Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.70 ( https://nmap.org ) at 2018-06-22 23:15 Central Daylight Time
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 23:15
- Completed NSE at 23:15, 0.00s elapsed
- Initiating NSE at 23:15
- Completed NSE at 23:15, 0.00s elapsed
- Initiating Ping Scan at 23:15
- Scanning max2019.neocities.org (198.51.233.2) [4 ports]
- Completed Ping Scan at 23:15, 1.46s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 23:15
- Completed Parallel DNS resolution of 1 host. at 23:15, 5.59s elapsed
- Initiating SYN Stealth Scan at 23:15
- Scanning max2019.neocities.org (198.51.233.2) [1000 ports]
- Discovered open port 443/tcp on 198.51.233.2
- Discovered open port 53/tcp on 198.51.233.2
- Discovered open port 80/tcp on 198.51.233.2
- Completed SYN Stealth Scan at 23:15, 5.93s elapsed (1000 total ports)
- Initiating Service scan at 23:15
- Scanning 3 services on max2019.neocities.org (198.51.233.2)
- Completed Service scan at 23:16, 12.15s elapsed (3 services on 1 host)
- Initiating OS detection (try #1) against max2019.neocities.org (198.51.233.2)
- Initiating Traceroute at 23:16
- Completed Traceroute at 23:16, 3.04s elapsed
- Initiating Parallel DNS resolution of 9 hosts. at 23:16
- Completed Parallel DNS resolution of 9 hosts. at 23:16, 0.16s elapsed
- NSE: Script scanning 198.51.233.2.
- Initiating NSE at 23:16
- Completed NSE at 23:16, 9.49s elapsed
- Initiating NSE at 23:16
- Completed NSE at 23:16, 0.00s elapsed
- Nmap scan report for max2019.neocities.org (198.51.233.2)
- Host is up (0.016s latency).
- Not shown: 997 filtered ports
- PORT STATE SERVICE VERSION
- 53/tcp open domain PowerDNS Authoritative Server 4.0.0-alpha2
- | dns-nsid:
- | NSID: proxy-dallas (70726f78792d64616c6c6173)
- | id.server: proxy-dallas
- |_ bind.version: PowerDNS Authoritative Server 4.0.0-alpha2
- 80/tcp open http OpenResty web app server
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: openresty
- |_http-title: Did not follow redirect to https://max2019.neocities.org/
- 443/tcp open ssl/http OpenResty web app server
- | http-methods:
- |_ Supported Methods: GET HEAD
- |_http-server-header: openresty
- |_http-title: The web site of max2019
- | ssl-cert: Subject: commonName=*.neocities.org
- | Subject Alternative Name: DNS:*.neocities.org, DNS:neocities.org
- | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2016-05-03T00:00:00
- | Not valid after: 2019-06-30T23:59:59
- | MD5: 6eeb de27 6a6c 99fb f783 ac72 fd2c 5d21
- |_SHA-1: 300a 2f6c 3cf2 3b5d 762d 9eee 6f68 f6af 7f87 58fe
- |_ssl-date: TLS randomness does not represent time
- | tls-alpn:
- | h2
- |_ http/1.1
- | tls-nextprotoneg:
- | h2
- |_ http/1.1
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running: Linux 3.X|4.X
- OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
- OS details: Linux 3.2 - 4.9
- Uptime guess: 135.966 days (since Tue Feb 06 23:05:09 2018)
- Network Distance: 12 hops
- TCP Sequence Prediction: Difficulty=260 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 6.00 ms 192.168.1.1
- 2 10.00 ms 47.189.48.1
- 3 63.00 ms 172.102.49.124
- 4 12.00 ms ae8---0.scr02.dlls.tx.frontiernet.net (74.40.3.25)
- 5 64.00 ms ae0---0.cbr01.dlls.tx.frontiernet.net (74.40.4.14)
- 6 ...
- 7 11.00 ms ae10.cr10-dal3.ip4.gtt.net (77.67.71.221)
- 8 11.00 ms xe-2-0-1.cr0-dal2.ip4.gtt.net (141.136.107.74)
- 9 12.00 ms ip4.gtt.net (173.205.43.82)
- 10 ... 11
- 12 15.00 ms 198.51.233.2
- NSE: Script Post-scanning.
- Initiating NSE at 23:16
- Completed NSE at 23:16, 0.00s elapsed
- Initiating NSE at 23:16
- Completed NSE at 23:16, 0.00s elapsed
- Read data files from: C:\Program Files (x86)\Nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 50.17 seconds
- Raw packets sent: 2060 (92.422KB) | Rcvd: 148 (11.767KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement