This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Starting Nmap 6.40 ( http://nmap.org ) at 2015-04-26 18:26 CEST | |
NSE: Loaded 110 scripts for scanning. | |
NSE: Script Pre-scanning. | |
Initiating Ping Scan at 18:26 | |
Scanning 256 hosts [2 ports/host] | |
Completed Ping Scan at 18:26, 2.22s elapsed (256 total hosts) | |
Initiating Parallel DNS resolution of 256 hosts. at 18:26 | |
Completed Parallel DNS resolution of 256 hosts. at 18:26, 0.02s elapsed | |
Nmap scan report for 158.75.50.0 [host down] | |
Nmap scan report for 158.75.50.2 [host down] | |
Nmap scan report for 158.75.50.5 [host down] | |
Nmap scan report for 158.75.50.7 [host down] | |
Nmap scan report for 158.75.50.12 [host down] | |
Nmap scan report for 158.75.50.15 [host down] | |
Nmap scan report for 158.75.50.16 [host down] | |
Nmap scan report for 158.75.50.17 [host down] | |
Nmap scan report for 158.75.50.18 [host down] | |
Nmap scan report for 158.75.50.19 [host down] | |
Nmap scan report for 158.75.50.20 [host down] | |
Nmap scan report for 158.75.50.21 [host down] | |
Nmap scan report for 158.75.50.22 [host down] | |
Nmap scan report for 158.75.50.23 [host down] | |
Nmap scan report for 158.75.50.24 [host down] | |
Nmap scan report for 158.75.50.25 [host down] | |
Nmap scan report for 158.75.50.26 [host down] | |
Nmap scan report for 158.75.50.27 [host down] | |
Nmap scan report for 158.75.50.28 [host down] | |
Nmap scan report for 158.75.50.29 [host down] | |
Nmap scan report for 158.75.50.30 [host down] | |
Nmap scan report for 158.75.50.31 [host down] | |
Nmap scan report for 158.75.50.32 [host down] | |
Nmap scan report for 158.75.50.33 [host down] | |
Nmap scan report for 158.75.50.34 [host down] | |
Nmap scan report for 158.75.50.35 [host down] | |
Nmap scan report for 158.75.50.36 [host down] | |
Nmap scan report for 158.75.50.37 [host down] | |
Nmap scan report for 158.75.50.38 [host down] | |
Nmap scan report for 158.75.50.39 [host down] | |
Nmap scan report for 158.75.50.40 [host down] | |
Nmap scan report for 158.75.50.42 [host down] | |
Nmap scan report for 158.75.50.43 [host down] | |
Nmap scan report for 158.75.50.44 [host down] | |
Nmap scan report for 158.75.50.45 [host down] | |
Nmap scan report for 158.75.50.46 [host down] | |
Nmap scan report for 158.75.50.47 [host down] | |
Nmap scan report for 158.75.50.48 [host down] | |
Nmap scan report for 158.75.50.49 [host down] | |
Nmap scan report for 158.75.50.50 [host down] | |
Nmap scan report for 158.75.50.51 [host down] | |
Nmap scan report for 158.75.50.52 [host down] | |
Nmap scan report for 158.75.50.53 [host down] | |
Nmap scan report for 158.75.50.54 [host down] | |
Nmap scan report for 158.75.50.55 [host down] | |
Nmap scan report for 158.75.50.56 [host down] | |
Nmap scan report for 158.75.50.57 [host down] | |
Nmap scan report for 158.75.50.58 [host down] | |
Nmap scan report for 158.75.50.59 [host down] | |
Nmap scan report for 158.75.50.60 [host down] | |
Nmap scan report for 158.75.50.61 [host down] | |
Nmap scan report for 158.75.50.62 [host down] | |
Nmap scan report for 158.75.50.63 [host down] | |
Nmap scan report for 158.75.50.64 [host down] | |
Nmap scan report for 158.75.50.65 [host down] | |
Nmap scan report for 158.75.50.66 [host down] | |
Nmap scan report for 158.75.50.67 [host down] | |
Nmap scan report for 158.75.50.68 [host down] | |
Nmap scan report for 158.75.50.69 [host down] | |
Nmap scan report for 158.75.50.70 [host down] | |
Nmap scan report for 158.75.50.72 [host down] | |
Nmap scan report for 158.75.50.73 [host down] | |
Nmap scan report for 158.75.50.74 [host down] | |
Nmap scan report for 158.75.50.75 [host down] | |
Nmap scan report for 158.75.50.76 [host down] | |
Nmap scan report for 158.75.50.77 [host down] | |
Nmap scan report for 158.75.50.78 [host down] | |
Nmap scan report for 158.75.50.79 [host down] | |
Nmap scan report for 158.75.50.80 [host down] | |
Nmap scan report for 158.75.50.81 [host down] | |
Nmap scan report for 158.75.50.82 [host down] | |
Nmap scan report for 158.75.50.84 [host down] | |
Nmap scan report for 158.75.50.85 [host down] | |
Nmap scan report for 158.75.50.86 [host down] | |
Nmap scan report for 158.75.50.87 [host down] | |
Nmap scan report for 158.75.50.88 [host down] | |
Nmap scan report for 158.75.50.89 [host down] | |
Nmap scan report for 158.75.50.92 [host down] | |
Nmap scan report for 158.75.50.93 [host down] | |
Nmap scan report for 158.75.50.94 [host down] | |
Nmap scan report for 158.75.50.95 [host down] | |
Nmap scan report for 158.75.50.96 [host down] | |
Nmap scan report for 158.75.50.97 [host down] | |
Nmap scan report for 158.75.50.100 [host down] | |
Nmap scan report for 158.75.50.101 [host down] | |
Nmap scan report for 158.75.50.102 [host down] | |
Nmap scan report for 158.75.50.103 [host down] | |
Nmap scan report for 158.75.50.104 [host down] | |
Nmap scan report for 158.75.50.105 [host down] | |
Nmap scan report for 158.75.50.106 [host down] | |
Nmap scan report for 158.75.50.107 [host down] | |
Nmap scan report for 158.75.50.108 [host down] | |
Nmap scan report for 158.75.50.109 [host down] | |
Nmap scan report for 158.75.50.110 [host down] | |
Nmap scan report for 158.75.50.111 [host down] | |
Nmap scan report for 158.75.50.112 [host down] | |
Nmap scan report for 158.75.50.115 [host down] | |
Nmap scan report for 158.75.50.116 [host down] | |
Nmap scan report for 158.75.50.117 [host down] | |
Nmap scan report for 158.75.50.118 [host down] | |
Nmap scan report for 158.75.50.119 [host down] | |
Nmap scan report for 158.75.50.120 [host down] | |
Nmap scan report for 158.75.50.121 [host down] | |
Nmap scan report for 158.75.50.122 [host down] | |
Nmap scan report for 158.75.50.123 [host down] | |
Nmap scan report for 158.75.50.124 [host down] | |
Nmap scan report for 158.75.50.125 [host down] | |
Nmap scan report for 158.75.50.126 [host down] | |
Nmap scan report for 158.75.50.127 [host down] | |
Nmap scan report for 158.75.50.128 [host down] | |
Nmap scan report for 158.75.50.129 [host down] | |
Nmap scan report for 158.75.50.130 [host down] | |
Nmap scan report for 158.75.50.131 [host down] | |
Nmap scan report for 158.75.50.132 [host down] | |
Nmap scan report for 158.75.50.133 [host down] | |
Nmap scan report for 158.75.50.134 [host down] | |
Nmap scan report for 158.75.50.135 [host down] | |
Nmap scan report for 158.75.50.136 [host down] | |
Nmap scan report for 158.75.50.137 [host down] | |
Nmap scan report for 158.75.50.138 [host down] | |
Nmap scan report for 158.75.50.139 [host down] | |
Nmap scan report for 158.75.50.140 [host down] | |
Nmap scan report for 158.75.50.141 [host down] | |
Nmap scan report for 158.75.50.142 [host down] | |
Nmap scan report for 158.75.50.143 [host down] | |
Nmap scan report for 158.75.50.144 [host down] | |
Nmap scan report for 158.75.50.145 [host down] | |
Nmap scan report for 158.75.50.146 [host down] | |
Nmap scan report for 158.75.50.147 [host down] | |
Nmap scan report for 158.75.50.148 [host down] | |
Nmap scan report for 158.75.50.149 [host down] | |
Nmap scan report for 158.75.50.150 [host down] | |
Nmap scan report for 158.75.50.151 [host down] | |
Nmap scan report for 158.75.50.152 [host down] | |
Nmap scan report for 158.75.50.153 [host down] | |
Nmap scan report for 158.75.50.154 [host down] | |
Nmap scan report for 158.75.50.155 [host down] | |
Nmap scan report for 158.75.50.156 [host down] | |
Nmap scan report for 158.75.50.157 [host down] | |
Nmap scan report for 158.75.50.158 [host down] | |
Nmap scan report for 158.75.50.159 [host down] | |
Nmap scan report for 158.75.50.160 [host down] | |
Nmap scan report for 158.75.50.161 [host down] | |
Nmap scan report for 158.75.50.162 [host down] | |
Nmap scan report for 158.75.50.163 [host down] | |
Nmap scan report for 158.75.50.164 [host down] | |
Nmap scan report for 158.75.50.165 [host down] | |
Nmap scan report for 158.75.50.166 [host down] | |
Nmap scan report for 158.75.50.167 [host down] | |
Nmap scan report for 158.75.50.168 [host down] | |
Nmap scan report for 158.75.50.169 [host down] | |
Nmap scan report for 158.75.50.170 [host down] | |
Nmap scan report for 158.75.50.171 [host down] | |
Nmap scan report for 158.75.50.172 [host down] | |
Nmap scan report for 158.75.50.174 [host down] | |
Nmap scan report for 158.75.50.175 [host down] | |
Nmap scan report for 158.75.50.176 [host down] | |
Nmap scan report for 158.75.50.177 [host down] | |
Nmap scan report for 158.75.50.178 [host down] | |
Nmap scan report for 158.75.50.179 [host down] | |
Nmap scan report for 158.75.50.180 [host down] | |
Nmap scan report for 158.75.50.181 [host down] | |
Nmap scan report for 158.75.50.182 [host down] | |
Nmap scan report for 158.75.50.183 [host down] | |
Nmap scan report for 158.75.50.184 [host down] | |
Nmap scan report for 158.75.50.185 [host down] | |
Nmap scan report for 158.75.50.186 [host down] | |
Nmap scan report for 158.75.50.187 [host down] | |
Nmap scan report for 158.75.50.188 [host down] | |
Nmap scan report for 158.75.50.189 [host down] | |
Nmap scan report for 158.75.50.190 [host down] | |
Nmap scan report for 158.75.50.191 [host down] | |
Nmap scan report for 158.75.50.192 [host down] | |
Nmap scan report for 158.75.50.194 [host down] | |
Nmap scan report for 158.75.50.195 [host down] | |
Nmap scan report for 158.75.50.196 [host down] | |
Nmap scan report for 158.75.50.197 [host down] | |
Nmap scan report for 158.75.50.198 [host down] | |
Nmap scan report for 158.75.50.199 [host down] | |
Nmap scan report for 158.75.50.200 [host down] | |
Nmap scan report for 158.75.50.201 [host down] | |
Nmap scan report for 158.75.50.202 [host down] | |
Nmap scan report for 158.75.50.203 [host down] | |
Nmap scan report for 158.75.50.204 [host down] | |
Nmap scan report for 158.75.50.205 [host down] | |
Nmap scan report for 158.75.50.206 [host down] | |
Nmap scan report for 158.75.50.207 [host down] | |
Nmap scan report for 158.75.50.208 [host down] | |
Nmap scan report for 158.75.50.209 [host down] | |
Nmap scan report for 158.75.50.210 [host down] | |
Nmap scan report for 158.75.50.211 [host down] | |
Nmap scan report for 158.75.50.212 [host down] | |
Nmap scan report for 158.75.50.213 [host down] | |
Nmap scan report for 158.75.50.214 [host down] | |
Nmap scan report for 158.75.50.215 [host down] | |
Nmap scan report for 158.75.50.216 [host down] | |
Nmap scan report for 158.75.50.217 [host down] | |
Nmap scan report for 158.75.50.218 [host down] | |
Nmap scan report for 158.75.50.219 [host down] | |
Nmap scan report for 158.75.50.220 [host down] | |
Nmap scan report for 158.75.50.221 [host down] | |
Nmap scan report for 158.75.50.222 [host down] | |
Nmap scan report for 158.75.50.223 [host down] | |
Nmap scan report for 158.75.50.224 [host down] | |
Nmap scan report for 158.75.50.225 [host down] | |
Nmap scan report for 158.75.50.226 [host down] | |
Nmap scan report for 158.75.50.227 [host down] | |
Nmap scan report for 158.75.50.228 [host down] | |
Nmap scan report for 158.75.50.229 [host down] | |
Nmap scan report for 158.75.50.230 [host down] | |
Nmap scan report for 158.75.50.231 [host down] | |
Nmap scan report for 158.75.50.232 [host down] | |
Nmap scan report for 158.75.50.233 [host down] | |
Nmap scan report for 158.75.50.234 [host down] | |
Nmap scan report for 158.75.50.235 [host down] | |
Nmap scan report for 158.75.50.236 [host down] | |
Nmap scan report for 158.75.50.237 [host down] | |
Nmap scan report for 158.75.50.238 [host down] | |
Nmap scan report for 158.75.50.239 [host down] | |
Nmap scan report for 158.75.50.240 [host down] | |
Nmap scan report for 158.75.50.241 [host down] | |
Nmap scan report for 158.75.50.242 [host down] | |
Nmap scan report for 158.75.50.243 [host down] | |
Nmap scan report for 158.75.50.244 [host down] | |
Nmap scan report for 158.75.50.245 [host down] | |
Nmap scan report for 158.75.50.246 [host down] | |
Nmap scan report for 158.75.50.247 [host down] | |
Nmap scan report for 158.75.50.248 [host down] | |
Nmap scan report for 158.75.50.249 [host down] | |
Nmap scan report for 158.75.50.250 [host down] | |
Nmap scan report for 158.75.50.251 [host down] | |
Nmap scan report for 158.75.50.252 [host down] | |
Nmap scan report for 158.75.50.253 [host down] | |
Nmap scan report for 158.75.50.254 [host down] | |
Nmap scan report for 158.75.50.255 [host down] | |
Initiating Connect Scan at 18:26 | |
Scanning 21 hosts [1000 ports/host] | |
Discovered open port 443/tcp on 158.75.50.41 | |
Discovered open port 443/tcp on 158.75.50.91 | |
Discovered open port 443/tcp on 158.75.50.99 | |
Discovered open port 443/tcp on 158.75.50.83 | |
Discovered open port 135/tcp on 158.75.50.41 | |
Discovered open port 445/tcp on 158.75.50.41 | |
Discovered open port 135/tcp on 158.75.50.98 | |
Discovered open port 135/tcp on 158.75.50.99 | |
Discovered open port 135/tcp on 158.75.50.113 | |
Discovered open port 445/tcp on 158.75.50.193 | |
Discovered open port 80/tcp on 158.75.50.8 | |
Discovered open port 80/tcp on 158.75.50.9 | |
Discovered open port 80/tcp on 158.75.50.14 | |
Discovered open port 80/tcp on 158.75.50.41 | |
Discovered open port 80/tcp on 158.75.50.4 | |
Discovered open port 80/tcp on 158.75.50.6 | |
Discovered open port 80/tcp on 158.75.50.91 | |
Discovered open port 445/tcp on 158.75.50.98 | |
Discovered open port 445/tcp on 158.75.50.99 | |
Discovered open port 445/tcp on 158.75.50.113 | |
Discovered open port 80/tcp on 158.75.50.11 | |
Discovered open port 80/tcp on 158.75.50.99 | |
Discovered open port 80/tcp on 158.75.50.83 | |
Discovered open port 22/tcp on 158.75.50.1 | |
Discovered open port 554/tcp on 158.75.50.91 | |
Discovered open port 554/tcp on 158.75.50.99 | |
Discovered open port 139/tcp on 158.75.50.113 | |
Discovered open port 139/tcp on 158.75.50.193 | |
Discovered open port 23/tcp on 158.75.50.6 | |
Discovered open port 23/tcp on 158.75.50.11 | |
Discovered open port 554/tcp on 158.75.50.173 | |
Discovered open port 23/tcp on 158.75.50.8 | |
Discovered open port 80/tcp on 158.75.50.10 | |
Discovered open port 139/tcp on 158.75.50.98 | |
Discovered open port 23/tcp on 158.75.50.4 | |
Discovered open port 80/tcp on 158.75.50.13 | |
Discovered open port 49156/tcp on 158.75.50.113 | |
Discovered open port 49156/tcp on 158.75.50.98 | |
Discovered open port 23/tcp on 158.75.50.13 | |
Discovered open port 23/tcp on 158.75.50.10 | |
Discovered open port 554/tcp on 158.75.50.41 | |
Discovered open port 139/tcp on 158.75.50.99 | |
Discovered open port 139/tcp on 158.75.50.41 | |
Discovered open port 23/tcp on 158.75.50.9 | |
Discovered open port 23/tcp on 158.75.50.14 | |
Discovered open port 49154/tcp on 158.75.50.113 | |
Discovered open port 49156/tcp on 158.75.50.91 | |
Discovered open port 49156/tcp on 158.75.50.114 | |
Discovered open port 49156/tcp on 158.75.50.173 | |
Discovered open port 5357/tcp on 158.75.50.113 | |
Discovered open port 49152/tcp on 158.75.50.113 | |
Discovered open port 3689/tcp on 158.75.50.193 | |
Increasing send delay for 158.75.50.98 from 0 to 5 due to max_successful_tryno increase to 4 | |
Increasing send delay for 158.75.50.98 from 5 to 10 due to max_successful_tryno increase to 5 | |
Discovered open port 2869/tcp on 158.75.50.99 | |
Discovered open port 49154/tcp on 158.75.50.98 | |
Discovered open port 49154/tcp on 158.75.50.91 | |
Discovered open port 49154/tcp on 158.75.50.114 | |
Discovered open port 2869/tcp on 158.75.50.41 | |
Discovered open port 49154/tcp on 158.75.50.173 | |
Discovered open port 5357/tcp on 158.75.50.98 | |
Discovered open port 49152/tcp on 158.75.50.98 | |
Increasing send delay for 158.75.50.91 from 0 to 5 due to max_successful_tryno increase to 4 | |
Discovered open port 49157/tcp on 158.75.50.98 | |
Discovered open port 5357/tcp on 158.75.50.91 | |
Discovered open port 1984/tcp on 158.75.50.90 | |
Discovered open port 5357/tcp on 158.75.50.173 | |
Discovered open port 5357/tcp on 158.75.50.114 | |
Discovered open port 49152/tcp on 158.75.50.91 | |
Discovered open port 49152/tcp on 158.75.50.114 | |
Discovered open port 49152/tcp on 158.75.50.173 | |
Discovered open port 6646/tcp on 158.75.50.41 | |
Discovered open port 49157/tcp on 158.75.50.91 | |
Discovered open port 49157/tcp on 158.75.50.173 | |
Discovered open port 10243/tcp on 158.75.50.99 | |
Increasing send delay for 158.75.50.98 from 10 to 20 due to max_successful_tryno increase to 6 | |
Discovered open port 1024/tcp on 158.75.50.13 | |
Discovered open port 49157/tcp on 158.75.50.114 | |
Discovered open port 1111/tcp on 158.75.50.113 | |
Discovered open port 10243/tcp on 158.75.50.41 | |
Completed Connect Scan against 158.75.50.11 in 31.69s (20 hosts left) | |
Discovered open port 49153/tcp on 158.75.50.113 | |
Discovered open port 10243/tcp on 158.75.50.173 | |
Discovered open port 10243/tcp on 158.75.50.91 | |
Completed Connect Scan against 158.75.50.90 in 35.43s (19 hosts left) | |
Completed Connect Scan against 158.75.50.99 in 42.45s (18 hosts left) | |
Completed Connect Scan against 158.75.50.13 in 46.68s (17 hosts left) | |
Discovered open port 1111/tcp on 158.75.50.98 | |
Completed Connect Scan against 158.75.50.4 in 46.90s (16 hosts left) | |
Completed Connect Scan against 158.75.50.8 in 46.99s (15 hosts left) | |
Discovered open port 49155/tcp on 158.75.50.113 | |
Completed Connect Scan against 158.75.50.113 in 48.02s (14 hosts left) | |
Discovered open port 49153/tcp on 158.75.50.173 | |
Discovered open port 49153/tcp on 158.75.50.91 | |
Discovered open port 49153/tcp on 158.75.50.114 | |
Completed Connect Scan against 158.75.50.9 in 50.63s (13 hosts left) | |
Completed Connect Scan against 158.75.50.10 in 50.84s (12 hosts left) | |
Completed Connect Scan against 158.75.50.71 in 51.80s (11 hosts left) | |
Discovered open port 49155/tcp on 158.75.50.41 | |
Completed Connect Scan against 158.75.50.41 in 53.26s (10 hosts left) | |
Completed Connect Scan against 158.75.50.193 in 53.57s (9 hosts left) | |
Completed Connect Scan against 158.75.50.14 in 54.85s (8 hosts left) | |
Completed Connect Scan against 158.75.50.6 in 55.60s (7 hosts left) | |
Completed Connect Scan against 158.75.50.114 in 56.44s (6 hosts left) | |
Completed Connect Scan against 158.75.50.3 in 56.72s (5 hosts left) | |
Completed Connect Scan against 158.75.50.1 in 57.12s (4 hosts left) | |
Completed Connect Scan against 158.75.50.83 in 58.23s (3 hosts left) | |
Increasing send delay for 158.75.50.173 from 0 to 5 due to max_successful_tryno increase to 4 | |
Discovered open port 49153/tcp on 158.75.50.98 | |
Increasing send delay for 158.75.50.173 from 5 to 10 due to 12 out of 40 dropped probes since last increase. | |
Discovered open port 9595/tcp on 158.75.50.91 | |
Discovered open port 49155/tcp on 158.75.50.173 | |
Completed Connect Scan against 158.75.50.173 in 63.05s (2 hosts left) | |
Discovered open port 49155/tcp on 158.75.50.91 | |
Completed Connect Scan against 158.75.50.91 in 63.55s (1 host left) | |
Discovered open port 49155/tcp on 158.75.50.98 | |
Completed Connect Scan at 18:27, 80.12s elapsed (21000 total ports) | |
Initiating Service scan at 18:27 | |
Scanning 90 services on 21 hosts | |
Service scan Timing: About 28.89% done; ETC: 18:29 (0:01:21 remaining) | |
Service scan Timing: About 46.67% done; ETC: 18:31 (0:01:42 remaining) | |
Service scan Timing: About 71.11% done; ETC: 18:30 (0:00:49 remaining) | |
Completed Service scan at 18:31, 200.78s elapsed (90 services on 21 hosts) | |
NSE: Script scanning 21 hosts. | |
Initiating NSE at 18:31 | |
Completed NSE at 18:32, 88.93s elapsed | |
Nmap scan report for dormdoor.gimakad.torun.pl (158.75.50.1) | |
Host is up (0.00045s latency). | |
Not shown: 995 closed ports | |
PORT STATE SERVICE VERSION | |
22/tcp open tcpwrapped | |
135/tcp filtered msrpc | |
139/tcp filtered netbios-ssn | |
445/tcp filtered microsoft-ds | |
1147/tcp filtered capioverlan | |
Nmap scan report for 158.75.50.3 | |
Host is up (0.0023s latency). | |
Not shown: 997 closed ports | |
PORT STATE SERVICE VERSION | |
23/tcp filtered telnet | |
80/tcp filtered http | |
161/tcp filtered snmp | |
Nmap scan report for 158.75.50.4 | |
Host is up (0.0019s latency). | |
Not shown: 998 closed ports | |
PORT STATE SERVICE VERSION | |
23/tcp open telnet (Usually a Cisco/3com switch) | |
80/tcp open http 3Com switch webadmin 1.0 | |
| http-auth: | |
| HTTP/1.0 401 Unauthorized | |
|_ Basic realm=device | |
|_http-title: Site doesn't have a title. | |
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios | |
Nmap scan report for 158.75.50.6 | |
Host is up (0.0022s latency). | |
Not shown: 998 closed ports | |
PORT STATE SERVICE VERSION | |
23/tcp open telnet (Usually a Cisco/3com switch) | |
80/tcp open http 3Com switch webadmin 1.0 | |
| http-auth: | |
| HTTP/1.0 401 Unauthorized | |
|_ Basic realm=device | |
|_http-title: Site doesn't have a title. | |
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios | |
Nmap scan report for 158.75.50.8 | |
Host is up (0.0019s latency). | |
Not shown: 998 closed ports | |
PORT STATE SERVICE VERSION | |
23/tcp open telnet (Usually a Cisco/3com switch) | |
80/tcp open http 3Com switch webadmin 1.0 | |
| http-auth: | |
| HTTP/1.0 401 Unauthorized | |
|_ Basic realm=device | |
|_http-title: Site doesn't have a title. | |
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios | |
Nmap scan report for 158.75.50.9 | |
Host is up (0.0018s latency). | |
Not shown: 998 closed ports | |
PORT STATE SERVICE VERSION | |
23/tcp open telnet (Usually a Cisco/3com switch) | |
80/tcp open http 3Com switch webadmin 1.0 | |
| http-auth: | |
| HTTP/1.0 401 Unauthorized | |
|_ Basic realm=device | |
|_http-title: Site doesn't have a title. | |
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios | |
Nmap scan report for 158.75.50.10 | |
Host is up (0.020s latency). | |
Not shown: 998 closed ports | |
PORT STATE SERVICE VERSION | |
23/tcp open telnet (Usually a Cisco/3com switch) | |
80/tcp open http 3Com switch webadmin 1.0 | |
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios | |
Nmap scan report for 158.75.50.11 | |
Host is up (0.0035s latency). | |
Not shown: 998 closed ports | |
PORT STATE SERVICE VERSION | |
23/tcp open telnet (Usually a Cisco/3com switch) | |
80/tcp open http 3Com switch webadmin 1.0 | |
| http-auth: | |
| HTTP/1.0 401 Unauthorized | |
|_ Basic realm=device | |
|_http-title: Site doesn't have a title. | |
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios | |
Nmap scan report for 158.75.50.13 | |
Host is up (0.030s latency). | |
Not shown: 997 closed ports | |
PORT STATE SERVICE VERSION | |
23/tcp open telnet? | |
80/tcp open tcpwrapped | |
1024/tcp open kdm? | |
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |
SF-Port23-TCP:V=6.40%I=7%D=4/26%Time=553D120C%P=i686-pc-linux-gnu%r(NULL,1 | |
SF:D,"\xff\xfb\x01\xff\xfb\x03\xff\xfd\x01\x1b\[0m\n\r\n\r\0\x1b\[0mLogin: | |
SF:\x20")%r(GenericLines,39,"\xff\xfb\x01\xff\xfb\x03\xff\xfd\x01\x1b\[0m\ | |
SF:n\r\n\r\0\x1b\[0mLogin:\x20\n\r\0\x1b\[0mLogin:\x20\n\r\0\x1b\[0mLogin: | |
SF:\x20")%r(GetRequest,5C,"\xff\xfb\x01\xff\xfb\x03\xff\xfd\x01\x1b\[0m\n\ | |
SF:r\n\r\0\x1b\[0mLogin:\x20GET\x20/\x20HTTP/1\.0\n\r\0Password:\x20\n\r\0 | |
SF:Incorrect\x20Password\.\n\r\0\x1b\[0mLogin:\x20")%r(HTTPOptions,60,"\xf | |
SF:f\xfb\x01\xff\xfb\x03\xff\xfd\x01\x1b\[0m\n\r\n\r\0\x1b\[0mLogin:\x20OP | |
SF:TIONS\x20/\x20HTTP/1\.0\n\r\0Password:\x20\n\r\0Incorrect\x20Password\. | |
SF:\n\r\0\x1b\[0mLogin:\x20")%r(RTSPRequest,60,"\xff\xfb\x01\xff\xfb\x03\x | |
SF:ff\xfd\x01\x1b\[0m\n\r\n\r\0\x1b\[0mLogin:\x20OPTIONS\x20/\x20RTSP/1\.0 | |
SF:\n\r\0Password:\x20\n\r\0Incorrect\x20Password\.\n\r\0\x1b\[0mLogin:\x2 | |
SF:0")%r(RPCCheck,12,"\xff\xfb\x01\xff\xfb\x03\xff\xfd\x01\x1b\[0m\n\r\n\r | |
SF:\0"); | |
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |
SF-Port1024-TCP:V=6.40%I=7%D=4/26%Time=553D1211%P=i686-pc-linux-gnu%r(Gene | |
SF:ricLines,2D,"\x1b\[0m\n\r\n\r\x1b\[0mLogin:\x20\n\r\x1b\[0mLogin:\x20\n | |
SF:\r\x1b\[0mLogin:\x20")%r(GetRequest,67,"\x1b\[0m\n\r\n\r\x1b\[0mLogin:\ | |
SF:x20T\x20/\x20HTTP/1\.0\n\rPassword:\x20\n\rIncorrect\x20Password\.\n\r\ | |
SF:x1b\[0mLogin:\x20\n\r\x1b\[0mLogin:\x20\n\r\x1b\[0mLogin:\x20")%r(HTTPO | |
SF:ptions,6B,"\x1b\[0m\n\r\n\r\x1b\[0mLogin:\x20TIONS\x20/\x20HTTP/1\.0\n\ | |
SF:rPassword:\x20\n\rIncorrect\x20Password\.\n\r\x1b\[0mLogin:\x20\n\r\x1b | |
SF:\[0mLogin:\x20\n\r\x1b\[0mLogin:\x20")%r(RTSPRequest,6B,"\x1b\[0m\n\r\n | |
SF:\r\x1b\[0mLogin:\x20TIONS\x20/\x20RTSP/1\.0\n\rPassword:\x20\n\rIncorre | |
SF:ct\x20Password\.\n\r\x1b\[0mLogin:\x20\n\r\x1b\[0mLogin:\x20\n\r\x1b\[0 | |
SF:mLogin:\x20")%r(RPCCheck,3C,"\x1b\[0m\n\r\n\r\x1b\[0mLogin:\x20\(r\n\rI | |
SF:nput\x20dev_id\x20\(or\x2099\x20to\x20read\x20Budge\):\x20\x18"); | |
Nmap scan report for 158.75.50.14 | |
Host is up (0.0019s latency). | |
Not shown: 998 closed ports | |
PORT STATE SERVICE VERSION | |
23/tcp open telnet (Usually a Cisco/3com switch) | |
80/tcp open http 3Com switch webadmin 1.0 | |
| http-auth: | |
| HTTP/1.0 401 Unauthorized | |
|_ Basic realm=device | |
|_http-title: Site doesn't have a title. | |
Service Info: OS: IOS; Device: switch; CPE: cpe:/o:cisco:ios | |
Nmap scan report for 158.75.50.41 | |
Host is up (0.00089s latency). | |
Not shown: 990 filtered ports | |
PORT STATE SERVICE VERSION | |
80/tcp open http? | |
|_http-title: Site doesn't have a title. | |
135/tcp open msrpc Microsoft Windows RPC | |
139/tcp open netbios-ssn | |
443/tcp open skype2 Skype | |
|_http-title: Site doesn't have a title. | |
445/tcp open netbios-ssn | |
554/tcp open rtsp? | |
2869/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
6646/tcp open unknown | |
10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 404) | |
|_http-title: Not Found | |
49155/tcp open msrpc Microsoft Windows RPC | |
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |
SF-Port80-TCP:V=6.40%I=7%D=4/26%Time=553D120C%P=i686-pc-linux-gnu%r(GetReq | |
SF:uest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions,62,"u | |
SF:\x8b\xff\xb9~\x80\xdc=\xb0\xd3\xe1\xc9\xa5xy\x12\xd5\x1b\x90\xfc_\xb0\x | |
SF:c3\x95\xda\xa9\xf8\[\x07\xb7:a\x1c\x05\xcd\x1c\xd9\x081\x1c\xae\|\xb4\x | |
SF:d2\xef\xb4\x9f\]b\xeb\xa0\x91\x8e'\xac-z#x\x89&\xdf\x04\xa5\x92\[P\x81\ | |
SF:xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\xee\x07\x0c\r\xda\x03\xd8 | |
SF:i\x86\xbfd\x85\xf2;")%r(RTSPRequest,43,"\t\x84\xa1#\xe4\xff\xef\x9e\xc7 | |
SF:G\x91\|v\xfb\xc4=g\[:\x19f\xacN~woU\xf6\xabi\xa9\x1d/\x1f\|\xa8\xec\xe3 | |
SF:\xbf\xa5\xc1\x14\xff#\xb3dig\x9f\xc4eR\x1b\x10A~W\x1c\xddjS\xe89\x16\x0 | |
SF:ftU")%r(FourOhFourRequest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n" | |
SF:)%r(RPCCheck,42,"\xf9\)\xcc\?\xado\xf8Q\xc10\xfe\xedU\x02\xb58\xe5'\x11 | |
SF:\x8a\x1a\xa6}\x1f{\xd7\xda\rd%aqb!{\xdd\xba\xfb\xf4w\xde\x0fO\xb7Y\x83D | |
SF:\xb9\x8a\xf3\x08\xd96\xaf\x94\xf5\xa2\+\xe0\xd1\xceg\xecm\xbac")%r(DNSV | |
SF:ersionBindReq,57,"\xf9\xbc\(:\]\xb8\x0c\xfc\xdf>\x03F\xb8\xaa6\xf3ZA\xe | |
SF:cl\x10\x16\xbeu\xdb\xb8\xec\.\x20\+\xcdg0\xbd\xb8i\x9f0\x96\x92\x1cJ\x1 | |
SF:0s\x14\xed\x9aa\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\x | |
SF:cb\0q\xee\x07\x0c\r\xda\x03\xd8i\x86\xbfd\x85\xf2;\xb0a\x1ew")%r(DNSSta | |
SF:tusRequest,5C,"\x1c\x1e\x8c\+8\x01\x91l\xad\x08\xf4\xf1\*\x9d\x1b7\xa2\ | |
SF:xad\xbd\x18\x9c\xb3}\xb8\x03-\x0b\x02\xc5\xa8\x16S:\xd2\xd3y\xa2\x80\x0 | |
SF:f\xe4v%B\xc7\xe7\xcb\xe1\x05\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\xee\ | |
SF:x07\x0c\r\xda\x03\xd8i\x86\xbfd\x85\xf2;\xb0a\x1ew\xbc\xfd\ns\x88Y\xb6/ | |
SF:\x14u\"\xab")%r(SSLSessionReq,40,"\x0fu\x7f\xef\+\xfdX\xf2\xdax\xf0\xf3 | |
SF:\xear-\\@\x8d\$e;\x7f\x94KL\xc2\xa7\xe1\xe1\x12R\xab\x17\xbd\x9b\xbaO\x | |
SF:bc\xa8J\x18\xb3\xd6\xc2Eo\x7f\xbe\+\xe0\xd1\xceg\xecm\xba\xbd@N\$9\x05\ | |
SF:xf6'")%r(Kerberos,48,"\x1ck\xec\xa6\xe1\x96\x075p\x92X3X\x15\xe0\xd3\xa | |
SF:e\[x\xd8:\x11\x11\x89\]H\x81\xe6\xb1LxK\xbc\xad\x88\xa3\x8eA\x8bs\xa0\x | |
SF:1d\xf7\xeb\xe7\x8a\xd2D\xe38I\xe6\x9f\xc4eR\x1b\x10A~W\x1c\xddjW\x9f\xf | |
SF:e\xd1\x8e\x7f6\"")%r(SMBProgNeg,67,"=\x90\._\xe1\xa6\xc7%\xc0\xa8\x1f\x | |
SF:d5\x141\x9c\x17\x0b\xf6w\x9b'\x04\?\xa4x\xb3}4w\x90/XU\xeb\x1d\[\x90GH\ | |
SF:x04\x92d\xde\xd5\xdeW\x97\x98\xa4\xc52{\xf0\xa1\^\xb7\xfc=J\xb3\xc8\x99 | |
SF:\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac-z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x9 | |
SF:7\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\xee"); | |
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows | |
Host script results: | |
| nbstat: | |
| NetBIOS name: KOMP-MAJA, NetBIOS user: <unknown>, NetBIOS MAC: 74:e6:e2:1c:e7:06 (unknown) | |
| Names | |
| KOMP-MAJA<20> Flags: <unique><active> | |
| KOMP-MAJA<00> Flags: <unique><active> | |
| WORKGROUP<00> Flags: <group><active> | |
|_ WORKGROUP<1e> Flags: <group><active> | |
| smb-os-discovery: | |
| OS: Windows 8.1 9600 (Windows 8.1 6.3) | |
| NetBIOS computer name: KOMP-MAJA | |
| Workgroup: WORKGROUP | |
|_ System time: 2015-04-26T18:31:24+02:00 | |
| smb-security-mode: | |
| Account that was used for smb scripts: guest | |
| User-level authentication | |
| SMB Security: Challenge/response passwords supported | |
|_ Message signing disabled (dangerous, but default) | |
|_smbv2-enabled: Server supports SMBv2 protocol | |
Nmap scan report for 158.75.50.71 | |
Host is up (0.00029s latency). | |
All 1000 scanned ports on 158.75.50.71 are closed | |
Nmap scan report for 158.75.50.83 | |
Host is up (0.00097s latency). | |
Not shown: 998 filtered ports | |
PORT STATE SERVICE VERSION | |
80/tcp open http? | |
|_http-title: Site doesn't have a title. | |
443/tcp open skype2 Skype | |
|_http-title: Site doesn't have a title. | |
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |
SF-Port80-TCP:V=6.40%I=7%D=4/26%Time=553D1211%P=i686-pc-linux-gnu%r(GetReq | |
SF:uest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions,37,"4 | |
SF:oY\xeb\\\x80Qt\x81\x1adW\x9e\xe1#\xc8\xba\x13\xde\xf4R&{\xb4jS\xe8\xd3\ | |
SF:"\xe5,D\x1dB\xfa\x8e\xe2W\x07\xfdP\xbcA\xd2\xfa\x8e\xf6\xb7\x05r\xbb0\x | |
SF:e1\x9e\xf7")%r(RTSPRequest,5C,"P\x85\x81\xf72-\xa2\x0c5NJ\xcd\x0e{<\xc9 | |
SF:lh\t9@A\xfd\xf1\xd9N\xb4\xba7\x98\x91R\xd6\x0el\xe7\x92\x94\[\x17\xbd\x | |
SF:da\^\xdbH\xec\xfc\xef\xfc=J\xb3\xc8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac | |
SF:-z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2 | |
SF:\xcb")%r(FourOhFourRequest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n | |
SF:")%r(RPCCheck,4D,"\+\x18\x89\xcb\x85#F\xc3\xa6\xb6\x14\x9a\x8c\xf3\xf4& | |
SF:\x8b\x81\x03c\xe48}G\x01\0\r\x92\x8b\x1e3T~\xf6b\x18\xe1T\xf6\xa2\xc7\x | |
SF:dah\xa2\x1bu\xba\xe3,\xad\xfa\xa3\xf8\t\xa6_\x84%\x12\xdb\xd0\x01>\x17\ | |
SF:xdc\x9d\*\x13\xa8\xf9\xd6\xcf4\x15BK\x80")%r(DNSVersionBindReq,55,"W\$\ | |
SF:xce\xa2\x15!o\xa3\xec\x9b\x04\n\xfc7\xc1\r\xad}\xacq\xf6X\x90D\?Q\x10\x | |
SF:1f\x9e\x9d\xddk\+\x8e\x8a\xf1qn\xa6\xc1\xfbOe\xf6\x16\xdb\xd4\xffx\x89& | |
SF:\xdf\x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\x | |
SF:ee\x07\x0c\r\xda\x03\xd8i\x86\xbfd")%r(DNSStatusRequest,3D,"}\xd8c\xe9\ | |
SF:xe4\x06\xfe%/\xba\xaer@\x9b\xf5g\)\x0f\\\xd0\t\x15\r\x99'\x80V\(1\x04C\ | |
SF:x8f\x13\xa9E\xa8\x90\x96\xd9\xa9\x97Vg\x10\x8f\xfe\xf4\x12\?\xe4\x05r\x | |
SF:bb0\xe1\x9e\xf7<}\x8a\xf3")%r(SSLSessionReq,72,"\x0b\x172\x8d\xb0\xa9!\ | |
SF:xb1\xfd\x90\]\x86c\xba\xa1tP\xdaw\?\xa2\xdb\x99\x96\x1b\x984\x80\xe9\xb | |
SF:7AGf\x15\x89\xfc\xe8D\xf6\xac\x03\xee\x17d\x11\xebs\xfb\x8f\xf4\xd5\x02 | |
SF:\x0b@\xb1\.GLM\x1aC\x18\xa9\xc6\xff\xa4\xc52{\xf0\xa1\^\xb7\xfc=J\xb3\x | |
SF:c8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac-z#x\x89&\xdf\x04\xa5\x92\[P\x81\ | |
SF:xbe\x97\\\x1dr\"\x16\x89\x87\xb5L")%r(Kerberos,5A,"~\xb4\xcc\x9dt#\xa7_ | |
SF::\xb1\xa6\xf7\xfe\x02\xca\xf7\xcc\xaf\x1f#V\+\xec\x82\xc7\xb2\xa0\xf8\x | |
SF:c7~\xd6\x921X\x83\|\x19\x8d/\xc0j\x9d\x96\x06d\xf6#\\@\xb1\.GLM\x1aC\x1 | |
SF:8\xa9\xc6\xff\xa4\xc52{\xf0\xa1\^\xb7\xfc=J\xb3\xc8\x99\xf6oT\xb5b\xeb\ | |
SF:xa0\x91\xec\xb8\xf4\x88n\x9b\xf4\x8b")%r(SMBProgNeg,61,"m\xd2\xf3\x13J\ | |
SF:xc5A\xa5\xefw@\x93\x90V:=\0\x02%\x93\xd9\xdeB\xbd\xd9},/n\x1f\xcb\xc6\? | |
SF:\xf5\xb4\x98'\xb4L\xc9\]\xdcp\x8e\xd6\xd1\x90i\xe89\x16\x0ftU\x82\x8b\x | |
SF:c01\xae\xc7\xcc\xcd\x9a\xc3\x98\)F\x7f\$E\xb2\xfbp!\xde7\|\xbd\xca3H\x1 | |
SF:9v\xef\xd45\xe2k\x20\x11\x0e\xa7,\xad\xfa\xa3\xf8"); | |
Nmap scan report for 158.75.50.90 | |
Host is up (0.00034s latency). | |
Not shown: 999 closed ports | |
PORT STATE SERVICE VERSION | |
1984/tcp open ssh (protocol 2.0) | |
| ssh-hostkey: 1024 51:6c:1f:27:bc:a6:b6:6c:bf:4c:bf:55:ca:dd:3b:5e (DSA) | |
| 2048 ae:c9:47:7e:5c:00:63:13:6e:2e:0d:ae:e7:d2:3a:e3 (RSA) | |
|_256 a4:24:9a:33:d4:62:35:f7:f0:d4:5e:45:00:9f:31:cf (ECDSA) | |
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |
SF-Port1984-TCP:V=6.40%I=7%D=4/26%Time=553D1212%P=i686-pc-linux-gnu%r(NULL | |
SF:,29,"SSH-2\.0-OpenSSH_6\.6\.1p1\x20Ubuntu-2ubuntu2\r\n"); | |
Nmap scan report for 158.75.50.91 | |
Host is up (0.00086s latency). | |
Not shown: 981 closed ports | |
PORT STATE SERVICE VERSION | |
80/tcp open http? | |
|_http-title: Site doesn't have a title. | |
135/tcp filtered msrpc | |
139/tcp filtered netbios-ssn | |
443/tcp open skype2 Skype | |
|_http-title: Site doesn't have a title. | |
445/tcp filtered microsoft-ds | |
554/tcp open rtsp? | |
1110/tcp filtered nfsd-status | |
2869/tcp filtered icslap | |
3389/tcp filtered ms-wbt-server | |
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 503) | |
|_http-title: Service Unavailable | |
9595/tcp open pds? | |
10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 404) | |
|_http-title: Not Found | |
19780/tcp filtered unknown | |
49152/tcp open msrpc Microsoft Windows RPC | |
49153/tcp open msrpc Microsoft Windows RPC | |
49154/tcp open msrpc Microsoft Windows RPC | |
49155/tcp open msrpc Microsoft Windows RPC | |
49156/tcp open msrpc Microsoft Windows RPC | |
49157/tcp open msrpc Microsoft Windows RPC | |
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |
SF-Port80-TCP:V=6.40%I=7%D=4/26%Time=553D1212%P=i686-pc-linux-gnu%r(GetReq | |
SF:uest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions,67,"m | |
SF:\xad@\x8f\x9e0\x02\]\xfc:l\xa9\xb7\x9d\x06vD\x99\+rj\xf1,A\xf2\x18\xa8K | |
SF:i\xc8\xb7\x80\x8aH\x17\x9aX\xd7g\xe7\|8}K\xa2\xf17!\x82\x8b\xc01\xae\xc | |
SF:7\xcc\xcd\x9a\xc3\x98\)F\x7f\$E\xb2\xfbp!\xde7\|\xbd\xca3H\x19v\xef\xd4 | |
SF:5\xe2k\x20\x11\x0e\xa7,\xad\xfa\xa3\xf8\t\xa6_\x84%\x12\xdb\xd0\x01>\x1 | |
SF:7\xdc")%r(RTSPRequest,6E,"\x12\xec=\xc0\x97\x136\xd6\x17~\xc5\xc3\xd7}C | |
SF:{W\x93\x7f\xbc\x85\x18\x8a\xe7\xf6\xfdx\xfe\xca\x18\xb6\x0e\x07\x9f\x96 | |
SF:\xb8eH\xd4\xaa\^\xc6{A1Y\xbb@-z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x97\\ | |
SF:\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\xee\x07\x0c\r\xda\x03\xd8i\x86\xbf | |
SF:d\x85\xf2;\xb0a\x1ew\xbc\xfd\ns\x88Y\xb6/\x14u\"\xab`QN")%r(FourOhFourR | |
SF:equest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(RPCCheck,39,"\x | |
SF:e2\\\x1f\xce\x16O\xfb\xa8\xe1oqt\xde\xc8\xc63\xc9\x84X\xf9\x8eu\xf3\x94 | |
SF:c\x9c\xc1\xfb\x16P\x8e9\x8b\xf0\x80\xcaW\x9e\xda\xdc\xf9\xe1u\xcdN\x98\ | |
SF:xdbN\xb8\xc9f\x1fD\xe5\xd2\x9b\x90")%r(DNSVersionBindReq,34,"\xdd\"\xe9 | |
SF:;\xe7\[\xadS\n\$\xcf\x93z\x0f5\xf8%\x03{\xdb\x80\?k\xc3\x7f\x93Wg7\xe4T | |
SF:\r\x1e\xfca\xc5\xfb\xfc\xed\x1f\x85H\x01\xf4;\xa5\x1f\x10\xfd\ns\x88")% | |
SF:r(DNSStatusRequest,41,"\x8a\xb41\xbb\xe61\xefA\xbdI\xd5\xeb0#\xca\)\x82 | |
SF:\xa0\xb9\x97\x9ar\xdej\nq\xf6x\xca#X4\x11\x9f\xbe\xd3\xafa\x87\xebT\xf2 | |
SF:\xae\xda\nm:\t\x0c\r\xda\x03\xd8i\x86\xbfd\x85\xf2;\xb0a\x1ew\xbc")%r(S | |
SF:SLSessionReq,45,"98~`_\x8779<\xc7\|\xd7\|\x0f\x15\xfb\xa0n\xe7\xfb\xebz | |
SF:\x8e>-\x82\x1e\xab\xaf\xeb\xe4\xa2\xcf\"\xe5E\xcdV\xa2\x1c{\x81\"P\xfb3 | |
SF:\x12A\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yV\x80\xbd\x93\x91\x95G\xf6\x86 | |
SF:")%r(Kerberos,39,"\x88\xd7\xac\xad\xcf\x9f\xfd\xdeo\xed\xf4\xa5c=Gw\x84 | |
SF:\xf7N\xe6\x11\x9bG\r\x95\r\xf17d\x97\x01@\xc5\xc1\xe1\xa9f\x93\x1d\x1d\ | |
SF:xca\x9a\xd4F\x20\xa6\xd8#\xddu\x80nR\xd9m\x1fG")%r(SMBProgNeg,67,"\xe66 | |
SF:\x88\x1d\x81U\x9eUE:c\x12O\x90\x8b\xb3\x82U5\x1a\x8c\xd4\xa3\xe7\xb3\n\ | |
SF:xab\x8a\x81\x98y\xb9\xd7HF\xe2Y\xc6\xb6z/\^Q\xd6\x8b\xc2!\xean\x87\x8c\ | |
SF:x8dZ\x83X\xe9\x06\?\xe4\x05r\xbb0\xe1\x9e\xf7<}\x8a\xf3\x08\xd96\xaf\x9 | |
SF:4\xf5\xa2\+\xe0\xd1\xceg\xecm\xbac\xb8\xc9f\x1fD\xe5\xd2\x9b\x90\xc1\xf | |
SF:e\xd7\x9c\]\xea\xd3h"); | |
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows | |
Nmap scan report for 158.75.50.98 | |
Host is up (0.00069s latency). | |
Not shown: 984 closed ports | |
PORT STATE SERVICE VERSION | |
135/tcp open msrpc Microsoft Windows RPC | |
139/tcp open netbios-ssn | |
301/tcp filtered unknown | |
445/tcp open netbios-ssn | |
1110/tcp filtered nfsd-status | |
1111/tcp open tcpwrapped | |
1761/tcp filtered landesk-rc | |
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 503) | |
|_http-title: Service Unavailable | |
9009/tcp filtered pichat | |
34571/tcp filtered unknown | |
49152/tcp open msrpc Microsoft Windows RPC | |
49153/tcp open msrpc Microsoft Windows RPC | |
49154/tcp open msrpc Microsoft Windows RPC | |
49155/tcp open msrpc Microsoft Windows RPC | |
49156/tcp open msrpc Microsoft Windows RPC | |
49157/tcp open msrpc Microsoft Windows RPC | |
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows | |
Host script results: | |
| nbstat: | |
| NetBIOS name: USER, NetBIOS user: <unknown>, NetBIOS MAC: 78:e4:00:eb:c0:85 (Hon Hai Precision Ind. Co.) | |
| Names | |
| USER<00> Flags: <unique><active> | |
| WORKGROUP<00> Flags: <group><active> | |
|_ USER<20> Flags: <unique><active> | |
| smb-security-mode: | |
| User-level authentication | |
| SMB Security: Challenge/response passwords supported | |
|_ Message signing disabled (dangerous, but default) | |
|_smbv2-enabled: Server supports SMBv2 protocol | |
Nmap scan report for 158.75.50.99 | |
Host is up (0.0014s latency). | |
Not shown: 992 filtered ports | |
PORT STATE SERVICE VERSION | |
80/tcp open http? | |
|_http-title: Site doesn't have a title. | |
135/tcp open msrpc Microsoft Windows RPC | |
139/tcp open netbios-ssn | |
443/tcp open skype2 Skype | |
|_http-title: Site doesn't have a title. | |
445/tcp open netbios-ssn | |
554/tcp open rtsp? | |
2869/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 404) | |
|_http-title: Not Found | |
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |
SF-Port80-TCP:V=6.40%I=7%D=4/26%Time=553D1249%P=i686-pc-linux-gnu%r(GetReq | |
SF:uest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions,35,"\ | |
SF:0\x07lr\xf4\0\xefF\x104j\xc4\xc3Se\xb6\x81\xd2\x1fp\x96\x97\x01\x80\xa6 | |
SF:\x03r\xd2\xac\xb49\xd3\x81\xc8\)F2\xb4g\x95\?8\x8d\xb1:\xb7\xc6\xbd\xea | |
SF:\xd3h\xb9\x96")%r(RTSPRequest,4E,"\xb9_\x86\x04\x10e\x89\x0c\xec\x15\xa | |
SF:3\xae\xdav\xdf\xcf\x99\"\xdc\x88'\xfc\xf8I\xd7t\x02\xa4\x17uJ@ha\x9f\"_ | |
SF:t\xce\xd4\(\xce\x94t\xc4\xa7W6\xcd\x9a\xc3\x98\)F\x7f\$E\xb2\xfbp!\xde7 | |
SF:\|\xbd\xca3H\x19v\xef\xd45\xe2k\x20\x11\x0e")%r(FourOhFourRequest,1A,"H | |
SF:TTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(RPCCheck,36,"b4\$\xb97\x165 | |
SF:\xf7C\xaa\xf9\xff\?\xf5w\xba6\xc3-\xba\xc4\xf9@\xc1\$1\xeczk\x94>\0\x96 | |
SF:l\x95V\x14\xc0\x0c\xeb\xd0\xc7\xf3\r=\(O\x91\x1d\xaa\x93\(yV")%r(DNSVer | |
SF:sionBindReq,6B,"N\xa1zS\xe4\x9d\xee\x0b\xacZ\xf6\x8a\x8f\xf4\xaa\xd0\"\ | |
SF:xa1\xd9\xb9\x86\xe6\xce\xa7\^:#\xa4\x9b68\xfaT>6O\xb3\xe8\xbe/\x1b:\xd8 | |
SF:WX\"\xdf\x9aJ\xb3\xc8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac-z#x\x89&\xdf\ | |
SF:x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\xcb\0q\xee\x0 | |
SF:7\x0c\r\xda\x03\xd8i\x86\xbfd\x85\xf2;\xb0")%r(DNSStatusRequest,68,"\xf | |
SF:e\x92\xfd4\x1c\xd9Q\xae\xd9\x04e\xd9}!dO\x87\xab\x90\x20\x95h\xdd7\xba\ | |
SF:xe2\xec\xe3\xecA\xae<2\xdf\xcc\x14\xaaw!\xe7\xa5Z\xbe\|\xe4YM\x20`QN\xe | |
SF:7l\xed:\xe38I\xe6\x9f\xc4eR\x1b\x10A~W\x1c\xddjS\xe89\x16\x0ftU\x82\x8b | |
SF:\xc01\xae\xc7\xcc\xcd\x9a\xc3\x98\)F\x7f\$E\xb2\xfbp!\xde7\|\xbd\xca3") | |
SF:%r(SSLSessionReq,6F,"\x7f\x94Gml\x16\xca\xe2K\x08\xb2\xb1io\xb3o\[f\xe8 | |
SF:\x07u\x19\x9c\x13\x19\x8d\xd8\xa9d7\x91y\+\xa92\xa7\xae\xf7\x8a!\xec\x9 | |
SF:a98i\xe5\x8f\xf2K\x80\xf1n\x87\x8c\x8dZ\x83X\xe9\x06\?\xe4\x05r\xbb0\xe | |
SF:1\x9e\xf7<}\x8a\xf3\x08\xd96\xaf\x94\xf5\xa2\+\xe0\xd1\xceg\xecm\xbac\x | |
SF:b8\xc9f\x1fD\xe5\xd2\x9b\x90\xc1\xfe\xd7\x9c\]%a\xda\x95\xc1\x7f~\?")%r | |
SF:(Kerberos,60,"\x07\x15\x1b\x13n\xd5\xc1a\xbcj\x0c\x1b\xb0\t2\xe8E:\x9e\ | |
SF:xde\x81m\xdb,iy\x92\xf8\xb6\xecH\xa0\x04\xc9\x85\x826e\x15z~\xa2\xbbIS\ | |
SF:\j\)\x03\xd8i\x86\xbfd\x85\xf2;\xb0a\x1ew\xbc\xfd\ns\x88Y\xb6/\x14u\"\x | |
SF:ab`QN\xe7l\xed:\xe38I\xe6\x9f\xc4eRJ_\x1b\xbc\xc5\x8b\x89!")%r(SMBProgN | |
SF:eg,31,"4q\t\x7f\xed\xad`\x0c\x9b`\xfe\xa3\x0b\x13\\x\x97'\t\xe1o\xbe\xb | |
SF:8\xd1\xd3\xaa\xabd\xfa\xd2\xfd%\x05\xa0\xf2`f\xabu\x1e\xe3\xb5n4o\x9f\n | |
SF:\xd6W"); | |
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows | |
Host script results: | |
| nbstat: | |
| NetBIOS name: JACQUESDETHORN, NetBIOS user: <unknown>, NetBIOS MAC: 14:da:e9:08:18:c0 (Asustek Computer) | |
| Names | |
| JACQUESDETHORN<20> Flags: <unique><active> | |
| JACQUESDETHORN<00> Flags: <unique><active> | |
| ZAKO\x97CIEL<00> Flags: <group><active> | |
| ZAKO\x97CIEL<1e> Flags: <group><active> | |
| ZAKO\x97CIEL<1d> Flags: <unique><active> | |
|_ \x01\x02__MSBROWSE__\x02<01> Flags: <group><active> | |
| smb-os-discovery: | |
| OS: Windows 7 Home Premium 7601 Service Pack 1 (Windows 7 Home Premium 6.1) | |
| OS CPE: cpe:/o:microsoft:windows_7::sp1 | |
| Computer name: JacquesDeThorn | |
| NetBIOS computer name: JACQUESDETHORN | |
| Workgroup: ZAKOZCIEL | |
|_ System time: 2015-04-26T18:31:33+02:00 | |
| smb-security-mode: | |
| Account that was used for smb scripts: guest | |
| User-level authentication | |
| SMB Security: Challenge/response passwords supported | |
|_ Message signing disabled (dangerous, but default) | |
|_smbv2-enabled: Server supports SMBv2 protocol | |
Nmap scan report for 158.75.50.113 | |
Host is up (0.00072s latency). | |
Not shown: 989 closed ports | |
PORT STATE SERVICE VERSION | |
135/tcp open msrpc Microsoft Windows RPC | |
139/tcp open netbios-ssn | |
445/tcp open netbios-ssn | |
1110/tcp filtered nfsd-status | |
1111/tcp open tcpwrapped | |
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 503) | |
|_http-title: Service Unavailable | |
49152/tcp open msrpc Microsoft Windows RPC | |
49153/tcp open msrpc Microsoft Windows RPC | |
49154/tcp open msrpc Microsoft Windows RPC | |
49155/tcp open msrpc Microsoft Windows RPC | |
49156/tcp open msrpc Microsoft Windows RPC | |
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows | |
Host script results: | |
| nbstat: | |
| NetBIOS name: KAZNOV_PC, NetBIOS user: <unknown>, NetBIOS MAC: 8c:89:a5:0f:4d:97 (Micro-Star INT'L CO.) | |
| Names | |
| KAZNOV_PC<00> Flags: <unique><active> | |
| WORKGROUP<00> Flags: <group><active> | |
| KAZNOV_PC<20> Flags: <unique><active> | |
|_ WORKGROUP<1e> Flags: <group><active> | |
| smb-os-discovery: | |
| OS: Windows 8.1 9600 (Windows 8.1 6.3) | |
| NetBIOS computer name: KAZNOV_PC | |
| Workgroup: WORKGROUP | |
|_ System time: 2015-04-26T18:31:28+02:00 | |
| smb-security-mode: | |
| Account that was used for smb scripts: guest | |
| User-level authentication | |
| SMB Security: Challenge/response passwords supported | |
|_ Message signing disabled (dangerous, but default) | |
|_smbv2-enabled: Server supports SMBv2 protocol | |
Nmap scan report for 158.75.50.114 | |
Host is up (0.0011s latency). | |
Not shown: 987 closed ports | |
PORT STATE SERVICE VERSION | |
135/tcp filtered msrpc | |
139/tcp filtered netbios-ssn | |
445/tcp filtered microsoft-ds | |
1110/tcp filtered nfsd-status | |
2869/tcp filtered icslap | |
3389/tcp filtered ms-wbt-server | |
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 503) | |
|_http-title: Service Unavailable | |
19780/tcp filtered unknown | |
49152/tcp open msrpc Microsoft Windows RPC | |
49153/tcp open msrpc Microsoft Windows RPC | |
49154/tcp open msrpc Microsoft Windows RPC | |
49156/tcp open msrpc Microsoft Windows RPC | |
49157/tcp open msrpc Microsoft Windows RPC | |
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows | |
Nmap scan report for 158.75.50.173 | |
Host is up (0.00055s latency). | |
Not shown: 983 closed ports | |
PORT STATE SERVICE VERSION | |
135/tcp filtered msrpc | |
139/tcp filtered netbios-ssn | |
445/tcp filtered microsoft-ds | |
554/tcp open rtsp? | |
1110/tcp filtered nfsd-status | |
2869/tcp filtered icslap | |
3389/tcp filtered ms-wbt-server | |
3390/tcp filtered dsc | |
5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 503) | |
|_http-title: Service Unavailable | |
10243/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) | |
|_http-methods: No Allow or Public header in OPTIONS response (status code 404) | |
|_http-title: Not Found | |
19780/tcp filtered unknown | |
49152/tcp open msrpc Microsoft Windows RPC | |
49153/tcp open msrpc Microsoft Windows RPC | |
49154/tcp open msrpc Microsoft Windows RPC | |
49155/tcp open msrpc Microsoft Windows RPC | |
49156/tcp open msrpc Microsoft Windows RPC | |
49157/tcp open msrpc Microsoft Windows RPC | |
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows | |
Nmap scan report for 158.75.50.193 | |
Host is up (0.00033s latency). | |
Not shown: 997 closed ports | |
PORT STATE SERVICE VERSION | |
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: MPOLO) | |
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: MPOLO) | |
3689/tcp open daap mt-daapd DAAP | |
Host script results: | |
| nbstat: | |
| NetBIOS name: MPOLO, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> | |
| Names | |
| MPOLO<00> Flags: <unique><active> | |
| MPOLO<03> Flags: <unique><active> | |
| MPOLO<20> Flags: <unique><active> | |
| WORKGROUP<00> Flags: <group><active> | |
|_ WORKGROUP<1e> Flags: <group><active> | |
| smb-os-discovery: | |
| OS: Unix (Samba 4.1.6-Ubuntu) | |
| Computer name: mpolo | |
| NetBIOS computer name: MPOLO | |
| Domain name: | |
| FQDN: mpolo | |
|_ System time: 2015-04-26T18:31:13+02:00 | |
| smb-security-mode: | |
| Account that was used for smb scripts: guest | |
| User-level authentication | |
| SMB Security: Challenge/response passwords supported | |
|_ Message signing disabled (dangerous, but default) | |
|_smbv2-enabled: Server supports SMBv2 protocol | |
NSE: Script Post-scanning. | |
Initiating NSE at 18:32 | |
Completed NSE at 18:32, 0.00s elapsed | |
Read data files from: /usr/bin/../share/nmap | |
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |
Nmap done: 256 IP addresses (21 hosts up) scanned in 375.33 seconds |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment