Skip to content

Instantly share code, notes, and snippets.

@enedil
Created April 26, 2015 16:48
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save enedil/b61e0bf9bc8419816a83 to your computer and use it in GitHub Desktop.
Save enedil/b61e0bf9bc8419816a83 to your computer and use it in GitHub Desktop.
Starting Nmap 6.40 ( http://nmap.org ) at 2015-04-26 18:26 CEST
NSE: Loaded 110 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 18:26
Scanning 256 hosts [2 ports/host]
Completed Ping Scan at 18:26, 2.22s elapsed (256 total hosts)
Initiating Parallel DNS resolution of 256 hosts. at 18:26
Completed Parallel DNS resolution of 256 hosts. at 18:26, 0.02s elapsed
Nmap scan report for 158.75.50.0 [host down]
Nmap scan report for 158.75.50.2 [host down]
Nmap scan report for 158.75.50.5 [host down]
Nmap scan report for 158.75.50.7 [host down]
Nmap scan report for 158.75.50.12 [host down]
Nmap scan report for 158.75.50.15 [host down]
Nmap scan report for 158.75.50.16 [host down]
Nmap scan report for 158.75.50.17 [host down]
Nmap scan report for 158.75.50.18 [host down]
Nmap scan report for 158.75.50.19 [host down]
Nmap scan report for 158.75.50.20 [host down]
Nmap scan report for 158.75.50.21 [host down]
Nmap scan report for 158.75.50.22 [host down]
Nmap scan report for 158.75.50.23 [host down]
Nmap scan report for 158.75.50.24 [host down]
Nmap scan report for 158.75.50.25 [host down]
Nmap scan report for 158.75.50.26 [host down]
Nmap scan report for 158.75.50.27 [host down]
Nmap scan report for 158.75.50.28 [host down]
Nmap scan report for 158.75.50.29 [host down]
Nmap scan report for 158.75.50.30 [host down]
Nmap scan report for 158.75.50.31 [host down]
Nmap scan report for 158.75.50.32 [host down]
Nmap scan report for 158.75.50.33 [host down]
Nmap scan report for 158.75.50.34 [host down]
Nmap scan report for 158.75.50.35 [host down]
Nmap scan report for 158.75.50.36 [host down]
Nmap scan report for 158.75.50.37 [host down]
Nmap scan report for 158.75.50.38 [host down]
Nmap scan report for 158.75.50.39 [host down]
Nmap scan report for 158.75.50.40 [host down]
Nmap scan report for 158.75.50.42 [host down]
Nmap scan report for 158.75.50.43 [host down]
Nmap scan report for 158.75.50.44 [host down]
Nmap scan report for 158.75.50.45 [host down]
Nmap scan report for 158.75.50.46 [host down]
Nmap scan report for 158.75.50.47 [host down]
Nmap scan report for 158.75.50.48 [host down]
Nmap scan report for 158.75.50.49 [host down]
Nmap scan report for 158.75.50.50 [host down]
Nmap scan report for 158.75.50.51 [host down]
Nmap scan report for 158.75.50.52 [host down]
Nmap scan report for 158.75.50.53 [host down]
Nmap scan report for 158.75.50.54 [host down]
Nmap scan report for 158.75.50.55 [host down]
Nmap scan report for 158.75.50.56 [host down]
Nmap scan report for 158.75.50.57 [host down]
Nmap scan report for 158.75.50.58 [host down]
Nmap scan report for 158.75.50.59 [host down]
Nmap scan report for 158.75.50.60 [host down]
Nmap scan report for 158.75.50.61 [host down]
Nmap scan report for 158.75.50.62 [host down]
Nmap scan report for 158.75.50.63 [host down]
Nmap scan report for 158.75.50.64 [host down]
Nmap scan report for 158.75.50.65 [host down]
Nmap scan report for 158.75.50.66 [host down]
Nmap scan report for 158.75.50.67 [host down]
Nmap scan report for 158.75.50.68 [host down]
Nmap scan report for 158.75.50.69 [host down]
Nmap scan report for 158.75.50.70 [host down]
Nmap scan report for 158.75.50.72 [host down]
Nmap scan report for 158.75.50.73 [host down]
Nmap scan report for 158.75.50.74 [host down]
Nmap scan report for 158.75.50.75 [host down]
Nmap scan report for 158.75.50.76 [host down]
Nmap scan report for 158.75.50.77 [host down]
Nmap scan report for 158.75.50.78 [host down]
Nmap scan report for 158.75.50.79 [host down]
Nmap scan report for 158.75.50.80 [host down]
Nmap scan report for 158.75.50.81 [host down]
Nmap scan report for 158.75.50.82 [host down]
Nmap scan report for 158.75.50.84 [host down]
Nmap scan report for 158.75.50.85 [host down]
Nmap scan report for 158.75.50.86 [host down]
Nmap scan report for 158.75.50.87 [host down]
Nmap scan report for 158.75.50.88 [host down]
Nmap scan report for 158.75.50.89 [host down]
Nmap scan report for 158.75.50.92 [host down]
Nmap scan report for 158.75.50.93 [host down]
Nmap scan report for 158.75.50.94 [host down]
Nmap scan report for 158.75.50.95 [host down]
Nmap scan report for 158.75.50.96 [host down]
Nmap scan report for 158.75.50.97 [host down]
Nmap scan report for 158.75.50.100 [host down]
Nmap scan report for 158.75.50.101 [host down]
Nmap scan report for 158.75.50.102 [host down]
Nmap scan report for 158.75.50.103 [host down]
Nmap scan report for 158.75.50.104 [host down]
Nmap scan report for 158.75.50.105 [host down]
Nmap scan report for 158.75.50.106 [host down]
Nmap scan report for 158.75.50.107 [host down]
Nmap scan report for 158.75.50.108 [host down]
Nmap scan report for 158.75.50.109 [host down]
Nmap scan report for 158.75.50.110 [host down]
Nmap scan report for 158.75.50.111 [host down]
Nmap scan report for 158.75.50.112 [host down]
Nmap scan report for 158.75.50.115 [host down]
Nmap scan report for 158.75.50.116 [host down]
Nmap scan report for 158.75.50.117 [host down]
Nmap scan report for 158.75.50.118 [host down]
Nmap scan report for 158.75.50.119 [host down]
Nmap scan report for 158.75.50.120 [host down]
Nmap scan report for 158.75.50.121 [host down]
Nmap scan report for 158.75.50.122 [host down]
Nmap scan report for 158.75.50.123 [host down]
Nmap scan report for 158.75.50.124 [host down]
Nmap scan report for 158.75.50.125 [host down]
Nmap scan report for 158.75.50.126 [host down]
Nmap scan report for 158.75.50.127 [host down]
Nmap scan report for 158.75.50.128 [host down]
Nmap scan report for 158.75.50.129 [host down]
Nmap scan report for 158.75.50.130 [host down]
Nmap scan report for 158.75.50.131 [host down]
Nmap scan report for 158.75.50.132 [host down]
Nmap scan report for 158.75.50.133 [host down]
Nmap scan report for 158.75.50.134 [host down]
Nmap scan report for 158.75.50.135 [host down]
Nmap scan report for 158.75.50.136 [host down]
Nmap scan report for 158.75.50.137 [host down]
Nmap scan report for 158.75.50.138 [host down]
Nmap scan report for 158.75.50.139 [host down]
Nmap scan report for 158.75.50.140 [host down]
Nmap scan report for 158.75.50.141 [host down]
Nmap scan report for 158.75.50.142 [host down]
Nmap scan report for 158.75.50.143 [host down]
Nmap scan report for 158.75.50.144 [host down]
Nmap scan report for 158.75.50.145 [host down]
Nmap scan report for 158.75.50.146 [host down]
Nmap scan report for 158.75.50.147 [host down]
Nmap scan report for 158.75.50.148 [host down]
Nmap scan report for 158.75.50.149 [host down]
Nmap scan report for 158.75.50.150 [host down]
Nmap scan report for 158.75.50.151 [host down]
Nmap scan report for 158.75.50.152 [host down]
Nmap scan report for 158.75.50.153 [host down]
Nmap scan report for 158.75.50.154 [host down]
Nmap scan report for 158.75.50.155 [host down]
Nmap scan report for 158.75.50.156 [host down]
Nmap scan report for 158.75.50.157 [host down]
Nmap scan report for 158.75.50.158 [host down]
Nmap scan report for 158.75.50.159 [host down]
Nmap scan report for 158.75.50.160 [host down]
Nmap scan report for 158.75.50.161 [host down]
Nmap scan report for 158.75.50.162 [host down]
Nmap scan report for 158.75.50.163 [host down]
Nmap scan report for 158.75.50.164 [host down]
Nmap scan report for 158.75.50.165 [host down]
Nmap scan report for 158.75.50.166 [host down]
Nmap scan report for 158.75.50.167 [host down]
Nmap scan report for 158.75.50.168 [host down]
Nmap scan report for 158.75.50.169 [host down]
Nmap scan report for 158.75.50.170 [host down]
Nmap scan report for 158.75.50.171 [host down]
Nmap scan report for 158.75.50.172 [host down]
Nmap scan report for 158.75.50.174 [host down]
Nmap scan report for 158.75.50.175 [host down]
Nmap scan report for 158.75.50.176 [host down]
Nmap scan report for 158.75.50.177 [host down]
Nmap scan report for 158.75.50.178 [host down]
Nmap scan report for 158.75.50.179 [host down]
Nmap scan report for 158.75.50.180 [host down]
Nmap scan report for 158.75.50.181 [host down]
Nmap scan report for 158.75.50.182 [host down]
Nmap scan report for 158.75.50.183 [host down]
Nmap scan report for 158.75.50.184 [host down]
Nmap scan report for 158.75.50.185 [host down]
Nmap scan report for 158.75.50.186 [host down]
Nmap scan report for 158.75.50.187 [host down]
Nmap scan report for 158.75.50.188 [host down]
Nmap scan report for 158.75.50.189 [host down]
Nmap scan report for 158.75.50.190 [host down]
Nmap scan report for 158.75.50.191 [host down]
Nmap scan report for 158.75.50.192 [host down]
Nmap scan report for 158.75.50.194 [host down]
Nmap scan report for 158.75.50.195 [host down]
Nmap scan report for 158.75.50.196 [host down]
Nmap scan report for 158.75.50.197 [host down]
Nmap scan report for 158.75.50.198 [host down]
Nmap scan report for 158.75.50.199 [host down]
Nmap scan report for 158.75.50.200 [host down]
Nmap scan report for 158.75.50.201 [host down]
Nmap scan report for 158.75.50.202 [host down]
Nmap scan report for 158.75.50.203 [host down]
Nmap scan report for 158.75.50.204 [host down]
Nmap scan report for 158.75.50.205 [host down]
Nmap scan report for 158.75.50.206 [host down]
Nmap scan report for 158.75.50.207 [host down]
Nmap scan report for 158.75.50.208 [host down]
Nmap scan report for 158.75.50.209 [host down]
Nmap scan report for 158.75.50.210 [host down]
Nmap scan report for 158.75.50.211 [host down]
Nmap scan report for 158.75.50.212 [host down]
Nmap scan report for 158.75.50.213 [host down]
Nmap scan report for 158.75.50.214 [host down]
Nmap scan report for 158.75.50.215 [host down]
Nmap scan report for 158.75.50.216 [host down]
Nmap scan report for 158.75.50.217 [host down]
Nmap scan report for 158.75.50.218 [host down]
Nmap scan report for 158.75.50.219 [host down]
Nmap scan report for 158.75.50.220 [host down]
Nmap scan report for 158.75.50.221 [host down]
Nmap scan report for 158.75.50.222 [host down]
Nmap scan report for 158.75.50.223 [host down]
Nmap scan report for 158.75.50.224 [host down]
Nmap scan report for 158.75.50.225 [host down]
Nmap scan report for 158.75.50.226 [host down]
Nmap scan report for 158.75.50.227 [host down]
Nmap scan report for 158.75.50.228 [host down]
Nmap scan report for 158.75.50.229 [host down]
Nmap scan report for 158.75.50.230 [host down]
Nmap scan report for 158.75.50.231 [host down]
Nmap scan report for 158.75.50.232 [host down]
Nmap scan report for 158.75.50.233 [host down]
Nmap scan report for 158.75.50.234 [host down]
Nmap scan report for 158.75.50.235 [host down]
Nmap scan report for 158.75.50.236 [host down]
Nmap scan report for 158.75.50.237 [host down]
Nmap scan report for 158.75.50.238 [host down]
Nmap scan report for 158.75.50.239 [host down]
Nmap scan report for 158.75.50.240 [host down]
Nmap scan report for 158.75.50.241 [host down]
Nmap scan report for 158.75.50.242 [host down]
Nmap scan report for 158.75.50.243 [host down]
Nmap scan report for 158.75.50.244 [host down]
Nmap scan report for 158.75.50.245 [host down]
Nmap scan report for 158.75.50.246 [host down]
Nmap scan report for 158.75.50.247 [host down]
Nmap scan report for 158.75.50.248 [host down]
Nmap scan report for 158.75.50.249 [host down]
Nmap scan report for 158.75.50.250 [host down]
Nmap scan report for 158.75.50.251 [host down]
Nmap scan report for 158.75.50.252 [host down]
Nmap scan report for 158.75.50.253 [host down]
Nmap scan report for 158.75.50.254 [host down]
Nmap scan report for 158.75.50.255 [host down]
Initiating Connect Scan at 18:26
Scanning 21 hosts [1000 ports/host]
Discovered open port 443/tcp on 158.75.50.41
Discovered open port 443/tcp on 158.75.50.91
Discovered open port 443/tcp on 158.75.50.99
Discovered open port 443/tcp on 158.75.50.83
Discovered open port 135/tcp on 158.75.50.41
Discovered open port 445/tcp on 158.75.50.41
Discovered open port 135/tcp on 158.75.50.98
Discovered open port 135/tcp on 158.75.50.99
Discovered open port 135/tcp on 158.75.50.113
Discovered open port 445/tcp on 158.75.50.193
Discovered open port 80/tcp on 158.75.50.8
Discovered open port 80/tcp on 158.75.50.9
Discovered open port 80/tcp on 158.75.50.14
Discovered open port 80/tcp on 158.75.50.41
Discovered open port 80/tcp on 158.75.50.4
Discovered open port 80/tcp on 158.75.50.6
Discovered open port 80/tcp on 158.75.50.91
Discovered open port 445/tcp on 158.75.50.98
Discovered open port 445/tcp on 158.75.50.99
Discovered open port 445/tcp on 158.75.50.113
Discovered open port 80/tcp on 158.75.50.11
Discovered open port 80/tcp on 158.75.50.99
Discovered open port 80/tcp on 158.75.50.83
Discovered open port 22/tcp on 158.75.50.1
Discovered open port 554/tcp on 158.75.50.91
Discovered open port 554/tcp on 158.75.50.99
Discovered open port 139/tcp on 158.75.50.113
Discovered open port 139/tcp on 158.75.50.193
Discovered open port 23/tcp on 158.75.50.6
Discovered open port 23/tcp on 158.75.50.11
Discovered open port 554/tcp on 158.75.50.173
Discovered open port 23/tcp on 158.75.50.8
Discovered open port 80/tcp on 158.75.50.10
Discovered open port 139/tcp on 158.75.50.98
Discovered open port 23/tcp on 158.75.50.4
Discovered open port 80/tcp on 158.75.50.13
Discovered open port 49156/tcp on 158.75.50.113
Discovered open port 49156/tcp on 158.75.50.98
Discovered open port 23/tcp on 158.75.50.13
Discovered open port 23/tcp on 158.75.50.10
Discovered open port 554/tcp on 158.75.50.41
Discovered open port 139/tcp on 158.75.50.99
Discovered open port 139/tcp on 158.75.50.41
Discovered open port 23/tcp on 158.75.50.9
Discovered open port 23/tcp on 158.75.50.14
Discovered open port 49154/tcp on 158.75.50.113
Discovered open port 49156/tcp on 158.75.50.91
Discovered open port 49156/tcp on 158.75.50.114
Discovered open port 49156/tcp on 158.75.50.173
Discovered open port 5357/tcp on 158.75.50.113
Discovered open port 49152/tcp on 158.75.50.113
Discovered open port 3689/tcp on 158.75.50.193
Increasing send delay for 158.75.50.98 from 0 to 5 due to max_successful_tryno increase to 4
Increasing send delay for 158.75.50.98 from 5 to 10 due to max_successful_tryno increase to 5
Discovered open port 2869/tcp on 158.75.50.99
Discovered open port 49154/tcp on 158.75.50.98
Discovered open port 49154/tcp on 158.75.50.91
Discovered open port 49154/tcp on 158.75.50.114
Discovered open port 2869/tcp on 158.75.50.41
Discovered open port 49154/tcp on 158.75.50.173
Discovered open port 5357/tcp on 158.75.50.98
Discovered open port 49152/tcp on 158.75.50.98
Increasing send delay for 158.75.50.91 from 0 to 5 due to max_successful_tryno increase to 4
Discovered open port 49157/tcp on 158.75.50.98
Discovered open port 5357/tcp on 158.75.50.91
Discovered open port 1984/tcp on 158.75.50.90
Discovered open port 5357/tcp on 158.75.50.173
Discovered open port 5357/tcp on 158.75.50.114
Discovered open port 49152/tcp on 158.75.50.91
Discovered open port 49152/tcp on 158.75.50.114
Discovered open port 49152/tcp on 158.75.50.173
Discovered open port 6646/tcp on 158.75.50.41
Discovered open port 49157/tcp on 158.75.50.91
Discovered open port 49157/tcp on 158.75.50.173
Discovered open port 10243/tcp on 158.75.50.99
Increasing send delay for 158.75.50.98 from 10 to 20 due to max_successful_tryno increase to 6
Discovered open port 1024/tcp on 158.75.50.13
Discovered open port 49157/tcp on 158.75.50.114
Discovered open port 1111/tcp on 158.75.50.113
Discovered open port 10243/tcp on 158.75.50.41
Completed Connect Scan against 158.75.50.11 in 31.69s (20 hosts left)
Discovered open port 49153/tcp on 158.75.50.113
Discovered open port 10243/tcp on 158.75.50.173
Discovered open port 10243/tcp on 158.75.50.91
Completed Connect Scan against 158.75.50.90 in 35.43s (19 hosts left)
Completed Connect Scan against 158.75.50.99 in 42.45s (18 hosts left)
Completed Connect Scan against 158.75.50.13 in 46.68s (17 hosts left)
Discovered open port 1111/tcp on 158.75.50.98
Completed Connect Scan against 158.75.50.4 in 46.90s (16 hosts left)
Completed Connect Scan against 158.75.50.8 in 46.99s (15 hosts left)
Discovered open port 49155/tcp on 158.75.50.113
Completed Connect Scan against 158.75.50.113 in 48.02s (14 hosts left)
Discovered open port 49153/tcp on 158.75.50.173
Discovered open port 49153/tcp on 158.75.50.91
Discovered open port 49153/tcp on 158.75.50.114
Completed Connect Scan against 158.75.50.9 in 50.63s (13 hosts left)
Completed Connect Scan against 158.75.50.10 in 50.84s (12 hosts left)
Completed Connect Scan against 158.75.50.71 in 51.80s (11 hosts left)
Discovered open port 49155/tcp on 158.75.50.41
Completed Connect Scan against 158.75.50.41 in 53.26s (10 hosts left)
Completed Connect Scan against 158.75.50.193 in 53.57s (9 hosts left)
Completed Connect Scan against 158.75.50.14 in 54.85s (8 hosts left)
Completed Connect Scan against 158.75.50.6 in 55.60s (7 hosts left)
Completed Connect Scan against 158.75.50.114 in 56.44s (6 hosts left)
Completed Connect Scan against 158.75.50.3 in 56.72s (5 hosts left)
Completed Connect Scan against 158.75.50.1 in 57.12s (4 hosts left)
Completed Connect Scan against 158.75.50.83 in 58.23s (3 hosts left)
Increasing send delay for 158.75.50.173 from 0 to 5 due to max_successful_tryno increase to 4
Discovered open port 49153/tcp on 158.75.50.98
Increasing send delay for 158.75.50.173 from 5 to 10 due to 12 out of 40 dropped probes since last increase.
Discovered open port 9595/tcp on 158.75.50.91
Discovered open port 49155/tcp on 158.75.50.173
Completed Connect Scan against 158.75.50.173 in 63.05s (2 hosts left)
Discovered open port 49155/tcp on 158.75.50.91
Completed Connect Scan against 158.75.50.91 in 63.55s (1 host left)
Discovered open port 49155/tcp on 158.75.50.98
Completed Connect Scan at 18:27, 80.12s elapsed (21000 total ports)
Initiating Service scan at 18:27
Scanning 90 services on 21 hosts
Service scan Timing: About 28.89% done; ETC: 18:29 (0:01:21 remaining)
Service scan Timing: About 46.67% done; ETC: 18:31 (0:01:42 remaining)
Service scan Timing: About 71.11% done; ETC: 18:30 (0:00:49 remaining)
Completed Service scan at 18:31, 200.78s elapsed (90 services on 21 hosts)
NSE: Script scanning 21 hosts.
Initiating NSE at 18:31
Completed NSE at 18:32, 88.93s elapsed
Nmap scan report for dormdoor.gimakad.torun.pl (158.75.50.1)
Host is up (0.00045s latency).
Not shown: 995 closed ports
PORT STATE SERVICE VERSION
22/tcp open tcpwrapped
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
1147/tcp filtered capioverlan
Nmap scan report for 158.75.50.3
Host is up (0.0023s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
23/tcp filtered telnet
80/tcp filtered http
161/tcp filtered snmp
Nmap scan report for 158.75.50.4
Host is up (0.0019s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet (Usually a Cisco/3com switch)
80/tcp open http 3Com switch webadmin 1.0
| http-auth:
| HTTP/1.0 401 Unauthorized
|_ Basic realm=device
|_http-title: Site doesn't have a title.
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios
Nmap scan report for 158.75.50.6
Host is up (0.0022s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet (Usually a Cisco/3com switch)
80/tcp open http 3Com switch webadmin 1.0
| http-auth:
| HTTP/1.0 401 Unauthorized
|_ Basic realm=device
|_http-title: Site doesn't have a title.
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios
Nmap scan report for 158.75.50.8
Host is up (0.0019s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet (Usually a Cisco/3com switch)
80/tcp open http 3Com switch webadmin 1.0
| http-auth:
| HTTP/1.0 401 Unauthorized
|_ Basic realm=device
|_http-title: Site doesn't have a title.
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios
Nmap scan report for 158.75.50.9
Host is up (0.0018s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet (Usually a Cisco/3com switch)
80/tcp open http 3Com switch webadmin 1.0
| http-auth:
| HTTP/1.0 401 Unauthorized
|_ Basic realm=device
|_http-title: Site doesn't have a title.
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios
Nmap scan report for 158.75.50.10
Host is up (0.020s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet (Usually a Cisco/3com switch)
80/tcp open http 3Com switch webadmin 1.0
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios
Nmap scan report for 158.75.50.11
Host is up (0.0035s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet (Usually a Cisco/3com switch)
80/tcp open http 3Com switch webadmin 1.0
| http-auth:
| HTTP/1.0 401 Unauthorized
|_ Basic realm=device
|_http-title: Site doesn't have a title.
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios
Nmap scan report for 158.75.50.13
Host is up (0.030s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet?
80/tcp open tcpwrapped
1024/tcp open kdm?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port23-TCP:V=6.40%I=7%D=4/26%Time=553D120C%P=i686-pc-linux-gnu%r(NULL,1
SF:D,"\xff\xfb\x01\xff\xfb\x03\xff\xfd\x01\x1b\[0m\n\r\n\r\0\x1b\[0mLogin:
SF:\x20")%r(GenericLines,39,"\xff\xfb\x01\xff\xfb\x03\xff\xfd\x01\x1b\[0m\
SF:n\r\n\r\0\x1b\[0mLogin:\x20\n\r\0\x1b\[0mLogin:\x20\n\r\0\x1b\[0mLogin:
SF:\x20")%r(GetRequest,5C,"\xff\xfb\x01\xff\xfb\x03\xff\xfd\x01\x1b\[0m\n\
SF:r\n\r\0\x1b\[0mLogin:\x20GET\x20/\x20HTTP/1\.0\n\r\0Password:\x20\n\r\0
SF:Incorrect\x20Password\.\n\r\0\x1b\[0mLogin:\x20")%r(HTTPOptions,60,"\xf
SF:f\xfb\x01\xff\xfb\x03\xff\xfd\x01\x1b\[0m\n\r\n\r\0\x1b\[0mLogin:\x20OP
SF:TIONS\x20/\x20HTTP/1\.0\n\r\0Password:\x20\n\r\0Incorrect\x20Password\.
SF:\n\r\0\x1b\[0mLogin:\x20")%r(RTSPRequest,60,"\xff\xfb\x01\xff\xfb\x03\x
SF:ff\xfd\x01\x1b\[0m\n\r\n\r\0\x1b\[0mLogin:\x20OPTIONS\x20/\x20RTSP/1\.0
SF:\n\r\0Password:\x20\n\r\0Incorrect\x20Password\.\n\r\0\x1b\[0mLogin:\x2
SF:0")%r(RPCCheck,12,"\xff\xfb\x01\xff\xfb\x03\xff\xfd\x01\x1b\[0m\n\r\n\r
SF:\0");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port1024-TCP:V=6.40%I=7%D=4/26%Time=553D1211%P=i686-pc-linux-gnu%r(Gene
SF:ricLines,2D,"\x1b\[0m\n\r\n\r\x1b\[0mLogin:\x20\n\r\x1b\[0mLogin:\x20\n
SF:\r\x1b\[0mLogin:\x20")%r(GetRequest,67,"\x1b\[0m\n\r\n\r\x1b\[0mLogin:\
SF:x20T\x20/\x20HTTP/1\.0\n\rPassword:\x20\n\rIncorrect\x20Password\.\n\r\
SF:x1b\[0mLogin:\x20\n\r\x1b\[0mLogin:\x20\n\r\x1b\[0mLogin:\x20")%r(HTTPO
SF:ptions,6B,"\x1b\[0m\n\r\n\r\x1b\[0mLogin:\x20TIONS\x20/\x20HTTP/1\.0\n\
SF:rPassword:\x20\n\rIncorrect\x20Password\.\n\r\x1b\[0mLogin:\x20\n\r\x1b
SF:\[0mLogin:\x20\n\r\x1b\[0mLogin:\x20")%r(RTSPRequest,6B,"\x1b\[0m\n\r\n
SF:\r\x1b\[0mLogin:\x20TIONS\x20/\x20RTSP/1\.0\n\rPassword:\x20\n\rIncorre
SF:ct\x20Password\.\n\r\x1b\[0mLogin:\x20\n\r\x1b\[0mLogin:\x20\n\r\x1b\[0
SF:mLogin:\x20")%r(RPCCheck,3C,"\x1b\[0m\n\r\n\r\x1b\[0mLogin:\x20\(r\n\rI
SF:nput\x20dev_id\x20\(or\x2099\x20to\x20read\x20Budge\):\x20\x18");
Nmap scan report for 158.75.50.14
Host is up (0.0019s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet (Usually a Cisco/3com switch)
80/tcp open http 3Com switch webadmin 1.0
| http-auth:
| HTTP/1.0 401 Unauthorized
|_ Basic realm=device
|_http-title: Site doesn't have a title.
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios
Nmap scan report for 158.75.50.41
Host is up (0.00089s latency).
Not shown: 990 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http?
|_http-title: Site doesn't have a title.
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
443/tcp open skype2 Skype
|_http-title: Site doesn't have a title.
445/tcp open netbios-ssn
554/tcp open rtsp?
2869/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
6646/tcp open unknown
10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 404)
|_http-title: Not Found
49155/tcp open msrpc Microsoft Windows RPC
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port80-TCP:V=6.40%I=7%D=4/26%Time=553D120C%P=i686-pc-linux-gnu%r(GetReq
SF:uest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions,62,"u
SF:\x8b\xff\xb9~\x80\xdc=\xb0\xd3\xe1\xc9\xa5xy\x12\xd5\x1b\x90\xfc_\xb0\x
SF:c3\x95\xda\xa9\xf8\[\x07\xb7:a\x1c\x05\xcd\x1c\xd9\x081\x1c\xae\|\xb4\x
SF:d2\xef\xb4\x9f\]b\xeb\xa0\x91\x8e'\xac-z#x\x89&\xdf\x04\xa5\x92\[P\x81\
SF:xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\xee\x07\x0c\r\xda\x03\xd8
SF:i\x86\xbfd\x85\xf2;")%r(RTSPRequest,43,"\t\x84\xa1#\xe4\xff\xef\x9e\xc7
SF:G\x91\|v\xfb\xc4=g\[:\x19f\xacN~woU\xf6\xabi\xa9\x1d/\x1f\|\xa8\xec\xe3
SF:\xbf\xa5\xc1\x14\xff#\xb3dig\x9f\xc4eR\x1b\x10A~W\x1c\xddjS\xe89\x16\x0
SF:ftU")%r(FourOhFourRequest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n"
SF:)%r(RPCCheck,42,"\xf9\)\xcc\?\xado\xf8Q\xc10\xfe\xedU\x02\xb58\xe5'\x11
SF:\x8a\x1a\xa6}\x1f{\xd7\xda\rd%aqb!{\xdd\xba\xfb\xf4w\xde\x0fO\xb7Y\x83D
SF:\xb9\x8a\xf3\x08\xd96\xaf\x94\xf5\xa2\+\xe0\xd1\xceg\xecm\xbac")%r(DNSV
SF:ersionBindReq,57,"\xf9\xbc\(:\]\xb8\x0c\xfc\xdf>\x03F\xb8\xaa6\xf3ZA\xe
SF:cl\x10\x16\xbeu\xdb\xb8\xec\.\x20\+\xcdg0\xbd\xb8i\x9f0\x96\x92\x1cJ\x1
SF:0s\x14\xed\x9aa\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\x
SF:cb\0q\xee\x07\x0c\r\xda\x03\xd8i\x86\xbfd\x85\xf2;\xb0a\x1ew")%r(DNSSta
SF:tusRequest,5C,"\x1c\x1e\x8c\+8\x01\x91l\xad\x08\xf4\xf1\*\x9d\x1b7\xa2\
SF:xad\xbd\x18\x9c\xb3}\xb8\x03-\x0b\x02\xc5\xa8\x16S:\xd2\xd3y\xa2\x80\x0
SF:f\xe4v%B\xc7\xe7\xcb\xe1\x05\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\xee\
SF:x07\x0c\r\xda\x03\xd8i\x86\xbfd\x85\xf2;\xb0a\x1ew\xbc\xfd\ns\x88Y\xb6/
SF:\x14u\"\xab")%r(SSLSessionReq,40,"\x0fu\x7f\xef\+\xfdX\xf2\xdax\xf0\xf3
SF:\xear-\\@\x8d\$e;\x7f\x94KL\xc2\xa7\xe1\xe1\x12R\xab\x17\xbd\x9b\xbaO\x
SF:bc\xa8J\x18\xb3\xd6\xc2Eo\x7f\xbe\+\xe0\xd1\xceg\xecm\xba\xbd@N\$9\x05\
SF:xf6'")%r(Kerberos,48,"\x1ck\xec\xa6\xe1\x96\x075p\x92X3X\x15\xe0\xd3\xa
SF:e\[x\xd8:\x11\x11\x89\]H\x81\xe6\xb1LxK\xbc\xad\x88\xa3\x8eA\x8bs\xa0\x
SF:1d\xf7\xeb\xe7\x8a\xd2D\xe38I\xe6\x9f\xc4eR\x1b\x10A~W\x1c\xddjW\x9f\xf
SF:e\xd1\x8e\x7f6\"")%r(SMBProgNeg,67,"=\x90\._\xe1\xa6\xc7%\xc0\xa8\x1f\x
SF:d5\x141\x9c\x17\x0b\xf6w\x9b'\x04\?\xa4x\xb3}4w\x90/XU\xeb\x1d\[\x90GH\
SF:x04\x92d\xde\xd5\xdeW\x97\x98\xa4\xc52{\xf0\xa1\^\xb7\xfc=J\xb3\xc8\x99
SF:\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac-z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x9
SF:7\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\xee");
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| nbstat:
| NetBIOS name: KOMP-MAJA, NetBIOS user: <unknown>, NetBIOS MAC: 74:e6:e2:1c:e7:06 (unknown)
| Names
| KOMP-MAJA<20> Flags: <unique><active>
| KOMP-MAJA<00> Flags: <unique><active>
| WORKGROUP<00> Flags: <group><active>
|_ WORKGROUP<1e> Flags: <group><active>
| smb-os-discovery:
| OS: Windows 8.1 9600 (Windows 8.1 6.3)
| NetBIOS computer name: KOMP-MAJA
| Workgroup: WORKGROUP
|_ System time: 2015-04-26T18:31:24+02:00
| smb-security-mode:
| Account that was used for smb scripts: guest
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol
Nmap scan report for 158.75.50.71
Host is up (0.00029s latency).
All 1000 scanned ports on 158.75.50.71 are closed
Nmap scan report for 158.75.50.83
Host is up (0.00097s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http?
|_http-title: Site doesn't have a title.
443/tcp open skype2 Skype
|_http-title: Site doesn't have a title.
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port80-TCP:V=6.40%I=7%D=4/26%Time=553D1211%P=i686-pc-linux-gnu%r(GetReq
SF:uest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions,37,"4
SF:oY\xeb\\\x80Qt\x81\x1adW\x9e\xe1#\xc8\xba\x13\xde\xf4R&{\xb4jS\xe8\xd3\
SF:"\xe5,D\x1dB\xfa\x8e\xe2W\x07\xfdP\xbcA\xd2\xfa\x8e\xf6\xb7\x05r\xbb0\x
SF:e1\x9e\xf7")%r(RTSPRequest,5C,"P\x85\x81\xf72-\xa2\x0c5NJ\xcd\x0e{<\xc9
SF:lh\t9@A\xfd\xf1\xd9N\xb4\xba7\x98\x91R\xd6\x0el\xe7\x92\x94\[\x17\xbd\x
SF:da\^\xdbH\xec\xfc\xef\xfc=J\xb3\xc8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac
SF:-z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2
SF:\xcb")%r(FourOhFourRequest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n
SF:")%r(RPCCheck,4D,"\+\x18\x89\xcb\x85#F\xc3\xa6\xb6\x14\x9a\x8c\xf3\xf4&
SF:\x8b\x81\x03c\xe48}G\x01\0\r\x92\x8b\x1e3T~\xf6b\x18\xe1T\xf6\xa2\xc7\x
SF:dah\xa2\x1bu\xba\xe3,\xad\xfa\xa3\xf8\t\xa6_\x84%\x12\xdb\xd0\x01>\x17\
SF:xdc\x9d\*\x13\xa8\xf9\xd6\xcf4\x15BK\x80")%r(DNSVersionBindReq,55,"W\$\
SF:xce\xa2\x15!o\xa3\xec\x9b\x04\n\xfc7\xc1\r\xad}\xacq\xf6X\x90D\?Q\x10\x
SF:1f\x9e\x9d\xddk\+\x8e\x8a\xf1qn\xa6\xc1\xfbOe\xf6\x16\xdb\xd4\xffx\x89&
SF:\xdf\x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\x
SF:ee\x07\x0c\r\xda\x03\xd8i\x86\xbfd")%r(DNSStatusRequest,3D,"}\xd8c\xe9\
SF:xe4\x06\xfe%/\xba\xaer@\x9b\xf5g\)\x0f\\\xd0\t\x15\r\x99'\x80V\(1\x04C\
SF:x8f\x13\xa9E\xa8\x90\x96\xd9\xa9\x97Vg\x10\x8f\xfe\xf4\x12\?\xe4\x05r\x
SF:bb0\xe1\x9e\xf7<}\x8a\xf3")%r(SSLSessionReq,72,"\x0b\x172\x8d\xb0\xa9!\
SF:xb1\xfd\x90\]\x86c\xba\xa1tP\xdaw\?\xa2\xdb\x99\x96\x1b\x984\x80\xe9\xb
SF:7AGf\x15\x89\xfc\xe8D\xf6\xac\x03\xee\x17d\x11\xebs\xfb\x8f\xf4\xd5\x02
SF:\x0b@\xb1\.GLM\x1aC\x18\xa9\xc6\xff\xa4\xc52{\xf0\xa1\^\xb7\xfc=J\xb3\x
SF:c8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac-z#x\x89&\xdf\x04\xa5\x92\[P\x81\
SF:xbe\x97\\\x1dr\"\x16\x89\x87\xb5L")%r(Kerberos,5A,"~\xb4\xcc\x9dt#\xa7_
SF::\xb1\xa6\xf7\xfe\x02\xca\xf7\xcc\xaf\x1f#V\+\xec\x82\xc7\xb2\xa0\xf8\x
SF:c7~\xd6\x921X\x83\|\x19\x8d/\xc0j\x9d\x96\x06d\xf6#\\@\xb1\.GLM\x1aC\x1
SF:8\xa9\xc6\xff\xa4\xc52{\xf0\xa1\^\xb7\xfc=J\xb3\xc8\x99\xf6oT\xb5b\xeb\
SF:xa0\x91\xec\xb8\xf4\x88n\x9b\xf4\x8b")%r(SMBProgNeg,61,"m\xd2\xf3\x13J\
SF:xc5A\xa5\xefw@\x93\x90V:=\0\x02%\x93\xd9\xdeB\xbd\xd9},/n\x1f\xcb\xc6\?
SF:\xf5\xb4\x98'\xb4L\xc9\]\xdcp\x8e\xd6\xd1\x90i\xe89\x16\x0ftU\x82\x8b\x
SF:c01\xae\xc7\xcc\xcd\x9a\xc3\x98\)F\x7f\$E\xb2\xfbp!\xde7\|\xbd\xca3H\x1
SF:9v\xef\xd45\xe2k\x20\x11\x0e\xa7,\xad\xfa\xa3\xf8");
Nmap scan report for 158.75.50.90
Host is up (0.00034s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
1984/tcp open ssh (protocol 2.0)
| ssh-hostkey: 1024 51:6c:1f:27:bc:a6:b6:6c:bf:4c:bf:55:ca:dd:3b:5e (DSA)
| 2048 ae:c9:47:7e:5c:00:63:13:6e:2e:0d:ae:e7:d2:3a:e3 (RSA)
|_256 a4:24:9a:33:d4:62:35:f7:f0:d4:5e:45:00:9f:31:cf (ECDSA)
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port1984-TCP:V=6.40%I=7%D=4/26%Time=553D1212%P=i686-pc-linux-gnu%r(NULL
SF:,29,"SSH-2\.0-OpenSSH_6\.6\.1p1\x20Ubuntu-2ubuntu2\r\n");
Nmap scan report for 158.75.50.91
Host is up (0.00086s latency).
Not shown: 981 closed ports
PORT STATE SERVICE VERSION
80/tcp open http?
|_http-title: Site doesn't have a title.
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
443/tcp open skype2 Skype
|_http-title: Site doesn't have a title.
445/tcp filtered microsoft-ds
554/tcp open rtsp?
1110/tcp filtered nfsd-status
2869/tcp filtered icslap
3389/tcp filtered ms-wbt-server
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 503)
|_http-title: Service Unavailable
9595/tcp open pds?
10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 404)
|_http-title: Not Found
19780/tcp filtered unknown
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49156/tcp open msrpc Microsoft Windows RPC
49157/tcp open msrpc Microsoft Windows RPC
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port80-TCP:V=6.40%I=7%D=4/26%Time=553D1212%P=i686-pc-linux-gnu%r(GetReq
SF:uest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions,67,"m
SF:\xad@\x8f\x9e0\x02\]\xfc:l\xa9\xb7\x9d\x06vD\x99\+rj\xf1,A\xf2\x18\xa8K
SF:i\xc8\xb7\x80\x8aH\x17\x9aX\xd7g\xe7\|8}K\xa2\xf17!\x82\x8b\xc01\xae\xc
SF:7\xcc\xcd\x9a\xc3\x98\)F\x7f\$E\xb2\xfbp!\xde7\|\xbd\xca3H\x19v\xef\xd4
SF:5\xe2k\x20\x11\x0e\xa7,\xad\xfa\xa3\xf8\t\xa6_\x84%\x12\xdb\xd0\x01>\x1
SF:7\xdc")%r(RTSPRequest,6E,"\x12\xec=\xc0\x97\x136\xd6\x17~\xc5\xc3\xd7}C
SF:{W\x93\x7f\xbc\x85\x18\x8a\xe7\xf6\xfdx\xfe\xca\x18\xb6\x0e\x07\x9f\x96
SF:\xb8eH\xd4\xaa\^\xc6{A1Y\xbb@-z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x97\\
SF:\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\xee\x07\x0c\r\xda\x03\xd8i\x86\xbf
SF:d\x85\xf2;\xb0a\x1ew\xbc\xfd\ns\x88Y\xb6/\x14u\"\xab`QN")%r(FourOhFourR
SF:equest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(RPCCheck,39,"\x
SF:e2\\\x1f\xce\x16O\xfb\xa8\xe1oqt\xde\xc8\xc63\xc9\x84X\xf9\x8eu\xf3\x94
SF:c\x9c\xc1\xfb\x16P\x8e9\x8b\xf0\x80\xcaW\x9e\xda\xdc\xf9\xe1u\xcdN\x98\
SF:xdbN\xb8\xc9f\x1fD\xe5\xd2\x9b\x90")%r(DNSVersionBindReq,34,"\xdd\"\xe9
SF:;\xe7\[\xadS\n\$\xcf\x93z\x0f5\xf8%\x03{\xdb\x80\?k\xc3\x7f\x93Wg7\xe4T
SF:\r\x1e\xfca\xc5\xfb\xfc\xed\x1f\x85H\x01\xf4;\xa5\x1f\x10\xfd\ns\x88")%
SF:r(DNSStatusRequest,41,"\x8a\xb41\xbb\xe61\xefA\xbdI\xd5\xeb0#\xca\)\x82
SF:\xa0\xb9\x97\x9ar\xdej\nq\xf6x\xca#X4\x11\x9f\xbe\xd3\xafa\x87\xebT\xf2
SF:\xae\xda\nm:\t\x0c\r\xda\x03\xd8i\x86\xbfd\x85\xf2;\xb0a\x1ew\xbc")%r(S
SF:SLSessionReq,45,"98~`_\x8779<\xc7\|\xd7\|\x0f\x15\xfb\xa0n\xe7\xfb\xebz
SF:\x8e>-\x82\x1e\xab\xaf\xeb\xe4\xa2\xcf\"\xe5E\xcdV\xa2\x1c{\x81\"P\xfb3
SF:\x12A\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yV\x80\xbd\x93\x91\x95G\xf6\x86
SF:")%r(Kerberos,39,"\x88\xd7\xac\xad\xcf\x9f\xfd\xdeo\xed\xf4\xa5c=Gw\x84
SF:\xf7N\xe6\x11\x9bG\r\x95\r\xf17d\x97\x01@\xc5\xc1\xe1\xa9f\x93\x1d\x1d\
SF:xca\x9a\xd4F\x20\xa6\xd8#\xddu\x80nR\xd9m\x1fG")%r(SMBProgNeg,67,"\xe66
SF:\x88\x1d\x81U\x9eUE:c\x12O\x90\x8b\xb3\x82U5\x1a\x8c\xd4\xa3\xe7\xb3\n\
SF:xab\x8a\x81\x98y\xb9\xd7HF\xe2Y\xc6\xb6z/\^Q\xd6\x8b\xc2!\xean\x87\x8c\
SF:x8dZ\x83X\xe9\x06\?\xe4\x05r\xbb0\xe1\x9e\xf7<}\x8a\xf3\x08\xd96\xaf\x9
SF:4\xf5\xa2\+\xe0\xd1\xceg\xecm\xbac\xb8\xc9f\x1fD\xe5\xd2\x9b\x90\xc1\xf
SF:e\xd7\x9c\]\xea\xd3h");
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Nmap scan report for 158.75.50.98
Host is up (0.00069s latency).
Not shown: 984 closed ports
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
301/tcp filtered unknown
445/tcp open netbios-ssn
1110/tcp filtered nfsd-status
1111/tcp open tcpwrapped
1761/tcp filtered landesk-rc
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 503)
|_http-title: Service Unavailable
9009/tcp filtered pichat
34571/tcp filtered unknown
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49156/tcp open msrpc Microsoft Windows RPC
49157/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| nbstat:
| NetBIOS name: USER, NetBIOS user: <unknown>, NetBIOS MAC: 78:e4:00:eb:c0:85 (Hon Hai Precision Ind. Co.)
| Names
| USER<00> Flags: <unique><active>
| WORKGROUP<00> Flags: <group><active>
|_ USER<20> Flags: <unique><active>
| smb-security-mode:
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol
Nmap scan report for 158.75.50.99
Host is up (0.0014s latency).
Not shown: 992 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http?
|_http-title: Site doesn't have a title.
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
443/tcp open skype2 Skype
|_http-title: Site doesn't have a title.
445/tcp open netbios-ssn
554/tcp open rtsp?
2869/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 404)
|_http-title: Not Found
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port80-TCP:V=6.40%I=7%D=4/26%Time=553D1249%P=i686-pc-linux-gnu%r(GetReq
SF:uest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions,35,"\
SF:0\x07lr\xf4\0\xefF\x104j\xc4\xc3Se\xb6\x81\xd2\x1fp\x96\x97\x01\x80\xa6
SF:\x03r\xd2\xac\xb49\xd3\x81\xc8\)F2\xb4g\x95\?8\x8d\xb1:\xb7\xc6\xbd\xea
SF:\xd3h\xb9\x96")%r(RTSPRequest,4E,"\xb9_\x86\x04\x10e\x89\x0c\xec\x15\xa
SF:3\xae\xdav\xdf\xcf\x99\"\xdc\x88'\xfc\xf8I\xd7t\x02\xa4\x17uJ@ha\x9f\"_
SF:t\xce\xd4\(\xce\x94t\xc4\xa7W6\xcd\x9a\xc3\x98\)F\x7f\$E\xb2\xfbp!\xde7
SF:\|\xbd\xca3H\x19v\xef\xd45\xe2k\x20\x11\x0e")%r(FourOhFourRequest,1A,"H
SF:TTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(RPCCheck,36,"b4\$\xb97\x165
SF:\xf7C\xaa\xf9\xff\?\xf5w\xba6\xc3-\xba\xc4\xf9@\xc1\$1\xeczk\x94>\0\x96
SF:l\x95V\x14\xc0\x0c\xeb\xd0\xc7\xf3\r=\(O\x91\x1d\xaa\x93\(yV")%r(DNSVer
SF:sionBindReq,6B,"N\xa1zS\xe4\x9d\xee\x0b\xacZ\xf6\x8a\x8f\xf4\xaa\xd0\"\
SF:xa1\xd9\xb9\x86\xe6\xce\xa7\^:#\xa4\x9b68\xfaT>6O\xb3\xe8\xbe/\x1b:\xd8
SF:WX\"\xdf\x9aJ\xb3\xc8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac-z#x\x89&\xdf\
SF:x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\xee\x0
SF:7\x0c\r\xda\x03\xd8i\x86\xbfd\x85\xf2;\xb0")%r(DNSStatusRequest,68,"\xf
SF:e\x92\xfd4\x1c\xd9Q\xae\xd9\x04e\xd9}!dO\x87\xab\x90\x20\x95h\xdd7\xba\
SF:xe2\xec\xe3\xecA\xae<2\xdf\xcc\x14\xaaw!\xe7\xa5Z\xbe\|\xe4YM\x20`QN\xe
SF:7l\xed:\xe38I\xe6\x9f\xc4eR\x1b\x10A~W\x1c\xddjS\xe89\x16\x0ftU\x82\x8b
SF:\xc01\xae\xc7\xcc\xcd\x9a\xc3\x98\)F\x7f\$E\xb2\xfbp!\xde7\|\xbd\xca3")
SF:%r(SSLSessionReq,6F,"\x7f\x94Gml\x16\xca\xe2K\x08\xb2\xb1io\xb3o\[f\xe8
SF:\x07u\x19\x9c\x13\x19\x8d\xd8\xa9d7\x91y\+\xa92\xa7\xae\xf7\x8a!\xec\x9
SF:a98i\xe5\x8f\xf2K\x80\xf1n\x87\x8c\x8dZ\x83X\xe9\x06\?\xe4\x05r\xbb0\xe
SF:1\x9e\xf7<}\x8a\xf3\x08\xd96\xaf\x94\xf5\xa2\+\xe0\xd1\xceg\xecm\xbac\x
SF:b8\xc9f\x1fD\xe5\xd2\x9b\x90\xc1\xfe\xd7\x9c\]%a\xda\x95\xc1\x7f~\?")%r
SF:(Kerberos,60,"\x07\x15\x1b\x13n\xd5\xc1a\xbcj\x0c\x1b\xb0\t2\xe8E:\x9e\
SF:xde\x81m\xdb,iy\x92\xf8\xb6\xecH\xa0\x04\xc9\x85\x826e\x15z~\xa2\xbbIS\
SF:\j\)\x03\xd8i\x86\xbfd\x85\xf2;\xb0a\x1ew\xbc\xfd\ns\x88Y\xb6/\x14u\"\x
SF:ab`QN\xe7l\xed:\xe38I\xe6\x9f\xc4eRJ_\x1b\xbc\xc5\x8b\x89!")%r(SMBProgN
SF:eg,31,"4q\t\x7f\xed\xad`\x0c\x9b`\xfe\xa3\x0b\x13\\x\x97'\t\xe1o\xbe\xb
SF:8\xd1\xd3\xaa\xabd\xfa\xd2\xfd%\x05\xa0\xf2`f\xabu\x1e\xe3\xb5n4o\x9f\n
SF:\xd6W");
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| nbstat:
| NetBIOS name: JACQUESDETHORN, NetBIOS user: <unknown>, NetBIOS MAC: 14:da:e9:08:18:c0 (Asustek Computer)
| Names
| JACQUESDETHORN<20> Flags: <unique><active>
| JACQUESDETHORN<00> Flags: <unique><active>
| ZAKO\x97CIEL<00> Flags: <group><active>
| ZAKO\x97CIEL<1e> Flags: <group><active>
| ZAKO\x97CIEL<1d> Flags: <unique><active>
|_ \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
| smb-os-discovery:
| OS: Windows 7 Home Premium 7601 Service Pack 1 (Windows 7 Home Premium 6.1)
| OS CPE: cpe:/o:microsoft:windows_7::sp1
| Computer name: JacquesDeThorn
| NetBIOS computer name: JACQUESDETHORN
| Workgroup: ZAKOZCIEL
|_ System time: 2015-04-26T18:31:33+02:00
| smb-security-mode:
| Account that was used for smb scripts: guest
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol
Nmap scan report for 158.75.50.113
Host is up (0.00072s latency).
Not shown: 989 closed ports
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
445/tcp open netbios-ssn
1110/tcp filtered nfsd-status
1111/tcp open tcpwrapped
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 503)
|_http-title: Service Unavailable
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49156/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
| nbstat:
| NetBIOS name: KAZNOV_PC, NetBIOS user: <unknown>, NetBIOS MAC: 8c:89:a5:0f:4d:97 (Micro-Star INT'L CO.)
| Names
| KAZNOV_PC<00> Flags: <unique><active>
| WORKGROUP<00> Flags: <group><active>
| KAZNOV_PC<20> Flags: <unique><active>
|_ WORKGROUP<1e> Flags: <group><active>
| smb-os-discovery:
| OS: Windows 8.1 9600 (Windows 8.1 6.3)
| NetBIOS computer name: KAZNOV_PC
| Workgroup: WORKGROUP
|_ System time: 2015-04-26T18:31:28+02:00
| smb-security-mode:
| Account that was used for smb scripts: guest
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol
Nmap scan report for 158.75.50.114
Host is up (0.0011s latency).
Not shown: 987 closed ports
PORT STATE SERVICE VERSION
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
1110/tcp filtered nfsd-status
2869/tcp filtered icslap
3389/tcp filtered ms-wbt-server
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 503)
|_http-title: Service Unavailable
19780/tcp filtered unknown
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49156/tcp open msrpc Microsoft Windows RPC
49157/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Nmap scan report for 158.75.50.173
Host is up (0.00055s latency).
Not shown: 983 closed ports
PORT STATE SERVICE VERSION
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
554/tcp open rtsp?
1110/tcp filtered nfsd-status
2869/tcp filtered icslap
3389/tcp filtered ms-wbt-server
3390/tcp filtered dsc
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 503)
|_http-title: Service Unavailable
10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 404)
|_http-title: Not Found
19780/tcp filtered unknown
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
49156/tcp open msrpc Microsoft Windows RPC
49157/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Nmap scan report for 158.75.50.193
Host is up (0.00033s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: MPOLO)
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: MPOLO)
3689/tcp open daap mt-daapd DAAP
Host script results:
| nbstat:
| NetBIOS name: MPOLO, NetBIOS user: <unknown>, NetBIOS MAC: <unknown>
| Names
| MPOLO<00> Flags: <unique><active>
| MPOLO<03> Flags: <unique><active>
| MPOLO<20> Flags: <unique><active>
| WORKGROUP<00> Flags: <group><active>
|_ WORKGROUP<1e> Flags: <group><active>
| smb-os-discovery:
| OS: Unix (Samba 4.1.6-Ubuntu)
| Computer name: mpolo
| NetBIOS computer name: MPOLO
| Domain name:
| FQDN: mpolo
|_ System time: 2015-04-26T18:31:13+02:00
| smb-security-mode:
| Account that was used for smb scripts: guest
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol
NSE: Script Post-scanning.
Initiating NSE at 18:32
Completed NSE at 18:32, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 256 IP addresses (21 hosts up) scanned in 375.33 seconds
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment