· 5 years ago · Mar 16, 2020, 01:00 PM
1Nmap 7.80 ( https://nmap.org ) at 2020-03-16 13:25 CET
2NSE: Loaded 151 scripts for scanning.
3NSE: Script Pre-scanning.
4Initiating NSE at 13:25
5Completed NSE at 13:25, 0.00s elapsed
6Initiating NSE at 13:25
7Completed NSE at 13:25, 0.00s elapsed
8Initiating NSE at 13:25
9Completed NSE at 13:25, 0.00s elapsed
10Initiating Ping Scan at 13:25
11Scanning 254 hosts [2 ports/host]
12Completed Ping Scan at 13:25, 11.06s elapsed (254 total hosts)
13Initiating Parallel DNS resolution of 254 hosts. at 13:25
14Completed Parallel DNS resolution of 254 hosts. at 13:25, 0.07s elapsed
15Nmap scan report for 192.168.1.3 [host down]
16Nmap scan report for 192.168.1.4 [host down]
17Nmap scan report for 192.168.1.5 [host down]
18Nmap scan report for 192.168.1.6 [host down]
19Nmap scan report for 192.168.1.7 [host down]
20Nmap scan report for 192.168.1.8 [host down]
21Nmap scan report for 192.168.1.9 [host down]
22Nmap scan report for 192.168.1.10 [host down]
23Nmap scan report for 192.168.1.11 [host down]
24Nmap scan report for 192.168.1.12 [host down]
25Nmap scan report for 192.168.1.13 [host down]
26Nmap scan report for 192.168.1.14 [host down]
27Nmap scan report for 192.168.1.15 [host down]
28Nmap scan report for 192.168.1.16 [host down]
29Nmap scan report for 192.168.1.17 [host down]
30Nmap scan report for 192.168.1.18 [host down]
31Nmap scan report for 192.168.1.19 [host down] Nmap scan report for 192.168.1.20 [host down]
32Nmap scan report for 192.168.1.21 [host down]
33Nmap scan report for 192.168.1.22 [host down]
34Nmap scan report for 192.168.1.23 [host down]
35Nmap scan report for 192.168.1.24 [host down]
36Nmap scan report for 192.168.1.25 [host down]
37Nmap scan report for 192.168.1.26 [host down]
38Nmap scan report for 192.168.1.27 [host down]
39Nmap scan report for 192.168.1.28 [host down]
40Nmap scan report for 192.168.1.29 [host down]
41Nmap scan report for 192.168.1.30 [host down]
42Nmap scan report for 192.168.1.31 [host down]
43Nmap scan report for 192.168.1.32 [host down]
44Nmap scan report for 192.168.1.33 [host down]
45Nmap scan report for 192.168.1.34 [host down]
46Nmap scan report for 192.168.1.35 [host down]
47Nmap scan report for 192.168.1.36 [host down]
48Nmap scan report for 192.168.1.37 [host down]
49Nmap scan report for 192.168.1.38 [host down]
50Nmap scan report for 192.168.1.40 [host down]
51Nmap scan report for 192.168.1.41 [host down]
52Nmap scan report for 192.168.1.42 [host down]
53Nmap scan report for 192.168.1.43 [host down]
54Nmap scan report for 192.168.1.44 [host down]
55Nmap scan report for 192.168.1.45 [host down]
56Nmap scan report for 192.168.1.46 [host down]
57Nmap scan report for 192.168.1.47 [host down]
58Nmap scan report for 192.168.1.48 [host down]
59Nmap scan report for 192.168.1.49 [host down]
60Nmap scan report for 192.168.1.50 [host down]
61Nmap scan report for 192.168.1.51 [host down]
62Nmap scan report for 192.168.1.52 [host down]
63Nmap scan report for 192.168.1.53 [host down]
64Nmap scan report for 192.168.1.54 [host down]
65Nmap scan report for 192.168.1.55 [host down]
66Nmap scan report for 192.168.1.56 [host down]
67Nmap scan report for 192.168.1.57 [host down]
68Nmap scan report for 192.168.1.58 [host down]
69Nmap scan report for 192.168.1.59 [host down]
70Nmap scan report for 192.168.1.60 [host down]
71Nmap scan report for 192.168.1.61 [host down]
72Nmap scan report for 192.168.1.62 [host down]
73Nmap scan report for 192.168.1.63 [host down]
74Nmap scan report for 192.168.1.64 [host down]
75Nmap scan report for 192.168.1.65 [host down]
76Nmap scan report for 192.168.1.66 [host down]
77Nmap scan report for 192.168.1.67 [host down]
78Nmap scan report for 192.168.1.68 [host down]
79Nmap scan report for 192.168.1.69 [host down]
80Nmap scan report for 192.168.1.70 [host down]
81Nmap scan report for 192.168.1.71 [host down]
82Nmap scan report for 192.168.1.72 [host down]
83Nmap scan report for 192.168.1.73 [host down]
84Nmap scan report for 192.168.1.74 [host down]
85Nmap scan report for 192.168.1.75 [host down]
86Nmap scan report for 192.168.1.76 [host down]
87Nmap scan report for 192.168.1.77 [host down]
88Nmap scan report for 192.168.1.78 [host down]
89Nmap scan report for 192.168.1.79 [host down]
90Nmap scan report for 192.168.1.81 [host down]
91Nmap scan report for 192.168.1.82 [host down]
92Nmap scan report for 192.168.1.83 [host down]
93Nmap scan report for 192.168.1.84 [host down]
94Nmap scan report for 192.168.1.85 [host down]
95Nmap scan report for 192.168.1.86 [host down]
96Nmap scan report for 192.168.1.87 [host down]
97Nmap scan report for 192.168.1.88 [host down]
98Nmap scan report for 192.168.1.89 [host down]
99Nmap scan report for 192.168.1.90 [host down]
100Nmap scan report for 192.168.1.91 [host down]
101Nmap scan report for 192.168.1.92 [host down]
102Nmap scan report for 192.168.1.93 [host down]
103Nmap scan report for 192.168.1.94 [host down]
104Nmap scan report for 192.168.1.95 [host down]
105Nmap scan report for 192.168.1.96 [host down]
106Nmap scan report for 192.168.1.97 [host down]
107Nmap scan report for 192.168.1.98 [host down]
108Nmap scan report for 192.168.1.99 [host down]
109Nmap scan report for 192.168.1.100 [host down]
110Nmap scan report for 192.168.1.101 [host down]
111Nmap scan report for 192.168.1.102 [host down]
112Nmap scan report for 192.168.1.104 [host down]
113Nmap scan report for 192.168.1.105 [host down]
114Nmap scan report for 192.168.1.106 [host down]
115Nmap scan report for 192.168.1.107 [host down]
116Nmap scan report for 192.168.1.108 [host down]
117Nmap scan report for 192.168.1.109 [host down]
118Nmap scan report for 192.168.1.110 [host down]
119Nmap scan report for 192.168.1.111 [host down]
120Nmap scan report for 192.168.1.112 [host down]
121Nmap scan report for 192.168.1.113 [host down]
122Nmap scan report for 192.168.1.114 [host down]
123Nmap scan report for 192.168.1.115 [host down]
124Nmap scan report for 192.168.1.116 [host down]
125Nmap scan report for 192.168.1.117 [host down]
126Nmap scan report for 192.168.1.118 [host down]
127Nmap scan report for 192.168.1.119 [host down]
128Nmap scan report for 192.168.1.120 [host down]
129Nmap scan report for 192.168.1.121 [host down]
130Nmap scan report for 192.168.1.122 [host down]
131Nmap scan report for 192.168.1.123 [host down]
132Nmap scan report for 192.168.1.124 [host down]
133Nmap scan report for 192.168.1.125 [host down]
134Nmap scan report for 192.168.1.126 [host down]
135Nmap scan report for 192.168.1.127 [host down]
136Nmap scan report for 192.168.1.128 [host down]
137Nmap scan report for 192.168.1.129 [host down]
138Nmap scan report for 192.168.1.130 [host down]
139Nmap scan report for 192.168.1.131 [host down]
140Nmap scan report for 192.168.1.132 [host down]
141Nmap scan report for 192.168.1.133 [host down]
142Nmap scan report for 192.168.1.134 [host down]
143Nmap scan report for 192.168.1.135 [host down]
144Nmap scan report for 192.168.1.136 [host down]
145Nmap scan report for 192.168.1.137 [host down]
146Nmap scan report for 192.168.1.138 [host down]
147Nmap scan report for 192.168.1.139 [host down]
148Nmap scan report for 192.168.1.140 [host down]
149Nmap scan report for 192.168.1.141 [host down]
150Nmap scan report for 192.168.1.142 [host down]
151Nmap scan report for 192.168.1.143 [host down]
152Nmap scan report for 192.168.1.144 [host down]
153Nmap scan report for 192.168.1.145 [host down]
154Nmap scan report for 192.168.1.146 [host down]
155Nmap scan report for 192.168.1.147 [host down]
156Nmap scan report for 192.168.1.148 [host down]
157Nmap scan report for 192.168.1.149 [host down]
158Nmap scan report for 192.168.1.150 [host down]
159Nmap scan report for 192.168.1.151 [host down]
160Nmap scan report for 192.168.1.152 [host down]
161Nmap scan report for 192.168.1.153 [host down]
162Nmap scan report for 192.168.1.154 [host down]
163Nmap scan report for 192.168.1.155 [host down]
164Nmap scan report for 192.168.1.156 [host down]
165Nmap scan report for 192.168.1.157 [host down]
166Nmap scan report for 192.168.1.158 [host down]
167Nmap scan report for 192.168.1.159 [host down]
168Nmap scan report for 192.168.1.160 [host down]
169Nmap scan report for 192.168.1.161 [host down]
170Nmap scan report for 192.168.1.162 [host down]
171Nmap scan report for 192.168.1.163 [host down]
172Nmap scan report for 192.168.1.164 [host down]
173Nmap scan report for 192.168.1.165 [host down]
174Nmap scan report for 192.168.1.166 [host down]
175Nmap scan report for 192.168.1.167 [host down]
176Nmap scan report for 192.168.1.168 [host down]
177Nmap scan report for 192.168.1.169 [host down]
178Nmap scan report for 192.168.1.170 [host down]
179Nmap scan report for 192.168.1.171 [host down]
180Nmap scan report for 192.168.1.172 [host down]
181Nmap scan report for 192.168.1.173 [host down]
182Nmap scan report for 192.168.1.174 [host down]
183Nmap scan report for 192.168.1.175 [host down]
184Nmap scan report for 192.168.1.176 [host down]
185Nmap scan report for 192.168.1.177 [host down]
186Nmap scan report for 192.168.1.178 [host down]
187Nmap scan report for 192.168.1.179 [host down]
188Nmap scan report for 192.168.1.181 [host down]
189Nmap scan report for 192.168.1.182 [host down]
190Nmap scan report for 192.168.1.183 [host down]
191Nmap scan report for 192.168.1.184 [host down]
192Nmap scan report for 192.168.1.185 [host down]
193Nmap scan report for 192.168.1.186 [host down]
194Nmap scan report for 192.168.1.187 [host down]
195Nmap scan report for 192.168.1.188 [host down]
196Nmap scan report for 192.168.1.189 [host down]
197Nmap scan report for 192.168.1.190 [host down]
198Nmap scan report for 192.168.1.191 [host down]
199Nmap scan report for 192.168.1.192 [host down]
200Nmap scan report for 192.168.1.193 [host down]
201Nmap scan report for 192.168.1.194 [host down]
202Nmap scan report for 192.168.1.195 [host down]
203Nmap scan report for 192.168.1.196 [host down]
204Nmap scan report for 192.168.1.197 [host down]
205Nmap scan report for 192.168.1.200 [host down]
206Nmap scan report for 192.168.1.201 [host down]
207Nmap scan report for 192.168.1.202 [host down]
208Nmap scan report for 192.168.1.203 [host down]
209Nmap scan report for 192.168.1.204 [host down]
210Nmap scan report for 192.168.1.205 [host down]
211Nmap scan report for 192.168.1.206 [host down]
212Nmap scan report for 192.168.1.207 [host down]
213Nmap scan report for 192.168.1.208 [host down]
214Nmap scan report for 192.168.1.209 [host down]
215Nmap scan report for 192.168.1.210 [host down]
216Nmap scan report for 192.168.1.211 [host down]
217Nmap scan report for 192.168.1.212 [host down]
218Nmap scan report for 192.168.1.213 [host down]
219Nmap scan report for 192.168.1.214 [host down]
220Nmap scan report for 192.168.1.215 [host down]
221Nmap scan report for 192.168.1.216 [host down]
222Nmap scan report for 192.168.1.217 [host down]
223Nmap scan report for 192.168.1.218 [host down]
224Nmap scan report for 192.168.1.219 [host down]
225Nmap scan report for 192.168.1.220 [host down]
226Nmap scan report for 192.168.1.221 [host down]
227Nmap scan report for 192.168.1.222 [host down]
228Nmap scan report for 192.168.1.223 [host down]
229Nmap scan report for 192.168.1.224 [host down]
230Nmap scan report for 192.168.1.225 [host down]
231Nmap scan report for 192.168.1.226 [host down]
232Nmap scan report for 192.168.1.227 [host down]
233Nmap scan report for 192.168.1.228 [host down]
234Nmap scan report for 192.168.1.229 [host down]
235Nmap scan report for 192.168.1.230 [host down]
236Nmap scan report for 192.168.1.231 [host down]
237Nmap scan report for 192.168.1.232 [host down]
238Nmap scan report for 192.168.1.233 [host down]
239Nmap scan report for 192.168.1.234 [host down]
240Nmap scan report for 192.168.1.235 [host down]
241Nmap scan report for 192.168.1.236 [host down]
242Nmap scan report for 192.168.1.237 [host down]
243Nmap scan report for 192.168.1.238 [host down]
244Nmap scan report for 192.168.1.239 [host down]
245Nmap scan report for 192.168.1.240 [host down]
246Nmap scan report for 192.168.1.241 [host down]
247Nmap scan report for 192.168.1.242 [host down]
248Nmap scan report for 192.168.1.243 [host down]
249Nmap scan report for 192.168.1.244 [host down]
250Nmap scan report for 192.168.1.245 [host down]
251Nmap scan report for 192.168.1.246 [host down]
252Nmap scan report for 192.168.1.247 [host down]
253Nmap scan report for 192.168.1.248 [host down]
254Nmap scan report for 192.168.1.249 [host down]
255Nmap scan report for 192.168.1.250 [host down]
256Nmap scan report for 192.168.1.251 [host down]
257Nmap scan report for 192.168.1.252 [host down]
258Nmap scan report for 192.168.1.253 [host down]
259Nmap scan report for 192.168.1.254 [host down]
260Initiating Connect Scan at 13:25
261Scanning 8 hosts [1000 ports/host]
262Discovered open port 23/tcp on 192.168.1.103
263Discovered open port 443/tcp on 192.168.1.1
264Discovered open port 554/tcp on 192.168.1.103
265Discovered open port 139/tcp on 192.168.1.199
266Discovered open port 8080/tcp on 192.168.1.199
267Discovered open port 53/tcp on 192.168.1.1
268Discovered open port 5900/tcp on 192.168.1.199
269Discovered open port 111/tcp on 192.168.1.199
270Discovered open port 80/tcp on 192.168.1.1
271Discovered open port 445/tcp on 192.168.1.199
272Discovered open port 80/tcp on 192.168.1.103
273Completed Connect Scan against 192.168.1.39 in 2.09s (7 hosts left)
274Increasing send delay for 192.168.1.2 from 0 to 5 due to 23 out of 57 dropped probes since last increase.
275Increasing send delay for 192.168.1.80 from 0 to 5 due to 22 out of 54 dropped probes since last increase.
276Increasing send delay for 192.168.1.1 from 0 to 5 due to 24 out of 59 dropped probes since last increase.
277Increasing send delay for 192.168.1.180 from 0 to 5 due to 23 out of 56 dropped probes since last increase.
278Discovered open port 5432/tcp on 192.168.1.199
279Discovered open port 80/tcp on 192.168.1.198
280Discovered open port 2222/tcp on 192.168.1.199
281Discovered open port 3800/tcp on 192.168.1.103
282Discovered open port 6789/tcp on 192.168.1.103
283Completed Connect Scan against 192.168.1.103 in 38.48s (6 hosts left)
284Completed Connect Scan against 192.168.1.199 in 40.01s (5 hosts left)
285Completed Connect Scan against 192.168.1.180 in 48.21s (4 hosts left)
286Completed Connect Scan against 192.168.1.1 in 49.84s (3 hosts left)
287Completed Connect Scan against 192.168.1.2 in 50.05s (2 hosts left)
288Completed Connect Scan against 192.168.1.80 in 50.56s (1 host left)
289Completed Connect Scan at 13:26, 51.17s elapsed (8000 total ports)
290Initiating Service scan at 13:26
291Scanning 16 services on 8 hosts
292Service scan Timing: About 81.25% done; ETC: 13:29 (0:00:36 remaining)
293Completed Service scan at 13:29, 178.91s elapsed (16 services on 8 hosts)
294NSE: Script scanning 8 hosts.
295Initiating NSE at 13:29
296Completed NSE at 13:31, 86.97s elapsed
297Initiating NSE at 13:31
298Completed NSE at 13:31, 2.95s elapsed
299Initiating NSE at 13:31
300Completed NSE at 13:31, 0.02s elapsed
301Nmap scan report for 192.168.1.1
302Host is up (0.068s latency).
303Not shown: 997 closed ports
304PORT STATE SERVICE VERSION
30553/tcp open domain?
30680/tcp open http ADB Broadband HTTP Server
307| fingerprint-strings:
308| FourOhFourRequest:
309| HTTP/1.0 505 HTTP Version Not Supported
310| Date: Mon, 16 Mar 2020 12:27:12 UTC
311| Server: ADB Broadband HTTP Server
312| X-Frame-Options: DENY
313| Connection: close
314| Content-Language: en
315| Content-Type: text/html
316| Content-Length: 432
317| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
318| <html>
319| <head>
320| <title>505 HTTP Version Not Supported</title>
321| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
322| </head>
323| <body>
324| <h1>505 HTTP Version Not Supported</h1>
325| HTTP Version Not Supported
326| <hr>
327| <br>ADB Broadband HTTP Server<br>protocol: HTTP<br>ipv4 192.168.1.1 port 80<br><br>connected peer 192.168.1.39 port 36472<br>
328| </body>
329| </html>
330| GetRequest:
331| HTTP/1.0 505 HTTP Version Not Supported
332| Date: Mon, 16 Mar 2020 12:26:52 UTC
333| Server: ADB Broadband HTTP Server
334| X-Frame-Options: DENY
335| Connection: close
336| Content-Language: en
337| Content-Type: text/html
338| Content-Length: 432
339| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
340| <html>
341| <head>
342| <title>505 HTTP Version Not Supported</title>
343| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
344| </head>
345| <body>
346| <h1>505 HTTP Version Not Supported</h1>
347| HTTP Version Not Supported
348| <hr>
349| <br>ADB Broadband HTTP Server<br>protocol: HTTP<br>ipv4 192.168.1.1 port 80<br><br>connected peer 192.168.1.39 port 36402<br>
350| </body>
351|_ </html>
352|_http-favicon: Unknown favicon MD5: 891B49BFCF85440A998A204EFE7E64BA
353| http-methods:
354|_ Supported Methods: GET POST
355|_http-server-header: ADB Broadband HTTP Server
356|_http-title: Site doesn't have a title (text/html).
357|_http-trane-info: Problem with XML parsing of /evox/about
358443/tcp open ssl/https ADB Broadband HTTP Server
359| fingerprint-strings:
360| FourOhFourRequest:
361| HTTP/1.0 505 HTTP Version Not Supported
362| Date: Mon, 16 Mar 2020 12:27:10 UTC
363| Server: ADB Broadband HTTP Server
364| X-Frame-Options: DENY
365| Connection: close
366| Content-Language: en
367| Content-Type: text/html
368| Content-Length: 434
369| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
370| <html>
371| <head>
372| <title>505 HTTP Version Not Supported</title>
373| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
374| </head>
375| <body>
376| <h1>505 HTTP Version Not Supported</h1>
377| HTTP Version Not Supported
378| <hr>
379| <br>ADB Broadband HTTP Server<br>protocol: HTTPS<br>ipv4 192.168.1.1 port 443<br><br>connected peer 192.168.1.39 port 34878<br>
380| </body>
381| </html>
382| GetRequest:
383| HTTP/1.0 505 HTTP Version Not Supported
384| Date: Mon, 16 Mar 2020 12:26:59 UTC
385| Server: ADB Broadband HTTP Server
386| X-Frame-Options: DENY
387| Connection: close
388| Content-Language: en
389| Content-Type: text/html
390| Content-Length: 434
391| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
392| <html>
393| <head>
394| <title>505 HTTP Version Not Supported</title>
395| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
396| </head>
397| <body>
398| <h1>505 HTTP Version Not Supported</h1>
399| HTTP Version Not Supported
400| <hr>
401| <br>ADB Broadband HTTP Server<br>protocol: HTTPS<br>ipv4 192.168.1.1 port 443<br><br>connected peer 192.168.1.39 port 34842<br>
402| </body>
403|_ </html>
404|_http-favicon: Unknown favicon MD5: 891B49BFCF85440A998A204EFE7E64BA
405| http-methods:
406|_ Supported Methods: GET POST
407|_http-server-header: ADB Broadband HTTP Server
408|_http-title: Site doesn't have a title (text/html).
409|_http-trane-info: Problem with XML parsing of /evox/about
410| ssl-cert: Subject: commonName=192.168.1.1/organizationName=ADB Broadband S.p.A./stateOrProvinceName=Italy/countryName=IT
411| Issuer: commonName=192.168.1.1/organizationName=ADB Broadband S.p.A./stateOrProvinceName=Italy/countryName=IT
412| Public Key type: rsa
413| Public Key bits: 1024
414| Signature Algorithm: sha1WithRSAEncryption
415| Not valid before: 2011-10-17T16:22:37
416| Not valid after: 2016-10-15T16:22:37
417| MD5: db58 8fcd 893b 987e b8cd f85f 5bcb ff34
418|_SHA-1: dbb4 2b08 c5fb 2d30 f3de 4351 9128 efbc be25 1651
419|_ssl-date: 2020-03-16T12:31:12+00:00; 0s from scanner time.
4202 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
421==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
422SF-Port80-TCP:V=7.80%I=7%D=3/16%Time=5E6F7090%P=aarch64-unknown-linux-andr
423SF:oid%r(GetRequest,291,"HTTP/1\.0\x20505\x20HTTP\x20Version\x20Not\x20Sup
424SF:ported\r\nDate:\x20Mon,\x2016\x20Mar\x202020\x2012:26:52\x20UTC\r\nServ
425SF:er:\x20ADB\x20Broadband\x20HTTP\x20Server\r\nX-Frame-Options:\x20DENY\r
426SF:\nConnection:\x20close\r\nContent-Language:\x20en\r\nContent-Type:\x20t
427SF:ext/html\r\nContent-Length:\x20432\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x
428SF:20\"-//W3C//DTD\x20HTML\x204\.01\x20Transitional//EN\">\n<html>\n<head>
429SF:\n<title>505\x20HTTP\x20Version\x20Not\x20Supported</title>\n<meta\x20h
430SF:ttp-equiv=\"content-type\"\x20content=\"text/html;\x20charset=iso-8859-
431SF:1\">\n</head>\n<body>\n\n<h1>505\x20HTTP\x20Version\x20Not\x20Supported
432SF:</h1>\n505\x20HTTP\x20Version\x20Not\x20Supported\n<hr>\n<br>ADB\x20Bro
433SF:adband\x20HTTP\x20Server<br>protocol:\x20HTTP<br>ipv4\x20192\.168\.1\.1
434SF:\x20port\x2080<br><br>connected\x20peer\x20192\.168\.1\.39\x20port\x203
435SF:6402<br>\n</body>\n</html>\r\n")%r(FourOhFourRequest,291,"HTTP/1\.0\x20
436SF:505\x20HTTP\x20Version\x20Not\x20Supported\r\nDate:\x20Mon,\x2016\x20Ma
437SF:r\x202020\x2012:27:12\x20UTC\r\nServer:\x20ADB\x20Broadband\x20HTTP\x20
438SF:Server\r\nX-Frame-Options:\x20DENY\r\nConnection:\x20close\r\nContent-L
439SF:anguage:\x20en\r\nContent-Type:\x20text/html\r\nContent-Length:\x20432\
440SF:r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x2
441SF:0Transitional//EN\">\n<html>\n<head>\n<title>505\x20HTTP\x20Version\x20
442SF:Not\x20Supported</title>\n<meta\x20http-equiv=\"content-type\"\x20conte
443SF:nt=\"text/html;\x20charset=iso-8859-1\">\n</head>\n<body>\n\n<h1>505\x2
444SF:0HTTP\x20Version\x20Not\x20Supported</h1>\n505\x20HTTP\x20Version\x20No
445SF:t\x20Supported\n<hr>\n<br>ADB\x20Broadband\x20HTTP\x20Server<br>protoco
446SF:l:\x20HTTP<br>ipv4\x20192\.168\.1\.1\x20port\x2080<br><br>connected\x20
447SF:peer\x20192\.168\.1\.39\x20port\x2036472<br>\n</body>\n</html>\r\n");
448==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
449SF-Port443-TCP:V=7.80%T=SSL%I=7%D=3/16%Time=5E6F7097%P=aarch64-unknown-lin
450SF:ux-android%r(GetRequest,293,"HTTP/1\.0\x20505\x20HTTP\x20Version\x20Not
451SF:\x20Supported\r\nDate:\x20Mon,\x2016\x20Mar\x202020\x2012:26:59\x20UTC\
452SF:r\nServer:\x20ADB\x20Broadband\x20HTTP\x20Server\r\nX-Frame-Options:\x2
453SF:0DENY\r\nConnection:\x20close\r\nContent-Language:\x20en\r\nContent-Typ
454SF:e:\x20text/html\r\nContent-Length:\x20434\r\n\r\n<!DOCTYPE\x20HTML\x20P
455SF:UBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20Transitional//EN\">\n<html>\
456SF:n<head>\n<title>505\x20HTTP\x20Version\x20Not\x20Supported</title>\n<me
457SF:ta\x20http-equiv=\"content-type\"\x20content=\"text/html;\x20charset=is
458SF:o-8859-1\">\n</head>\n<body>\n\n<h1>505\x20HTTP\x20Version\x20Not\x20Su
459SF:pported</h1>\n505\x20HTTP\x20Version\x20Not\x20Supported\n<hr>\n<br>ADB
460SF:\x20Broadband\x20HTTP\x20Server<br>protocol:\x20HTTPS<br>ipv4\x20192\.1
461SF:68\.1\.1\x20port\x20443<br><br>connected\x20peer\x20192\.168\.1\.39\x20
462SF:port\x2034842<br>\n</body>\n</html>\r\n")%r(FourOhFourRequest,293,"HTTP
463SF:/1\.0\x20505\x20HTTP\x20Version\x20Not\x20Supported\r\nDate:\x20Mon,\x2
464SF:016\x20Mar\x202020\x2012:27:10\x20UTC\r\nServer:\x20ADB\x20Broadband\x2
465SF:0HTTP\x20Server\r\nX-Frame-Options:\x20DENY\r\nConnection:\x20close\r\n
466SF:Content-Language:\x20en\r\nContent-Type:\x20text/html\r\nContent-Length
467SF::\x20434\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x2
468SF:04\.01\x20Transitional//EN\">\n<html>\n<head>\n<title>505\x20HTTP\x20Ve
469SF:rsion\x20Not\x20Supported</title>\n<meta\x20http-equiv=\"content-type\"
470SF:\x20content=\"text/html;\x20charset=iso-8859-1\">\n</head>\n<body>\n\n<
471SF:h1>505\x20HTTP\x20Version\x20Not\x20Supported</h1>\n505\x20HTTP\x20Vers
472SF:ion\x20Not\x20Supported\n<hr>\n<br>ADB\x20Broadband\x20HTTP\x20Server<b
473SF:r>protocol:\x20HTTPS<br>ipv4\x20192\.168\.1\.1\x20port\x20443<br><br>co
474SF:nnected\x20peer\x20192\.168\.1\.39\x20port\x2034878<br>\n</body>\n</htm
475SF:l>\r\n");
476
477Nmap scan report for 192.168.1.2
478Host is up (0.077s latency).
479All 1000 scanned ports on 192.168.1.2 are closed
480
481Nmap scan report for 192.168.1.39
482Host is up (0.0071s latency).
483All 1000 scanned ports on 192.168.1.39 are closed
484
485Nmap scan report for 192.168.1.80
486Host is up (0.057s latency).
487All 1000 scanned ports on 192.168.1.80 are closed
488
489Nmap scan report for 192.168.1.103
490Host is up (0.064s latency).
491Not shown: 995 closed ports
492PORT STATE SERVICE VERSION
49323/tcp open telnet BusyBox telnetd
49480/tcp open http
495| fingerprint-strings:
496| GetRequest:
497| HTTP/1.1 200 OK
498| Date: Thu, 02 Dec 2010 15:05:55 UTC
499| Content-Type: text/html
500| Content-Length: 58028
501|_ Connection: Close
502554/tcp open rtsp?
5033800/tcp open pwgpsi?
5046789/tcp open ibm-db2-admin?
505| fingerprint-strings:
506| JavaRMI:
507| /var/Challenge: ../../Src/Http/DH_HTTP.cpp: 831: virtual CompLib::RET_CODE CompLib::HTTPRequest::parseHead(const std::string&): Assertion `end != std::string::npos' failed.
508| :20:00|trace libkeyboard.a::KeepAlive ff a 0 0!
509| libkeyboard.a::KeepAlive ff a 0 0!
510| LIBDVR_MSG : 2020-3-16, weekday:1 time:13:20:22
511| libkeyboard.a::KeepAlive ff a 0 0!
512| CNetWorkService::onConnTimer-----------------
513| 13:20:45|trace libkeyboard.a::KeepAlive ff a 0 0!
514| CVFDCommandTimeLed::setParam>>13:21:0
515| 13:21:00|trace libkeyboard.a::KeepAlive ff a 0 0!
516| libkeyboard.a::KeepAlive ff a 0 0!
517| LIBDVR_MSG : 2020-3-16, weekday:1 time:13:21:22
518| libkeyboard.a::KeepAlive ff a 0 0!
519| DHFS: save_pdp, 0.3 -- 252415 clus
520| CNetWorkService::onConnTimer-----------------
521| 13:21:45|trace libkeyboard.a::KeepAlive ff a 0 0!
522| tracepoint: IntelCfgMag.cpp, 310.
523| Libstcap.a >> SlaveTimeCheck_Thread, ChipId=0,Times=264
524|_ Libstcap.a >> SlaveTimeCheck_Thread, C
5252 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
526==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
527SF-Port80-TCP:V=7.80%I=7%D=3/16%Time=5E6F708C%P=aarch64-unknown-linux-andr
528SF:oid%r(GetRequest,7B,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Thu,\x2002\x20D
529SF:ec\x202010\x2015:05:55\x20UTC\r\nContent-Type:\x20text/html\r\nContent-
530SF:Length:\x2058028\r\nConnection:\x20Close\r\n\r\n");
531==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
532SF-Port6789-TCP:V=7.80%I=7%D=3/16%Time=5E6F7090%P=aarch64-unknown-linux-an
533SF:droid%r(JavaRMI,AF5,"/var/Challenge:\x20\.\./\.\./Src/Http/DH_HTTP\.cpp
534SF::\x20831:\x20virtual\x20CompLib::RET_CODE\x20CompLib::HTTPRequest::pars
535SF:eHead\(const\x20std::string&\):\x20Assertion\x20`end\x20!=\x20std::stri
536SF:ng::npos'\x20failed\.\n:20:00\|trace\x20libkeyboard\.a::KeepAlive\x20ff
537SF:\x20a\x200\x200!\nlibkeyboard\.a::KeepAlive\x20ff\x20a\x200\x200!\nLIBD
538SF:VR_MSG\x20:\x202020-3-16,\x20weekday:1\x20time:13:20:22\nlibkeyboard\.a
539SF:::KeepAlive\x20ff\x20a\x200\x200!\nCNetWorkService::onConnTimer--------
540SF:---------\n13:20:45\|trace\x20libkeyboard\.a::KeepAlive\x20ff\x20a\x200
541SF:\x200!\nCVFDCommandTimeLed::setParam>>13:21:0\n13:21:00\|trace\x20libke
542SF:yboard\.a::KeepAlive\x20ff\x20a\x200\x200!\nlibkeyboard\.a::KeepAlive\x
543SF:20ff\x20a\x200\x200!\nLIBDVR_MSG\x20:\x202020-3-16,\x20weekday:1\x20tim
544SF:e:13:21:22\nlibkeyboard\.a::KeepAlive\x20ff\x20a\x200\x200!\nDHFS:\x20s
545SF:ave_pdp,\x200\.3\x20--\x20252415\x20clus\nCNetWorkService::onConnTimer-
546SF:----------------\n13:21:45\|trace\x20libkeyboard\.a::KeepAlive\x20ff\x2
547SF:0a\x200\x200!\ntracepoint:\x20IntelCfgMag\.cpp,\x20310\.\nLibstcap\.a\x
548SF:20>>\x20SlaveTimeCheck_Thread,\x20ChipId=0,Times=264\nLibstcap\.a\x20>>
549SF:\x20SlaveTimeCheck_Thread,\x20C");
550
551Nmap scan report for 192.168.1.180
552Host is up (0.072s latency).
553All 1000 scanned ports on 192.168.1.180 are closed
554
555Nmap scan report for 192.168.1.198
556Host is up (0.067s latency).
557Not shown: 999 filtered ports
558PORT STATE SERVICE VERSION
55980/tcp open http nginx 1.14.0 (Ubuntu)
560| http-methods:
561|_ Supported Methods: GET HEAD OPTIONS
562|_http-server-header: nginx/1.14.0 (Ubuntu)
563| http-title: Prihl\xC3\xA1senie | FT5000 Admin
564|_Requested resource was /admin/login/?next=/admin/
565Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
566
567Nmap scan report for 192.168.1.199
568Host is up (0.069s latency).
569Not shown: 993 closed ports
570PORT STATE SERVICE VERSION
571111/tcp open rpcbind 2-4 (RPC #100000)
572| rpcinfo:
573| program version port/proto service
574| 100000 2,3,4 111/tcp rpcbind
575| 100000 2,3,4 111/udp rpcbind
576| 100000 3,4 111/tcp6 rpcbind
577| 100000 3,4 111/udp6 rpcbind
578| 100024 1 50609/tcp status
579| 100024 1 53577/tcp6 status
580| 100024 1 54537/udp6 status
581|_ 100024 1 59172/udp status
582139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
583445/tcp open netbios-ssn Samba smbd 4.2.14-Debian (workgroup: WORKGROUP)
5842222/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u3 (protocol 2.0)
585| ssh-hostkey:
586| 1024 fa:67:83:46:ad:08:54:e2:a2:9a:3b:7a:32:f2:77:ba (DSA)
587| 2048 25:20:d0:70:0f:9d:68:ba:c6:e5:12:af:34:da:26:c5 (RSA)
588| 256 8b:05:3e:57:e9:41:39:65:70:ac:3f:e1:6d:24:b9:14 (ECDSA)
589|_ 256 d7:9d:f4:e6:73:b4:b6:48:1a:4d:61:da:e8:b5:ad:7d (ED25519)
5905432/tcp open postgresql PostgreSQL DB 9.4.13 - 9.4.15
591| ssl-cert: Subject: commonName=titan
592| Issuer: commonName=titan
593| Public Key type: rsa
594| Public Key bits: 2048
595| Signature Algorithm: sha256WithRSAEncryption
596| Not valid before: 2015-07-24T07:49:25
597| Not valid after: 2025-07-21T07:49:25
598| MD5: bbc1 fe93 c9a7 0957 d61c 9dd9 ee6f c4ec
599|_SHA-1: 8ca3 d090 5a1e a034 0676 3942 3422 0fe7 5846 bdd4
600|_ssl-date: TLS randomness does not represent time
6015900/tcp open vnc VNC (protocol 3.8)
602|_ssl-cert: ERROR: Script execution failed (use -d to debug)
603|_ssl-date: ERROR: Script execution failed (use -d to debug)
604|_sslv2: ERROR: Script execution failed (use -d to debug)
605|_tls-alpn: ERROR: Script execution failed (use -d to debug)
606|_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug)
607|_vnc-info: ERROR: Script execution failed (use -d to debug)
6088080/tcp open http lighttpd 1.4.35
609| http-methods:
610|_ Supported Methods: GET HEAD POST OPTIONS
611|_http-server-header: lighttpd/1.4.35
612| http-title: Publix - Informa\xC3\x84\xC2\x8Dn\xC3\x83\xC2\xBD port\xC3\x83\xC2\xA1l \xC3\x84\xC2\x8CS
613|_Requested resource was login.pl?err=3
614Service Info: Host: TITAN; OS: Linux; CPE: cpe:/o:linux:linux_kernel
615
616Host script results:
617|_clock-skew: mean: -19m58s, deviation: 34m37s, median: 0s
618| nbstat: NetBIOS name: TITAN, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
619| Names:
620| TITAN<00> Flags: <unique><active>
621| TITAN<03> Flags: <unique><active>
622| TITAN<20> Flags: <unique><active>
623| \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
624| WORKGROUP<00> Flags: <group><active>
625| WORKGROUP<1d> Flags: <unique><active>
626|_ WORKGROUP<1e> Flags: <group><active>
627| smb-os-discovery:
628| OS: Windows 6.1 (Samba 4.2.14-Debian)
629| Computer name: titan
630| NetBIOS computer name: TITAN\x00
631| Domain name: \x00
632| FQDN: titan
633|_ System time: 2020-03-16T13:29:46+01:00
634| smb-security-mode:
635| account_used: guest
636| authentication_level: user
637| challenge_response: supported
638|_ message_signing: disabled (dangerous, but default)
639| smb2-security-mode:
640| 2.02:
641|_ Message signing enabled but not required
642| smb2-time:
643| date: 2020-03-16T12:29:51
644|_ start_date: N/A
645
646NSE: Script Post-scanning.
647Initiating NSE at 13:31
648Completed NSE at 13:31, 0.00s elapsed
649Initiating NSE at 13:31
650Completed NSE at 13:31, 0.00s elapsed
651Initiating NSE at 13:31
652Completed NSE at 13:31, 0.00s elapsed
653Post-scan script results:
654| clock-skew:
655| -19m58s:
656| 192.168.1.199
657|_ 192.168.1.1
658Read data files from: /data/data/com.termux/files/usr/bin/../share/nmap
659Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
660Nmap done: 254 IP addresses (8 hosts up) scanned in 332.55 seconds
661$