Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-02 11:19 RTZ 2 (ceia)
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 11:19
- Completed NSE at 11:19, 0.00s elapsed
- Initiating NSE at 11:19
- Completed NSE at 11:19, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 11:21
- Completed Parallel DNS resolution of 1 host. at 11:21, 0.12s elapsed
- Initiating SYN Stealth Scan at 11:21
- Scanning koronabora.com (82.202.161.53) [1000 ports]
- Discovered open port 22/tcp on 82.202.161.53
- Completed SYN Stealth Scan at 11:21, 14.21s elapsed (1000 total ports)
- Initiating Service scan at 11:21
- Scanning 1 service on koronabora.com (82.202.161.53)
- Completed Service scan at 11:21, 0.13s elapsed (1 service on 1 host)
- Initiating OS detection (try #1) against koronabora.com (82.202.161.53)
- Retrying OS detection (try #2) against koronabora.com (82.202.161.53)
- Initiating Traceroute at 11:21
- Completed Traceroute at 11:21, 0.07s elapsed
- Initiating Parallel DNS resolution of 3 hosts. at 11:21
- Completed Parallel DNS resolution of 3 hosts. at 11:21, 0.01s elapsed
- NSE: Script scanning 82.202.161.53.
- Initiating NSE at 11:21
- Completed NSE at 11:21, 1.74s elapsed
- Initiating NSE at 11:21
- Completed NSE at 11:21, 0.00s elapsed
- Nmap scan report for koronabora.com (82.202.161.53)
- Host is up (0.044s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE VERSION
- 22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u3 (protocol 2.0)
- | ssh-hostkey:
- | 2048 9b:22:0b:0d:98:6e:3e:f1:b6:01:37:18:4c:01:b5:ba (RSA)
- | 256 1b:fa:ec:d8:d5:51:95:a9:0c:9a:a2:62:2e:f1:81:04 (ECDSA)
- |_ 256 d8:44:f4:2e:1f:71:b8:e8:a2:34:b9:96:95:35:7f:ba (ED25519)
- 55555/tcp closed unknown
- Device type: general purpose|firewall
- Running (JUST GUESSING): Linux 4.X|3.X|2.6.X (97%), IPFire 2.X (88%), WatchGuard Fireware 11.X (87%)
- OS CPE: cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:3.8 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:ipfire:ipfire:2.11 cpe:/o:watchguard:fireware:11.8
- Aggressive OS guesses: Linux 4.4 (97%), Linux 3.8 (93%), Linux 3.11 - 4.1 (92%), Linux 3.16 (90%), Linux 3.0 (89%), Linux 3.10 - 3.16 (89%), Linux 3.13 (89%), Linux 2.6.32 (89%), Linux 3.10 - 3.12 (88%), Linux 3.2 - 3.8 (88%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.017 days (since Fri Aug 02 10:57:32 2019)
- Network Distance: 3 hops
- TCP Sequence Prediction: Difficulty=263 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
- TRACEROUTE (using port 55555/tcp)
- HOP RTT ADDRESS
- 1 4.00 ms OpenWrt.lan (192.168.1.1)
- 2 19.00 ms 192.168.8.1
- 3 40.00 ms koronabora.com (82.202.161.53)
- NSE: Script Post-scanning.
- Initiating NSE at 11:21
- Completed NSE at 11:21, 0.00s elapsed
- Initiating NSE at 11:21
- Completed NSE at 11:21, 0.00s elapsed
- Read data files from: C:\Program Files (x86)\Nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 106.06 seconds
- Raw packets sent: 2070 (93.272KB) | Rcvd: 69 (5.132KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement