Advertisement
Guest User

Untitled

a guest
Jun 22nd, 2018
220
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.38 KB | None | 0 0
  1. Starting Nmap 7.70 ( https://nmap.org ) at 2018-06-22 23:15 Central Daylight Time
  2.  
  3. NSE: Loaded 148 scripts for scanning.
  4.  
  5. NSE: Script Pre-scanning.
  6.  
  7. Initiating NSE at 23:15
  8.  
  9. Completed NSE at 23:15, 0.00s elapsed
  10.  
  11. Initiating NSE at 23:15
  12.  
  13. Completed NSE at 23:15, 0.00s elapsed
  14.  
  15. Initiating Ping Scan at 23:15
  16.  
  17. Scanning max2019.neocities.org (198.51.233.2) [4 ports]
  18.  
  19. Completed Ping Scan at 23:15, 1.46s elapsed (1 total hosts)
  20.  
  21. Initiating Parallel DNS resolution of 1 host. at 23:15
  22.  
  23. Completed Parallel DNS resolution of 1 host. at 23:15, 5.59s elapsed
  24.  
  25. Initiating SYN Stealth Scan at 23:15
  26.  
  27. Scanning max2019.neocities.org (198.51.233.2) [1000 ports]
  28.  
  29. Discovered open port 443/tcp on 198.51.233.2
  30.  
  31. Discovered open port 53/tcp on 198.51.233.2
  32.  
  33. Discovered open port 80/tcp on 198.51.233.2
  34.  
  35. Completed SYN Stealth Scan at 23:15, 5.93s elapsed (1000 total ports)
  36.  
  37. Initiating Service scan at 23:15
  38.  
  39. Scanning 3 services on max2019.neocities.org (198.51.233.2)
  40.  
  41. Completed Service scan at 23:16, 12.15s elapsed (3 services on 1 host)
  42.  
  43. Initiating OS detection (try #1) against max2019.neocities.org (198.51.233.2)
  44.  
  45. Initiating Traceroute at 23:16
  46.  
  47. Completed Traceroute at 23:16, 3.04s elapsed
  48.  
  49. Initiating Parallel DNS resolution of 9 hosts. at 23:16
  50.  
  51. Completed Parallel DNS resolution of 9 hosts. at 23:16, 0.16s elapsed
  52.  
  53. NSE: Script scanning 198.51.233.2.
  54.  
  55. Initiating NSE at 23:16
  56.  
  57. Completed NSE at 23:16, 9.49s elapsed
  58.  
  59. Initiating NSE at 23:16
  60.  
  61. Completed NSE at 23:16, 0.00s elapsed
  62.  
  63. Nmap scan report for max2019.neocities.org (198.51.233.2)
  64.  
  65. Host is up (0.016s latency).
  66.  
  67. Not shown: 997 filtered ports
  68.  
  69. PORT STATE SERVICE VERSION
  70.  
  71. 53/tcp open domain PowerDNS Authoritative Server 4.0.0-alpha2
  72.  
  73. | dns-nsid:
  74.  
  75. | NSID: proxy-dallas (70726f78792d64616c6c6173)
  76.  
  77. | id.server: proxy-dallas
  78.  
  79. |_ bind.version: PowerDNS Authoritative Server 4.0.0-alpha2
  80.  
  81. 80/tcp open http OpenResty web app server
  82.  
  83. | http-methods:
  84.  
  85. |_ Supported Methods: GET HEAD POST OPTIONS
  86.  
  87. |_http-server-header: openresty
  88.  
  89. |_http-title: Did not follow redirect to https://max2019.neocities.org/
  90.  
  91. 443/tcp open ssl/http OpenResty web app server
  92.  
  93. | http-methods:
  94.  
  95. |_ Supported Methods: GET HEAD
  96.  
  97. |_http-server-header: openresty
  98.  
  99. |_http-title: The web site of max2019
  100.  
  101. | ssl-cert: Subject: commonName=*.neocities.org
  102.  
  103. | Subject Alternative Name: DNS:*.neocities.org, DNS:neocities.org
  104.  
  105. | Issuer: commonName=COMODO RSA Domain Validation Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
  106.  
  107. | Public Key type: rsa
  108.  
  109. | Public Key bits: 2048
  110.  
  111. | Signature Algorithm: sha256WithRSAEncryption
  112.  
  113. | Not valid before: 2016-05-03T00:00:00
  114.  
  115. | Not valid after: 2019-06-30T23:59:59
  116.  
  117. | MD5: 6eeb de27 6a6c 99fb f783 ac72 fd2c 5d21
  118.  
  119. |_SHA-1: 300a 2f6c 3cf2 3b5d 762d 9eee 6f68 f6af 7f87 58fe
  120.  
  121. |_ssl-date: TLS randomness does not represent time
  122.  
  123. | tls-alpn:
  124.  
  125. | h2
  126.  
  127. |_ http/1.1
  128.  
  129. | tls-nextprotoneg:
  130.  
  131. | h2
  132.  
  133. |_ http/1.1
  134.  
  135. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  136.  
  137. Device type: general purpose
  138.  
  139. Running: Linux 3.X|4.X
  140.  
  141. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
  142.  
  143. OS details: Linux 3.2 - 4.9
  144.  
  145. Uptime guess: 135.966 days (since Tue Feb 06 23:05:09 2018)
  146.  
  147. Network Distance: 12 hops
  148.  
  149. TCP Sequence Prediction: Difficulty=260 (Good luck!)
  150.  
  151. IP ID Sequence Generation: All zeros
  152.  
  153.  
  154.  
  155. TRACEROUTE (using port 443/tcp)
  156.  
  157. HOP RTT ADDRESS
  158.  
  159. 1 6.00 ms 192.168.1.1
  160.  
  161. 2 10.00 ms 47.189.48.1
  162.  
  163. 3 63.00 ms 172.102.49.124
  164.  
  165. 4 12.00 ms ae8---0.scr02.dlls.tx.frontiernet.net (74.40.3.25)
  166.  
  167. 5 64.00 ms ae0---0.cbr01.dlls.tx.frontiernet.net (74.40.4.14)
  168.  
  169. 6 ...
  170.  
  171. 7 11.00 ms ae10.cr10-dal3.ip4.gtt.net (77.67.71.221)
  172.  
  173. 8 11.00 ms xe-2-0-1.cr0-dal2.ip4.gtt.net (141.136.107.74)
  174.  
  175. 9 12.00 ms ip4.gtt.net (173.205.43.82)
  176.  
  177. 10 ... 11
  178.  
  179. 12 15.00 ms 198.51.233.2
  180.  
  181.  
  182.  
  183. NSE: Script Post-scanning.
  184.  
  185. Initiating NSE at 23:16
  186.  
  187. Completed NSE at 23:16, 0.00s elapsed
  188.  
  189. Initiating NSE at 23:16
  190.  
  191. Completed NSE at 23:16, 0.00s elapsed
  192.  
  193. Read data files from: C:\Program Files (x86)\Nmap
  194.  
  195. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  196.  
  197. Nmap done: 1 IP address (1 host up) scanned in 50.17 seconds
  198.  
  199. Raw packets sent: 2060 (92.422KB) | Rcvd: 148 (11.767KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement