.b006655-1.mco01.atlas.cogentco.com (154.24.23.202)
- 14 62.24 ms 38.104.89.26
- 15 270.18 ms xe-1-3-core2.orl.hostdime.com (72.29.88.46)
- 16 68.48 ms server.click-grafix.com (138.128.160.2)
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 01:26
- Completed NSE at 01:26, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 01:26
- Completed NSE at 01:26, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 439.85 seconds
- Raw packets sent: 119 (10.028KB) | Rcvd: 1595 (1.312MB)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-05-02 01:26 EDT
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 01:26
- Completed NSE at 01:26, 0.00s elapsed
- Initiating NSE at 01:26
- Completed NSE at 01:26, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 01:26
- Completed Parallel DNS resolution of 1 host. at 01:26, 0.03s elapsed
- Initiating UDP Scan at 01:26
- Scanning server.click-grafix.com (138.128.160.2) [14 ports]
- Discovered open port 53/udp on 138.128.160.2
- Completed UDP Scan at 01:26, 1.30s elapsed (14 total ports)
- Initiating Service scan at 01:26
- Scanning 12 services on server.click-grafix.com (138.128.160.2)
- Service scan Timing: About 16.67% done; ETC: 01:36 (0:08:10 remaining)
- Completed Service scan at 01:28, 102.58s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against server.click-grafix.com (138.128.160.2)
- adjust_timeouts2: packet supposedly had rtt of -87476 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -672141 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -672141 microseconds. Ignoring time.
- Retrying OS detection (try #2) against server.click-grafix.com (138.128.160.2)
- Initiating Traceroute at 01:28
- Completed Traceroute at 01:28, 7.09s elapsed
- Initiating Parallel DNS resolution of 1 host. at 01:28
- Completed Parallel DNS resolution of 1 host. at 01:28, 0.01s elapsed
- NSE: Script scanning 138.128.160.2.
- Initiating NSE at 01:28
- Completed NSE at 01:28, 20.24s elapsed
- Initiating NSE at 01:28
- Completed NSE at 01:28, 1.02s elapsed
- Nmap scan report for server.click-grafix.com (138.128.160.2)
- Host is up (0.032s latency).
- PORT STATE SERVICE VERSION
- 53/udp open domain ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
- | dns-nsid:
- |_ bind.version: 9.9.4-RedHat-9.9.4-73.el7_6
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
- TRACEROUTE (using port 137/udp)
- HOP RTT ADDRESS
- 1 21.67 ms 10.248.200.1
- 2 ... 3
- 4 21.83 ms 10.248.200.1
- 5 21.06 ms 10.248.200.1
- 6 21.05 ms 10.248.200.1
- 7 21.05 ms 10.248.200.1
- 8 21.04 ms 10.248.200.1
- 9 21.03 ms 10.248.200.1
- 10 21.04 ms 10.248.200.1
- 11 ... 18
- 19 21.34 ms 10.248.200.1
- 20 22.75 ms 10.248.200.1
- 21 ... 28
- 29 22.21 ms 10.248.200.1
- 30 22.28 ms 10.248.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 01:28
- Completed NSE at 01:28, 0.00s elapsed
- Initiating NSE at 01:28
- Completed NSE at 01:28, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 136.85 seconds
- Raw packets sent: 143 (13.200KB) | Rcvd: 4228 (1.564MB)
- #######################################################################################################################################
- [+] URL: http://wre.gov.sd/
- [+] Started: Wed May 1 23:55:49 2019
- Interesting Finding(s):
- [+] http://wre.gov.sd/
- | Interesting Entries:
- | - X-Powered-By: PHP/5.6.40
- | - Referrer-Policy: no-referrer-when-downgrade
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://wre.gov.sd/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://wre.gov.sd/xmlrpc.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] http://wre.gov.sd/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] Upload directory has listing enabled: http://wre.gov.sd/wp-content/uploads/
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] http://wre.gov.sd/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 4.9.10 identified (Latest, released on 2019-03-13).
- | Detected By: Emoji Settings (Passive Detection)
- | - http://wre.gov.sd/, Match: '-release.min.js?ver=4.9.10'
- | Confirmed By: Meta Generator (Passive Detection)
- | - http://wre.gov.sd/, Match: 'WordPress 4.9.10'
- [+] WordPress theme in use: nilogy
- | Location: http://wre.gov.sd/wp-content/themes/nilogy/
- | Style URL: http://wre.gov.sd/wp-content/themes/nilogy/style.css
- | Style Name: Nilogy
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] Enumerating All Plugins (via Passive Methods)
- [+] Checking Plugin Versions (via Passive and Aggressive Methods)
- [i] Plugin(s) Identified:
- [+] add-to-any
- | Location: http://wre.gov.sd/wp-content/plugins/add-to-any/
- | Last Updated: 2019-04-02T00:25:00.000Z
- | [!] The version is out of date, the latest version is 1.7.35
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.7.34 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/add-to-any/README.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/add-to-any/README.txt
- [+] all-in-one-seo-pack
- | Location: http://wre.gov.sd/wp-content/plugins/all-in-one-seo-pack/
- | Latest Version: 2.12 (up to date)
- | Last Updated: 2019-02-20T19:20:00.000Z
- |
- | Detected By: Comment (Passive Detection)
- |
- | Version: 2.12 (100% confidence)
- | Detected By: Comment (Passive Detection)
- | - http://wre.gov.sd/, Match: 'All in One SEO Pack 2.12 by'
- | Confirmed By: Readme - Stable Tag (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/all-in-one-seo-pack/readme.txt
- [+] fx-editor
- | Location: http://wre.gov.sd/wp-content/plugins/fx-editor/
- | Latest Version: 1.4.0 (up to date)
- | Last Updated: 2016-12-09T06:43:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 1.4.0 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/fx-editor/readme.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/fx-editor/readme.txt
- [+] gutenberg
- | Location: http://wre.gov.sd/wp-content/plugins/gutenberg/
- | Last Updated: 2019-04-19T02:13:00.000Z
- | [!] The version is out of date, the latest version is 5.5.0
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 4.9.0 (90% confidence)
- | Detected By: Change Log (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/gutenberg/changelog.txt, Match: '= 4.9.0'
- [+] popup-builder
- | Location: http://wre.gov.sd/wp-content/plugins/popup-builder/
- | Last Updated: 2019-04-03T15:34:00.000Z
- | [!] The version is out of date, the latest version is 3.1.9
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 3.1.7.1 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/popup-builder/readme.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/popup-builder/readme.txt
- [+] qtranslate-x
- | Location: http://wre.gov.sd/wp-content/plugins/qtranslate-x/
- | Latest Version: 3.4.6.8 (up to date)
- | Last Updated: 2016-07-13T17:36:00.000Z
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | Version: 3.4.6.8 (80% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/qtranslate-x/readme.txt
- [+] w3-total-cache
- | Location: http://wre.gov.sd/wp-content/plugins/w3-total-cache/
- | Last Updated: 2019-03-26T15:19:00.000Z
- | [!] The version is out of date, the latest version is 0.9.7.3
- |
- | Detected By: Comment Debug Info (Passive Detection)
- |
- | Version: 0.9.7.2 (100% confidence)
- | Detected By: Readme - Stable Tag (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/w3-total-cache/readme.txt
- | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
- | - http://wre.gov.sd/wp-content/plugins/w3-total-cache/readme.txt
- [+] Enumerating Config Backups (via Passive and Aggressive Methods)
- Checking Config Backups - Time: 00:00:05 <=============> (21 / 21) 100.00% Time: 00:00:05
- [i] No Config Backups Found.
- [+] Finished: Wed May 1 23:56:58 2019
- [+] Requests Done: 67
- [+] Cached Requests: 6
- [+] Data Sent: 14.581 KB
- [+] Data Received: 896.498 KB
- [+] Memory used: 190.945 MB
- [+] Elapsed time: 00:01:08
- #######################################################################################################################################
- [+] URL: http://wre.gov.sd/
- [+] Started: Wed May 1 23:55:51 2019
- Interesting Finding(s):
- [+] http://wre.gov.sd/
- | Interesting Entries:
- | - X-Powered-By: PHP/5.6.40
- | - Referrer-Policy: no-referrer-when-downgrade
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://wre.gov.sd/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://wre.gov.sd/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] Upload directory has listing enabled: http://wre.gov.sd/wp-content/uploads/
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] http://wre.gov.sd/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 4.9.10 identified (Latest, released on 2019-03-13).
- | Detected By: Emoji Settings (Passive Detection)
- | - http://wre.gov.sd/, Match: '-release.min.js?ver=4.9.10'
- | Confirmed By: Meta Generator (Passive Detection)
- | - http://wre.gov.sd/, Match: 'WordPress 4.9.10'
- [+] WordPress theme in use: nilogy
- | Location: http://wre.gov.sd/wp-content/themes/nilogy/
- | Style URL: http://wre.gov.sd/wp-content/themes/nilogy/style.css
- | Style Name: Nilogy
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] Enumerating Users (via Passive and Aggressive Methods)
- Brute Forcing Author IDs - Time: 00:00:08 <==> (10 / 10) 100.00% Time: 00:00:08
- [i] User(s) Identified:
- [+] admin
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://wre.gov.sd/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By:
- | Rss Generator (Aggressive Detection)
- | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] prmu
- | Detected By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] Finished: Wed May 1 23:56:48 2019
- [+] Requests Done: 44
- [+] Cached Requests: 12
- [+] Data Sent: 9.741 KB
- [+] Data Received: 1.042 MB
- [+] Memory used: 94.625 MB
- [+] Elapsed time: 00:00:57
- #######################################################################################################################################
- [+] URL: http://wre.gov.sd/
- [+] Started: Thu May 2 00:07:45 2019
- Interesting Finding(s):
- [+] http://wre.gov.sd/
- | Interesting Entries:
- | - X-Powered-By: PHP/5.6.40
- | - Referrer-Policy: no-referrer-when-downgrade
- | Found By: Headers (Passive Detection)
- | Confidence: 100%
- [+] http://wre.gov.sd/robots.txt
- | Interesting Entries:
- | - /wp-admin/
- | - /wp-admin/admin-ajax.php
- | Found By: Robots Txt (Aggressive Detection)
- | Confidence: 100%
- [+] http://wre.gov.sd/xmlrpc.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- | References:
- | - http://codex.wordpress.org/XML-RPC_Pingback_API
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
- | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
- | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
- [+] http://wre.gov.sd/readme.html
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] Upload directory has listing enabled: http://wre.gov.sd/wp-content/uploads/
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 100%
- [+] http://wre.gov.sd/wp-cron.php
- | Found By: Direct Access (Aggressive Detection)
- | Confidence: 60%
- | References:
- | - https://www.iplocation.net/defend-wordpress-from-ddos
- | - https://github.com/wpscanteam/wpscan/issues/1299
- [+] WordPress version 4.9.10 identified (Latest, released on 2019-03-13).
- | Detected By: Emoji Settings (Passive Detection)
- | - http://wre.gov.sd/, Match: '-release.min.js?ver=4.9.10'
- | Confirmed By: Meta Generator (Passive Detection)
- | - http://wre.gov.sd/, Match: 'WordPress 4.9.10'
- [+] WordPress theme in use: nilogy
- | Location: http://wre.gov.sd/wp-content/themes/nilogy/
- | Style URL: http://wre.gov.sd/wp-content/themes/nilogy/style.css
- | Style Name: Nilogy
- |
- | Detected By: Urls In Homepage (Passive Detection)
- |
- | The version could not be determined.
- [+] Enumerating Users (via Passive and Aggressive Methods)
- Brute Forcing Author IDs - Time: 00:00:07 <============> (10 / 10) 100.00% Time: 00:00:07
- [i] User(s) Identified:
- [+] admin
- | Detected By: Wp Json Api (Aggressive Detection)
- | - http://wre.gov.sd/wp-json/wp/v2/users/?per_page=100&page=1
- | Confirmed By:
- | Rss Generator (Aggressive Detection)
- | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] prmu
- | Detected By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
- [+] Finished: Thu May 2 00:08:43 2019
- [+] Requests Done: 48
- [+] Cached Requests: 8
- [+] Data Sent: 10.987 KB
- [+] Data Received: 936.592 KB
- [+] Memory used: 94.527 MB
- [+] Elapsed time: 00:00:57
- #######################################################################################################################################
- [-] Date & Time: 01/05/2019 23:55:39
- [I] Threads: 5
- [-] Target: http://wre.gov.sd (138.128.160.2)
- [M] Website Not in HTTPS: http://wre.gov.sd
- [I] X-Powered-By: PHP/5.6.40
- [L] X-Frame-Options: Not Enforced
- [I] Strict-Transport-Security: Not Enforced
- [I] X-Content-Security-Policy: Not Enforced
- [I] X-Content-Type-Options: Not Enforced
- [L] Robots.txt Found: http://wre.gov.sd/robots.txt
- [I] CMS Detection: WordPress
- [I] Wordpress Version: 4.9.10
- [M] EDB-ID: 46511 "WordPress Core 5.0 - Remote Code Execution"
- [M] EDB-ID: 46662 "WordPress 5.0.0 - Crop-image Shell Upload (Metasploit)"
- [I] Wordpress Theme: nilogy
- [L] Wordpress Hello Plugin Full Path Disclosure: /home/med/public_html/wp-content/plugins/hello.php
- [-] WordPress usernames identified:
- [M] admin
- [M] prmu
- [M] XML-RPC services are enabled
- [I] Autocomplete Off Not Found: http://wre.gov.sd/wp-login.php
- [-] Default WordPress Files:
- [I] http://wre.gov.sd/license.txt
- [I] http://wre.gov.sd/readme.html
- [I] http://wre.gov.sd/wp-includes/ID3/license.commercial.txt
- [I] http://wre.gov.sd/wp-includes/ID3/license.txt
- [I] http://wre.gov.sd/wp-includes/ID3/readme.txt
- [I] http://wre.gov.sd/wp-includes/images/crystal/license.txt
- [I] http://wre.gov.sd/wp-includes/js/plupload/license.txt
- [I] http://wre.gov.sd/wp-includes/js/swfupload/license.txt
- [I] http://wre.gov.sd/wp-includes/js/tinymce/license.txt
- [-] Searching Wordpress Plugins ...
- [I] add-to-any
- [I] adrotate
- [M] EDB-ID: 17888 "WordPress Plugin AdRotate 3.6.5 - SQL Injection"
- [M] EDB-ID: 18114 "WordPress Plugin AdRotate 3.6.6 - SQL Injection"
- [M] EDB-ID: 31834 "WordPress Plugin AdRotate 3.9.4 - 'clicktracker.ph?track' SQL Injection"
- [I] ads-box
- [M] EDB-ID: 38060 "WordPress Plugin Ads Box - 'count' SQL Injection"
- [I] feed
- [M] EDB-ID: 38624 "WordPress Plugin WP Feed - 'nid' SQL Injection"
- [I] firestats
- [M] EDB-ID: 14308 "WordPress Plugin Firestats - Remote Configuration File Download"
- [M] EDB-ID: 33367 "WordPress Plugin Firestats 1.0.2 - Multiple Cross-Site Scripting / Authentication Bypass Vulnerabilities (1)"
- [M] EDB-ID: 33368 "WordPress Plugin Firestats 1.0.2 - Multiple Cross-Site Scripting / Authentication Bypass Vulnerabilities (2)"
- [I] fx-editor v1.4.0
- [I] gutenberg v4.8.0
- [I] jetpack v7.1.1
- [M] EDB-ID: 18126 "WordPress Plugin jetpack - 'sharedaddy.php' ID SQL Injection"
- [I] popup-builder v3.1.7.1
- [I] qtranslate-x v3.4.6.8
- [I] simple-ads-manager
- [M] EDB-ID: 36613 "WordPress Plugin Simple Ads Manager - Multiple SQL Injections"
- [M] EDB-ID: 36614 "WordPress Plugin Simple Ads Manager 2.5.94 - Arbitrary File Upload"
- [M] EDB-ID: 36615 "WordPress Plugin Simple Ads Manager - Information Disclosure"
- [M] EDB-ID: 39133 "WordPress Plugin Simple Ads Manager 2.9.4.116 - SQL Injection"
- [I] wp-bannerize
- [M] EDB-ID: 17764 "WordPress Plugin Bannerize 2.8.6 - SQL Injection"
- [M] EDB-ID: 17906 "WordPress Plugin Bannerize 2.8.7 - SQL Injection"
- [M] EDB-ID: 36193 "WordPress Plugin WP Bannerize 2.8.7 - 'ajax_sorter.php' SQL Injection"
- [I] Checking for Directory Listing Enabled ...
- [L] http://wre.gov.sd/wp-admin/css
- [L] http://wre.gov.sd/wp-admin/images
- [L] http://wre.gov.sd/wp-admin/includes
- [L] http://wre.gov.sd/wp-admin/js
- [L] http://wre.gov.sd/wp-admin/maint
- [L] http://wre.gov.sd/wp-includes
- [L] http://wre.gov.sd/wp-includes/ID3
- [L] http://wre.gov.sd/wp-includes/IXR
- [L] http://wre.gov.sd/wp-includes/Requests
- [L] http://wre.gov.sd/wp-includes/SimplePie
- [L] http://wre.gov.sd/wp-includes/Text
- [L] http://wre.gov.sd/wp-includes/certificates
- [L] http://wre.gov.sd/wp-includes/css
- [L] http://wre.gov.sd/wp-includes/customize
- [L] http://wre.gov.sd/wp-includes/fonts
- [L] http://wre.gov.sd/wp-includes/images
- [L] http://wre.gov.sd/wp-includes/js
- [L] http://wre.gov.sd/wp-includes/pomo
- [L] http://wre.gov.sd/wp-includes/random_compat
- [L] http://wre.gov.sd/wp-includes/rest-api
- [L] http://wre.gov.sd/wp-includes/theme-compat
- [L] http://wre.gov.sd/wp-includes/widgets
- [L] http://wre.gov.sd/wp-content/plugins/add-to-any
- [L] http://wre.gov.sd/wp-content/plugins/fx-editor
- [L] http://wre.gov.sd/wp-content/plugins/gutenberg
- [L] http://wre.gov.sd/wp-content/plugins/jetpack
- [L] http://wre.gov.sd/wp-content/plugins/qtranslate-x
- [-] Date & Time: 02/05/2019 00:01:40
- [-] Completed in: 0:06:01
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 138.128.160.2
- + Target Hostname: 138.128.160.2
- + Target Port: 443
- ---------------------------------------------------------------------------------------------------------------------------------------
- + SSL Info: Subject: /CN=abaad.sd
- Ciphers: ECDHE-RSA-AES256-GCM-SHA384
- Issuer: /CN=abaad.sd
- + Start Time: 2019-05-02 01:51:11 (GMT-4)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: Apache
- + Retrieved x-powered-by header: PHP/5.6.40
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The site uses SSL and the Strict-Transport-Security HTTP header is not defined.
- + The site uses SSL and Expect-CT header is not present.
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Hostname '138.128.160.2' does not match certificate's names: abaad.sd
- + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
- + OSVDB-877: HTTP TRACE method is active, suggesting the host is vulnerable to XST
- + /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
- + /securecontrolpanel/: Web Server Control Panel
- + /webmail/: Web based mail package installed.
- + OSVDB-3233: /mailman/listinfo: Mailman was found on the server.
- + OSVDB-2117: /cpanel/: Web-based control panel
- + OSVDB-3268: /css/: Directory indexing found.
- + OSVDB-3092: /css/: This might be interesting...
- + OSVDB-3092: /demo/: This might be interesting...
- + Server may leak inodes via ETags, header found with file /img-sys/, inode: 66588330, size: 0, mtime: Tue Jan 19 21:08:44 2016
- + OSVDB-3092: /img-sys/: Default image directory should not allow directory listing.
- + OSVDB-3093: /webmail/lib/emailreader_execute_on_each_page.inc.php: This might be interesting... has been seen in web logs from an unknown scanner.
- + OSVDB-3268: /images/: Directory indexing found.
- + OSVDB-3268: /style/: Directory indexing found.
- + /controlpanel/: Admin login page/section found.
- + 7915 requests: 0 error(s) and 23 item(s) reported on remote host
- + End Time: 2019-05-02 02:30:53 (GMT-4) (2382 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- --------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 138.128.160.2
- + Target Hostname: wre.gov.sd
- + Target Port: 80
- + Start Time: 2019-05-02 00:31:46 (GMT-4)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: No banner retrieved
- + Retrieved x-powered-by header: PHP/5.6.40
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + Uncommon header 'link' found, with contents: <http://wre.gov.sd/wp-json/>; rel="https://api.w.org/"
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + Cookie qtrans_front_language created without the httponly flag
- + Cookie qtrans_admin_language created without the httponly flag
- + Entry '/wp-admin/' in robots.txt returned a non-forbidden or redirect HTTP code (302)
- + "robots.txt" contains 2 entries which should be manually viewed.
- + Server may leak inodes via ETags, header found with file /, inode: 118096467, size: 163, mtime: Tue Jan 29 21:03:25 2019
- + Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_URL 0
- + Web Server returns a valid response with junk HTTP methods, this may cause false positives.
- + DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- Anonymous JTSEC #OpSudan Full Recon #66
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement