Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- the owner of this site runs galaxy2 intel exchange chattor and many other sites on the tor network
- collecting user credentials and logging all chat even on daniel's chat
- so feel free to hack this motherfucker into the dirt here's some basic info:
- https://pastebin.com/NMicmy5Y
- http://tt3j2x4k5ycaa5zt.onion
- nikto -host http://tt3j2x4k5ycaa5zt.onion
- - Nikto v2.1.5
- ---------------------------------------------------------------------------
- + Target IP: 10.192.22.133
- + Target Hostname: tt3j2x4k5ycaa5zt.onion
- + Target Port: 80
- + Start Time: 2017-04-05 02:43:09 (GMT-4)
- ---------------------------------------------------------------------------
- + Server: nginx
- + The anti-clickjacking X-Frame-Options header is not present.
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Server leaks inodes via ETags, header found with file /robots.txt, fields: 0x55c71dff 0x22
- + OSVDB-3268: /uploads/: Directory indexing found.
- + File/dir '/uploads/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
- + "robots.txt" contains 1 entry which should be manually viewed.
- + OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-3931: /myphpnuke/links.php?op=search&query=[script]alert('Vulnerable);[/script]?query=: myphpnuke is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-3931: /myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent: myphpnuke is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + /modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-4598: /members.asp?SF=%22;}alert(223344);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-2946: /forum_members.asp?find=%22;}alert(9823);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
- + OSVDB-3092: /mail/: This might be interesting...
- + Cookie pmaCookieVer created without the httponly flag
- + Cookie pma_lang created without the httponly flag
- + Cookie pma_collation_connection created without the httponly flag
- + Cookie phpMyAdmin created without the httponly flag
- + Uncommon header 'x-webkit-csp' found, with contents: default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data: *.tile.openstreetmap.org;
- + Uncommon header 'content-security-policy' found, with contents: default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self' 'unsafe-inline' ;referrer no-referrer;img-src 'self' data: *.tile.openstreetmap.org;
- + Uncommon header 'x-ob_mode' found, with contents: 1
- + Uncommon header 'x-content-security-policy' found, with contents: default-src 'self' ;options inline-script eval-script;referrer no-referrer;img-src 'self' data: *.tile.openstreetmap.org;
- + Uncommon header 'x-permitted-cross-domain-policies' found, with contents: none
- + Uncommon header 'x-robots-tag' found, with contents: noindex, nofollow
- + Uncommon header 'x-xss-protection' found, with contents: 1; mode=block
- + Uncommon header 'x-content-type-options' found, with contents: nosniff
- + Uncommon header 'x-frame-options' found, with contents: DENY
- + OSVDB-3233: /info.php: PHP is installed, and a test script which runs phpinfo() was found. This gives a lot of system information.
- + Cookie language created without the httponly flag
- + Uncommon header 'referrer-policy' found, with contents: no-referrer
- + OSVDB-5292: /info.php?file=http://cirt.net/rfiinc.txt?: RFI from RSnake's list (http://ha.ckers.org/weird/rfi-locations.dat) or from http://osvdb.org/
- ##########################
- http://danwin1210.me [301] Country[UNITED STATES][US], HTTPServer[nginx], IP[207.154.197.249], RedirectLocation[https://danwin1210.me/], Title[301 Moved Permanently], nginx
- URL : http://danwin1210.me
- Status : 301
- Country --------------------------------------------------------------------
- Description: Shows the country the IPv4 address belongs to. This uses
- the GeoIP IP2Country database from
- http://software77.net/geo-ip/. Instructions on updating the
- database are in the plugin comments.
- String : UNITED STATES
- Module : US
- HTTPServer -----------------------------------------------------------------
- Description: HTTP server header string. This plugin also attempts to
- identify the operating system from the server header.
- String : nginx (from server string)
- IP -------------------------------------------------------------------------
- Description: IP address of the target, if available.
- String : 207.154.197.249
- RedirectLocation -----------------------------------------------------------
- Description: HTTP Server string location. used with http-status 301 and
- 302
- String : https://danwin1210.me/ (from location)
- Title ----------------------------------------------------------------------
- Description: The HTML page title
- String : 301 Moved Permanently (from page title)
- nginx ----------------------------------------------------------------------
- Description: Nginx (Engine-X) is a free, open-source, high-performance
- HTTP server and reverse proxy, as well as an IMAP/POP3
- proxy server. - Homepage: http://nginx.net/
- https://danwin1210.me/ [200]
- https://danwin1210.me/ [200] Country[UNITED STATES][US], HTTPServer[nginx], IP[207.154.197.249], nginx
- URL : https://danwin1210.me/
- Status : 200
- Country --------------------------------------------------------------------
- Description: Shows the country the IPv4 address belongs to. This uses
- the GeoIP IP2Country database from
- http://software77.net/geo-ip/. Instructions on updating the
- database are in the plugin comments.
- String : UNITED STATES
- Module : US
- HTTPServer -----------------------------------------------------------------
- Description: HTTP server header string. This plugin also attempts to
- identify the operating system from the server header.
- String : nginx (from server string)
- IP -------------------------------------------------------------------------
- Description: IP address of the target, if available.
- String : 207.154.197.249
- nginx ----------------------------------------------------------------------
- Description: Nginx (Engine-X) is a free, open-source, high-performance
- HTTP server and reverse proxy, as well as an IMAP/POP3
- proxy server. - Homepage: http://nginx.net/
- ##########################################
- Starting Nmap 7.01 ( https://nmap.org ) at 2017-04-05 19:51 EDT
- NSE: Loaded 132 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 19:51
- Completed NSE at 19:51, 0.00s elapsed
- Initiating NSE at 19:51
- Completed NSE at 19:51, 0.00s elapsed
- Initiating Ping Scan at 19:51
- Scanning 207.154.197.249 [4 ports]
- Completed Ping Scan at 19:51, 0.41s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 19:51
- Completed Parallel DNS resolution of 1 host. at 19:51, 0.20s elapsed
- Initiating SYN Stealth Scan at 19:51
- Scanning danwin1210.me (207.154.197.249) [1000 ports]
- Discovered open port 21/tcp on 207.154.197.249
- Discovered open port 993/tcp on 207.154.197.249
- Discovered open port 143/tcp on 207.154.197.249
- Discovered open port 587/tcp on 207.154.197.249
- Discovered open port 110/tcp on 207.154.197.249
- Discovered open port 443/tcp on 207.154.197.249
- Discovered open port 80/tcp on 207.154.197.249
- Discovered open port 22/tcp on 207.154.197.249
- Discovered open port 995/tcp on 207.154.197.249
- Discovered open port 5009/tcp on 207.154.197.249
- Discovered open port 5000/tcp on 207.154.197.249
- Discovered open port 5004/tcp on 207.154.197.249
- Discovered open port 5003/tcp on 207.154.197.249
- Discovered open port 5222/tcp on 207.154.197.249
- Discovered open port 465/tcp on 207.154.197.249
- Discovered open port 20/tcp on 207.154.197.249
- Discovered open port 5002/tcp on 207.154.197.249
- Discovered open port 5280/tcp on 207.154.197.249
- Discovered open port 5269/tcp on 207.154.197.249
- Discovered open port 5001/tcp on 207.154.197.249
- Completed SYN Stealth Scan at 19:51, 2.57s elapsed (1000 total ports)
- Initiating Service scan at 19:51
- Scanning 20 services on danwin1210.me (207.154.197.249)
- Completed Service scan at 19:53, 111.91s elapsed (20 services on 1 host)
- Initiating OS detection (try #1) against danwin1210.me (207.154.197.249)
- sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
- Offending packet: TCP 10.50.5.74:50216 > 207.154.197.249:21 ttl=59 id=12529 iplen=60 seq=2019977701 win=128 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
- sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
- Offending packet: TCP 10.50.5.74:50217 > 207.154.197.249:21 SFPU ttl=59 id=64414 iplen=60 seq=2019977701 win=256 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
- sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
- Offending packet: TCP 10.50.5.74:50221 > 207.154.197.249:1 FPU ttl=57 id=8147 iplen=60 seq=2019977701 win=65535 <wscale 15,nop,mss 265,timestamp 4294967295 0,sackOK>
- sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
- Offending packet: TCP 10.50.5.74:50216 > 207.154.197.249:21 ttl=42 id=56090 iplen=60 seq=2019977701 win=128 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
- sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
- Offending packet: TCP 10.50.5.74:50217 > 207.154.197.249:21 SFPU ttl=42 id=24149 iplen=60 seq=2019977701 win=256 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
- sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
- Offending packet: TCP 10.50.5.74:50221 > 207.154.197.249:1 FPU ttl=57 id=43843 iplen=60 seq=2019977701 win=65535 <wscale 15,nop,mss 265,timestamp 4294967295 0,sackOK>
- sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
- Offending packet: TCP 10.50.5.74:50216 > 207.154.197.249:21 ttl=39 id=40618 iplen=60 seq=2019977701 win=128 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
- sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
- Offending packet: TCP 10.50.5.74:50217 > 207.154.197.249:21 SFPU ttl=58 id=48514 iplen=60 seq=2019977701 win=256 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
- sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
- Offending packet: TCP 10.50.5.74:50221 > 207.154.197.249:1 FPU ttl=58 id=47253 iplen=60 seq=2019977701 win=65535 <wscale 15,nop,mss 265,timestamp 4294967295 0,sackOK>
- sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
- Offending packet: TCP 10.50.5.74:50216 > 207.154.197.249:21 ttl=50 id=27396 iplen=60 seq=2019977701 win=128 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
- Omitting future Sendto error messages now that 10 have been shown. Use -d2 if you really want to see them.
- Retrying OS detection (try #2) against danwin1210.me (207.154.197.249)
- adjust_timeouts2: packet supposedly had rtt of -90398 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -90398 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -76864 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -76864 microseconds. Ignoring time.
- Retrying OS detection (try #3) against danwin1210.me (207.154.197.249)
- adjust_timeouts2: packet supposedly had rtt of -123823 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -123823 microseconds. Ignoring time.
- Retrying OS detection (try #4) against danwin1210.me (207.154.197.249)
- adjust_timeouts2: packet supposedly had rtt of -132568 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -132568 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -132378 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -132378 microseconds. Ignoring time.
- Initiating Traceroute at 19:53
- Completed Traceroute at 19:53, 3.28s elapsed
- Initiating Parallel DNS resolution of 13 hosts. at 19:53
- Completed Parallel DNS resolution of 13 hosts. at 19:53, 2.71s elapsed
- NSE: Script scanning 207.154.197.249.
- Initiating NSE at 19:53
- Completed NSE at 19:54, 26.31s elapsed
- Initiating NSE at 19:54
- Completed NSE at 19:54, 0.01s elapsed
- Nmap scan report for danwin1210.me (207.154.197.249)
- Host is up (0.23s latency).
- Not shown: 979 closed ports
- PORT STATE SERVICE VERSION
- 20/tcp open tcpwrapped
- 21/tcp open ftp vsftpd 3.0.3
- 22/tcp open ssh OpenSSH 7.4p1 Debian 10 (protocol 2.0)
- | ssh-hostkey:
- | 2048 f1:48:90:77:d3:82:b2:4b:2c:d6:b9:03:a0:bc:4b:e6 (RSA)
- |_ 256 9d:a3:ce:5e:d4:4a:21:f1:f0:0e:eb:54:67:a5:2a:4b (ECDSA)
- 25/tcp filtered smtp
- 80/tcp open http nginx
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: nginx
- |_http-title: Did not follow redirect to https://danwin1210.me/
- 110/tcp open pop3 Dovecot pop3d
- |_pop3-capabilities: TOP PIPELINING CAPA UIDL SASL(PLAIN LOGIN) USER STLS AUTH-RESP-CODE RESP-CODES
- | ssl-cert: Subject: commonName=danwin1210.me
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-02-26T11:20:00
- | Not valid after: 2017-05-27T11:20:00
- | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
- |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
- |_ssl-date: TLS randomness does not represent time
- 143/tcp open imap Dovecot imapd
- |_imap-capabilities: capabilities Pre-login have IDLE more LOGIN-REFERRALS SASL-IR ENABLE AUTH=PLAIN ID listed AUTH=LOGINA0001 LITERAL+ OK STARTTLS IMAP4rev1 post-login
- | ssl-cert: Subject: commonName=danwin1210.me
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-02-26T11:20:00
- | Not valid after: 2017-05-27T11:20:00
- | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
- |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
- |_ssl-date: TLS randomness does not represent time
- 443/tcp open ssl/http nginx
- |_http-favicon: Unknown favicon MD5: 871C151F112F820ED24B7C1080CB87AF
- | http-methods:
- |_ Supported Methods: GET HEAD POST
- |_http-server-header: nginx
- |_http-title: Daniel - Home
- | ssl-cert: Subject: commonName=danwin1210.me
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-02-26T11:20:00
- | Not valid after: 2017-05-27T11:20:00
- | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
- |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
- |_ssl-date: TLS randomness does not represent time
- | tls-nextprotoneg:
- |_ http/1.1
- 465/tcp open ssl/smtp Postfix smtpd
- |_smtp-commands: tt3j2x4k5ycaa5zt.onion, PIPELINING, SIZE 10240000, VRFY, ETRN, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
- | ssl-cert: Subject: commonName=danwin1210.me
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-02-26T11:20:00
- | Not valid after: 2017-05-27T11:20:00
- | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
- |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
- |_ssl-date: TLS randomness does not represent time
- 587/tcp open smtp Postfix smtpd
- |_smtp-commands: tt3j2x4k5ycaa5zt.onion, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
- | ssl-cert: Subject: commonName=danwin1210.me
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-02-26T11:20:00
- | Not valid after: 2017-05-27T11:20:00
- | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
- |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
- |_ssl-date: TLS randomness does not represent time
- 993/tcp open ssl/imap Dovecot imapd
- | ssl-cert: Subject: commonName=danwin1210.me
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-02-26T11:20:00
- | Not valid after: 2017-05-27T11:20:00
- | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
- |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
- |_ssl-date: TLS randomness does not represent time
- 995/tcp open ssl/pop3 Dovecot pop3d
- | ssl-cert: Subject: commonName=danwin1210.me
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-02-26T11:20:00
- | Not valid after: 2017-05-27T11:20:00
- | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
- |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
- |_ssl-date: TLS randomness does not represent time
- 5000/tcp open xmpp-transport Spectrum XMPP file transfer
- 5001/tcp open tcpwrapped
- 5002/tcp open tcpwrapped
- 5003/tcp open tcpwrapped
- 5004/tcp open tcpwrapped
- 5009/tcp open tcpwrapped
- 5222/tcp open jabber Prosody Jabber client
- | ssl-cert: Subject: commonName=danwin1210.me
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-02-26T11:20:00
- | Not valid after: 2017-05-27T11:20:00
- | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
- |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
- |_ssl-date: TLS randomness does not represent time
- | xmpp-info:
- | Respects server name
- | info:
- | xmpp:
- | lang: en
- | version: 1.0
- | capabilities:
- |
- | pre_tls:
- | xmpp:
- |
- | capabilities:
- |
- | features:
- | TLS
- | post_tls:
- | xmpp:
- |
- | capabilities:
- |
- | auth_mechanisms:
- | PLAIN
- |_ Non-SASL
- 5269/tcp open jabber Prosody Jabber server
- | ssl-cert: Subject: commonName=danwin1210.me
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2017-02-26T11:20:00
- | Not valid after: 2017-05-27T11:20:00
- | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
- |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
- |_ssl-date: TLS randomness does not represent time
- | xmpp-info:
- | Respects server name
- | info:
- | xmpp:
- | lang: en
- | version: 1.0
- | capabilities:
- |
- | features:
- | Server Dialback
- | pre_tls:
- | xmpp:
- |
- | capabilities:
- |
- | features:
- | TLS
- | post_tls:
- | xmpp:
- |
- |_ capabilities:
- 5280/tcp open xmpp-bosh?
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port5280-TCP:V=7.01%I=7%D=4/5%Time=58E58304%P=i686-pc-linux-gnu%r(GetRe
- SF:quest,1DF,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2005\x2
- SF:0Apr\x202017\x2023:51:32\x20GMT\r\nContent-Length:\x20393\r\n\r\n<!DOCT
- SF:YPE\x20html>\n<html>\n<head><meta\x20charset=\"utf-8\"><style>body{marg
- SF:in-top:14%;text-align:center;background-color:#F8F8F8;font-family:sans-
- SF:serif;}h1{font-size:xx-large;}p{font-size:x-large;}p\+p\x20{\x20font-si
- SF:ze:\x20large;\x20font-family:\x20courier\x20}</style>\n</head>\n<body><
- SF:h1>400\x20Bad\x20Request</h1><p>What\x20kind\x20of\x20request\x20do\x20
- SF:you\x20call\x20that\?\?</p><p>Missing\x20or\x20invalid\x20'Host&ap
- SF:os;\x20header</p>\n</body>\n</html>")%r(HTTPOptions,1DF,"HTTP/1\.0\x204
- SF:00\x20Bad\x20Request\r\nDate:\x20Wed,\x2005\x20Apr\x202017\x2023:51:33\
- SF:x20GMT\r\nContent-Length:\x20393\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<he
- SF:ad><meta\x20charset=\"utf-8\"><style>body{margin-top:14%;text-align:cen
- SF:ter;background-color:#F8F8F8;font-family:sans-serif;}h1{font-size:xx-la
- SF:rge;}p{font-size:x-large;}p\+p\x20{\x20font-size:\x20large;\x20font-fam
- SF:ily:\x20courier\x20}</style>\n</head>\n<body><h1>400\x20Bad\x20Request<
- SF:/h1><p>What\x20kind\x20of\x20request\x20do\x20you\x20call\x20that\?\?</
- SF:p><p>Missing\x20or\x20invalid\x20'Host'\x20header</p>\n</body
- SF:>\n</html>")%r(FourOhFourRequest,1DF,"HTTP/1\.0\x20400\x20Bad\x20Reques
- SF:t\r\nDate:\x20Wed,\x2005\x20Apr\x202017\x2023:52:24\x20GMT\r\nContent-L
- SF:ength:\x20393\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<head><meta\x20charset
- SF:=\"utf-8\"><style>body{margin-top:14%;text-align:center;background-colo
- SF:r:#F8F8F8;font-family:sans-serif;}h1{font-size:xx-large;}p{font-size:x-
- SF:large;}p\+p\x20{\x20font-size:\x20large;\x20font-family:\x20courier\x20
- SF:}</style>\n</head>\n<body><h1>400\x20Bad\x20Request</h1><p>What\x20kind
- SF:\x20of\x20request\x20do\x20you\x20call\x20that\?\?</p><p>Missing\x20or\
- SF:x20invalid\x20'Host'\x20header</p>\n</body>\n</html>");
- Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (91%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (90%), OpenWrt White Russian 0.9 (Linux 2.4.30) (90%), Linux 3.12 (90%), Linux 3.18 (89%), HP P2000 G3 NAS device (88%), DD-WRT v24-sp2 (Linux 3.10) (88%), Linux 2.4.18 (88%), Linux 2.6.32 (88%), ProVision-ISR security DVR (88%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 18 hops
- TCP Sequence Prediction: Difficulty=250 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Host: danwin1210.me; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
- TRACEROUTE (using port 135/tcp)
- HOP RTT ADDRESS
- 1 82.70 ms 10.50.0.1
- 2 83.55 ms server2.lax.airvpn.org (199.241.146.177)
- 3 125.11 ms cs2.lax3.hugeserver.com (199.244.116.41)
- 4 86.29 ms cr1.lax3.hugeserver.com (199.244.116.5)
- 5 124.75 ms ae0-170.cr1-lax2.ip4.gtt.net (173.205.61.21)
- 6 124.58 ms ix-ae-12-0.tcore1.LVW-Los-Angeles.as6453.net (66.110.59.101)
- 7 ...
- 8 245.20 ms if-ae-36-2.tcore2.AEQ-Ashburn.as6453.net (216.6.87.110)
- 9 246.47 ms if-ae-11-2.thar2.NJY-Newark.as6453.net (216.6.87.169)
- 10 ...
- 11 243.40 ms if-ae-4-2.tcore1.L78-London.as6453.net (80.231.130.33)
- 12 239.81 ms if-ae-3-2.tcore1.PYE-Paris.as6453.net (80.231.154.142)
- 13 270.20 ms if-ae-4-2.tcore1.FR0-Frankfurt.as6453.net (195.219.87.18)
- 14 ... 15
- 16 269.24 ms 195.219.50.218
- 17 ...
- 18 240.06 ms danwin1210.me (207.154.197.249)
- NSE: Script Post-scanning.
- Initiating NSE at 19:54
- Completed NSE at 19:54, 0.00s elapsed
- Initiating NSE at 19:54
- Completed NSE at 19:54, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 168.79 seconds
- Raw packets sent: 1188 (55.760KB) | Rcvd: 1171 (50.700KB)
- ##############################
- 207.154.197.249 is from United States (US) in region North America
- Input: 207.154.197.249
- canonical name: danwin1210.me
- Registered Domain: danwin1210.me
- TraceRoute from Network-Tools.com to 207.154.197.249 [danwin1210.me]
- Hop (ms) (ms) (ms) IP Address Host name
- 1 Timed out Timed out Timed out -
- 2 1 1 1 4.68.63.178 ntt-level3-200g.dallas1.level3.net
- 3 4 6 6 129.250.4.83 ae-14.r22.dllstx09.us.bb.gin.ntt.net
- 4 36 36 36 129.250.5.13 ae-1.r22.asbnva02.us.bb.gin.ntt.net
- 5 126 126 127 129.250.4.97 ae-8.r20.frnkge04.de.bb.gin.ntt.net
- 6 127 127 127 129.250.5.218 ae-2.r02.frnkge03.de.bb.gin.ntt.net
- 7 126 126 127 213.198.72.202 -
- 8 Timed out Timed out Timed out -
- 9 136 136 137 207.154.197.249 danwin1210.me
- Trace complete
- Retrieving DNS records for danwin1210.me...
- DNS servers
- dns110.ovh.net
- ns110.ovh.net
- Answer records
- danwin1210.me SOA
- server: dns110.ovh.net
- email: tech@ovh.net
- serial: 2017033040
- refresh: 86400
- retry: 3600
- expire: 3600000
- minimum ttl: 300
- 3600s
- danwin1210.me NS dns110.ovh.net 3600s
- danwin1210.me NS ns110.ovh.net 3600s
- danwin1210.me MX
- preference: 1
- exchange: danwin1210.me
- 3600s
- danwin1210.me A 207.154.197.249 3600s
- danwin1210.me 28 [16 bytes] 3600s
- danwin1210.me TXT v=spf1 a mx -all 600s
- Authority records
- Additional records
- Whois query for danwin1210.me...
- Results returned from whois.nic.me:
- Domain Name: DANWIN1210.ME
- Registry Domain ID: D425500000001344790-AGRS
- Registrar WHOIS Server: whois.namecheap.com
- Registrar URL: www.namecheap.com
- Updated Date: 2017-03-30T18:03:00Z
- Creation Date: 2016-12-07T06:20:05Z
- Registry Expiry Date: 2017-12-07T06:20:05Z
- Registrar: NameCheap, Inc.
- Registrar IANA ID: 1068
- Registrar Abuse Contact Email: abuse@namecheap.com
- Registrar Abuse Contact Phone: +1.6613102107
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Registry Registrant ID: 4ic8pg2a0irjaazh
- Registrant Name: WhoisGuard Protected
- Registrant Organization: WhoisGuard, Inc.
- Registrant Street: P.O. Box 0823-03411
- Registrant City: Panama
- Registrant State/Province: Panama
- Registrant Postal Code: 0
- Registrant Country: PA
- Registrant Phone: +507.8365503
- Registrant Phone Ext:
- Registrant Fax: +51.17057182
- Registrant Fax Ext:
- Registrant Email: e7b2607bdfbb460a884cb298fc23664d.protect@whoisguard.com
- Registry Admin ID: xqer71uo1dt4poyg
- Admin Name: WhoisGuard Protected
- Admin Organization: WhoisGuard, Inc.
- Admin Street: P.O. Box 0823-03411
- Admin City: Panama
- Admin State/Province: Panama
- Admin Postal Code: 0
- Admin Country: PA
- Admin Phone: +507.8365503
- Admin Phone Ext:
- Admin Fax: +51.17057182
- Admin Fax Ext:
- Admin Email: e7b2607bdfbb460a884cb298fc23664d.protect@whoisguard.com
- Registry Tech ID: 1000xqagxbxvppss
- Tech Name: WhoisGuard Protected
- Tech Organization: WhoisGuard, Inc.
- Tech Street: P.O. Box 0823-03411
- Tech City: Panama
- Tech State/Province: Panama
- Tech Postal Code: 0
- Tech Country: PA
- Tech Phone: +507.8365503
- Tech Phone Ext:
- Tech Fax: +51.17057182
- Tech Fax Ext:
- Tech Email: e7b2607bdfbb460a884cb298fc23664d.protect@whoisguard.com
- Name Server: DNS110.OVH.NET
- Name Server: NS110.OVH.NET
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
- >>> Last update of WHOIS database: 2017-04-06T00:03:11Z <<<
- Network IP address lookup:
- Whois query for 207.154.197.249...
- Results returned from whois.arin.net:
- #
- # ARIN WHOIS data and services are subject to the Terms of Use
- # available at: https://www.arin.net/whois_tou.html
- #
- # If you see inaccuracies in the results, please report at
- # https://www.arin.net/public/whoisinaccuracy/index.xhtml
- #
- #
- # The following results may also be obtained via:
- # https://whois.arin.net/rest/nets;q=207.154.197.249?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
- #
- NetRange: 207.154.192.0 - 207.154.255.255
- CIDR: 207.154.192.0/18
- NetName: DIGITALOCEAN-18
- NetHandle: NET-207-154-192-0-1
- Parent: NET207 (NET-207-0-0-0-0)
- NetType: Direct Allocation
- OriginAS:
- Organization: Digital Ocean, Inc. (DO-13)
- RegDate: 2016-04-12
- Updated: 2016-04-12
- Ref: https://whois.arin.net/rest/net/NET-207-154-192-0-1
- OrgName: Digital Ocean, Inc.
- OrgId: DO-13
- Address: 101 Ave of the Americas
- Address: 10th Floor
- City: New York
- StateProv: NY
- PostalCode: 10013
- Country: US
- RegDate: 2012-05-14
- Updated: 2017-01-28
- Comment: http://www.digitalocean.com
- Comment: Simple Cloud Hosting
- Ref: https://whois.arin.net/rest/org/DO-13
- OrgNOCHandle: NOC32014-ARIN
- OrgNOCName: Network Operations Center
- OrgNOCPhone: +1-347-875-6044
- OrgNOCEmail: noc@digitalocean.com
- OrgNOCRef: https://whois.arin.net/rest/poc/NOC32014-ARIN
- OrgTechHandle: NOC32014-ARIN
- OrgTechName: Network Operations Center
- OrgTechPhone: +1-347-875-6044
- OrgTechEmail: noc@digitalocean.com
- OrgTechRef: https://whois.arin.net/rest/poc/NOC32014-ARIN
- OrgAbuseHandle: ABUSE5232-ARIN
- OrgAbuseName: Abuse, DigitalOcean
- OrgAbusePhone: +1-347-875-6044
- OrgAbuseEmail: abuse@digitalocean.com
- OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE5232-ARIN
- #
- # ARIN WHOIS data and services are subject to the Terms of Use
- # available at: https://www.arin.net/whois_tou.html
- #
- # If you see inaccuracies in the results, please report at
- # https://www.arin.net/public/whoisinaccuracy/index.xhtml
- #
- ##########
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement