Advertisement
koronabora

Untitled

Aug 2nd, 2019
159
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.22 KB | None | 0 0
  1. Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-02 11:19 RTZ 2 (ceia)
  2.  
  3. NSE: Loaded 148 scripts for scanning.
  4.  
  5. NSE: Script Pre-scanning.
  6.  
  7. Initiating NSE at 11:19
  8.  
  9. Completed NSE at 11:19, 0.00s elapsed
  10.  
  11. Initiating NSE at 11:19
  12.  
  13. Completed NSE at 11:19, 0.00s elapsed
  14.  
  15. Initiating Parallel DNS resolution of 1 host. at 11:21
  16.  
  17. Completed Parallel DNS resolution of 1 host. at 11:21, 0.12s elapsed
  18.  
  19. Initiating SYN Stealth Scan at 11:21
  20.  
  21. Scanning koronabora.com (82.202.161.53) [1000 ports]
  22.  
  23. Discovered open port 22/tcp on 82.202.161.53
  24.  
  25. Completed SYN Stealth Scan at 11:21, 14.21s elapsed (1000 total ports)
  26.  
  27. Initiating Service scan at 11:21
  28.  
  29. Scanning 1 service on koronabora.com (82.202.161.53)
  30.  
  31. Completed Service scan at 11:21, 0.13s elapsed (1 service on 1 host)
  32.  
  33. Initiating OS detection (try #1) against koronabora.com (82.202.161.53)
  34.  
  35. Retrying OS detection (try #2) against koronabora.com (82.202.161.53)
  36.  
  37. Initiating Traceroute at 11:21
  38.  
  39. Completed Traceroute at 11:21, 0.07s elapsed
  40.  
  41. Initiating Parallel DNS resolution of 3 hosts. at 11:21
  42.  
  43. Completed Parallel DNS resolution of 3 hosts. at 11:21, 0.01s elapsed
  44.  
  45. NSE: Script scanning 82.202.161.53.
  46.  
  47. Initiating NSE at 11:21
  48.  
  49. Completed NSE at 11:21, 1.74s elapsed
  50.  
  51. Initiating NSE at 11:21
  52.  
  53. Completed NSE at 11:21, 0.00s elapsed
  54.  
  55. Nmap scan report for koronabora.com (82.202.161.53)
  56.  
  57. Host is up (0.044s latency).
  58.  
  59. Not shown: 998 filtered ports
  60.  
  61. PORT STATE SERVICE VERSION
  62.  
  63. 22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u3 (protocol 2.0)
  64.  
  65. | ssh-hostkey:
  66.  
  67. | 2048 9b:22:0b:0d:98:6e:3e:f1:b6:01:37:18:4c:01:b5:ba (RSA)
  68.  
  69. | 256 1b:fa:ec:d8:d5:51:95:a9:0c:9a:a2:62:2e:f1:81:04 (ECDSA)
  70.  
  71. |_ 256 d8:44:f4:2e:1f:71:b8:e8:a2:34:b9:96:95:35:7f:ba (ED25519)
  72.  
  73. 55555/tcp closed unknown
  74.  
  75. Device type: general purpose|firewall
  76.  
  77. Running (JUST GUESSING): Linux 4.X|3.X|2.6.X (97%), IPFire 2.X (88%), WatchGuard Fireware 11.X (87%)
  78.  
  79. OS CPE: cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:3.8 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:ipfire:ipfire:2.11 cpe:/o:watchguard:fireware:11.8
  80.  
  81. Aggressive OS guesses: Linux 4.4 (97%), Linux 3.8 (93%), Linux 3.11 - 4.1 (92%), Linux 3.16 (90%), Linux 3.0 (89%), Linux 3.10 - 3.16 (89%), Linux 3.13 (89%), Linux 2.6.32 (89%), Linux 3.10 - 3.12 (88%), Linux 3.2 - 3.8 (88%)
  82.  
  83. No exact OS matches for host (test conditions non-ideal).
  84.  
  85. Uptime guess: 0.017 days (since Fri Aug 02 10:57:32 2019)
  86.  
  87. Network Distance: 3 hops
  88.  
  89. TCP Sequence Prediction: Difficulty=263 (Good luck!)
  90.  
  91. IP ID Sequence Generation: All zeros
  92.  
  93. Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
  94.  
  95.  
  96.  
  97. TRACEROUTE (using port 55555/tcp)
  98.  
  99. HOP RTT ADDRESS
  100.  
  101. 1 4.00 ms OpenWrt.lan (192.168.1.1)
  102.  
  103. 2 19.00 ms 192.168.8.1
  104.  
  105. 3 40.00 ms koronabora.com (82.202.161.53)
  106.  
  107.  
  108.  
  109. NSE: Script Post-scanning.
  110.  
  111. Initiating NSE at 11:21
  112.  
  113. Completed NSE at 11:21, 0.00s elapsed
  114.  
  115. Initiating NSE at 11:21
  116.  
  117. Completed NSE at 11:21, 0.00s elapsed
  118.  
  119. Read data files from: C:\Program Files (x86)\Nmap
  120.  
  121. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  122.  
  123. Nmap done: 1 IP address (1 host up) scanned in 106.06 seconds
  124.  
  125. Raw packets sent: 2070 (93.272KB) | Rcvd: 69 (5.132KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement