Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting Nmap 7.60 ( https://nmap.org ) at 2018-09-04 19:44 CEST
- NSE: Loaded 146 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 19:44
- Completed NSE at 19:44, 0.00s elapsed
- Initiating NSE at 19:44
- Completed NSE at 19:44, 0.00s elapsed
- Initiating Ping Scan at 19:44
- Scanning 176.119.1.146 [4 ports]
- Completed Ping Scan at 19:44, 0.26s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 19:44
- Completed Parallel DNS resolution of 1 host. at 19:44, 0.10s elapsed
- Initiating SYN Stealth Scan at 19:44
- Scanning 176.119.1.146 [1000 ports]
- Discovered open port 21/tcp on 176.119.1.146
- Discovered open port 143/tcp on 176.119.1.146
- Discovered open port 110/tcp on 176.119.1.146
- Discovered open port 22/tcp on 176.119.1.146
- Discovered open port 993/tcp on 176.119.1.146
- Discovered open port 25/tcp on 176.119.1.146
- Discovered open port 53/tcp on 176.119.1.146
- Discovered open port 995/tcp on 176.119.1.146
- Discovered open port 80/tcp on 176.119.1.146
- Discovered open port 587/tcp on 176.119.1.146
- Increasing send delay for 176.119.1.146 from 0 to 5 due to 57 out of 142 dropped probes since last increase.
- Increasing send delay for 176.119.1.146 from 5 to 10 due to 18 out of 44 dropped probes since last increase.
- Discovered open port 443/tcp on 176.119.1.146
- Warning: 176.119.1.146 giving up on port because retransmission cap hit (6).
- Discovered open port 465/tcp on 176.119.1.146
- Discovered open port 1500/tcp on 176.119.1.146
- Completed SYN Stealth Scan at 19:45, 40.95s elapsed (1000 total ports)
- Initiating Service scan at 19:45
- Scanning 13 services on 176.119.1.146
- Completed Service scan at 19:47, 120.97s elapsed (13 services on 1 host)
- Initiating OS detection (try #1) against 176.119.1.146
- adjust_timeouts2: packet supposedly had rtt of -134230 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -134230 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -144426 microseconds. Ignoring time.
- adjust_timeouts2: packet supposedly had rtt of -144426 microseconds. Ignoring time.
- Retrying OS detection (try #2) against 176.119.1.146
- Initiating Traceroute at 19:47
- Completed Traceroute at 19:47, 3.08s elapsed
- Initiating Parallel DNS resolution of 11 hosts. at 19:47
- Completed Parallel DNS resolution of 11 hosts. at 19:47, 0.25s elapsed
- NSE: Script scanning 176.119.1.146.
- Initiating NSE at 19:47
- Completed NSE at 19:47, 35.76s elapsed
- Initiating NSE at 19:47
- Completed NSE at 19:47, 1.12s elapsed
- Nmap scan report for 176.119.1.146
- Host is up (0.10s latency).
- Not shown: 987 closed ports
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD 1.3.5a
- | ssl-cert: Subject: commonName=example.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Issuer: commonName=example.com/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-31T21:12:23
- | Not valid after: 2028-08-28T21:12:23
- | MD5: 6ea3 d5b4 4535 e66f ad2c aadf b8ac 62ef
- |_SHA-1: 800a 69fd de7a a95b 4509 f882 619b 962e a5d6 a4fe
- |_ssl-date: TLS randomness does not represent time
- 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0)
- | ssh-hostkey:
- | 2048 4a:e0:24:e1:53:d9:6d:2f:c4:39:a9:30:62:64:90:94 (RSA)
- | 256 54:a0:96:b0:2c:45:94:97:03:05:a7:aa:02:9e:0e:35 (ECDSA)
- |_ 256 54:69:c4:0f:e3:3c:f6:93:c4:66:1c:62:74:8c:09:2b (EdDSA)
- 25/tcp open smtp Exim smtpd 4.86_2
- | smtp-commands: megaopac.host Hello nmap.scanme.org [128.90.170.169], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-31T21:11:11
- | Not valid after: 2028-08-28T21:11:11
- | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
- |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
- |_ssl-date: 2018-09-04T17:48:11+00:00; +55s from scanner time.
- 53/tcp open domain ISC BIND 9.10.3-P4-Ubuntu
- | dns-nsid:
- |_ bind.version: 9.10.3-P4-Ubuntu
- 80/tcp open http Apache httpd 2.4.18
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Apache/2.4.18 (Ubuntu)
- |_http-title: Did not follow redirect to https://176.119.1.146/
- 110/tcp open pop3 Dovecot pop3d
- |_pop3-capabilities: STLS RESP-CODES TOP CAPA SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) PIPELINING USER AUTH-RESP-CODE UIDL
- | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-31T21:11:11
- | Not valid after: 2028-08-28T21:11:11
- | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
- |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
- |_ssl-date: TLS randomness does not represent time
- 143/tcp open imap Dovecot imapd
- |_imap-capabilities: AUTH=CRAM-MD5A0001 IDLE post-login STARTTLS AUTH=LOGIN more SASL-IR ID have LITERAL+ listed Pre-login capabilities LOGIN-REFERRALS ENABLE OK AUTH=PLAIN AUTH=DIGEST-MD5 IMAP4rev1
- | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-31T21:11:11
- | Not valid after: 2028-08-28T21:11:11
- | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
- |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
- |_ssl-date: TLS randomness does not represent time
- 443/tcp open https?
- | ssl-cert: Subject: commonName=megaopac.host
- | Subject Alternative Name: DNS:megaopac.host, DNS:www.megaopac.host
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-31T20:36:15
- | Not valid after: 2018-11-29T20:36:15
- | MD5: 8fa7 de1a e79e 0011 1b22 18ce 7b2e 3bf1
- |_SHA-1: e7f8 86ef cf97 3a08 f567 5934 75ba c65a 1ffb cecb
- 465/tcp open ssl/smtp Exim smtpd 4.86_2
- | smtp-commands: megaopac.host Hello nmap.scanme.org [128.90.170.169], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, HELP,
- |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-31T21:11:11
- | Not valid after: 2028-08-28T21:11:11
- | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
- |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
- |_ssl-date: 2018-09-04T17:50:18+00:00; +2m59s from scanner time.
- 587/tcp open smtp Exim smtpd 4.86_2
- | smtp-commands: megaopac.host Hello nmap.scanme.org [128.90.170.169], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN CRAM-MD5, STARTTLS, HELP,
- |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
- | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-31T21:11:11
- | Not valid after: 2028-08-28T21:11:11
- | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
- |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
- |_ssl-date: 2018-09-04T17:48:01+00:00; +41s from scanner time.
- 993/tcp open ssl/imap Dovecot imapd
- |_imap-capabilities: listed IDLE post-login AUTH=LOGIN more SASL-IR ID have LITERAL+ AUTH=CRAM-MD5A0001 Pre-login capabilities LOGIN-REFERRALS ENABLE OK AUTH=PLAIN AUTH=DIGEST-MD5 IMAP4rev1
- | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-31T21:11:11
- | Not valid after: 2028-08-28T21:11:11
- | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
- |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
- |_ssl-date: TLS randomness does not represent time
- 995/tcp open ssl/pop3 Dovecot pop3d
- |_pop3-capabilities: SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) PIPELINING AUTH-RESP-CODE RESP-CODES USER UIDL TOP CAPA
- | ssl-cert: Subject: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Issuer: commonName=megaopac/organizationName=XX/stateOrProvinceName=XX/countryName=XX
- | Public Key type: rsa
- | Public Key bits: 1024
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-31T21:11:11
- | Not valid after: 2028-08-28T21:11:11
- | MD5: f5ab 2120 2859 cf9a dcce 3657 c59b 0ff2
- |_SHA-1: c8b2 031c de66 bad5 f7bc 0bbc 0de0 a93c 7505 1bd2
- |_ssl-date: TLS randomness does not represent time
- 1500/tcp open ssl/vlsi-lm?
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.0 404 Not Found
- | Content-Length: 2715
- | Date: Tue, 04 Sep 2018 17:46:08 GMT
- | <!DOCTYPE html>
- | <html>
- | <head>
- | <title>404 Not Found</title>
- | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
- | <style>
- | body {
- | font-weight: normal;
- | font-size: 11px;
- | font-family: Arial;
- | .fatal-error {
- | width: 270px;
- | height: 270px;
- | margin: 0 auto;
- | position: absolute;
- | top: 50%;
- | left: 50%;
- | margin-left: -135px;
- | margin-top: -135px;
- | .fatal-error-round {
- | width: 270px;
- | height: 270px;
- | background: #FF8356;
- | border-radius: 270px;
- | .fatal-error-inner {
- | padding-top: 23px;
- | text-align: center;
- | .fatal-error-sign {
- | margin-bottom: 10px;
- | .fatal-error-sign-top {
- | background: #FFF;
- | width: 14px;
- | height: 7px;
- | border-radius: 28px
- | GetRequest:
- | HTTP/1.0 200 OK
- | Connection: close
- | Content-Type: text/html; charset=UTF-8
- | Pragma: no-cache
- | Cache-Control: no-cache
- | Expires: 0
- | Set-Cookie: ispmgrses5=; path=/; HttpOnly; expires=Wed, 04 Sep 2019 18:45:31 BST
- | Set-Cookie: ispmgrlang5=orion:en; path=/; expires=Wed, 04 Sep 2019 18:45:31 BST
- | X-Frame-Options: SAMEORIGIN
- | Date: Tue, 04 Sep 2018 17:45:31 GMT
- | <!DOCTYPE html><html>
- | <head>
- | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
- | <title>Authorization</title>
- | <link rel="stylesheet" href="/manimg/orion/default/main.css" type="text/css">
- | <link rel="shortcut icon" href="/manimg/orion/default/favicon-ispmgr.ico" type="image/x-icon">
- | <link rel="mask-icon" href="https:///manimg/common/maskicon/ispmgr.svg" color="#000000">
- | <meta name="viewport" content="width=device-width, initial-scale=1.0, minimum-scale=1.0, maximum-scale=1.0, user-scalable=yes">
- | </head>
- | <body class="b
- | HTTPOptions:
- | HTTP/1.0 200 OK
- | Content-Length: 0
- | Date: Tue, 04 Sep 2018 17:45:31 GMT
- | RTSPRequest:
- | HTTP/1.1 200 OK
- | Content-Length: 0
- |_ Date: Tue, 04 Sep 2018 17:45:32 GMT
- | ssl-cert: Subject: commonName=la02abd2.justinstalledpanel.com
- | Subject Alternative Name: DNS:la02abd2.justinstalledpanel.com
- | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2018-08-31T20:07:08
- | Not valid after: 2018-11-29T20:07:08
- | MD5: 60f8 9d6b e5de eb56 370a e2be 0b83 9b2f
- |_SHA-1: c98e 8c1f c29f f245 b0c3 7853 abd5 c1e2 2e70 5552
- |_ssl-date: 2018-09-04T17:49:22+00:00; +2m03s from scanner time.
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port1500-TCP:V=7.60%T=SSL%I=7%D=9/4%Time=5B8EC4BB%P=x86_64-pc-linux-gnu
- SF:%r(GetRequest,1706,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\r\nC
- SF:ontent-Type:\x20text/html;\x20charset=UTF-8\r\nPragma:\x20no-cache\r\nC
- SF:ache-Control:\x20no-cache\r\nExpires:\x200\r\nSet-Cookie:\x20ispmgrses5
- SF:=;\x20path=/;\x20HttpOnly;\x20expires=Wed,\x2004\x20Sep\x202019\x2018:4
- SF:5:31\x20BST\r\nSet-Cookie:\x20ispmgrlang5=orion:en;\x20path=/;\x20expir
- SF:es=Wed,\x2004\x20Sep\x202019\x2018:45:31\x20BST\r\nX-Frame-Options:\x20
- SF:SAMEORIGIN\r\nDate:\x20Tue,\x2004\x20Sep\x202018\x2017:45:31\x20GMT\r\n
- SF:\r\n<!DOCTYPE\x20html><html>\n<head>\n<meta\x20http-equiv=\"Content-Typ
- SF:e\"\x20content=\"text/html;\x20charset=UTF-8\">\n<title>Authorization</
- SF:title>\n<link\x20rel=\"stylesheet\"\x20href=\"/manimg/orion/default/mai
- SF:n\.css\"\x20type=\"text/css\">\n<link\x20rel=\"shortcut\x20icon\"\x20hr
- SF:ef=\"/manimg/orion/default/favicon-ispmgr\.ico\"\x20type=\"image/x-icon
- SF:\">\n<link\x20rel=\"mask-icon\"\x20href=\"https:///manimg/common/maskic
- SF:on/ispmgr\.svg\"\x20color=\"#000000\">\n<meta\x20name=\"viewport\"\x20c
- SF:ontent=\"width=device-width,\x20initial-scale=1\.0,\x20minimum-scale=1\
- SF:.0,\x20maximum-scale=1\.0,\x20user-scalable=yes\">\n</head>\n<body\x20c
- SF:lass=\"b")%r(HTTPOptions,4B,"HTTP/1\.0\x20200\x20OK\r\nContent-Length:\
- SF:x200\r\nDate:\x20Tue,\x2004\x20Sep\x202018\x2017:45:31\x20GMT\r\n\r\n")
- SF:%r(RTSPRequest,4B,"HTTP/1\.1\x20200\x20OK\r\nContent-Length:\x200\r\nDa
- SF:te:\x20Tue,\x2004\x20Sep\x202018\x2017:45:32\x20GMT\r\n\r\n")%r(FourOhF
- SF:ourRequest,AF0,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Length:\x20
- SF:2715\r\nDate:\x20Tue,\x2004\x20Sep\x202018\x2017:46:08\x20GMT\r\n\r\n<!
- SF:DOCTYPE\x20html>\n<html>\n<head>\n\x20\x20<title>404\x20Not\x20Found</t
- SF:itle>\n\x20\x20<meta\x20http-equiv=\"Content-Type\"\x20content=\"text/h
- SF:tml;\x20charset=UTF-8\">\n\x20\x20<style>\n\x20\x20\x20\x20body\x20{\n\
- SF:x20\x20\x20\x20\x20\x20font-weight:\x20normal;\n\x20\x20\x20\x20\x20\x2
- SF:0font-size:\x2011px;\n\x20\x20\x20\x20\x20\x20font-family:\x20Arial;\n\
- SF:x20\x20\x20\x20}\n\x20\x20\x20\x20\.fatal-error\x20{\n\x20\x20\x20\x20\
- SF:x20\x20width:\x20270px;\n\x20\x20\x20\x20\x20\x20height:\x20270px;\n\x2
- SF:0\x20\x20\x20\x20\x20margin:\x200\x20auto;\n\x20\x20\x20\x20\x20\x20pos
- SF:ition:\x20absolute;\n\x20\x20\x20\x20\x20\x20top:\x2050%;\n\x20\x20\x20
- SF:\x20\x20\x20left:\x2050%;\n\x20\x20\x20\x20\x20\x20margin-left:\x20-135
- SF:px;\n\x20\x20\x20\x20\x20\x20margin-top:\x20-135px;\n\x20\x20\x20\x20}\
- SF:n\x20\x20\x20\x20\.fatal-error-round\x20{\n\x20\x20\x20\x20\x20\x20widt
- SF:h:\x20270px;\n\x20\x20\x20\x20\x20\x20height:\x20270px;\n\x20\x20\x20\x
- SF:20\x20\x20background:\x20#FF8356;\n\x20\x20\x20\x20\x20\x20border-radiu
- SF:s:\x20270px;\n\x20\x20\x20\x20}\n\x20\x20\x20\x20\.fatal-error-inner\x2
- SF:0{\n\x20\x20\x20\x20\x20\x20padding-top:\x2023px;\n\x20\x20\x20\x20\x20
- SF:\x20text-align:\x20center;\n\x20\x20\x20\x20}\n\x20\x20\x20\x20\.fatal-
- SF:error-sign\x20{\n\x20\x20\x20\x20\x20\x20margin-bottom:\x2010px;\n\x20\
- SF:x20\x20\x20}\n\x20\x20\x20\x20\.fatal-error-sign-top\x20{\n\x20\x20\x20
- SF:\x20\x20\x20background:\x20#FFF;\n\x20\x20\x20\x20\x20\x20width:\x2014p
- SF:x;\n\x20\x20\x20\x20\x20\x20height:\x207px;\n\x20\x20\x20\x20\x20\x20bo
- SF:rder-radius:\x2028px");
- Aggressive OS guesses: Linux 3.10 - 4.8 (95%), Linux 3.13 (95%), Linux 3.13 or 4.2 (95%), Linux 4.4 (95%), Linux 3.16 (94%), Linux 3.16 - 4.6 (94%), Linux 3.12 (93%), Linux 3.2 - 4.8 (93%), Linux 3.8 - 3.11 (93%), Linux 4.1 (92%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 3.841 days (since Fri Aug 31 23:36:24 2018)
- Network Distance: 14 hops
- TCP Sequence Prediction: Difficulty=263 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Host: megaopac.host; OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
- Host script results:
- |_clock-skew: mean: 1m39s, deviation: 1m03s, median: 54s
- NSE: Script Post-scanning.
- Initiating NSE at 19:47
- Completed NSE at 19:47, 0.00s elapsed
- Initiating NSE at 19:47
- Completed NSE at 19:47, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 209.17 seconds
- Raw packets sent: 2932 (133.040KB) | Rcvd: 4430 (542.999KB)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement