· 6 years ago · Jan 03, 2020, 05:28 PM
1######################################################################################################################################
2=======================================================================================================================================
3Hostname www.aafp.cl ISP SOC. COMERCIAL WIRENET CHILE LTDA.
4Continent South America Flag
5CL
6Country Chile Country Code CL
7Region Unknown Local time 25 Dec 2019 20:07 -03
8City Unknown Postal Code Unknown
9IP Address 138.117.148.94 Latitude -33.439
10 Longitude -70.643
11======================================================================================================================================
12#####################################################################################################################################
13> www.aafp.cl
14Server: 38.132.106.139
15Address: 38.132.106.139#53
16
17Non-authoritative answer:
18Name: www.aafp.cl
19Address: 138.117.148.94
20>
21#####################################################################################################################################
22Domain name: aafp.cl
23Registrant name: ASOC DE ADMINISTRADORAS DE FONDOS DE PENSIONES
24Registrant organisation:
25Registrar name: NIC Chile
26Registrar URL: https://www.nic.cl
27Creation date: 2009-12-28 22:25:07 CLST
28Expiration date: 2021-01-26 19:25:07 CLST
29Name server: cpanel1.soporte.cl
30Name server: cpanel2.soporte.cl
31#####################################################################################################################################
32[+] Target : www.aafp.cl
33
34[+] IP Address : 138.117.148.94
35
36[+] Headers :
37
38[+] Date : Wed, 25 Dec 2019 23:46:21 GMT
39[+] Server : Apache
40[+] Vary : Accept-Encoding,User-Agent
41[+] Last-Modified : Wed, 25 Dec 2019 13:06:27 GMT
42[+] Accept-Ranges : bytes
43[+] Content-Length : 31953
44[+] Cache-Control : max-age=0
45[+] Expires : Wed, 25 Dec 2019 23:46:21 GMT
46[+] Keep-Alive : timeout=5, max=100
47[+] Connection : Keep-Alive
48[+] Content-Type : text/html; charset=UTF-8
49[+] Content-Encoding : gzip
50
51[+] SSL Certificate Information :
52
53[+] commonName : aafp.cl
54[+] countryName : US
55[+] stateOrProvinceName : TX
56[+] localityName : Houston
57[+] organizationName : cPanel, Inc.
58[+] commonName : cPanel, Inc. Certification Authority
59[+] Version : 3
60[+] Serial Number : DECAD1B1D37B32F2A83F801845929DFD
61[+] Not Before : Nov 9 00:00:00 2019 GMT
62[+] Not After : Feb 7 23:59:59 2020 GMT
63[+] OCSP : ('http://ocsp.comodoca.com',)
64[+] subject Alt Name : (('DNS', 'aafp.cl'), ('DNS', 'cpanel.aafp.cl'), ('DNS', 'mail.aafp.cl'), ('DNS', 'webdisk.aafp.cl'), ('DNS', 'webmail.aafp.cl'), ('DNS', 'whm.aafp.cl'), ('DNS', 'www.aafp.cl'))
65[+] CA Issuers : ('http://crt.comodoca.com/cPanelIncCertificationAuthority.crt',)
66[+] CRL Distribution Points : ('http://crl.comodoca.com/cPanelIncCertificationAuthority.crl',)
67
68[+] Whois Lookup :
69
70[+] NIR : None
71[+] ASN Registry : lacnic
72[+] ASN : 265831
73[+] ASN CIDR : 138.117.148.0/24
74[+] ASN Country Code : CL
75[+] ASN Date : 2015-05-04
76[+] ASN Description : SOC. COMERCIAL WIRENET CHILE LTDA., CL
77[+] cidr : 138.117.148.0/22
78[+] name : None
79[+] handle : FEZ5
80[+] range : 138.117.148/22
81[+] description : SOC. COMERCIAL WIRENET CHILE LTDA.
82[+] country : CL
83[+] state : None
84[+] city : None
85[+] address : None
86[+] postal_code : None
87[+] emails : ['admin@WIRENETCHILE.COM']
88[+] created : 20150504
89[+] updated : 20150504
90
91[+] Crawling Target...
92
93[+] Looking for robots.txt........[ Found ]
94[+] Extracting robots Links.......[ 2 ]
95[+] Looking for sitemap.xml.......[ Found ]
96[+] Extracting sitemap Links......[ 4 ]
97[+] Extracting CSS Links..........[ 12 ]
98[+] Extracting Javascript Links...[ 3 ]
99[+] Extracting Internal Links.....[ 34 ]
100[+] Extracting External Links.....[ 26 ]
101[+] Extracting Images.............[ 23 ]
102
103[+] Total Links Extracted : 104
104
105[+] Dumping Links in /opt/FinalRecon/dumps/www.aafp.cl.dump
106[+] Completed!
107#####################################################################################################################################
108[i] Scanning Site: https://www.aafp.cl
109
110
111
112B A S I C I N F O
113====================
114
115
116[+] Site Title: AAFP - Asociación Gremial de Administradora de Fondos de Pensiones
117[+] IP address: 138.117.148.94
118[+] Web Server: Apache
119[+] CMS: WordPress
120[+] Cloudflare: Not Detected
121[+] Robots File: Found
122
123-------------[ contents ]----------------
124User-agent: *
125Disallow: /wp-admin/
126Allow: /wp-admin/admin-ajax.php
127
128-----------[end of contents]-------------
129
130
131
132W H O I S L O O K U P
133========================
134
135 %%
136%% This is the NIC Chile Whois server (whois.nic.cl).
137%%
138%% Rights restricted by copyright.
139%% See https://www.nic.cl/normativa/politica-publicacion-de-datos-cl.pdf
140%%
141
142Domain name: aafp.cl
143Registrant name: ASOC DE ADMINISTRADORAS DE FONDOS DE PENSIONES
144Registrant organisation:
145Registrar name: NIC Chile
146Registrar URL: https://www.nic.cl
147Creation date: 2009-12-28 22:25:07 CLST
148Expiration date: 2021-01-26 19:25:07 CLST
149Name server: cpanel1.soporte.cl
150Name server: cpanel2.soporte.cl
151
152%%
153%% For communication with domain contacts please use website.
154%% See https://www.nic.cl/registry/Whois.do?d=aafp.cl
155%%
156
157
158
159
160G E O I P L O O K U P
161=========================
162
163[i] IP Address: 138.117.148.94
164[i] Country: Chile
165[i] State:
166[i] City:
167[i] Latitude: -33.4378
168[i] Longitude: -70.6503
169
170
171
172
173H T T P H E A D E R S
174=======================
175
176
177[i] HTTP/1.1 200 OK
178[i] Date: Wed, 25 Dec 2019 23:46:38 GMT
179[i] Server: Apache
180[i] Accept-Ranges: bytes
181[i] Content-Length: 176069
182[i] Cache-Control: max-age=0, public
183[i] Expires: Wed, 25 Dec 2019 23:46:38 GMT
184[i] Vary: Accept-Encoding
185[i] X-Powered-By: WP Rocket/3.4.1.2
186[i] Connection: close
187[i] Content-Type: text/html; charset=UTF-8
188
189
190
191
192D N S L O O K U P
193===================
194
195aafp.cl. 14399 IN TXT "v=spf1 ip4:200.55.200.5 include:_spf.google.com include:spf.masterbase.com ~all"
196aafp.cl. 14399 IN MX 10 alt4.aspmx.l.google.com.
197aafp.cl. 14399 IN MX 5 alt2.aspmx.l.google.com.
198aafp.cl. 14399 IN MX 1 aspmx.l.google.com.
199aafp.cl. 14399 IN MX 5 alt1.aspmx.l.google.com.
200aafp.cl. 14399 IN MX 10 alt3.aspmx.l.google.com.
201aafp.cl. 14399 IN A 138.117.148.94
202aafp.cl. 21599 IN SOA cpanel1.soporte.cl. epizarro.soporte.cl. 2019120702 3600 7200 1209600 86400
203aafp.cl. 21599 IN NS cpanel1.soporte.cl.
204aafp.cl. 21599 IN NS cpanel2.soporte.cl.
205
206
207
208
209S U B N E T C A L C U L A T I O N
210====================================
211
212Address = 138.117.148.94
213Network = 138.117.148.94 / 32
214Netmask = 255.255.255.255
215Broadcast = not needed on Point-to-Point links
216Wildcard Mask = 0.0.0.0
217Hosts Bits = 0
218Max. Hosts = 1 (2^0 - 0)
219Host Range = { 138.117.148.94 - 138.117.148.94 }
220
221
222
223N M A P P O R T S C A N
224============================
225
226Starting Nmap 7.70 ( https://nmap.org ) at 2019-12-25 23:46 UTC
227Nmap scan report for aafp.cl (138.117.148.94)
228Host is up (0.16s latency).
229rDNS record for 138.117.148.94: host94.138.117.148.static.wirenetchile.com
230
231PORT STATE SERVICE
23221/tcp open ftp
23322/tcp open ssh
23423/tcp filtered telnet
23580/tcp open http
236110/tcp open pop3
237143/tcp open imap
238443/tcp open https
2393389/tcp filtered ms-wbt-server
240
241Nmap done: 1 IP address (1 host up) scanned in 2.24 seconds
242
243
244
245S U B - D O M A I N F I N D E R
246==================================
247
248
249[i] Total Subdomains Found : 13
250
251[+] Subdomain: ns2.aafp.cl
252[-] IP: 138.117.148.94
253
254[+] Subdomain: reforma.aafp.cl
255[-] IP: 138.117.148.94
256
257[+] Subdomain: www.reforma.aafp.cl
258[-] IP: 138.117.148.94
259
260[+] Subdomain: meimporta.aafp.cl
261[-] IP: 138.117.148.94
262
263[+] Subdomain: reporte.aafp.cl
264[-] IP: 138.117.148.94
265
266[+] Subdomain: webdisk.aafp.cl
267[-] IP: 200.55.200.5
268
269[+] Subdomain: cpanel.aafp.cl
270[-] IP: 200.55.200.5
271
272[+] Subdomain: webmail.aafp.cl
273[-] IP: 200.55.200.5
274
275[+] Subdomain: whm.aafp.cl
276[-] IP: 200.55.200.5
277
278[+] Subdomain: doblecomision.aafp.cl
279[-] IP: 138.117.148.94
280
281[+] Subdomain: www.doblecomision.aafp.cl
282[-] IP: 138.117.148.94
283
284[+] Subdomain: masahorro.aafp.cl
285[-] IP: 138.117.148.94
286
287[+] Subdomain: www.aafp.cl
288[-] IP: 138.117.148.94
289#####################################################################################################################################
290[+] Starting At 2019-12-25 18:46:32.657870
291[+] Collecting Information On: https://www.aafp.cl/
292[#] Status: 200
293--------------------------------------------------
294[#] Web Server Detected: Apache
295[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
296- Date: Wed, 25 Dec 2019 23:46:32 GMT
297- Server: Apache
298- Vary: Accept-Encoding,User-Agent
299- Last-Modified: Wed, 25 Dec 2019 13:06:27 GMT
300- Accept-Ranges: bytes
301- Content-Length: 31953
302- Cache-Control: max-age=0
303- Expires: Wed, 25 Dec 2019 23:46:32 GMT
304- Keep-Alive: timeout=5, max=100
305- Connection: Keep-Alive
306- Content-Type: text/html; charset=UTF-8
307- Content-Encoding: gzip
308--------------------------------------------------
309[#] Finding Location..!
310[#] status: success
311[#] country: Chile
312[#] countryCode: CL
313[#] region: RM
314[#] regionName: Santiago Metropolitan
315[#] city: Penalolen
316[#] zip: 7910000
317[#] lat: -33.4809
318[#] lon: -70.5456
319[#] timezone: America/Santiago
320[#] isp: SOC. COMERCIAL WIRENET CHILE LTDA.
321[#] org: SOC. COMERCIAL WIRENET CHILE LTDA
322[#] as: AS265831 SOC. COMERCIAL WIRENET CHILE LTDA.
323[#] query: 138.117.148.94
324--------------------------------------------------
325[x] Didn't Detect WAF Presence on: https://www.aafp.cl/
326--------------------------------------------------
327[#] Starting Reverse DNS
328[-] Failed ! Fail
329--------------------------------------------------
330[!] Scanning Open Port
331[#] 21/tcp open ftp
332[#] 22/tcp open ssh
333[#] 53/tcp open domain
334[#] 80/tcp open http
335[#] 110/tcp open pop3
336[#] 143/tcp open imap
337[#] 443/tcp open https
338[#] 465/tcp open smtps
339[#] 587/tcp open submission
340[#] 993/tcp open imaps
341[#] 995/tcp open pop3s
342[#] 3306/tcp open mysql
343--------------------------------------------------
344[+] Collecting Information Disclosure!
345[#] Detecting sitemap.xml file
346[!] sitemap.xml File Found: https://www.aafp.cl/sitemap_index.xml
347[#] Detecting robots.txt file
348[!] robots.txt File Found: https://www.aafp.cl//robots.txt
349[#] Detecting GNU Mailman
350[!] GNU Mailman App Detected: https://www.aafp.cl//mailman/admin
351[!] version: 2.1.29
352--------------------------------------------------
353[+] Crawling Url Parameter On: https://www.aafp.cl/
354--------------------------------------------------
355[#] Searching Html Form !
356[+] Html Form Discovered
357[#] action: https://www.aafp.cl/
358[#] class: ['searchform']
359[#] id: None
360[#] method: get
361--------------------------------------------------
362[!] Found 19 dom parameter
363[#] https://www.aafp.cl/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.aafp.cl%2F&format=xml
364[#] https://www.aafp.cl//#main
365[#] https://www.aafp.cl//#
366[#] https://www.aafp.cl//#
367[#] https://www.aafp.cl//#
368[#] https://www.aafp.cl//#
369[#] https://www.aafp.cl//#
370[#] https://www.aafp.cl//#
371[#] https://www.aafp.cl//#search-lightbox
372[#] https://www.aafp.cl//#search-lightbox
373[#] http://www.mitosyrealidades.cl/#new_tab
374[#] https://www.aafp.cl/wp-content/uploads/2019/12/Boletín-Multifondos-Tercer-Trimestre.pdf#new_tab
375[#] https://www.sontuslucas.cl/#/
376[#] https://www.aafp.cl//#top
377[#] https://www.aafp.cl//#
378[#] https://www.aafp.cl//#
379[#] https://www.aafp.cl//#
380[#] https://www.aafp.cl//#
381[#] https://www.aafp.cl//#
382--------------------------------------------------
383[!] 3 Internal Dynamic Parameter Discovered
384[+] https://www.aafp.cl/xmlrpc.php?rsd
385[+] https://www.aafp.cl/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.aafp.cl%2F
386[+] https://www.aafp.cl/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.aafp.cl%2F&format=xml
387--------------------------------------------------
388[!] 7 External Dynamic Parameter Discovered
389[#] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=c2FsdWQ=&idcat=MzYx
390[#] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=ZWR1Y2FjaW9u&idcat=MzYy
391[#] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=Z2FzdHJvbm9taWE=&idcat=MzYz
392[#] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=c2VydmljaW9z&idcat=MzY0
393[#] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=c2hvcHBpbmc=&idcat=MzY1
394[#] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=dGllbXBv&idcat=MzY2
395[#] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=cGVuc2lvbmFkb3M=&idcat=MzY3
396--------------------------------------------------
397[!] 73 Internal links Discovered
398[+] https://www.aafp.cl/xmlrpc.php
399[+] https://www.aafp.cl/
400[+] https://www.aafp.cl/feed/
401[+] https://www.aafp.cl/comments/feed/
402[+] https://www.aafp.cl/wp-includes/wlwmanifest.xml
403[+] https://www.aafp.cl/wp-content/themes/flatsome/assets/css/ie-fallback.css
404[+] https://www.aafp.cl/wp-content/uploads/2019/11/favicon.png
405[+] https://www.aafp.cl/wp-content/uploads/2019/11/favicon.png
406[+] https://www.aafp.cl/wp-content/uploads/2019/11/favicon.png
407[+] https://www.aafp.cl/
408[+] https://www.aafp.cl/quienes-somos/
409[+] https://www.aafp.cl/que-hacemos/
410[+] https://www.aafp.cl/directorio-y-presidentes/
411[+] https://www.aafp.cl/estructura-del-equipo/
412[+] https://www.aafp.cl/revista-institucional/
413[+] https://www.aafp.cl/sistema-previsional/
414[+] https://www.aafp.cl/programas-aafp/
415[+] https://www.aafp.cl/perfiles-de-afiliados/
416[+] https://www.aafp.cl/perfiles-de-afiliados/trabajador-dependiente/
417[+] https://www.aafp.cl/perfiles-de-afiliados/trabajador-independiente/
418[+] https://www.aafp.cl/perfiles-de-afiliados/empleador/
419[+] https://www.aafp.cl/perfiles-de-afiliados/mujer/
420[+] https://www.aafp.cl/perfiles-de-afiliados/mi-primer-trabajo/
421[+] https://www.aafp.cl/perfiles-de-afiliados/inmigrantes/
422[+] https://www.aafp.cl/perfiles-de-afiliados/trabajador-en-edad-de-pensionarse/
423[+] https://www.aafp.cl/perfiles-de-afiliados/pensionado/
424[+] https://www.aafp.cl/perfiles-de-afiliados/pensionado-por-invalidez/
425[+] https://www.aafp.cl/perfiles-de-afiliados/familiar-fallecido/
426[+] https://www.aafp.cl/temas-previsionales/
427[+] https://www.aafp.cl/boletines-multifondos/
428[+] https://www.aafp.cl/y-encuestas/
429[+] https://www.aafp.cl/biblioteca/
430[+] https://www.aafp.cl/categoria/prensa/
431[+] https://www.aafp.cl/resumenes-de-prensa/
432[+] https://www.aafp.cl/blog/
433[+] https://www.aafp.cl/transparencia/
434[+] https://www.aafp.cl/encuestas-2/
435[+] https://www.aafp.cl/agenda-de-relacionamiento/
436[+] https://www.aafp.cl/retiro-de-ahorros-de-afp-tc-rechaza-recursos-porque-no-se-afecta-el-derecho-de-propiedad/
437[+] https://www.aafp.cl/programas-de-educacion-previsional-de-la-asociacion-de-aafp/
438[+] https://www.aafp.cl/aspectos-que-propone-el-proyecto-de-reforma-a-las-pensiones/
439[+] https://www.aafp.cl/calculo-pensiones/
440[+] https://www.aafp.cl/calculo-pensiones/
441[+] https://www.aafp.cl//tel:+56229353300
442[+] https://www.aafp.cl/quienes-somos/
443[+] https://www.aafp.cl/que-hacemos/
444[+] https://www.aafp.cl/directorio-y-presidentes/
445[+] https://www.aafp.cl/estructura-del-equipo/
446[+] https://www.aafp.cl/revista-institucional/
447[+] https://www.aafp.cl/sistema-previsional/
448[+] https://www.aafp.cl/programas-aafp/
449[+] https://www.aafp.cl/perfiles-de-afiliados/
450[+] https://www.aafp.cl/perfiles-de-afiliados/trabajador-dependiente/
451[+] https://www.aafp.cl/perfiles-de-afiliados/trabajador-independiente/
452[+] https://www.aafp.cl/perfiles-de-afiliados/empleador/
453[+] https://www.aafp.cl/perfiles-de-afiliados/mujer/
454[+] https://www.aafp.cl/perfiles-de-afiliados/mi-primer-trabajo/
455[+] https://www.aafp.cl/perfiles-de-afiliados/inmigrantes/
456[+] https://www.aafp.cl/perfiles-de-afiliados/trabajador-en-edad-de-pensionarse/
457[+] https://www.aafp.cl/perfiles-de-afiliados/pensionado/
458[+] https://www.aafp.cl/perfiles-de-afiliados/pensionado-por-invalidez/
459[+] https://www.aafp.cl/perfiles-de-afiliados/familiar-fallecido/
460[+] https://www.aafp.cl/temas-previsionales/
461[+] https://www.aafp.cl/boletines-multifondos/
462[+] https://www.aafp.cl/y-encuestas/
463[+] https://www.aafp.cl/biblioteca/
464[+] https://www.aafp.cl/categoria/prensa/
465[+] https://www.aafp.cl/resumenes-de-prensa/
466[+] https://www.aafp.cl/blog/
467[+] https://www.aafp.cl/transparencia/
468[+] https://www.aafp.cl/encuestas-2/
469[+] https://www.aafp.cl/agenda-de-relacionamiento/
470[+] https://www.aafp.cl//mailto:your@email
471--------------------------------------------------
472[!] 26 External links Discovered
473[#] http://gmpg.org/xfn/11
474[#] https://afiliadoinformado.cl/
475[#] http://www.mitosyrealidades.cl/#new_tab
476[#] https://www.misbeneficiosafp.cl/
477[#] https://www.misbeneficiosafp.cl/
478[#] http://www.sontuslucas.cl
479[#] https://www.afpcapital.cl/Paginas/default.aspx
480[#] https://nuevo.cuprum.cl/
481[#] https://www.afpmodelo.cl/AFP/Home.aspx
482[#] https://www.planvital.cl/
483[#] https://www.provida.cl/
484[#] http://www.spensiones.cl/portal/institucional/594/w3-channel.html
485[#] https://www.previsionsocial.gob.cl/sps/
486[#] https://www.previred.com
487[#] http://www.scomp.cl
488[#] https://afiliadoinformado.cl/
489[#] https://www.sontuslucas.cl/#/
490[#] https://www.misbeneficiosafp.cl/
491[#] https://www.facebook.com/AFPdeChile
492[#] https://twitter.com/AFPdeChile
493[#] https://www.linkedin.com/company/asociaci-n-de-afp-de-chile/
494[#] https://www.youtube.com/user/AAFPdeCHile
495[#] https://afiliadoinformado.cl/
496[#] http://url
497[#] http://url
498[#] http://url
499--------------------------------------------------
500[#] Mapping Subdomain..
501[!] Found 14 Subdomain
502- ns1.aafp.cl
503- ns2.aafp.cl
504- reforma.aafp.cl
505- www.reforma.aafp.cl
506- meimporta.aafp.cl
507- reporte.aafp.cl
508- webdisk.aafp.cl
509- cpanel.aafp.cl
510- webmail.aafp.cl
511- whm.aafp.cl
512- doblecomision.aafp.cl
513- www.doblecomision.aafp.cl
514- masahorro.aafp.cl
515- www.aafp.cl
516--------------------------------------------------
517[!] Done At 2019-12-25 18:46:59.274420
518######################################################################################################################################
519Trying "aafp.cl"
520;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32458
521;; flags: qr rd ra; QUERY: 1, ANSWER: 10, AUTHORITY: 0, ADDITIONAL: 7
522
523;; QUESTION SECTION:
524;aafp.cl. IN ANY
525
526;; ANSWER SECTION:
527aafp.cl. 43200 IN SOA cpanel1.soporte.cl. epizarro.soporte.cl. 2019120702 3600 7200 1209600 86400
528aafp.cl. 14400 IN A 138.117.148.94
529aafp.cl. 14400 IN MX 5 alt2.aspmx.l.google.com.
530aafp.cl. 14400 IN MX 10 alt3.aspmx.l.google.com.
531aafp.cl. 14400 IN MX 5 alt1.aspmx.l.google.com.
532aafp.cl. 14400 IN MX 1 aspmx.l.google.com.
533aafp.cl. 14400 IN MX 10 alt4.aspmx.l.google.com.
534aafp.cl. 14400 IN TXT "v=spf1 ip4:200.55.200.5 include:_spf.google.com include:spf.masterbase.com ~all"
535aafp.cl. 3600 IN NS cpanel1.soporte.cl.
536aafp.cl. 3600 IN NS cpanel2.soporte.cl.
537
538;; ADDITIONAL SECTION:
539alt2.aspmx.l.google.com. 235 IN A 209.85.202.26
540alt1.aspmx.l.google.com. 235 IN A 64.233.186.26
541alt3.aspmx.l.google.com. 235 IN A 172.253.120.26
542aspmx.l.google.com. 234 IN A 173.194.207.27
543alt2.aspmx.l.google.com. 235 IN AAAA 2a00:1450:400b:c00::1b
544alt1.aspmx.l.google.com. 235 IN AAAA 2800:3f0:4003:c00::1a
545alt3.aspmx.l.google.com. 235 IN AAAA 2a00:1450:400c:c01::1a
546
547Received 496 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 408 ms
548#######################################################################################################################################
549; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace aafp.cl any
550;; global options: +cmd
551. 84138 IN NS e.root-servers.net.
552. 84138 IN NS g.root-servers.net.
553. 84138 IN NS j.root-servers.net.
554. 84138 IN NS m.root-servers.net.
555. 84138 IN NS h.root-servers.net.
556. 84138 IN NS a.root-servers.net.
557. 84138 IN NS f.root-servers.net.
558. 84138 IN NS c.root-servers.net.
559. 84138 IN NS d.root-servers.net.
560. 84138 IN NS i.root-servers.net.
561. 84138 IN NS k.root-servers.net.
562. 84138 IN NS b.root-servers.net.
563. 84138 IN NS l.root-servers.net.
564. 84138 IN RRSIG NS 8 0 518400 20200107190000 20191225180000 22545 . OGFBydUEOKwycY1e0xfd1Wnx8SiVUbL+E6NKKyV47QivadIQy0F4ceEM ArURpBVMyFRTvHfPBcEATQOCu/9zIxXNgMqPozAs54krLnT8/hPkzDhp 5EXS0pgxywXYwN63nrBosvUeFyYcJvHdPtIk88S54UywORKZ9J/tAqpS jIYsV20kTbI5F/9yN5B0blWAbiU1MnBhBmKxGc58A+CWsdBa/spUWhDj 0MAgJhvheykW8qdBh+Ct8G2S13v3NdtrYxVltCdJ9HSrWBjlpIFNcRhX kABj3lJQ6FflyEc6UqEvHUj+vu9I88QYVQ+BG2f8Szve7pAp42iVDxI1 jVrHDA==
565;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 155 ms
566
567cl. 172800 IN NS a.nic.cl.
568cl. 172800 IN NS b.nic.cl.
569cl. 172800 IN NS c.nic.cl.
570cl. 172800 IN NS cl1.dnsnode.net.
571cl. 172800 IN NS cl-ns.anycast.pch.net.
572cl. 172800 IN NS cl1-tld.d-zone.ca.
573cl. 172800 IN NS cl2-tld.d-zone.ca.
574cl. 86400 IN DS 21199 8 2 7D756DFFAB6D3CD9C786FF5C659954C22944FAEF9433EEE26F1D84EB 5370B394
575cl. 86400 IN RRSIG DS 8 1 86400 20200107190000 20191225180000 22545 . rIFOlQk+b1iTek3if2RXCbJ2Nvefn/XwxS3sbz/h6sW2U8b2bm72brsz mhoLqNi2SlfeDwFA7LFZYe8Rkshvf9arNgsHfz21zkX8Bw1dX10qerxc qIKyn/dSJEarwX/30kfVIi8B517nb9vT6S8EqW/TzMVwlA59sDolpx8S TdWmniY4DWzEcGUl9jkSLdCPjpG7C+scaGFq/0wh7b68ZyBkb5IfbxRG KMk+6UdFBZaM0mYhNNI9q7gIgNTEfoWypexe8s9cKkzJp0DmZPlYdEYk x0ndfjOoOfnJsshoUEk2OetC9ZFyab3H3ptz3C8vRdY3PBv1Td4/3vlW 0keBGg==
576;; Received 817 bytes from 2001:500:a8::e#53(e.root-servers.net) in 29 ms
577
578aafp.cl. 3600 IN NS cpanel2.soporte.cl.
579aafp.cl. 3600 IN NS cpanel1.soporte.cl.
580SLGBNID89SI0662NTMJJ7N3FBH5PBORH.cl. 900 IN NSEC3 1 1 2 64B8C76F503A0D3291EE3CF9669344F3 SNDSV8F3F9GAGFOBQRAIH45JDR8JBQMB NS SOA TXT RRSIG DNSKEY NSEC3PARAM
581SLGBNID89SI0662NTMJJ7N3FBH5PBORH.cl. 900 IN RRSIG NSEC3 8 2 900 20200205154132 20191225223050 12363 cl. VFZNcmBSggf3FN+vtkOc2uK2vdJfQ5A3XqQbwgcpGxw0ycb7zw8arnrH kM2u7kSk/Q2e2Nye4G+jQeOpUuNYur4x9b5b7MROGYt1pIFGDRhm2j8T aiBUOxRhxSbmNIYptmmxz/kRIa022HTf9zxjrRVmCnwZU9Qdawtkj5ng 6QM=
582TRCOD2N0OI1UQ36P1DVKIQ1NPI89UMI7.cl. 900 IN NSEC3 1 1 2 64B8C76F503A0D3291EE3CF9669344F3 TUHU7316NNUAIUGFJ3KF3MO0JE1H8FBR NS DS RRSIG
583TRCOD2N0OI1UQ36P1DVKIQ1NPI89UMI7.cl. 900 IN RRSIG NSEC3 8 2 900 20200206130337 20191225223050 12363 cl. k/DvZ2hmZmPUj+GHG3OSyTJlbLs6CHUQ2c27yH85CTyvPLkbDj+Ednyh e+an9YosNU8mNUTapgioJZOQWvTy/ZsD6lmoCUzHzP5DYHLC2xKxO4Id E5jTAR22TeS7Ef/3IBuGvzfsuhuUBos3yzuTR/AbZhdEAnOw/Vt5RvXH ixs=
584;; Received 633 bytes from 2001:500:14:6030:ad::1#53(cl-ns.anycast.pch.net) in 26 ms
585
586aafp.cl. 14400 IN TXT "v=spf1 ip4:200.55.200.5 include:_spf.google.com include:spf.masterbase.com ~all"
587aafp.cl. 14400 IN MX 5 alt2.aspmx.l.google.com.
588aafp.cl. 14400 IN MX 10 alt3.aspmx.l.google.com.
589aafp.cl. 14400 IN MX 5 alt1.aspmx.l.google.com.
590aafp.cl. 14400 IN MX 10 alt4.aspmx.l.google.com.
591aafp.cl. 14400 IN MX 1 aspmx.l.google.com.
592aafp.cl. 14400 IN A 138.117.148.94
593aafp.cl. 86400 IN SOA cpanel1.soporte.cl. epizarro.soporte.cl. 2019120702 3600 7200 1209600 86400
594aafp.cl. 86400 IN NS cpanel1.soporte.cl.
595aafp.cl. 86400 IN NS cpanel2.soporte.cl.
596;; Received 419 bytes from 200.75.7.68#53(cpanel2.soporte.cl) in 300 ms
597######################################################################################################################################
598[*] Performing General Enumeration of Domain: aafp.cl
599[-] DNSSEC is not configured for aafp.cl
600[*] SOA cpanel1.soporte.cl 200.55.200.5
601[*] NS cpanel2.soporte.cl 200.75.7.68
602[*] Bind Version for 200.75.7.68 9.11.4-P2-RedHat-9.11.4-9.P2.el7
603[*] MX alt4.aspmx.l.google.com 173.194.216.26
604[*] MX aspmx.l.google.com 172.217.214.26
605[*] MX alt1.aspmx.l.google.com 173.194.77.27
606[*] MX alt2.aspmx.l.google.com 64.233.177.27
607[*] MX alt3.aspmx.l.google.com 173.194.175.27
608[*] MX alt4.aspmx.l.google.com 2607:f8b0:400c:c12::1b
609[*] MX aspmx.l.google.com 2607:f8b0:4001:c0c::1b
610[*] MX alt1.aspmx.l.google.com 2607:f8b0:4023:401::1a
611[*] MX alt2.aspmx.l.google.com 2607:f8b0:4002:c08::1a
612[*] MX alt3.aspmx.l.google.com 2607:f8b0:400d:c0b::1a
613[*] A aafp.cl 138.117.148.94
614[*] TXT aafp.cl v=spf1 ip4:200.55.200.5 include:_spf.google.com include:spf.masterbase.com ~all
615[*] Enumerating SRV Records
616[-] No SRV Records Found for aafp.cl
617[+] 0 Records Found
618#####################################################################################################################################
619[*] Processing domain aafp.cl
620[*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
621[+] Getting nameservers
622200.55.200.5 - cpanel1.soporte.cl
623200.75.7.68 - cpanel2.soporte.cl
624[-] Zone transfer failed
625
626[+] TXT records found
627"v=spf1 ip4:200.55.200.5 include:_spf.google.com include:spf.masterbase.com ~all"
628
629[+] MX records found, added to target list
63010 alt4.aspmx.l.google.com.
6311 aspmx.l.google.com.
6325 alt1.aspmx.l.google.com.
6335 alt2.aspmx.l.google.com.
63410 alt3.aspmx.l.google.com.
635
636[*] Scanning aafp.cl for A records
637138.117.148.94 - aafp.cl
638200.55.200.5 - cpanel.aafp.cl
639200.55.200.5 - ftp.aafp.cl
640127.0.0.1 - localhost.aafp.cl
641138.117.148.94 - mail.aafp.cl
642138.117.148.94 - ns1.aafp.cl
643138.117.148.94 - ns2.aafp.cl
644200.55.200.5 - webmail.aafp.cl
645200.55.200.5 - webdisk.aafp.cl
646200.55.200.5 - whm.aafp.cl
647138.117.148.94 - www.aafp.cl
648#####################################################################################################################################
649Domains still to check: 1
650 Checking if the hostname aafp.cl. given is in fact a domain...
651
652Analyzing domain: aafp.cl.
653 Checking NameServers using system default resolver...
654 IP: 200.55.200.5 (Chile)
655 HostName: cpanel1.soporte.cl Type: NS
656 HostName: cpanel3.intellicomp.cl Type: PTR
657 IP: 200.75.7.68 (Chile)
658 HostName: cpanel2.soporte.cl Type: NS
659 HostName: intelliwebx.intellicomp.cl Type: PTR
660
661 Checking MailServers using system default resolver...
662 IP: 173.194.216.27 (United States)
663 HostName: alt4.aspmx.l.google.com Type: MX
664 HostName: vu-in-f27.1e100.net Type: PTR
665 IP: 172.217.212.26 (United States)
666 HostName: aspmx.l.google.com Type: MX
667 IP: 173.194.77.26 (United States)
668 HostName: alt1.aspmx.l.google.com Type: MX
669 HostName: ob-in-f26.1e100.net Type: PTR
670 IP: 64.233.177.27 (United States)
671 HostName: alt2.aspmx.l.google.com Type: MX
672 HostName: yx-in-f27.1e100.net Type: PTR
673 IP: 173.194.175.27 (United States)
674 HostName: alt3.aspmx.l.google.com Type: MX
675 HostName: qs-in-f27.1e100.net Type: PTR
676
677 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
678 No zone transfer found on nameserver 200.55.200.5
679 No zone transfer found on nameserver 200.75.7.68
680
681 Checking SPF record...
682
683 Checking SPF record...
684
685 Checking SPF record...
686 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 35.190.247.0/24, but only the network IP
687 New IP found: 35.190.247.0
688 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 64.233.160.0/19, but only the network IP
689 New IP found: 64.233.160.0
690 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 66.102.0.0/20, but only the network IP
691 New IP found: 66.102.0.0
692 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 66.249.80.0/20, but only the network IP
693 New IP found: 66.249.80.0
694 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 72.14.192.0/18, but only the network IP
695 New IP found: 72.14.192.0
696 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 74.125.0.0/16, but only the network IP
697 New IP found: 74.125.0.0
698 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 108.177.8.0/21, but only the network IP
699 New IP found: 108.177.8.0
700 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 173.194.0.0/16, but only the network IP
701 New IP found: 173.194.0.0
702 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 209.85.128.0/17, but only the network IP
703 New IP found: 209.85.128.0
704 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 216.58.192.0/19, but only the network IP
705 New IP found: 216.58.192.0
706 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 216.239.32.0/19, but only the network IP
707 New IP found: 216.239.32.0
708
709 Checking SPF record...
710 There are no IPv4 addresses in the SPF. Maybe IPv6.
711 There are no IPv4 addresses in the SPF. Maybe IPv6.
712 There are no IPv4 addresses in the SPF. Maybe IPv6.
713 There are no IPv4 addresses in the SPF. Maybe IPv6.
714 There are no IPv4 addresses in the SPF. Maybe IPv6.
715 There are no IPv4 addresses in the SPF. Maybe IPv6.
716
717 Checking SPF record...
718 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 172.217.0.0/19, but only the network IP
719 New IP found: 172.217.0.0
720 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 172.217.32.0/20, but only the network IP
721 New IP found: 172.217.32.0
722 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 172.217.128.0/19, but only the network IP
723 New IP found: 172.217.128.0
724 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 172.217.160.0/20, but only the network IP
725 New IP found: 172.217.160.0
726 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 172.217.192.0/19, but only the network IP
727 New IP found: 172.217.192.0
728 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 172.253.56.0/21, but only the network IP
729 New IP found: 172.253.56.0
730 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 172.253.112.0/20, but only the network IP
731 New IP found: 172.253.112.0
732 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 108.177.96.0/19, but only the network IP
733 New IP found: 108.177.96.0
734 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 35.191.0.0/16, but only the network IP
735 New IP found: 35.191.0.0
736 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 130.211.0.0/22, but only the network IP
737 New IP found: 130.211.0.0
738
739 Checking SPF record...
740 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 200.9.128.0/24, but only the network IP
741 New IP found: 200.9.128.0
742 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 108.175.97.0/24, but only the network IP
743 New IP found: 108.175.97.0
744 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 108.175.110.0/24, but only the network IP
745 New IP found: 108.175.110.0
746 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 108.175.99.0/24, but only the network IP
747 New IP found: 108.175.99.0
748 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 108.175.107.0/24, but only the network IP
749 New IP found: 108.175.107.0
750 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 108.175.108.0/24, but only the network IP
751 New IP found: 108.175.108.0
752
753 Checking 192 most common hostnames using system default resolver...
754 IP: 138.117.148.94 (Chile)
755 HostName: www.aafp.cl. Type: A
756 IP: 200.55.200.5 (Chile)
757 HostName: cpanel1.soporte.cl Type: NS
758 HostName: cpanel3.intellicomp.cl Type: PTR
759 Type: SPF
760 HostName: ftp.aafp.cl. Type: A
761 IP: 138.117.148.94 (Chile)
762 HostName: www.aafp.cl. Type: A
763 HostName: mail.aafp.cl. Type: A
764 HostName: host94.138.117.148.static.wirenetchile.com Type: PTR
765 IP: 138.117.148.94 (Chile)
766 HostName: www.aafp.cl. Type: A
767 HostName: mail.aafp.cl. Type: A
768 HostName: host94.138.117.148.static.wirenetchile.com Type: PTR
769 HostName: ns1.aafp.cl. Type: A
770 IP: 138.117.148.94 (Chile)
771 HostName: www.aafp.cl. Type: A
772 HostName: mail.aafp.cl. Type: A
773 HostName: host94.138.117.148.static.wirenetchile.com Type: PTR
774 HostName: ns1.aafp.cl. Type: A
775 HostName: ns2.aafp.cl. Type: A
776 IP: 200.55.200.5 (Chile)
777 HostName: cpanel1.soporte.cl Type: NS
778 HostName: cpanel3.intellicomp.cl Type: PTR
779 Type: SPF
780 HostName: ftp.aafp.cl. Type: A
781 HostName: webmail.aafp.cl. Type: A
782
783 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
784 Checking netblock 216.58.192.0
785 Checking netblock 200.55.200.0
786 Checking netblock 172.253.112.0
787 Checking netblock 172.217.32.0
788 Checking netblock 108.175.97.0
789 Checking netblock 172.217.212.0
790 Checking netblock 172.253.56.0
791 Checking netblock 173.194.77.0
792 Checking netblock 200.9.128.0
793 Checking netblock 108.175.107.0
794 Checking netblock 173.194.216.0
795 Checking netblock 172.217.192.0
796 Checking netblock 108.175.108.0
797 Checking netblock 173.194.0.0
798 Checking netblock 74.125.0.0
799 Checking netblock 173.194.175.0
800 Checking netblock 172.217.128.0
801 Checking netblock 108.175.99.0
802 Checking netblock 216.239.32.0
803 Checking netblock 138.117.148.0
804 Checking netblock 172.217.160.0
805 Checking netblock 66.102.0.0
806 Checking netblock 108.177.8.0
807 Checking netblock 200.75.7.0
808 Checking netblock 130.211.0.0
809 Checking netblock 209.85.128.0
810 Checking netblock 172.217.0.0
811 Checking netblock 64.233.177.0
812 Checking netblock 35.190.247.0
813 Checking netblock 72.14.192.0
814 Checking netblock 66.249.80.0
815 Checking netblock 35.191.0.0
816 Checking netblock 108.175.110.0
817 Checking netblock 108.177.96.0
818 Checking netblock 64.233.160.0
819
820 Searching for aafp.cl. emails in Google
821 contacto@aafp.cl
822 contacto@aafp.cl;
823 estudios@aafp.cl
824 n@aafp.cl,
825
826 Checking 35 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
827 Host 216.58.192.0 is up (reset ttl 64)
828 Host 200.55.200.5 is up (reset ttl 64)
829 Host 172.253.112.0 is up (reset ttl 64)
830 Host 172.217.32.0 is up (reset ttl 64)
831 Host 108.175.97.0 is up (reset ttl 64)
832 Host 172.217.212.26 is up (echo-reply ttl 48)
833 Host 172.253.56.0 is up (reset ttl 64)
834 Host 173.194.77.26 is up (reset ttl 64)
835 Host 200.9.128.0 is up (reset ttl 64)
836 Host 108.175.107.0 is up (reset ttl 64)
837 Host 173.194.216.27 is up (reset ttl 64)
838 Host 172.217.192.0 is up (reset ttl 64)
839 Host 108.175.108.0 is up (reset ttl 64)
840 Host 173.194.0.0 is up (reset ttl 64)
841 Host 74.125.0.0 is up (reset ttl 64)
842 Host 173.194.175.27 is up (reset ttl 64)
843 Host 172.217.128.0 is up (reset ttl 64)
844 Host 108.175.99.0 is up (reset ttl 64)
845 Host 216.239.32.0 is up (reset ttl 64)
846 Host 138.117.148.94 is up (reset ttl 64)
847 Host 172.217.160.0 is up (reset ttl 64)
848 Host 66.102.0.0 is up (reset ttl 64)
849 Host 108.177.8.0 is up (reset ttl 64)
850 Host 200.75.7.68 is up (reset ttl 64)
851 Host 130.211.0.0 is up (reset ttl 64)
852 Host 209.85.128.0 is up (reset ttl 64)
853 Host 172.217.0.0 is up (reset ttl 64)
854 Host 64.233.177.27 is up (reset ttl 64)
855 Host 35.190.247.0 is up (echo-reply ttl 57)
856 Host 72.14.192.0 is up (reset ttl 64)
857 Host 66.249.80.0 is up (reset ttl 64)
858 Host 35.191.0.0 is up (reset ttl 64)
859 Host 108.175.110.0 is up (reset ttl 64)
860 Host 108.177.96.0 is up (reset ttl 64)
861 Host 64.233.160.0 is up (reset ttl 64)
862
863 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
864 Scanning ip 216.58.192.0 ():
865 80/tcp open http syn-ack ttl 108 gws
866 | fingerprint-strings:
867 | GetRequest:
868 | HTTP/1.0 200 OK
869 | Date: Thu, 26 Dec 2019 00:06:50 GMT
870 | Expires: -1
871 | Cache-Control: private, max-age=0
872 | Content-Type: text/html; charset=ISO-8859-1
873 | P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
874 | Server: gws
875 | X-XSS-Protection: 0
876 | X-Frame-Options: SAMEORIGIN
877 | Set-Cookie: 1P_JAR=2019-12-26-00; expires=Sat, 25-Jan-2020 00:06:50 GMT; path=/; domain=.google.com
878 | Set-Cookie: NID=194=TkJfTfJUzU_yU59OFf8mA5UoPqri-kYvS_lJocTy-mvUF_KHUL6PWZmJSu18DZN1WzTVFL_ykSRtrAo51IxZycE2QLOi9niBrxHmYPr99eoRK8-KLq4DVX1OtjAJqhWl9thgh4AyYgvwsr_aFCIXe248QwRK1myXEECHrFt5Y9A; expires=Fri, 26-Jun-2020 00:06:50 GMT; path=/; domain=.google.com; HttpOnly
879 | Accept-Ranges: none
880 | Vary: Accept-Encoding
881 | <!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="en-CA"><head><meta content="text/html; charset=UTF-8" http-equiv="Content-Type"><meta content="/logos/doodles/2019/happy-holida
882 | HTTPOptions:
883 | HTTP/1.0 405 Method Not Allowed
884 | Allow: GET, HEAD
885 | Date: Thu, 26 Dec 2019 00:06:50 GMT
886 | Content-Type: text/html; charset=UTF-8
887 | Server: gws
888 | Content-Length: 1592
889 | X-XSS-Protection: 0
890 | X-Frame-Options: SAMEORIGIN
891 | <!DOCTYPE html>
892 | <html lang=en>
893 | <meta charset=utf-8>
894 | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
895 | <title>Error 405 (Method Not Allowed)!!1</title>
896 | <style>
897 |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#l
898 |_http-favicon: Google
899 | http-methods:
900 |_ Supported Methods: GET HEAD
901 | http-robots.txt: 217 disallowed entries (15 shown)
902 | /search /sdch /groups /index.html? /? /?hl=*&
903 |_/?hl=*&*&gws_rd=ssl /imgres /u/ /preferences /setprefs /default /m? /m/ /wml?
904 |_http-server-header: gws
905 |_http-title: Did not follow redirect to http://www.google.com/
906 443/tcp open ssl/https syn-ack ttl 108 gws
907 | fingerprint-strings:
908 | GetRequest:
909 | HTTP/1.0 200 OK
910 | Date: Thu, 26 Dec 2019 00:06:56 GMT
911 | Expires: -1
912 | Cache-Control: private, max-age=0
913 | Content-Type: text/html; charset=ISO-8859-1
914 | P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
915 | Server: gws
916 | X-XSS-Protection: 0
917 | X-Frame-Options: SAMEORIGIN
918 | Set-Cookie: 1P_JAR=2019-12-26-00; expires=Sat, 25-Jan-2020 00:06:56 GMT; path=/; domain=.google.com
919 | Set-Cookie: NID=194=FCe-Dbma-gYcKtgLiuWAI7dlSVsi1duOk-pk0Zj0cCokAPagzkysJ4l0OFqmVirgm5DfiblE5kkLYMYu_5IspsCZClLjD_cdk-QMrtJjSHnlzcKJYJWouF5lVSDxICjWyOBiRC505lFXA4w-OhDFs3izyLNmVYJi4vBvjhCYmEM; expires=Fri, 26-Jun-2020 00:06:56 GMT; path=/; domain=.google.com; HttpOnly
920 | Alt-Svc: quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
921 | Accept-Ranges: none
922 | Vary: Accept-Encoding
923 | <!doctype html><html ite
924 | HTTPOptions:
925 | HTTP/1.0 405 Method Not Allowed
926 | Allow: GET, HEAD
927 | Date: Thu, 26 Dec 2019 00:06:57 GMT
928 | Content-Type: text/html; charset=UTF-8
929 | Server: gws
930 | Content-Length: 1592
931 | X-XSS-Protection: 0
932 | X-Frame-Options: SAMEORIGIN
933 | Alt-Svc: quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
934 | <!DOCTYPE html>
935 | <html lang=en>
936 | <meta charset=utf-8>
937 | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
938 | <title>Error 405 (Method Not Allowed)!!1</title>
939 | <style>
940 |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11p
941 |_http-favicon: Google
942 | http-methods:
943 |_ Supported Methods: GET HEAD
944 | http-robots.txt: 217 disallowed entries (15 shown)
945 | /search /sdch /groups /index.html? /? /?hl=*&
946 |_/?hl=*&*&gws_rd=ssl /imgres /u/ /preferences /setprefs /default /m? /m/ /wml?
947 |_http-server-header: gws
948 |_http-title: Did not follow redirect to http://www.google.com/
949 | ssl-cert: Subject: commonName=invalid2.invalid
950 | Issuer: commonName=invalid2.invalid
951 | Public Key type: rsa
952 | Public Key bits: 2048
953 | Signature Algorithm: sha256WithRSAEncryption
954 | Not valid before: 2015-01-01T00:00:00
955 | Not valid after: 2030-01-01T00:00:00
956 | MD5: 904a c8d5 445a d06a 8a10 ffcd 8b11 be16
957 |_SHA-1: 4259 517c d4e4 8a28 9d33 2ab3 f0ab 52a3 6632 2824
958 |_ssl-date: 2019-12-26T00:08:06+00:00; 0s from scanner time.
959 | tls-alpn:
960 | grpc-exp
961 | h2
962 |_ http/1.1
963 | tls-nextprotoneg:
964 | grpc-exp
965 | h2
966 |_ http/1.1
967 Scanning ip 200.55.200.5 (webmail.aafp.cl.):
968 21/tcp open ftp syn-ack ttl 50 Pure-FTPd
969 22/tcp open ssh syn-ack ttl 50 OpenSSH 7.4 (protocol 2.0)
970 53/tcp open domain syn-ack ttl 49 ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
971 80/tcp open http syn-ack ttl 50 Apache httpd
972 | http-methods:
973 |_ Supported Methods: GET POST OPTIONS HEAD
974 |_http-title: Site doesn't have a title (text/html).
975 110/tcp open pop3 syn-ack ttl 50 Dovecot pop3d
976 |_pop3-capabilities: TOP STLS CAPA SASL(PLAIN LOGIN) UIDL PIPELINING RESP-CODES AUTH-RESP-CODE USER
977 143/tcp open imap syn-ack ttl 50 Dovecot imapd
978 |_imap-capabilities: listed AUTH=LOGINA0001 ENABLE ID NAMESPACE post-login LITERAL+ OK capabilities AUTH=PLAIN LOGIN-REFERRALS IDLE have more SASL-IR STARTTLS IMAP4rev1 Pre-login
979 443/tcp open ssl/http syn-ack ttl 50 Apache httpd
980 | http-methods:
981 |_ Supported Methods: GET POST OPTIONS HEAD
982 |_http-title: Index of /
983 | ssl-cert: Subject: commonName=aafp.cl
984 | Subject Alternative Name: DNS:aafp.cl, DNS:cpanel.aafp.cl, DNS:mail.aafp.cl, DNS:webdisk.aafp.cl, DNS:webmail.aafp.cl, DNS:www.aafp.cl
985 | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
986 | Public Key type: rsa
987 | Public Key bits: 2048
988 | Signature Algorithm: sha256WithRSAEncryption
989 | Not valid before: 2019-12-07T00:00:00
990 | Not valid after: 2020-03-06T23:59:59
991 | MD5: 84fe 64b2 442a 6882 fa83 5f95 0daa a652
992 |_SHA-1: 1e1a 0b88 346f 787a 541c a8ad c1a8 b993 105b 6116
993 465/tcp open ssl/smtp syn-ack ttl 50 Exim smtpd 4.92
994 | smtp-commands: cpanel1.soporte.cl Hello nmap.scanme.org [104.245.145.185], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
995 |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
996 993/tcp open imaps? syn-ack ttl 50
997 |_imap-capabilities: listed AUTH=LOGINA0001 ENABLE ID SASL-IR post-login LITERAL+ OK capabilities AUTH=PLAIN LOGIN-REFERRALS IDLE have more Pre-login IMAP4rev1 NAMESPACE
998 995/tcp open pop3s? syn-ack ttl 50
999 |_pop3-capabilities: TOP SASL(PLAIN LOGIN) USER CAPA RESP-CODES AUTH-RESP-CODE UIDL PIPELINING
1000 OS Info: Service Info: Host: cpanel1.soporte.cl; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1001 Scanning ip 172.253.112.0 ():
1002 Scanning ip 172.217.32.0 ():
1003 Scanning ip 108.175.97.0 ():
1004 Scanning ip 172.217.212.26 (aspmx.l.google.com):
1005 Scanning ip 172.253.56.0 ():
1006 Scanning ip 173.194.77.26 (ob-in-f26.1e100.net (PTR)):
1007 Scanning ip 200.9.128.0 ():
1008 Scanning ip 108.175.107.0 ():
1009 Scanning ip 173.194.216.27 (vu-in-f27.1e100.net (PTR)):
1010 Scanning ip 172.217.192.0 ():
1011 Scanning ip 108.175.108.0 ():
1012 Scanning ip 173.194.0.0 ():
1013 Scanning ip 74.125.0.0 ():
1014 Scanning ip 173.194.175.27 (qs-in-f27.1e100.net (PTR)):
1015 Scanning ip 172.217.128.0 ():
1016 Scanning ip 108.175.99.0 ():
1017 Scanning ip 216.239.32.0 ():
1018 Scanning ip 138.117.148.94 (ns2.aafp.cl.):
1019 Scanning ip 172.217.160.0 ():
1020 80/tcp open http syn-ack ttl 122 gws
1021 | fingerprint-strings:
1022 | GetRequest:
1023 | HTTP/1.0 200 OK
1024 | Date: Thu, 26 Dec 2019 00:17:45 GMT
1025 | Expires: -1
1026 | Cache-Control: private, max-age=0
1027 | Content-Type: text/html; charset=ISO-8859-1
1028 | P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
1029 | Server: gws
1030 | X-XSS-Protection: 0
1031 | X-Frame-Options: SAMEORIGIN
1032 | Set-Cookie: 1P_JAR=2019-12-26-00; expires=Sat, 25-Jan-2020 00:17:45 GMT; path=/; domain=.google.com
1033 | Set-Cookie: NID=194=iY2-SfeKVLLU7aA8RspLdvLg_mfIUGBlt--EkvQQoEM0K1CC9r2hXLJ200aorv0DYuNb9BqS5OZRBj7tfzUHOIArnuBXNML7F4x4ZkPl_YPDYSwVV1Y_V1OIl1zSkBsBw6mo07iR-rwte8RCF2dyCp97ZQEr9ohfiQE9dqWc9Tc; expires=Fri, 26-Jun-2020 00:17:45 GMT; path=/; domain=.google.com; HttpOnly
1034 | Accept-Ranges: none
1035 | Vary: Accept-Encoding
1036 | <!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="en-CA"><head><meta content="text/html; charset=UTF-8" http-equiv="Content-Type"><meta content="/logos/doodles/2019/happy-holida
1037 | HTTPOptions:
1038 | HTTP/1.0 405 Method Not Allowed
1039 | Allow: GET, HEAD
1040 | Date: Thu, 26 Dec 2019 00:17:45 GMT
1041 | Content-Type: text/html; charset=UTF-8
1042 | Server: gws
1043 | Content-Length: 1592
1044 | X-XSS-Protection: 0
1045 | X-Frame-Options: SAMEORIGIN
1046 | <!DOCTYPE html>
1047 | <html lang=en>
1048 | <meta charset=utf-8>
1049 | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1050 | <title>Error 405 (Method Not Allowed)!!1</title>
1051 | <style>
1052 |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#l
1053 |_http-favicon: Google
1054 | http-methods:
1055 |_ Supported Methods: GET HEAD
1056 | http-robots.txt: 217 disallowed entries (15 shown)
1057 | /search /sdch /groups /index.html? /? /?hl=*&
1058 |_/?hl=*&*&gws_rd=ssl /imgres /u/ /preferences /setprefs /default /m? /m/ /wml?
1059 |_http-server-header: gws
1060 |_http-title: Did not follow redirect to http://www.google.com/
1061 443/tcp open ssl/https syn-ack ttl 122 gws
1062 | fingerprint-strings:
1063 | GetRequest:
1064 | HTTP/1.0 200 OK
1065 | Date: Thu, 26 Dec 2019 00:17:52 GMT
1066 | Expires: -1
1067 | Cache-Control: private, max-age=0
1068 | Content-Type: text/html; charset=ISO-8859-1
1069 | P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
1070 | Server: gws
1071 | X-XSS-Protection: 0
1072 | X-Frame-Options: SAMEORIGIN
1073 | Set-Cookie: 1P_JAR=2019-12-26-00; expires=Sat, 25-Jan-2020 00:17:52 GMT; path=/; domain=.google.com
1074 | Set-Cookie: NID=194=mMnbXPShnLMpc4sSS734bjtKGJM1rzcMVWzqBLdZ479GxMFlrp_G5gqo8c_qBIdNqup1TWCjOZ0_WaExyv0drqJTnBQx6xCHms-t9DtRhSn79JHSqRRrw4PEBx5JR93n9_R5d5AqGmiLFeZEN2HIJ-ZdB2DFRUEC8gyCjaWhPfE; expires=Fri, 26-Jun-2020 00:17:52 GMT; path=/; domain=.google.com; HttpOnly
1075 | Alt-Svc: quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
1076 | Accept-Ranges: none
1077 | Vary: Accept-Encoding
1078 | <!doctype html><html ite
1079 | HTTPOptions:
1080 | HTTP/1.0 405 Method Not Allowed
1081 | Allow: GET, HEAD
1082 | Date: Thu, 26 Dec 2019 00:17:53 GMT
1083 | Content-Type: text/html; charset=UTF-8
1084 | Server: gws
1085 | Content-Length: 1592
1086 | X-XSS-Protection: 0
1087 | X-Frame-Options: SAMEORIGIN
1088 | Alt-Svc: quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
1089 | <!DOCTYPE html>
1090 | <html lang=en>
1091 | <meta charset=utf-8>
1092 | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1093 | <title>Error 405 (Method Not Allowed)!!1</title>
1094 | <style>
1095 |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11p
1096 |_http-favicon: Google
1097 | http-methods:
1098 |_ Supported Methods: GET HEAD
1099 | http-robots.txt: 217 disallowed entries (15 shown)
1100 | /search /sdch /groups /index.html? /? /?hl=*&
1101 |_/?hl=*&*&gws_rd=ssl /imgres /u/ /preferences /setprefs /default /m? /m/ /wml?
1102 |_http-server-header: gws
1103 |_http-title: Did not follow redirect to http://www.google.com/
1104 | ssl-cert: Subject: commonName=invalid2.invalid
1105 | Issuer: commonName=invalid2.invalid
1106 | Public Key type: rsa
1107 | Public Key bits: 2048
1108 | Signature Algorithm: sha256WithRSAEncryption
1109 | Not valid before: 2015-01-01T00:00:00
1110 | Not valid after: 2030-01-01T00:00:00
1111 | MD5: 904a c8d5 445a d06a 8a10 ffcd 8b11 be16
1112 |_SHA-1: 4259 517c d4e4 8a28 9d33 2ab3 f0ab 52a3 6632 2824
1113 |_ssl-date: 2019-12-26T00:19:31+00:00; 0s from scanner time.
1114 | tls-alpn:
1115 | grpc-exp
1116 | h2
1117 |_ http/1.1
1118 | tls-nextprotoneg:
1119 | grpc-exp
1120 | h2
1121 |_ http/1.1
1122 Scanning ip 66.102.0.0 ():
1123 Scanning ip 108.177.8.0 ():
1124 Scanning ip 200.75.7.68 (intelliwebx.intellicomp.cl (PTR)):
1125 53/tcp open domain syn-ack ttl 49 ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
1126 | dns-nsid:
1127 |_ bind.version: 9.11.4-P2-RedHat-9.11.4-9.P2.el7
1128 465/tcp open ssl/smtp syn-ack ttl 50 Exim smtpd 4.92
1129 | smtp-commands: cpanel2.soporte.cl Hello nmap.scanme.org [104.245.145.185], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
1130 |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1131 | ssl-cert: Subject: commonName=cpanel2.soporte.cl
1132 | Subject Alternative Name: DNS:cpanel2.soporte.cl
1133 | Issuer: commonName=cpanel2.soporte.cl
1134 | Public Key type: rsa
1135 | Public Key bits: 2048
1136 | Signature Algorithm: sha256WithRSAEncryption
1137 | Not valid before: 2019-12-17T03:05:16
1138 | Not valid after: 2020-12-16T03:05:16
1139 | MD5: 97c1 0631 00d6 9c6b 3c25 09a2 d71d 7292
1140 |_SHA-1: debb bb9c 7bd3 d33a f974 d3d2 0ce7 35ea c266 e971
1141 Device type: general purpose|storage-misc|firewall
1142 Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%), Synology DiskStation Manager 5.X (85%), WatchGuard Fireware 11.X (85%)
1143 OS Info: Service Info: Host: cpanel2.soporte.cl; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1144 Scanning ip 130.211.0.0 ():
1145 Scanning ip 209.85.128.0 ():
1146 Scanning ip 172.217.0.0 ():
1147 Scanning ip 64.233.177.27 (yx-in-f27.1e100.net (PTR)):
1148 Scanning ip 35.190.247.0 ():
1149 80/tcp open http syn-ack ttl 123
1150 | fingerprint-strings:
1151 | GetRequest, HTTPOptions:
1152 | HTTP/1.0 404 Not Found
1153 | Content-Type: text/html; charset=UTF-8
1154 | Referrer-Policy: no-referrer
1155 | Content-Length: 1561
1156 | Date: Thu, 26 Dec 2019 00:22:13 GMT
1157 | <!DOCTYPE html>
1158 | <html lang=en>
1159 | <meta charset=utf-8>
1160 | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1161 | <title>Error 404 (Not Found)!!1</title>
1162 | <style>
1163 |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/goo
1164 |_http-title: Error 404 (Not Found)!!1
1165 110/tcp open tcpwrapped syn-ack ttl 123
1166 143/tcp open tcpwrapped syn-ack ttl 123
1167 443/tcp open tcpwrapped syn-ack ttl 123
1168 465/tcp open tcpwrapped syn-ack ttl 123
1169 |_smtp-commands: Couldn't establish connection on port 465
1170 587/tcp open tcpwrapped syn-ack ttl 123
1171 |_smtp-commands: Couldn't establish connection on port 587
1172 993/tcp open tcpwrapped syn-ack ttl 123
1173 995/tcp open tcpwrapped syn-ack ttl 123
1174 3389/tcp open tcpwrapped syn-ack ttl 123
1175 5432/tcp open tcpwrapped syn-ack ttl 123
1176 5900/tcp open tcpwrapped syn-ack ttl 123
1177 8080/tcp open http-proxy syn-ack ttl 123
1178 | fingerprint-strings:
1179 | GetRequest:
1180 | HTTP/1.0 404 Not Found
1181 | Content-Type: text/html; charset=UTF-8
1182 | Referrer-Policy: no-referrer
1183 | Content-Length: 1561
1184 | Date: Thu, 26 Dec 2019 00:22:13 GMT
1185 | <!DOCTYPE html>
1186 | <html lang=en>
1187 | <meta charset=utf-8>
1188 | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1189 | <title>Error 404 (Not Found)!!1</title>
1190 | <style>
1191 | *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/goo
1192 | HTTPOptions:
1193 | HTTP/1.0 404 Not Found
1194 | Content-Type: text/html; charset=UTF-8
1195 | Referrer-Policy: no-referrer
1196 | Content-Length: 1561
1197 | Date: Thu, 26 Dec 2019 00:22:14 GMT
1198 | <!DOCTYPE html>
1199 | <html lang=en>
1200 | <meta charset=utf-8>
1201 | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1202 | <title>Error 404 (Not Found)!!1</title>
1203 | <style>
1204 |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/goo
1205 |_http-title: Error 404 (Not Found)!!1
1206 Scanning ip 72.14.192.0 ():
1207 80/tcp open http syn-ack ttl 108 Google httpd
1208 | http-methods:
1209 |_ Supported Methods: GET HEAD POST OPTIONS
1210 |_http-server-header: ghs
1211 |_http-title: Error 404 (Not Found)!!1
1212 443/tcp open ssl/https? syn-ack ttl 108
1213 465/tcp open ssl/smtp syn-ack ttl 108 Google gsmtp
1214 |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
1215 | ssl-cert: Subject: commonName=smtp.gmail.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1216 | Subject Alternative Name: DNS:smtp.gmail.com
1217 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1218 | Public Key type: rsa
1219 | Public Key bits: 2048
1220 | Signature Algorithm: sha256WithRSAEncryption
1221 | Not valid before: 2019-02-26T17:03:31
1222 | Not valid after: 2020-02-21T17:03:31
1223 | MD5: a3ed 0cab 9ab5 109e 5421 aa2f 3cdf 3483
1224 |_SHA-1: 5f7e f238 fa22 d061 3bda 1b5c c014 681e 8037 ca2f
1225 |_ssl-date: 2019-12-26T00:29:36+00:00; 0s from scanner time.
1226 587/tcp open smtp syn-ack ttl 108 Google gsmtp
1227 | smtp-commands: mx.google.com at your service, [104.245.145.185], SIZE 35882577, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1228 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 k78sm11604217ila.80 - gsmtp
1229 | ssl-cert: Subject: commonName=smtp.gmail.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1230 | Subject Alternative Name: DNS:smtp.gmail.com
1231 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1232 | Public Key type: rsa
1233 | Public Key bits: 2048
1234 | Signature Algorithm: sha256WithRSAEncryption
1235 | Not valid before: 2019-02-26T17:03:31
1236 | Not valid after: 2020-02-21T17:03:31
1237 | MD5: a3ed 0cab 9ab5 109e 5421 aa2f 3cdf 3483
1238 |_SHA-1: 5f7e f238 fa22 d061 3bda 1b5c c014 681e 8037 ca2f
1239 |_ssl-date: 2019-12-26T00:29:36+00:00; 0s from scanner time.
1240 993/tcp open ssl/imap syn-ack ttl 108
1241 | fingerprint-strings:
1242 | NULL:
1243 |_ * OK Gimap ready for requests from 104.245.145.185 e23mb178439688ivn
1244 | ssl-cert: Subject: commonName=ghs-ssl.googlehosted.com/organizationName=Google Inc/stateOrProvinceName=California/countryName=US
1245 | Subject Alternative Name: DNS:ghs-ssl.googlehosted.com
1246 | Issuer: commonName=Google Internet Authority G2/organizationName=Google Inc/countryName=US
1247 | Public Key type: rsa
1248 | Public Key bits: 2048
1249 | Signature Algorithm: sha256WithRSAEncryption
1250 | Not valid before: 2015-11-27T08:49:40
1251 | Not valid after: 2016-11-26T00:00:00
1252 | MD5: fe82 6dc4 7414 1ec6 186e 2a96 928b e8f9
1253 |_SHA-1: 12ca fdcc 0f42 c1cf e45f 4d5e bd10 503a c109 650e
1254 |_ssl-date: 2019-12-26T00:29:36+00:00; 0s from scanner time.
1255 995/tcp open ssl/pop3 syn-ack ttl 108 Google Gmail pop3d (o22mb183174489ivn)
1256 | ssl-cert: Subject: commonName=ghs-ssl.googlehosted.com/organizationName=Google Inc/stateOrProvinceName=California/countryName=US
1257 | Subject Alternative Name: DNS:ghs-ssl.googlehosted.com
1258 | Issuer: commonName=Google Internet Authority G2/organizationName=Google Inc/countryName=US
1259 | Public Key type: rsa
1260 | Public Key bits: 2048
1261 | Signature Algorithm: sha256WithRSAEncryption
1262 | Not valid before: 2015-11-27T08:49:40
1263 | Not valid after: 2016-11-26T00:00:00
1264 | MD5: fe82 6dc4 7414 1ec6 186e 2a96 928b e8f9
1265 |_SHA-1: 12ca fdcc 0f42 c1cf e45f 4d5e bd10 503a c109 650e
1266 |_ssl-date: 2019-12-26T00:29:36+00:00; 0s from scanner time.
1267 OS Info: Service Info: Host: mx.google.com
1268 Scanning ip 66.249.80.0 ():
1269 Scanning ip 35.191.0.0 ():
1270 Scanning ip 108.175.110.0 ():
1271 Scanning ip 108.177.96.0 ():
1272 Scanning ip 64.233.160.0 ():
1273 WebCrawling domain's web servers... up to 50 max links.
1274
1275 + URL to crawl: http://webmail.aafp.cl.
1276 + Date: 2019-12-25
1277
1278 + Crawling URL: http://webmail.aafp.cl.:
1279 + Links:
1280 + Crawling http://webmail.aafp.cl. (timed out)
1281 + Searching for directories...
1282 + Searching open folders...
1283
1284
1285 + URL to crawl: http://ftp.aafp.cl.
1286 + Date: 2019-12-25
1287
1288 + Crawling URL: http://ftp.aafp.cl.:
1289 + Links:
1290 + Crawling http://ftp.aafp.cl. (timed out)
1291 + Searching for directories...
1292 + Searching open folders...
1293
1294
1295 + URL to crawl: http://cpanel1.soporte.cl
1296 + Date: 2019-12-25
1297
1298 + Crawling URL: http://cpanel1.soporte.cl:
1299 + Links:
1300 + Crawling http://cpanel1.soporte.cl (timed out)
1301 + Searching for directories...
1302 + Searching open folders...
1303
1304
1305 + URL to crawl: https://webmail.aafp.cl.
1306 + Date: 2019-12-25
1307
1308 + Crawling URL: https://webmail.aafp.cl.:
1309 + Links:
1310 + Crawling https://webmail.aafp.cl. (timed out)
1311 + Searching for directories...
1312 + Searching open folders...
1313
1314
1315 + URL to crawl: https://ftp.aafp.cl.
1316 + Date: 2019-12-25
1317
1318 + Crawling URL: https://ftp.aafp.cl.:
1319 + Links:
1320 + Crawling https://ftp.aafp.cl. (timed out)
1321 + Searching for directories...
1322 + Searching open folders...
1323
1324
1325 + URL to crawl: https://cpanel1.soporte.cl
1326 + Date: 2019-12-25
1327
1328 + Crawling URL: https://cpanel1.soporte.cl:
1329 + Links:
1330 + Crawling https://cpanel1.soporte.cl (timed out)
1331 + Searching for directories...
1332 + Searching open folders...
1333
1334--Finished--
1335Summary information for domain aafp.cl.
1336-----------------------------------------
1337 Domain Specific Information:
1338 Email: contacto@aafp.cl
1339 Email: contacto@aafp.cl;
1340 Email: estudios@aafp.cl
1341 Email: n@aafp.cl,
1342
1343 Domain Ips Information:
1344 IP: 216.58.192.0
1345 Type: SPF
1346 Is Active: True (reset ttl 64)
1347 Port: 80/tcp open http syn-ack ttl 108 gws
1348 Script Info: | fingerprint-strings:
1349 Script Info: | GetRequest:
1350 Script Info: | HTTP/1.0 200 OK
1351 Script Info: | Date: Thu, 26 Dec 2019 00:06:50 GMT
1352 Script Info: | Expires: -1
1353 Script Info: | Cache-Control: private, max-age=0
1354 Script Info: | Content-Type: text/html; charset=ISO-8859-1
1355 Script Info: | P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
1356 Script Info: | Server: gws
1357 Script Info: | X-XSS-Protection: 0
1358 Script Info: | X-Frame-Options: SAMEORIGIN
1359 Script Info: | Set-Cookie: 1P_JAR=2019-12-26-00; expires=Sat, 25-Jan-2020 00:06:50 GMT; path=/; domain=.google.com
1360 Script Info: | Set-Cookie: NID=194=TkJfTfJUzU_yU59OFf8mA5UoPqri-kYvS_lJocTy-mvUF_KHUL6PWZmJSu18DZN1WzTVFL_ykSRtrAo51IxZycE2QLOi9niBrxHmYPr99eoRK8-KLq4DVX1OtjAJqhWl9thgh4AyYgvwsr_aFCIXe248QwRK1myXEECHrFt5Y9A; expires=Fri, 26-Jun-2020 00:06:50 GMT; path=/; domain=.google.com; HttpOnly
1361 Script Info: | Accept-Ranges: none
1362 Script Info: | Vary: Accept-Encoding
1363 Script Info: | <!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="en-CA"><head><meta content="text/html; charset=UTF-8" http-equiv="Content-Type"><meta content="/logos/doodles/2019/happy-holida
1364 Script Info: | HTTPOptions:
1365 Script Info: | HTTP/1.0 405 Method Not Allowed
1366 Script Info: | Allow: GET, HEAD
1367 Script Info: | Date: Thu, 26 Dec 2019 00:06:50 GMT
1368 Script Info: | Content-Type: text/html; charset=UTF-8
1369 Script Info: | Server: gws
1370 Script Info: | Content-Length: 1592
1371 Script Info: | X-XSS-Protection: 0
1372 Script Info: | X-Frame-Options: SAMEORIGIN
1373 Script Info: | <!DOCTYPE html>
1374 Script Info: | <html lang=en>
1375 Script Info: | <meta charset=utf-8>
1376 Script Info: | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1377 Script Info: | <title>Error 405 (Method Not Allowed)!!1</title>
1378 Script Info: | <style>
1379 Script Info: |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#l
1380 Script Info: |_http-favicon: Google
1381 Script Info: | http-methods:
1382 Script Info: |_ Supported Methods: GET HEAD
1383 Script Info: | http-robots.txt: 217 disallowed entries (15 shown)
1384 Script Info: | /search /sdch /groups /index.html? /? /?hl=*&
1385 Script Info: |_/?hl=*&*&gws_rd=ssl /imgres /u/ /preferences /setprefs /default /m? /m/ /wml?
1386 Script Info: |_http-server-header: gws
1387 Script Info: |_http-title: Did not follow redirect to http://www.google.com/
1388 Port: 443/tcp open ssl/https syn-ack ttl 108 gws
1389 Script Info: | fingerprint-strings:
1390 Script Info: | GetRequest:
1391 Script Info: | HTTP/1.0 200 OK
1392 Script Info: | Date: Thu, 26 Dec 2019 00:06:56 GMT
1393 Script Info: | Expires: -1
1394 Script Info: | Cache-Control: private, max-age=0
1395 Script Info: | Content-Type: text/html; charset=ISO-8859-1
1396 Script Info: | P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
1397 Script Info: | Server: gws
1398 Script Info: | X-XSS-Protection: 0
1399 Script Info: | X-Frame-Options: SAMEORIGIN
1400 Script Info: | Set-Cookie: 1P_JAR=2019-12-26-00; expires=Sat, 25-Jan-2020 00:06:56 GMT; path=/; domain=.google.com
1401 Script Info: | Set-Cookie: NID=194=FCe-Dbma-gYcKtgLiuWAI7dlSVsi1duOk-pk0Zj0cCokAPagzkysJ4l0OFqmVirgm5DfiblE5kkLYMYu_5IspsCZClLjD_cdk-QMrtJjSHnlzcKJYJWouF5lVSDxICjWyOBiRC505lFXA4w-OhDFs3izyLNmVYJi4vBvjhCYmEM; expires=Fri, 26-Jun-2020 00:06:56 GMT; path=/; domain=.google.com; HttpOnly
1402 Script Info: | Alt-Svc: quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
1403 Script Info: | Accept-Ranges: none
1404 Script Info: | Vary: Accept-Encoding
1405 Script Info: | <!doctype html><html ite
1406 Script Info: | HTTPOptions:
1407 Script Info: | HTTP/1.0 405 Method Not Allowed
1408 Script Info: | Allow: GET, HEAD
1409 Script Info: | Date: Thu, 26 Dec 2019 00:06:57 GMT
1410 Script Info: | Content-Type: text/html; charset=UTF-8
1411 Script Info: | Server: gws
1412 Script Info: | Content-Length: 1592
1413 Script Info: | X-XSS-Protection: 0
1414 Script Info: | X-Frame-Options: SAMEORIGIN
1415 Script Info: | Alt-Svc: quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
1416 Script Info: | <!DOCTYPE html>
1417 Script Info: | <html lang=en>
1418 Script Info: | <meta charset=utf-8>
1419 Script Info: | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1420 Script Info: | <title>Error 405 (Method Not Allowed)!!1</title>
1421 Script Info: | <style>
1422 Script Info: |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11p
1423 Script Info: |_http-favicon: Google
1424 Script Info: | http-methods:
1425 Script Info: |_ Supported Methods: GET HEAD
1426 Script Info: | http-robots.txt: 217 disallowed entries (15 shown)
1427 Script Info: | /search /sdch /groups /index.html? /? /?hl=*&
1428 Script Info: |_/?hl=*&*&gws_rd=ssl /imgres /u/ /preferences /setprefs /default /m? /m/ /wml?
1429 Script Info: |_http-server-header: gws
1430 Script Info: |_http-title: Did not follow redirect to http://www.google.com/
1431 Script Info: | ssl-cert: Subject: commonName=invalid2.invalid
1432 Script Info: | Issuer: commonName=invalid2.invalid
1433 Script Info: | Public Key type: rsa
1434 Script Info: | Public Key bits: 2048
1435 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1436 Script Info: | Not valid before: 2015-01-01T00:00:00
1437 Script Info: | Not valid after: 2030-01-01T00:00:00
1438 Script Info: | MD5: 904a c8d5 445a d06a 8a10 ffcd 8b11 be16
1439 Script Info: |_SHA-1: 4259 517c d4e4 8a28 9d33 2ab3 f0ab 52a3 6632 2824
1440 Script Info: |_ssl-date: 2019-12-26T00:08:06+00:00; 0s from scanner time.
1441 Script Info: | tls-alpn:
1442 Script Info: | grpc-exp
1443 Script Info: | h2
1444 Script Info: |_ http/1.1
1445 Script Info: | tls-nextprotoneg:
1446 Script Info: | grpc-exp
1447 Script Info: | h2
1448 Script Info: |_ http/1.1
1449 IP: 200.55.200.5
1450 HostName: cpanel1.soporte.cl Type: NS
1451 HostName: cpanel3.intellicomp.cl Type: PTR
1452 Type: SPF
1453 HostName: ftp.aafp.cl. Type: A
1454 HostName: webmail.aafp.cl. Type: A
1455 Country: Chile
1456 Is Active: True (reset ttl 64)
1457 Port: 21/tcp open ftp syn-ack ttl 50 Pure-FTPd
1458 Port: 22/tcp open ssh syn-ack ttl 50 OpenSSH 7.4 (protocol 2.0)
1459 Port: 53/tcp open domain syn-ack ttl 49 ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
1460 Port: 80/tcp open http syn-ack ttl 50 Apache httpd
1461 Script Info: | http-methods:
1462 Script Info: |_ Supported Methods: GET POST OPTIONS HEAD
1463 Script Info: |_http-title: Site doesn't have a title (text/html).
1464 Port: 110/tcp open pop3 syn-ack ttl 50 Dovecot pop3d
1465 Script Info: |_pop3-capabilities: TOP STLS CAPA SASL(PLAIN LOGIN) UIDL PIPELINING RESP-CODES AUTH-RESP-CODE USER
1466 Port: 143/tcp open imap syn-ack ttl 50 Dovecot imapd
1467 Script Info: |_imap-capabilities: listed AUTH=LOGINA0001 ENABLE ID NAMESPACE post-login LITERAL+ OK capabilities AUTH=PLAIN LOGIN-REFERRALS IDLE have more SASL-IR STARTTLS IMAP4rev1 Pre-login
1468 Port: 443/tcp open ssl/http syn-ack ttl 50 Apache httpd
1469 Script Info: | http-methods:
1470 Script Info: |_ Supported Methods: GET POST OPTIONS HEAD
1471 Script Info: |_http-title: Index of /
1472 Script Info: | ssl-cert: Subject: commonName=aafp.cl
1473 Script Info: | Subject Alternative Name: DNS:aafp.cl, DNS:cpanel.aafp.cl, DNS:mail.aafp.cl, DNS:webdisk.aafp.cl, DNS:webmail.aafp.cl, DNS:www.aafp.cl
1474 Script Info: | Issuer: commonName=cPanel, Inc. Certification Authority/organizationName=cPanel, Inc./stateOrProvinceName=TX/countryName=US
1475 Script Info: | Public Key type: rsa
1476 Script Info: | Public Key bits: 2048
1477 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1478 Script Info: | Not valid before: 2019-12-07T00:00:00
1479 Script Info: | Not valid after: 2020-03-06T23:59:59
1480 Script Info: | MD5: 84fe 64b2 442a 6882 fa83 5f95 0daa a652
1481 Script Info: |_SHA-1: 1e1a 0b88 346f 787a 541c a8ad c1a8 b993 105b 6116
1482 Port: 465/tcp open ssl/smtp syn-ack ttl 50 Exim smtpd 4.92
1483 Script Info: | smtp-commands: cpanel1.soporte.cl Hello nmap.scanme.org [104.245.145.185], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
1484 Script Info: |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1485 Port: 993/tcp open imaps? syn-ack ttl 50
1486 Script Info: |_imap-capabilities: listed AUTH=LOGINA0001 ENABLE ID SASL-IR post-login LITERAL+ OK capabilities AUTH=PLAIN LOGIN-REFERRALS IDLE have more Pre-login IMAP4rev1 NAMESPACE
1487 Port: 995/tcp open pop3s? syn-ack ttl 50
1488 Script Info: |_pop3-capabilities: TOP SASL(PLAIN LOGIN) USER CAPA RESP-CODES AUTH-RESP-CODE UIDL PIPELINING
1489 Os Info: Host: cpanel1.soporte.cl; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1490 IP: 172.253.112.0
1491 Type: SPF
1492 Is Active: True (reset ttl 64)
1493 IP: 172.217.32.0
1494 Type: SPF
1495 Is Active: True (reset ttl 64)
1496 IP: 108.175.97.0
1497 Type: SPF
1498 Is Active: True (reset ttl 64)
1499 IP: 172.217.212.26
1500 HostName: aspmx.l.google.com Type: MX
1501 Country: United States
1502 Is Active: True (echo-reply ttl 48)
1503 IP: 172.253.56.0
1504 Type: SPF
1505 Is Active: True (reset ttl 64)
1506 IP: 173.194.77.26
1507 HostName: alt1.aspmx.l.google.com Type: MX
1508 HostName: ob-in-f26.1e100.net Type: PTR
1509 Country: United States
1510 Is Active: True (reset ttl 64)
1511 IP: 200.9.128.0
1512 Type: SPF
1513 Is Active: True (reset ttl 64)
1514 IP: 108.175.107.0
1515 Type: SPF
1516 Is Active: True (reset ttl 64)
1517 IP: 173.194.216.27
1518 HostName: alt4.aspmx.l.google.com Type: MX
1519 HostName: vu-in-f27.1e100.net Type: PTR
1520 Country: United States
1521 Is Active: True (reset ttl 64)
1522 IP: 172.217.192.0
1523 Type: SPF
1524 Is Active: True (reset ttl 64)
1525 IP: 108.175.108.0
1526 Type: SPF
1527 Is Active: True (reset ttl 64)
1528 IP: 173.194.0.0
1529 Type: SPF
1530 Is Active: True (reset ttl 64)
1531 IP: 74.125.0.0
1532 Type: SPF
1533 Is Active: True (reset ttl 64)
1534 IP: 173.194.175.27
1535 HostName: alt3.aspmx.l.google.com Type: MX
1536 HostName: qs-in-f27.1e100.net Type: PTR
1537 Country: United States
1538 Is Active: True (reset ttl 64)
1539 IP: 172.217.128.0
1540 Type: SPF
1541 Is Active: True (reset ttl 64)
1542 IP: 108.175.99.0
1543 Type: SPF
1544 Is Active: True (reset ttl 64)
1545 IP: 216.239.32.0
1546 Type: SPF
1547 Is Active: True (reset ttl 64)
1548 IP: 138.117.148.94
1549 HostName: www.aafp.cl. Type: A
1550 HostName: mail.aafp.cl. Type: A
1551 HostName: host94.138.117.148.static.wirenetchile.com Type: PTR
1552 HostName: ns1.aafp.cl. Type: A
1553 HostName: ns2.aafp.cl. Type: A
1554 Country: Chile
1555 Is Active: True (reset ttl 64)
1556 IP: 172.217.160.0
1557 Type: SPF
1558 Is Active: True (reset ttl 64)
1559 Port: 80/tcp open http syn-ack ttl 122 gws
1560 Script Info: | fingerprint-strings:
1561 Script Info: | GetRequest:
1562 Script Info: | HTTP/1.0 200 OK
1563 Script Info: | Date: Thu, 26 Dec 2019 00:17:45 GMT
1564 Script Info: | Expires: -1
1565 Script Info: | Cache-Control: private, max-age=0
1566 Script Info: | Content-Type: text/html; charset=ISO-8859-1
1567 Script Info: | P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
1568 Script Info: | Server: gws
1569 Script Info: | X-XSS-Protection: 0
1570 Script Info: | X-Frame-Options: SAMEORIGIN
1571 Script Info: | Set-Cookie: 1P_JAR=2019-12-26-00; expires=Sat, 25-Jan-2020 00:17:45 GMT; path=/; domain=.google.com
1572 Script Info: | Set-Cookie: NID=194=iY2-SfeKVLLU7aA8RspLdvLg_mfIUGBlt--EkvQQoEM0K1CC9r2hXLJ200aorv0DYuNb9BqS5OZRBj7tfzUHOIArnuBXNML7F4x4ZkPl_YPDYSwVV1Y_V1OIl1zSkBsBw6mo07iR-rwte8RCF2dyCp97ZQEr9ohfiQE9dqWc9Tc; expires=Fri, 26-Jun-2020 00:17:45 GMT; path=/; domain=.google.com; HttpOnly
1573 Script Info: | Accept-Ranges: none
1574 Script Info: | Vary: Accept-Encoding
1575 Script Info: | <!doctype html><html itemscope="" itemtype="http://schema.org/WebPage" lang="en-CA"><head><meta content="text/html; charset=UTF-8" http-equiv="Content-Type"><meta content="/logos/doodles/2019/happy-holida
1576 Script Info: | HTTPOptions:
1577 Script Info: | HTTP/1.0 405 Method Not Allowed
1578 Script Info: | Allow: GET, HEAD
1579 Script Info: | Date: Thu, 26 Dec 2019 00:17:45 GMT
1580 Script Info: | Content-Type: text/html; charset=UTF-8
1581 Script Info: | Server: gws
1582 Script Info: | Content-Length: 1592
1583 Script Info: | X-XSS-Protection: 0
1584 Script Info: | X-Frame-Options: SAMEORIGIN
1585 Script Info: | <!DOCTYPE html>
1586 Script Info: | <html lang=en>
1587 Script Info: | <meta charset=utf-8>
1588 Script Info: | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1589 Script Info: | <title>Error 405 (Method Not Allowed)!!1</title>
1590 Script Info: | <style>
1591 Script Info: |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#l
1592 Script Info: |_http-favicon: Google
1593 Script Info: | http-methods:
1594 Script Info: |_ Supported Methods: GET HEAD
1595 Script Info: | http-robots.txt: 217 disallowed entries (15 shown)
1596 Script Info: | /search /sdch /groups /index.html? /? /?hl=*&
1597 Script Info: |_/?hl=*&*&gws_rd=ssl /imgres /u/ /preferences /setprefs /default /m? /m/ /wml?
1598 Script Info: |_http-server-header: gws
1599 Script Info: |_http-title: Did not follow redirect to http://www.google.com/
1600 Port: 443/tcp open ssl/https syn-ack ttl 122 gws
1601 Script Info: | fingerprint-strings:
1602 Script Info: | GetRequest:
1603 Script Info: | HTTP/1.0 200 OK
1604 Script Info: | Date: Thu, 26 Dec 2019 00:17:52 GMT
1605 Script Info: | Expires: -1
1606 Script Info: | Cache-Control: private, max-age=0
1607 Script Info: | Content-Type: text/html; charset=ISO-8859-1
1608 Script Info: | P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
1609 Script Info: | Server: gws
1610 Script Info: | X-XSS-Protection: 0
1611 Script Info: | X-Frame-Options: SAMEORIGIN
1612 Script Info: | Set-Cookie: 1P_JAR=2019-12-26-00; expires=Sat, 25-Jan-2020 00:17:52 GMT; path=/; domain=.google.com
1613 Script Info: | Set-Cookie: NID=194=mMnbXPShnLMpc4sSS734bjtKGJM1rzcMVWzqBLdZ479GxMFlrp_G5gqo8c_qBIdNqup1TWCjOZ0_WaExyv0drqJTnBQx6xCHms-t9DtRhSn79JHSqRRrw4PEBx5JR93n9_R5d5AqGmiLFeZEN2HIJ-ZdB2DFRUEC8gyCjaWhPfE; expires=Fri, 26-Jun-2020 00:17:52 GMT; path=/; domain=.google.com; HttpOnly
1614 Script Info: | Alt-Svc: quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
1615 Script Info: | Accept-Ranges: none
1616 Script Info: | Vary: Accept-Encoding
1617 Script Info: | <!doctype html><html ite
1618 Script Info: | HTTPOptions:
1619 Script Info: | HTTP/1.0 405 Method Not Allowed
1620 Script Info: | Allow: GET, HEAD
1621 Script Info: | Date: Thu, 26 Dec 2019 00:17:53 GMT
1622 Script Info: | Content-Type: text/html; charset=UTF-8
1623 Script Info: | Server: gws
1624 Script Info: | Content-Length: 1592
1625 Script Info: | X-XSS-Protection: 0
1626 Script Info: | X-Frame-Options: SAMEORIGIN
1627 Script Info: | Alt-Svc: quic=":443"; ma=2592000; v="46,43",h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000
1628 Script Info: | <!DOCTYPE html>
1629 Script Info: | <html lang=en>
1630 Script Info: | <meta charset=utf-8>
1631 Script Info: | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1632 Script Info: | <title>Error 405 (Method Not Allowed)!!1</title>
1633 Script Info: | <style>
1634 Script Info: |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11p
1635 Script Info: |_http-favicon: Google
1636 Script Info: | http-methods:
1637 Script Info: |_ Supported Methods: GET HEAD
1638 Script Info: | http-robots.txt: 217 disallowed entries (15 shown)
1639 Script Info: | /search /sdch /groups /index.html? /? /?hl=*&
1640 Script Info: |_/?hl=*&*&gws_rd=ssl /imgres /u/ /preferences /setprefs /default /m? /m/ /wml?
1641 Script Info: |_http-server-header: gws
1642 Script Info: |_http-title: Did not follow redirect to http://www.google.com/
1643 Script Info: | ssl-cert: Subject: commonName=invalid2.invalid
1644 Script Info: | Issuer: commonName=invalid2.invalid
1645 Script Info: | Public Key type: rsa
1646 Script Info: | Public Key bits: 2048
1647 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1648 Script Info: | Not valid before: 2015-01-01T00:00:00
1649 Script Info: | Not valid after: 2030-01-01T00:00:00
1650 Script Info: | MD5: 904a c8d5 445a d06a 8a10 ffcd 8b11 be16
1651 Script Info: |_SHA-1: 4259 517c d4e4 8a28 9d33 2ab3 f0ab 52a3 6632 2824
1652 Script Info: |_ssl-date: 2019-12-26T00:19:31+00:00; 0s from scanner time.
1653 Script Info: | tls-alpn:
1654 Script Info: | grpc-exp
1655 Script Info: | h2
1656 Script Info: |_ http/1.1
1657 Script Info: | tls-nextprotoneg:
1658 Script Info: | grpc-exp
1659 Script Info: | h2
1660 Script Info: |_ http/1.1
1661 IP: 66.102.0.0
1662 Type: SPF
1663 Is Active: True (reset ttl 64)
1664 IP: 108.177.8.0
1665 Type: SPF
1666 Is Active: True (reset ttl 64)
1667 IP: 200.75.7.68
1668 HostName: cpanel2.soporte.cl Type: NS
1669 HostName: intelliwebx.intellicomp.cl Type: PTR
1670 Country: Chile
1671 Is Active: True (reset ttl 64)
1672 Port: 53/tcp open domain syn-ack ttl 49 ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
1673 Script Info: | dns-nsid:
1674 Script Info: |_ bind.version: 9.11.4-P2-RedHat-9.11.4-9.P2.el7
1675 Port: 465/tcp open ssl/smtp syn-ack ttl 50 Exim smtpd 4.92
1676 Script Info: | smtp-commands: cpanel2.soporte.cl Hello nmap.scanme.org [104.245.145.185], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
1677 Script Info: |_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1678 Script Info: | ssl-cert: Subject: commonName=cpanel2.soporte.cl
1679 Script Info: | Subject Alternative Name: DNS:cpanel2.soporte.cl
1680 Script Info: | Issuer: commonName=cpanel2.soporte.cl
1681 Script Info: | Public Key type: rsa
1682 Script Info: | Public Key bits: 2048
1683 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1684 Script Info: | Not valid before: 2019-12-17T03:05:16
1685 Script Info: | Not valid after: 2020-12-16T03:05:16
1686 Script Info: | MD5: 97c1 0631 00d6 9c6b 3c25 09a2 d71d 7292
1687 Script Info: |_SHA-1: debb bb9c 7bd3 d33a f974 d3d2 0ce7 35ea c266 e971
1688 Script Info: Device type: general purpose|storage-misc|firewall
1689 Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%), Synology DiskStation Manager 5.X (85%), WatchGuard Fireware 11.X (85%)
1690 Os Info: Host: cpanel2.soporte.cl; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1691 IP: 130.211.0.0
1692 Type: SPF
1693 Is Active: True (reset ttl 64)
1694 IP: 209.85.128.0
1695 Type: SPF
1696 Is Active: True (reset ttl 64)
1697 IP: 172.217.0.0
1698 Type: SPF
1699 Is Active: True (reset ttl 64)
1700 IP: 64.233.177.27
1701 HostName: alt2.aspmx.l.google.com Type: MX
1702 HostName: yx-in-f27.1e100.net Type: PTR
1703 Country: United States
1704 Is Active: True (reset ttl 64)
1705 IP: 35.190.247.0
1706 Type: SPF
1707 Is Active: True (echo-reply ttl 57)
1708 Port: 80/tcp open http syn-ack ttl 123
1709 Script Info: | fingerprint-strings:
1710 Script Info: | GetRequest, HTTPOptions:
1711 Script Info: | HTTP/1.0 404 Not Found
1712 Script Info: | Content-Type: text/html; charset=UTF-8
1713 Script Info: | Referrer-Policy: no-referrer
1714 Script Info: | Content-Length: 1561
1715 Script Info: | Date: Thu, 26 Dec 2019 00:22:13 GMT
1716 Script Info: | <!DOCTYPE html>
1717 Script Info: | <html lang=en>
1718 Script Info: | <meta charset=utf-8>
1719 Script Info: | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1720 Script Info: | <title>Error 404 (Not Found)!!1</title>
1721 Script Info: | <style>
1722 Script Info: |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/goo
1723 Script Info: |_http-title: Error 404 (Not Found)!!1
1724 Port: 110/tcp open tcpwrapped syn-ack ttl 123
1725 Port: 143/tcp open tcpwrapped syn-ack ttl 123
1726 Port: 443/tcp open tcpwrapped syn-ack ttl 123
1727 Port: 465/tcp open tcpwrapped syn-ack ttl 123
1728 Script Info: |_smtp-commands: Couldn't establish connection on port 465
1729 Port: 587/tcp open tcpwrapped syn-ack ttl 123
1730 Script Info: |_smtp-commands: Couldn't establish connection on port 587
1731 Port: 993/tcp open tcpwrapped syn-ack ttl 123
1732 Port: 995/tcp open tcpwrapped syn-ack ttl 123
1733 Port: 3389/tcp open tcpwrapped syn-ack ttl 123
1734 Port: 5432/tcp open tcpwrapped syn-ack ttl 123
1735 Port: 5900/tcp open tcpwrapped syn-ack ttl 123
1736 Port: 8080/tcp open http-proxy syn-ack ttl 123
1737 Script Info: | fingerprint-strings:
1738 Script Info: | GetRequest:
1739 Script Info: | HTTP/1.0 404 Not Found
1740 Script Info: | Content-Type: text/html; charset=UTF-8
1741 Script Info: | Referrer-Policy: no-referrer
1742 Script Info: | Content-Length: 1561
1743 Script Info: | Date: Thu, 26 Dec 2019 00:22:13 GMT
1744 Script Info: | <!DOCTYPE html>
1745 Script Info: | <html lang=en>
1746 Script Info: | <meta charset=utf-8>
1747 Script Info: | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1748 Script Info: | <title>Error 404 (Not Found)!!1</title>
1749 Script Info: | <style>
1750 Script Info: | *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/goo
1751 Script Info: | HTTPOptions:
1752 Script Info: | HTTP/1.0 404 Not Found
1753 Script Info: | Content-Type: text/html; charset=UTF-8
1754 Script Info: | Referrer-Policy: no-referrer
1755 Script Info: | Content-Length: 1561
1756 Script Info: | Date: Thu, 26 Dec 2019 00:22:14 GMT
1757 Script Info: | <!DOCTYPE html>
1758 Script Info: | <html lang=en>
1759 Script Info: | <meta charset=utf-8>
1760 Script Info: | <meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width">
1761 Script Info: | <title>Error 404 (Not Found)!!1</title>
1762 Script Info: | <style>
1763 Script Info: |_ *{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}* > body{background:url(//www.google.com/images/errors/robot.png) 100% 5px no-repeat;padding-right:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#logo{background:url(//www.google.com/images/branding/googlelogo/1x/goo
1764 Script Info: |_http-title: Error 404 (Not Found)!!1
1765 IP: 72.14.192.0
1766 Type: SPF
1767 Is Active: True (reset ttl 64)
1768 Port: 80/tcp open http syn-ack ttl 108 Google httpd
1769 Script Info: | http-methods:
1770 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1771 Script Info: |_http-server-header: ghs
1772 Script Info: |_http-title: Error 404 (Not Found)!!1
1773 Port: 443/tcp open ssl/https? syn-ack ttl 108
1774 Port: 465/tcp open ssl/smtp syn-ack ttl 108 Google gsmtp
1775 Script Info: |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
1776 Script Info: | ssl-cert: Subject: commonName=smtp.gmail.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1777 Script Info: | Subject Alternative Name: DNS:smtp.gmail.com
1778 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1779 Script Info: | Public Key type: rsa
1780 Script Info: | Public Key bits: 2048
1781 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1782 Script Info: | Not valid before: 2019-02-26T17:03:31
1783 Script Info: | Not valid after: 2020-02-21T17:03:31
1784 Script Info: | MD5: a3ed 0cab 9ab5 109e 5421 aa2f 3cdf 3483
1785 Script Info: |_SHA-1: 5f7e f238 fa22 d061 3bda 1b5c c014 681e 8037 ca2f
1786 Script Info: |_ssl-date: 2019-12-26T00:29:36+00:00; 0s from scanner time.
1787 Port: 587/tcp open smtp syn-ack ttl 108 Google gsmtp
1788 Script Info: | smtp-commands: mx.google.com at your service, [104.245.145.185], SIZE 35882577, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1789 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 k78sm11604217ila.80 - gsmtp
1790 Script Info: | ssl-cert: Subject: commonName=smtp.gmail.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1791 Script Info: | Subject Alternative Name: DNS:smtp.gmail.com
1792 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1793 Script Info: | Public Key type: rsa
1794 Script Info: | Public Key bits: 2048
1795 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1796 Script Info: | Not valid before: 2019-02-26T17:03:31
1797 Script Info: | Not valid after: 2020-02-21T17:03:31
1798 Script Info: | MD5: a3ed 0cab 9ab5 109e 5421 aa2f 3cdf 3483
1799 Script Info: |_SHA-1: 5f7e f238 fa22 d061 3bda 1b5c c014 681e 8037 ca2f
1800 Script Info: |_ssl-date: 2019-12-26T00:29:36+00:00; 0s from scanner time.
1801 Port: 993/tcp open ssl/imap syn-ack ttl 108
1802 Script Info: | fingerprint-strings:
1803 Script Info: | NULL:
1804 Script Info: |_ * OK Gimap ready for requests from 104.245.145.185 e23mb178439688ivn
1805 Script Info: | ssl-cert: Subject: commonName=ghs-ssl.googlehosted.com/organizationName=Google Inc/stateOrProvinceName=California/countryName=US
1806 Script Info: | Subject Alternative Name: DNS:ghs-ssl.googlehosted.com
1807 Script Info: | Issuer: commonName=Google Internet Authority G2/organizationName=Google Inc/countryName=US
1808 Script Info: | Public Key type: rsa
1809 Script Info: | Public Key bits: 2048
1810 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1811 Script Info: | Not valid before: 2015-11-27T08:49:40
1812 Script Info: | Not valid after: 2016-11-26T00:00:00
1813 Script Info: | MD5: fe82 6dc4 7414 1ec6 186e 2a96 928b e8f9
1814 Script Info: |_SHA-1: 12ca fdcc 0f42 c1cf e45f 4d5e bd10 503a c109 650e
1815 Script Info: |_ssl-date: 2019-12-26T00:29:36+00:00; 0s from scanner time.
1816 Port: 995/tcp open ssl/pop3 syn-ack ttl 108 Google Gmail pop3d (o22mb183174489ivn)
1817 Script Info: | ssl-cert: Subject: commonName=ghs-ssl.googlehosted.com/organizationName=Google Inc/stateOrProvinceName=California/countryName=US
1818 Script Info: | Subject Alternative Name: DNS:ghs-ssl.googlehosted.com
1819 Script Info: | Issuer: commonName=Google Internet Authority G2/organizationName=Google Inc/countryName=US
1820 Script Info: | Public Key type: rsa
1821 Script Info: | Public Key bits: 2048
1822 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1823 Script Info: | Not valid before: 2015-11-27T08:49:40
1824 Script Info: | Not valid after: 2016-11-26T00:00:00
1825 Script Info: | MD5: fe82 6dc4 7414 1ec6 186e 2a96 928b e8f9
1826 Script Info: |_SHA-1: 12ca fdcc 0f42 c1cf e45f 4d5e bd10 503a c109 650e
1827 Script Info: |_ssl-date: 2019-12-26T00:29:36+00:00; 0s from scanner time.
1828 Os Info: Host: mx.google.com
1829 IP: 66.249.80.0
1830 Type: SPF
1831 Is Active: True (reset ttl 64)
1832 IP: 35.191.0.0
1833 Type: SPF
1834 Is Active: True (reset ttl 64)
1835 IP: 108.175.110.0
1836 Type: SPF
1837 Is Active: True (reset ttl 64)
1838 IP: 108.177.96.0
1839 Type: SPF
1840 Is Active: True (reset ttl 64)
1841 IP: 64.233.160.0
1842 Type: SPF
1843 Is Active: True (reset ttl 64)
1844
1845--------------End Summary --------------
1846-----------------------------------------
1847#####################################################################################################################################
1848traceroute to www.aafp.cl (138.117.148.94), 30 hops max, 60 byte packets
1849 1 10.247.204.1 (10.247.204.1) 30.901 ms 61.245 ms 61.246 ms
1850 2 104.245.145.177 (104.245.145.177) 61.231 ms 61.214 ms 61.198 ms
1851 3 te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113) 61.184 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9) 61.211 ms 61.222 ms
1852 4 be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57) 61.096 ms 61.080 ms te0-0-0-1.agr14.yyz02.atlas.cogentco.com (154.24.54.41) 61.093 ms
1853 5 level3.yyz02.atlas.cogentco.com (154.54.11.210) 63.694 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141) 61.046 ms level3.yyz02.atlas.cogentco.com (154.54.11.210) 60.966 ms
1854 6 level3.yyz02.atlas.cogentco.com (154.54.11.210) 63.534 ms * *
1855 7 GTD-INTERNE.ear3.Miami2.Level3.net (4.15.156.162) 154.652 ms * 154.645 ms
1856 8 GTD-INTERNE.ear3.Miami2.Level3.net (4.15.156.162) 154.591 ms 154.574 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131) 269.668 ms
1857 9 * scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131) 347.838 ms 347.818 ms
185810 * * *
185911 host1.138.117.151.static.wirenetchile.com (138.117.151.1) 347.674 ms * *
186012 host1.138.117.151.static.wirenetchile.com (138.117.151.1) 223.050 ms * 252.952 ms
1861######################################################################################################################################
1862----- aafp.cl -----
1863
1864
1865Host's addresses:
1866__________________
1867
1868aafp.cl. 11404 IN A 138.117.148.94
1869
1870
1871Name Servers:
1872______________
1873
1874cpanel1.soporte.cl. 39549 IN A 200.55.200.5
1875cpanel2.soporte.cl. 40191 IN A 200.75.7.68
1876
1877
1878Mail (MX) Servers:
1879___________________
1880
1881alt4.aspmx.l.google.com. 168 IN A 173.194.216.27
1882aspmx.l.google.com. 9 IN A 172.217.212.26
1883alt1.aspmx.l.google.com. 293 IN A 173.194.77.26
1884alt2.aspmx.l.google.com. 170 IN A 64.233.177.27
1885alt3.aspmx.l.google.com. 170 IN A 173.194.175.27
1886
1887Google Results:
1888________________
1889
1890 perhaps Google is blocking our queries.
1891 Check manually.
1892
1893
1894Brute forcing with /usr/share/dnsenum/dns.txt:
1895_______________________________________________
1896
1897ftp.aafp.cl. 11349 IN A 200.55.200.5
1898mail.aafp.cl. 11334 IN CNAME aafp.cl.
1899aafp.cl. 11334 IN A 138.117.148.94
1900ns1.aafp.cl. 11327 IN A 138.117.148.94
1901ns2.aafp.cl. 11327 IN A 138.117.148.94
1902webmail.aafp.cl. 11311 IN A 200.55.200.5
1903www.aafp.cl. 14400 IN A 138.117.148.94
1904
1905
1906Launching Whois Queries:
1907_________________________
1908
1909 whois ip result: 138.117.148.0 -> 138.117.148.0/22
1910 whois ip result: 200.55.200.0 -> 200.55.200.0/24
1911
1912
1913aafp.cl_______
1914
1915 200.55.200.0/24
1916 138.117.148.0/22
1917#####################################################################################################################################
1918Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 18:48 EST
1919Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
1920Host is up (0.20s latency).
1921Not shown: 439 filtered ports, 25 closed ports
1922Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1923PORT STATE SERVICE VERSION
192421/tcp open ftp Pure-FTPd
1925| ssl-cert: Subject: commonName=vps.aafp.cl
1926| Subject Alternative Name: DNS:vps.aafp.cl
1927| Not valid before: 2019-11-13T00:36:57
1928|_Not valid after: 2020-11-12T00:36:57
1929|_ssl-date: TLS randomness does not represent time
193022/tcp open ssh OpenSSH 7.4 (protocol 2.0)
1931| ssh-hostkey:
1932| 2048 c7:b2:00:5d:dc:f9:9c:56:83:ae:ab:5c:96:08:1a:4d (RSA)
1933| 256 12:f4:54:91:81:3f:3a:77:eb:ea:e4:3a:90:f4:cf:b4 (ECDSA)
1934|_ 256 fa:d5:f1:67:27:58:a4:7f:a5:05:c0:d7:d1:98:de:70 (ED25519)
193553/tcp open domain ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
1936| dns-nsid:
1937|_ bind.version: 9.11.4-P2-RedHat-9.11.4-9.P2.el7
193880/tcp open http Apache httpd
1939|_http-server-header: Apache
1940|_http-title: Site doesn't have a title (text/html).
1941110/tcp open pop3 Dovecot pop3d
1942|_pop3-capabilities: STLS TOP USER PIPELINING CAPA RESP-CODES UIDL SASL(PLAIN LOGIN) AUTH-RESP-CODE
1943| ssl-cert: Subject: commonName=vps.aafp.cl
1944| Subject Alternative Name: DNS:vps.aafp.cl
1945| Not valid before: 2019-11-13T00:36:57
1946|_Not valid after: 2020-11-12T00:36:57
1947143/tcp open imap Dovecot imapd
1948|_imap-capabilities: have listed NAMESPACE AUTH=PLAIN LOGIN-REFERRALS LITERAL+ STARTTLS more AUTH=LOGINA0001 post-login IMAP4rev1 IDLE capabilities SASL-IR ID OK ENABLE Pre-login
1949| ssl-cert: Subject: commonName=vps.aafp.cl
1950| Subject Alternative Name: DNS:vps.aafp.cl
1951| Not valid before: 2019-11-13T00:36:57
1952|_Not valid after: 2020-11-12T00:36:57
1953443/tcp open ssl/http Apache httpd
1954| http-robots.txt: 1 disallowed entry
1955|_/wp-admin/
1956|_http-server-header: Apache
1957| ssl-cert: Subject: commonName=aafp.cl
1958| Subject Alternative Name: DNS:aafp.cl, DNS:cpanel.aafp.cl, DNS:mail.aafp.cl, DNS:webdisk.aafp.cl, DNS:webmail.aafp.cl, DNS:whm.aafp.cl, DNS:www.aafp.cl
1959| Not valid before: 2019-11-09T00:00:00
1960|_Not valid after: 2020-02-07T23:59:59
1961465/tcp open ssl/smtp Exim smtpd 4.92
1962| smtp-commands: vps.aafp.cl Hello host94.138.117.148.static.wirenetchile.com [104.245.145.185], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, HELP,
1963|_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1964| ssl-cert: Subject: commonName=vps.aafp.cl
1965| Subject Alternative Name: DNS:vps.aafp.cl
1966| Not valid before: 2019-11-13T00:36:57
1967|_Not valid after: 2020-11-12T00:36:57
1968587/tcp open smtp Exim smtpd 4.92
1969| smtp-commands: vps.aafp.cl Hello host94.138.117.148.static.wirenetchile.com [104.245.145.185], SIZE 52428800, 8BITMIME, PIPELINING, STARTTLS, HELP,
1970|_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1971| ssl-cert: Subject: commonName=vps.aafp.cl
1972| Subject Alternative Name: DNS:vps.aafp.cl
1973| Not valid before: 2019-11-13T00:36:57
1974|_Not valid after: 2020-11-12T00:36:57
1975993/tcp open imaps?
1976|_imap-capabilities: have listed NAMESPACE AUTH=PLAIN LOGIN-REFERRALS LITERAL+ AUTH=LOGINA0001 more post-login IMAP4rev1 OK IDLE capabilities ID SASL-IR ENABLE Pre-login
1977| ssl-cert: Subject: commonName=vps.aafp.cl
1978| Subject Alternative Name: DNS:vps.aafp.cl
1979| Not valid before: 2019-11-13T00:36:57
1980|_Not valid after: 2020-11-12T00:36:57
1981995/tcp open pop3s?
1982|_pop3-capabilities: SASL(PLAIN LOGIN) RESP-CODES TOP USER UIDL PIPELINING CAPA AUTH-RESP-CODE
1983| ssl-cert: Subject: commonName=vps.aafp.cl
1984| Subject Alternative Name: DNS:vps.aafp.cl
1985| Not valid before: 2019-11-13T00:36:57
1986|_Not valid after: 2020-11-12T00:36:57
19873306/tcp open mysql MySQL (unauthorized)
1988Aggressive OS guesses: HP P2000 G3 NAS device (91%), Linux 3.10 - 4.11 (91%), Linux 3.2 - 4.9 (91%), Linux 2.6.32 (90%), Linux 2.6.32 - 3.1 (90%), Ubiquiti AirOS 5.5.9 (90%), Linux 4.4 (90%), Ubiquiti Pico Station WAP (AirOS 5.2.6) (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.0 - 3.2 (89%)
1989No exact OS matches for host (test conditions non-ideal).
1990Network Distance: 13 hops
1991Service Info: Host: vps.aafp.cl; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1992
1993TRACEROUTE (using port 21/tcp)
1994HOP RTT ADDRESS
19951 113.79 ms 10.247.204.1
19962 142.54 ms 104.245.145.177
19973 142.63 ms te0-0-2-1.225.nr11.b010988-1.yyz02.atlas.cogentco.com (38.104.156.9)
19984 142.62 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
19995 142.61 ms te0-9-1-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.161)
20006 ...
20017 175.09 ms GTD-INTERNE.ear3.Miami2.Level3.net (4.15.156.162)
20028 306.38 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131)
20039 ... 10
200411 223.10 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
200512 264.57 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
200613 197.21 ms host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2007#####################################################################################################################################
2008Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 18:50 EST
2009Warning: 138.117.148.94 giving up on port because retransmission cap hit (2).
2010Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2011Host is up (0.20s latency).
2012Not shown: 18 filtered ports, 1 closed port
2013Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2014PORT STATE SERVICE VERSION
201553/tcp open domain ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
201653/udp open domain ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
2017| dns-nsid:
2018|_ bind.version: 9.11.4-P2-RedHat-9.11.4-9.P2.el7
201968/udp open|filtered dhcpc
202069/udp open|filtered tftp
202188/udp open|filtered kerberos-sec
2022123/udp open|filtered ntp
2023161/udp open|filtered snmp
2024162/udp open|filtered snmptrap
2025520/udp open|filtered route
2026Aggressive OS guesses: Linux 3.10 - 4.11 (92%), HP P2000 G3 NAS device (91%), Linux 3.2 - 4.9 (91%), Linux 3.16 - 4.6 (90%), Linux 2.6.32 (90%), Infomir MAG-250 set-top box (90%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (90%), Linux 2.6.32 - 3.13 (89%), Linux 3.3 (89%), Linux 2.6.32 - 3.1 (89%)
2027No exact OS matches for host (test conditions non-ideal).
2028Network Distance: 12 hops
2029Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
2030
2031TRACEROUTE (using port 53/tcp)
2032HOP RTT ADDRESS
20331 43.82 ms 10.247.204.1
20342 73.65 ms 104.245.145.177
20353 73.70 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
20364 73.73 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
20375 73.75 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
20386 ... 7
20398 228.13 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131)
20409 ... 10
204111 267.43 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
204212 237.04 ms host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2043#####################################################################################################################################
2044Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 18:50 EST
2045NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
2046NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
2047NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
2048Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2049Host is up (0.22s latency).
2050
2051PORT STATE SERVICE VERSION
205221/tcp open ftp Pure-FTPd
2053| ftp-brute:
2054| Accounts: No valid accounts found
2055|_ Statistics: Performed 1493 guesses in 185 seconds, average tps: 7.9
2056Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2057Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.18 (91%), Linux 3.2 - 4.9 (91%), HP P2000 G3 NAS device (90%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
2058No exact OS matches for host (test conditions non-ideal).
2059Network Distance: 13 hops
2060
2061TRACEROUTE (using port 21/tcp)
2062HOP RTT ADDRESS
20631 60.56 ms 10.247.204.1
20642 90.21 ms 104.245.145.177
20653 90.24 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
20664 90.26 ms te0-0-0-1.agr13.yyz02.atlas.cogentco.com (154.24.54.37)
20675 90.26 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
20686 ... 7
20698 120.21 ms GTD-INTERNE.ear3.Miami2.Level3.net (4.15.156.162)
20709 ... 10
207111 226.84 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
207212 232.85 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
207313 233.35 ms host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2074#####################################################################################################################################
2075# general
2076(gen) banner: SSH-2.0-OpenSSH_7.4
2077(gen) software: OpenSSH 7.4
2078(gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
2079(gen) compression: enabled (zlib@openssh.com)
2080
2081# key exchange algorithms
2082(kex) curve25519-sha256 -- [warn] unknown algorithm
2083(kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
2084(kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
2085 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2086(kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
2087 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2088(kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
2089 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2090(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
2091 `- [info] available since OpenSSH 4.4
2092(kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
2093(kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
2094(kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2095 `- [warn] using weak hashing algorithm
2096 `- [info] available since OpenSSH 2.3.0
2097(kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
2098(kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
2099 `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
2100(kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2101 `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
2102 `- [warn] using small 1024-bit modulus
2103 `- [warn] using weak hashing algorithm
2104 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
2105
2106# host-key algorithms
2107(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
2108(key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
2109(key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
2110(key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
2111 `- [warn] using weak random number generator could reveal the key
2112 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2113(key) ssh-ed25519 -- [info] available since OpenSSH 6.5
2114
2115# encryption algorithms (ciphers)
2116(enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
2117 `- [info] default cipher since OpenSSH 6.9.
2118(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2119(enc) aes192-ctr -- [info] available since OpenSSH 3.7
2120(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2121(enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
2122(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
2123(enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2124 `- [warn] using weak cipher mode
2125 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
2126(enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2127 `- [warn] using weak cipher mode
2128 `- [info] available since OpenSSH 2.3.0
2129(enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2130 `- [warn] using weak cipher mode
2131 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
2132(enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2133 `- [fail] disabled since Dropbear SSH 0.53
2134 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
2135 `- [warn] using weak cipher mode
2136 `- [warn] using small 64-bit block size
2137 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
2138(enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2139 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
2140 `- [warn] using weak cipher mode
2141 `- [warn] using small 64-bit block size
2142 `- [info] available since OpenSSH 2.1.0
2143(enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2144 `- [warn] using weak cipher
2145 `- [warn] using weak cipher mode
2146 `- [warn] using small 64-bit block size
2147 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
2148
2149# message authentication code algorithms
2150(mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
2151 `- [info] available since OpenSSH 6.2
2152(mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
2153(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
2154(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
2155(mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
2156 `- [info] available since OpenSSH 6.2
2157(mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
2158 `- [warn] using small 64-bit tag size
2159 `- [info] available since OpenSSH 4.7
2160(mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
2161 `- [info] available since OpenSSH 6.2
2162(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
2163 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2164(mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
2165 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2166(mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
2167 `- [warn] using weak hashing algorithm
2168 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
2169
2170# algorithm recommendations (for OpenSSH 7.4)
2171(rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
2172(rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
2173(rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
2174(rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
2175(rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
2176(rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
2177(rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
2178(rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
2179(rec) -blowfish-cbc -- enc algorithm to remove
2180(rec) -3des-cbc -- enc algorithm to remove
2181(rec) -aes256-cbc -- enc algorithm to remove
2182(rec) -cast128-cbc -- enc algorithm to remove
2183(rec) -aes192-cbc -- enc algorithm to remove
2184(rec) -aes128-cbc -- enc algorithm to remove
2185(rec) -hmac-sha2-512 -- mac algorithm to remove
2186(rec) -umac-128@openssh.com -- mac algorithm to remove
2187(rec) -hmac-sha2-256 -- mac algorithm to remove
2188(rec) -umac-64@openssh.com -- mac algorithm to remove
2189(rec) -hmac-sha1 -- mac algorithm to remove
2190(rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
2191(rec) -umac-64-etm@openssh.com -- mac algorithm to remove
2192#####################################################################################################################################
2193Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 18:54 EST
2194NSE: [ssh-run] Failed to specify credentials and command to run.
2195NSE: [ssh-brute] Trying username/password pair: root:root
2196NSE: [ssh-brute] Trying username/password pair: admin:admin
2197NSE: [ssh-brute] Trying username/password pair: administrator:administrator
2198NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
2199NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
2200NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
2201NSE: [ssh-brute] Trying username/password pair: guest:guest
2202NSE: [ssh-brute] Trying username/password pair: user:user
2203NSE: [ssh-brute] Trying username/password pair: web:web
2204NSE: [ssh-brute] Trying username/password pair: test:test
2205NSE: [ssh-brute] Trying username/password pair: root:
2206NSE: [ssh-brute] Trying username/password pair: admin:
2207NSE: [ssh-brute] Trying username/password pair: administrator:
2208NSE: [ssh-brute] Trying username/password pair: webadmin:
2209NSE: [ssh-brute] Trying username/password pair: sysadmin:
2210NSE: [ssh-brute] Trying username/password pair: netadmin:
2211NSE: [ssh-brute] Trying username/password pair: guest:
2212NSE: [ssh-brute] Trying username/password pair: user:
2213NSE: [ssh-brute] Trying username/password pair: web:
2214NSE: [ssh-brute] Trying username/password pair: test:
2215NSE: [ssh-brute] Trying username/password pair: root:123456
2216NSE: [ssh-brute] Trying username/password pair: admin:123456
2217NSE: [ssh-brute] Trying username/password pair: administrator:123456
2218NSE: [ssh-brute] Trying username/password pair: webadmin:123456
2219NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
2220NSE: [ssh-brute] Trying username/password pair: netadmin:123456
2221NSE: [ssh-brute] Trying username/password pair: guest:123456
2222NSE: [ssh-brute] Trying username/password pair: user:123456
2223NSE: [ssh-brute] Trying username/password pair: web:123456
2224NSE: [ssh-brute] Trying username/password pair: test:123456
2225NSE: [ssh-brute] Trying username/password pair: root:12345
2226NSE: [ssh-brute] Trying username/password pair: admin:12345
2227NSE: [ssh-brute] Trying username/password pair: administrator:12345
2228NSE: [ssh-brute] Trying username/password pair: webadmin:12345
2229NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
2230NSE: [ssh-brute] Trying username/password pair: netadmin:12345
2231NSE: [ssh-brute] Trying username/password pair: guest:12345
2232Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2233Host is up (0.21s latency).
2234
2235PORT STATE SERVICE VERSION
223622/tcp open ssh OpenSSH 7.4 (protocol 2.0)
2237|_ssh-auth-methods: ERROR: Script execution failed (use -d to debug)
2238| ssh-hostkey:
2239| 2048 c7:b2:00:5d:dc:f9:9c:56:83:ae:ab:5c:96:08:1a:4d (RSA)
2240| 256 12:f4:54:91:81:3f:3a:77:eb:ea:e4:3a:90:f4:cf:b4 (ECDSA)
2241|_ 256 fa:d5:f1:67:27:58:a4:7f:a5:05:c0:d7:d1:98:de:70 (ED25519)
2242|_ssh-publickey-acceptance: ERROR: Script execution failed (use -d to debug)
2243|_ssh-run: Failed to specify credentials and command to run.
2244Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2245Aggressive OS guesses: Linux 3.10 - 4.11 (98%), Linux 3.18 (98%), Linux 3.2 - 4.9 (98%), Adtran 424RG FTTH gateway (97%), LG Bp430 Blu-ray Player (97%), Linux 2.6.22 - 2.6.36 (97%), Linux 2.6.32 (97%), Linux 2.6.32 - 2.6.39 (97%), Linux 2.6.32 - 3.1 (97%), Linux 2.6.34 (97%)
2246No exact OS matches for host (test conditions non-ideal).
2247Network Distance: 12 hops
2248
2249TRACEROUTE (using port 22/tcp)
2250HOP RTT ADDRESS
22511 49.60 ms 10.247.204.1
22522 81.51 ms 104.245.145.177
22533 81.54 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
22544 81.56 ms te0-0-0-1.agr13.yyz02.atlas.cogentco.com (154.24.54.37)
22555 81.57 ms te0-9-0-9.ccr31.yyz02.atlas.cogentco.com (154.54.43.141)
22566 ... 7
22578 253.55 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131)
22589 217.15 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131)
225910 ... 11
226012 201.90 ms host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2261#####################################################################################################################################
2262USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
2263RHOSTS => 138.117.148.94
2264RHOST => 138.117.148.94
2265[*] 138.117.148.94:22 - SSH - Using malformed packet technique
2266[*] 138.117.148.94:22 - SSH - Starting scan
2267[-] 138.117.148.94:22 - SSH - User 'admin' on could not connect
2268[-] 138.117.148.94:22 - SSH - User 'administrator' on could not connect
2269[-] 138.117.148.94:22 - SSH - User 'anonymous' on could not connect
2270[-] 138.117.148.94:22 - SSH - User 'backup' on could not connect
2271[-] 138.117.148.94:22 - SSH - User 'bee' on could not connect
2272[-] 138.117.148.94:22 - SSH - User 'ftp' on could not connect
2273[-] 138.117.148.94:22 - SSH - User 'guest' on could not connect
2274[-] 138.117.148.94:22 - SSH - User 'GUEST' on could not connect
2275[-] 138.117.148.94:22 - SSH - User 'info' on could not connect
2276[-] 138.117.148.94:22 - SSH - User 'mail' on could not connect
2277[-] 138.117.148.94:22 - SSH - User 'mailadmin' on could not connect
2278[-] 138.117.148.94:22 - SSH - User 'msfadmin' on could not connect
2279[-] 138.117.148.94:22 - SSH - User 'mysql' on could not connect
2280[-] 138.117.148.94:22 - SSH - User 'nobody' on could not connect
2281[-] 138.117.148.94:22 - SSH - User 'oracle' on could not connect
2282[-] 138.117.148.94:22 - SSH - User 'owaspbwa' on could not connect
2283[-] 138.117.148.94:22 - SSH - User 'postfix' on could not connect
2284[-] 138.117.148.94:22 - SSH - User 'postgres' on could not connect
2285[-] 138.117.148.94:22 - SSH - User 'private' on could not connect
2286[-] 138.117.148.94:22 - SSH - User 'proftpd' on could not connect
2287[-] 138.117.148.94:22 - SSH - User 'public' on could not connect
2288[-] 138.117.148.94:22 - SSH - User 'root' on could not connect
2289[-] 138.117.148.94:22 - SSH - User 'superadmin' on could not connect
2290[-] 138.117.148.94:22 - SSH - User 'support' on could not connect
2291[-] 138.117.148.94:22 - SSH - User 'sys' on could not connect
2292[-] 138.117.148.94:22 - SSH - User 'system' on could not connect
2293[-] 138.117.148.94:22 - SSH - User 'systemadmin' on could not connect
2294[-] 138.117.148.94:22 - SSH - User 'systemadministrator' on could not connect
2295[-] 138.117.148.94:22 - SSH - User 'test' on could not connect
2296[-] 138.117.148.94:22 - SSH - User 'tomcat' on could not connect
2297[-] 138.117.148.94:22 - SSH - User 'user' on could not connect
2298[-] 138.117.148.94:22 - SSH - User 'webmaster' on could not connect
2299[-] 138.117.148.94:22 - SSH - User 'www-data' on could not connect
2300[-] 138.117.148.94:22 - SSH - User 'Fortimanager_Access' on could not connect
2301[*] Scanned 1 of 1 hosts (100% complete)
2302[*] Auxiliary module execution completed
2303#####################################################################################################################################
2304Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 19:24 EST
2305Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2306Host is up.
2307
2308PORT STATE SERVICE VERSION
230953/tcp filtered domain
2310Too many fingerprints match this host to give specific OS details
2311
2312Host script results:
2313| dns-brute:
2314|_ DNS Brute-force hostnames: No results.
2315
2316TRACEROUTE (using proto 1/icmp)
2317HOP RTT ADDRESS
23181 62.62 ms 10.247.204.1
23192 100.37 ms 104.245.145.177
23203 100.43 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
23214 100.43 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
23225 100.55 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
23236 ...
23247 133.66 ms GTD-INTERNE.ear3.Miami2.Level3.net (4.15.156.162)
23258 284.84 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131)
23269 ... 10
232711 247.12 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
232812 ... 30
2329#####################################################################################################################################
2330Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 19:25 EST
2331Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2332Host is up.
2333
2334PORT STATE SERVICE VERSION
233568/tcp filtered dhcpc
233668/udp open|filtered dhcpc
2337Too many fingerprints match this host to give specific OS details
2338
2339TRACEROUTE (using proto 1/icmp)
2340HOP RTT ADDRESS
23411 60.80 ms 10.247.204.1
23422 90.49 ms 104.245.145.177
23433 90.56 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
23444 90.55 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
23455 90.60 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
23466 ...
23477 120.50 ms GTD-INTERNE.ear3.Miami2.Level3.net (4.15.156.162)
23488 282.33 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131)
23499 ... 10
235011 271.33 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
235112 ... 30
2352####################################################################################################################################
2353Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 19:27 EST
2354Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2355Host is up.
2356
2357PORT STATE SERVICE VERSION
235869/tcp filtered tftp
235969/udp open|filtered tftp
2360Too many fingerprints match this host to give specific OS details
2361
2362TRACEROUTE (using proto 1/icmp)
2363HOP RTT ADDRESS
23641 58.88 ms 10.247.204.1
23652 88.80 ms 104.245.145.177
23663 88.86 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
23674 88.90 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
23685 88.90 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
23696 ...
23707 122.82 ms GTD-INTERNE.ear3.Miami2.Level3.net (4.15.156.162)
23718 325.02 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131)
23729 ... 10
237311 264.18 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
237412 ... 30
2375#####################################################################################################################################
2376Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 19:32 EST
2377Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2378Host is up.
2379
2380PORT STATE SERVICE VERSION
2381110/tcp filtered pop3
2382Too many fingerprints match this host to give specific OS details
2383
2384TRACEROUTE (using proto 1/icmp)
2385HOP RTT ADDRESS
23861 104.24 ms 10.247.204.1
23872 134.10 ms 104.245.145.177
23883 134.03 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
23894 134.10 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
23905 134.09 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
23916 ...
23927 164.10 ms GTD-INTERNE.ear3.Miami2.Level3.net (4.15.156.162)
23938 302.38 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131)
23949 ... 10
239511 226.84 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
239612 ... 30
2397#####################################################################################################################################
2398Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 19:32 EST
2399Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2400Host is up.
2401
2402PORT STATE SERVICE VERSION
2403123/tcp filtered ntp
2404123/udp open|filtered ntp
2405Too many fingerprints match this host to give specific OS details
2406
2407TRACEROUTE (using proto 1/icmp)
2408HOP RTT ADDRESS
24091 60.57 ms 10.247.204.1
24102 90.72 ms 104.245.145.177
24113 90.78 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
24124 90.82 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
24135 90.84 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
24146 ...
24157 120.47 ms GTD-INTERNE.ear3.Miami2.Level3.net (4.15.156.162)
24168 275.71 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131)
24179 ... 10
241811 246.00 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
241912 ... 30
2420#####################################################################################################################################
2421Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 19:40 EST
2422Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2423Host is up.
2424
2425PORT STATE SERVICE VERSION
24263306/tcp filtered mysql
2427Too many fingerprints match this host to give specific OS details
2428
2429TRACEROUTE (using proto 1/icmp)
2430HOP RTT ADDRESS
24311 59.29 ms 10.247.204.1
24322 89.42 ms 104.245.145.177
24333 89.47 ms te0-1-1-9.219.ccr32.yyz02.atlas.cogentco.com (38.104.158.113)
24344 89.52 ms be3435.ccr31.yyz02.atlas.cogentco.com (154.54.85.57)
24355 89.51 ms level3.yyz02.atlas.cogentco.com (154.54.11.210)
24366 ...
24377 119.01 ms GTD-INTERNE.ear3.Miami2.Level3.net (4.15.156.162)
24388 257.27 ms scl1.ae2.100.mia1.gtdinternet.com.63.196.190.in-addr.arpa (190.196.63.131)
24399 ... 10
244011 230.34 ms host1.138.117.151.static.wirenetchile.com (138.117.151.1)
244112 ... 30
2442#####################################################################################################################################
2443Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 19:40 EST
2444Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2445Host is up (0.056s latency).
2446Not shown: 65532 filtered ports
2447PORT STATE SERVICE VERSION
244825/tcp closed smtp
2449139/tcp closed netbios-ssn
2450445/tcp closed microsoft-ds
2451Too many fingerprints match this host to give specific OS details
2452Network Distance: 2 hops
2453
2454TRACEROUTE (using port 139/tcp)
2455HOP RTT ADDRESS
24561 64.36 ms 10.247.204.1
24572 64.35 ms host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2458#####################################################################################################################################
2459Starting Nmap 7.80 ( https://nmap.org ) at 2019-12-25 19:42 EST
2460Nmap scan report for host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2461Host is up (0.076s latency).
2462
2463PORT STATE SERVICE VERSION
246453/tcp filtered domain
246567/tcp filtered dhcps
246668/tcp filtered dhcpc
246769/tcp filtered tftp
246888/tcp filtered kerberos-sec
2469123/tcp filtered ntp
2470137/tcp filtered netbios-ns
2471138/tcp filtered netbios-dgm
2472139/tcp closed netbios-ssn
2473161/tcp filtered snmp
2474162/tcp filtered snmptrap
2475389/tcp filtered ldap
2476520/tcp filtered efs
24772049/tcp filtered nfs
247853/udp open|filtered domain
247967/udp open|filtered dhcps
248068/udp open|filtered dhcpc
248169/udp open|filtered tftp
248288/udp open|filtered kerberos-sec
2483123/udp open|filtered ntp
2484137/udp filtered netbios-ns
2485138/udp filtered netbios-dgm
2486139/udp open|filtered netbios-ssn
2487161/udp open|filtered snmp
2488162/udp open|filtered snmptrap
2489389/udp open|filtered ldap
2490520/udp open|filtered route
24912049/udp open|filtered nfs
2492Too many fingerprints match this host to give specific OS details
2493Network Distance: 2 hops
2494
2495TRACEROUTE (using port 139/tcp)
2496HOP RTT ADDRESS
24971 93.01 ms 10.247.204.1
24982 93.00 ms host94.138.117.148.static.wirenetchile.com (138.117.148.94)
2499#####################################################################################################################################
2500Hosts
2501=====
2502
2503address mac name os_name os_flavor os_sp purpose info comments
2504------- --- ---- ------- --------- ----- ------- ---- --------
250518.211.128.100 Linux 9.0 server
250635.184.184.103 Linux 18.04 server
250737.148.210.195 Unknown device
250852.6.80.62 www.antronio.com embedded device
250952.10.168.224 Linux 18.04 server
251052.33.225.55 ec2-52-33-225-55.us-west-2.compute.amazonaws.com Linux 3.X server
251154.186.104.128 ec2-54-186-104-128.us-west-2.compute.amazonaws.com Linux 3.X server
251269.10.62.204 Unknown device
251377.68.77.242 Unknown device
251482.94.228.244 Linux 2.6.X server
251582.221.139.217 Unknown device
251689.248.172.178 no-reverse-dns-configured.com Linux 3.X server
251791.121.115.139 FreeBSD device
251892.39.247.11 Unknown device
251992.45.61.11 host-92-45-61-11.reverse.superonline.net Linux 2.6.X server
252093.174.95.2 Unknown device
252193.189.37.11 Unknown device
252294.102.49.234 Linux 5.0 server
252394.138.199.135 Unknown device
2524104.217.75.179 Unknown device
2525104.243.32.197 benacus.host Unknown device
2526107.152.98.18 Unknown device
2527109.232.216.55 Unknown device
2528116.0.20.220 imperius.instanthosting.com.au Linux 3.X server
2529138.117.148.94 host94.138.117.148.static.wirenetchile.com Linux 3.X server
2530144.76.114.219 Unknown device
2531144.202.14.242 Linux 18.04 server
2532157.71.194.7 Linux 2.6.X server
2533163.172.115.13 Unknown device
2534184.154.7.82 Unknown device
2535186.67.125.5 Unknown device
2536188.165.237.39 Unknown device
2537191.232.193.90 Linux 2.6.X server
2538191.234.162.247 Unknown device
2539192.0.78.12 Linux 2.6.X server
2540192.0.78.13 Linux 2.6.X server
2541192.99.38.90 Unknown device
2542192.169.188.31 ip-192-169-188-31.ip.secureserver.net Linux 2.6.X server
2543192.252.144.58 Unknown device
2544192.252.149.45 Linux 9.0 server
2545193.238.47.73 Unknown device
2546198.46.81.182 Unknown device
2547198.136.62.34 single-7051.banahosting.com Linux 2.6.X server
2548200.2.249.28 Unknown device
2549200.74.161.66 mail.hospitaldipreca.cl Unknown device
2550201.148.104.123 Unknown device
2551201.217.241.136 servidor.laestokada.cl Linux 2.6.X server
2552208.113.216.34 Unknown device
2553217.12.199.143 17568.example.com Unknown device
2554219.94.128.83 www873.sakura.ne.jp FreeBSD 10.X device
2555219.94.128.84 FreeBSD 9.0 device
2556#####################################################################################################################################
2557Services
2558========
2559
2560host port proto name state info
2561---- ---- ----- ---- ----- ----
256218.211.128.100 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7
256335.184.184.103 22 tcp ssh open SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
256437.148.210.195 21 tcp ftp open 220 (vsFTPd 3.0.2)\x0d\x0a
256537.148.210.195 22 tcp ssh open SSH-2.0-OpenSSH_7.4
256652.6.80.62 21 tcp ftp open vsftpd 2.2.2
256752.6.80.62 53 tcp domain filtered
256852.6.80.62 53 udp domain unknown
256952.6.80.62 67 tcp dhcps filtered
257052.6.80.62 67 udp dhcps unknown
257152.6.80.62 68 tcp dhcpc filtered
257252.6.80.62 68 udp dhcpc unknown
257352.6.80.62 69 tcp tftp filtered
257452.6.80.62 69 udp tftp unknown
257552.6.80.62 80 tcp http open nginx 1.14.1
257652.6.80.62 88 tcp kerberos-sec filtered
257752.6.80.62 88 udp kerberos-sec unknown
257852.6.80.62 123 tcp ntp filtered
257952.6.80.62 123 udp ntp unknown
258052.6.80.62 137 tcp netbios-ns filtered
258152.6.80.62 137 udp netbios-ns filtered
258252.6.80.62 138 tcp netbios-dgm filtered
258352.6.80.62 138 udp netbios-dgm filtered
258452.6.80.62 139 tcp netbios-ssn closed
258552.6.80.62 139 udp netbios-ssn unknown
258652.6.80.62 161 tcp snmp filtered
258752.6.80.62 161 udp snmp unknown
258852.6.80.62 162 tcp snmptrap filtered
258952.6.80.62 162 udp snmptrap unknown
259052.6.80.62 389 tcp ldap filtered
259152.6.80.62 389 udp ldap unknown
259252.6.80.62 443 tcp ssl/http open nginx 1.14.1
259352.6.80.62 520 tcp efs filtered
259452.6.80.62 520 udp route unknown
259552.6.80.62 2049 tcp nfs filtered
259652.6.80.62 2049 udp nfs unknown
259752.10.168.224 22 tcp ssh open SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
259852.33.225.55 80 tcp http open nginx 1.10.3
259952.33.225.55 443 tcp ssl/http open nginx 1.10.3
260054.186.104.128 53 udp domain unknown
260154.186.104.128 67 udp dhcps unknown
260254.186.104.128 68 udp dhcpc unknown
260354.186.104.128 69 udp tftp unknown
260454.186.104.128 80 tcp http open nginx 1.10.3
260554.186.104.128 88 udp kerberos-sec unknown
260654.186.104.128 123 udp ntp unknown
260754.186.104.128 139 udp netbios-ssn unknown
260854.186.104.128 161 udp snmp unknown
260954.186.104.128 162 udp snmptrap unknown
261054.186.104.128 389 udp ldap unknown
261154.186.104.128 443 tcp ssl/http open nginx 1.10.3
261254.186.104.128 520 udp route unknown
261354.186.104.128 2049 udp nfs unknown
261469.10.62.204 21 tcp ftp open 421 Too many connections (8) from this IP\x0d\x0a
261569.10.62.204 22 tcp ssh open SSH-2.0-OpenSSH_7.4
261677.68.77.242 21 tcp ftp open 220 ProFTPD Server (ProFTPD) [77.68.77.242]\x0d\x0a
261777.68.77.242 22 tcp ssh open SSH-2.0-OpenSSH_7.4
261882.94.228.244 25 tcp smtp closed
261982.94.228.244 53 tcp domain open ISC BIND 9.8.4-rpz2+rl005.12-P1
262082.94.228.244 53 udp domain open ISC BIND 9.8.4-rpz2+rl005.12-P1
262182.94.228.244 67 tcp dhcps filtered
262282.94.228.244 67 udp dhcps unknown
262382.94.228.244 68 tcp dhcpc filtered
262482.94.228.244 68 udp dhcpc unknown
262582.94.228.244 69 tcp tftp filtered
262682.94.228.244 69 udp tftp unknown
262782.94.228.244 80 tcp http open nginx
262882.94.228.244 88 tcp kerberos-sec filtered
262982.94.228.244 88 udp kerberos-sec unknown
263082.94.228.244 122 tcp ssh open OpenSSH 6.0p1 Debian 4+deb7u7 protocol 2.0
263182.94.228.244 123 tcp ntp filtered
263282.94.228.244 123 udp ntp unknown
263382.94.228.244 137 tcp netbios-ns filtered
263482.94.228.244 137 udp netbios-ns filtered
263582.94.228.244 138 tcp netbios-dgm filtered
263682.94.228.244 138 udp netbios-dgm filtered
263782.94.228.244 139 tcp netbios-ssn closed
263882.94.228.244 139 udp netbios-ssn unknown
263982.94.228.244 161 tcp snmp filtered
264082.94.228.244 161 udp snmp unknown
264182.94.228.244 162 tcp snmptrap filtered
264282.94.228.244 162 udp snmptrap unknown
264382.94.228.244 389 tcp ldap filtered
264482.94.228.244 389 udp ldap unknown
264582.94.228.244 443 tcp ssl/http open nginx
264682.94.228.244 445 tcp microsoft-ds closed
264782.94.228.244 520 tcp efs filtered
264882.94.228.244 520 udp route unknown
264982.94.228.244 2049 tcp nfs filtered
265082.94.228.244 2049 udp nfs unknown
265182.221.139.217 22 tcp ssh open SSH-2.0-OpenSSH_5.3
265289.248.172.178 20 tcp ftp-data closed
265389.248.172.178 21 tcp ftp open ProFTPD or KnFTPD
265489.248.172.178 25 tcp smtp closed
265589.248.172.178 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
265689.248.172.178 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
265789.248.172.178 67 tcp dhcps filtered
265889.248.172.178 67 udp dhcps unknown
265989.248.172.178 68 tcp dhcpc filtered
266089.248.172.178 68 udp dhcpc unknown
266189.248.172.178 69 tcp tftp filtered
266289.248.172.178 69 udp tftp unknown
266389.248.172.178 80 tcp http open nginx 1.16.1
266489.248.172.178 88 tcp kerberos-sec filtered
266589.248.172.178 88 udp kerberos-sec unknown
266689.248.172.178 110 tcp pop3 closed
266789.248.172.178 123 tcp ntp filtered
266889.248.172.178 123 udp ntp unknown
266989.248.172.178 137 tcp netbios-ns filtered
267089.248.172.178 137 udp netbios-ns filtered
267189.248.172.178 138 tcp netbios-dgm filtered
267289.248.172.178 138 udp netbios-dgm filtered
267389.248.172.178 139 tcp netbios-ssn closed
267489.248.172.178 139 udp netbios-ssn filtered
267589.248.172.178 143 tcp imap closed
267689.248.172.178 161 tcp snmp filtered
267789.248.172.178 161 udp snmp filtered
267889.248.172.178 162 tcp snmptrap filtered
267989.248.172.178 162 udp snmptrap unknown
268089.248.172.178 389 tcp ldap filtered
268189.248.172.178 389 udp ldap unknown
268289.248.172.178 443 tcp https closed
268389.248.172.178 445 tcp microsoft-ds closed
268489.248.172.178 465 tcp smtps closed
268589.248.172.178 520 tcp efs filtered
268689.248.172.178 520 udp route filtered
268789.248.172.178 587 tcp submission closed
268889.248.172.178 993 tcp imaps closed
268989.248.172.178 995 tcp pop3s closed
269089.248.172.178 1500 tcp vlsi-lm closed
269189.248.172.178 2049 tcp nfs filtered
269289.248.172.178 2049 udp nfs unknown
269389.248.172.178 3306 tcp mysql closed
269489.248.172.178 5432 tcp postgresql closed
269591.121.115.139 22 tcp ssh open SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
269692.39.247.11 21 tcp ftp open 220 ProFTPD Server (ProFTPD) [192.168.0.100]\x0d\x0a
269792.39.247.11 22 tcp ssh open SSH-2.0-OpenSSH_7.4
269892.45.61.11 25 tcp smtp closed
269992.45.61.11 53 tcp domain filtered
270092.45.61.11 53 udp domain unknown
270192.45.61.11 67 tcp dhcps filtered
270292.45.61.11 67 udp dhcps unknown
270392.45.61.11 68 tcp dhcpc filtered
270492.45.61.11 68 udp dhcpc unknown
270592.45.61.11 69 tcp tftp filtered
270692.45.61.11 69 udp tftp unknown
270792.45.61.11 80 tcp http-proxy open F5 BIG-IP load balancer http proxy
270892.45.61.11 88 tcp kerberos-sec filtered
270992.45.61.11 88 udp kerberos-sec unknown
271092.45.61.11 123 tcp ntp filtered
271192.45.61.11 123 udp ntp unknown
271292.45.61.11 137 tcp netbios-ns filtered
271392.45.61.11 137 udp netbios-ns filtered
271492.45.61.11 138 tcp netbios-dgm filtered
271592.45.61.11 138 udp netbios-dgm filtered
271692.45.61.11 139 tcp netbios-ssn closed
271792.45.61.11 139 udp netbios-ssn unknown
271892.45.61.11 161 tcp snmp filtered
271992.45.61.11 161 udp snmp unknown
272092.45.61.11 162 tcp snmptrap filtered
272192.45.61.11 162 udp snmptrap unknown
272292.45.61.11 389 tcp ldap filtered
272392.45.61.11 389 udp ldap unknown
272492.45.61.11 443 tcp ssl/https open
272592.45.61.11 445 tcp microsoft-ds closed
272692.45.61.11 520 tcp efs filtered
272792.45.61.11 520 udp route unknown
272892.45.61.11 2049 tcp nfs filtered
272992.45.61.11 2049 udp nfs unknown
273093.174.95.2 21 tcp ftp open 220 FTP Server ready.\x0d\x0a
273193.174.95.2 22 tcp ssh open SSH-2.0-OpenSSH_7.4
273293.189.37.11 21 tcp ftp open 220 Bienvenido al servidor FTP de DataControl.\x0d\x0a
273393.189.37.11 22 tcp ssh open SSH-2.0-OpenSSH_5.3
273494.102.49.234 21 tcp ftp open 220 (vsFTPd 2.0.5)\x0d\x0a
273594.102.49.234 22 tcp ssh open SSH-2.0-OpenSSH_5.1p1 Debian-5
273694.138.199.135 21 tcp ftp open 220 94.138.199.135 FTP server ready\x0d\x0a
2737104.217.75.179 22 tcp ssh open SSH-2.0-OpenSSH_5.3
2738104.243.32.197 53 tcp domain closed
2739104.243.32.197 53 udp domain unknown
2740104.243.32.197 67 tcp dhcps closed
2741104.243.32.197 67 udp dhcps unknown
2742104.243.32.197 68 tcp dhcpc closed
2743104.243.32.197 68 udp dhcpc unknown
2744104.243.32.197 69 tcp tftp closed
2745104.243.32.197 69 udp tftp closed
2746104.243.32.197 88 tcp kerberos-sec closed
2747104.243.32.197 88 udp kerberos-sec unknown
2748104.243.32.197 123 tcp ntp closed
2749104.243.32.197 123 udp ntp unknown
2750104.243.32.197 137 tcp netbios-ns closed
2751104.243.32.197 137 udp netbios-ns filtered
2752104.243.32.197 138 tcp netbios-dgm closed
2753104.243.32.197 138 udp netbios-dgm filtered
2754104.243.32.197 139 tcp netbios-ssn closed
2755104.243.32.197 139 udp netbios-ssn closed
2756104.243.32.197 161 tcp snmp closed
2757104.243.32.197 161 udp snmp closed
2758104.243.32.197 162 tcp snmptrap closed
2759104.243.32.197 162 udp snmptrap unknown
2760104.243.32.197 389 tcp ldap closed
2761104.243.32.197 389 udp ldap closed
2762104.243.32.197 520 tcp efs closed
2763104.243.32.197 520 udp route closed
2764104.243.32.197 2049 tcp nfs closed
2765104.243.32.197 2049 udp nfs closed
2766107.152.98.18 21 tcp ftp open 220 ProFTPD 1.3.5b Server (ProFTPD) [107.152.98.18]\x0d\x0a
2767109.232.216.55 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 20:20. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
2768116.0.20.220 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 23:58. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
2769116.0.20.220 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
2770116.0.20.220 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
2771116.0.20.220 67 tcp dhcps filtered
2772116.0.20.220 67 udp dhcps unknown
2773116.0.20.220 68 tcp dhcpc filtered
2774116.0.20.220 68 udp dhcpc unknown
2775116.0.20.220 69 tcp tftp filtered
2776116.0.20.220 69 udp tftp unknown
2777116.0.20.220 88 tcp kerberos-sec filtered
2778116.0.20.220 88 udp kerberos-sec unknown
2779116.0.20.220 123 tcp ntp filtered
2780116.0.20.220 123 udp ntp unknown
2781116.0.20.220 137 tcp netbios-ns filtered
2782116.0.20.220 137 udp netbios-ns filtered
2783116.0.20.220 138 tcp netbios-dgm filtered
2784116.0.20.220 138 udp netbios-dgm filtered
2785116.0.20.220 139 tcp netbios-ssn closed
2786116.0.20.220 139 udp netbios-ssn unknown
2787116.0.20.220 161 tcp snmp filtered
2788116.0.20.220 161 udp snmp unknown
2789116.0.20.220 162 tcp snmptrap filtered
2790116.0.20.220 162 udp snmptrap unknown
2791116.0.20.220 389 tcp ldap filtered
2792116.0.20.220 389 udp ldap unknown
2793116.0.20.220 520 tcp efs filtered
2794116.0.20.220 520 udp route unknown
2795116.0.20.220 2049 tcp nfs filtered
2796116.0.20.220 2049 udp nfs unknown
2797138.117.148.94 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 20:54. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
2798138.117.148.94 25 tcp smtp closed
2799138.117.148.94 53 tcp domain filtered ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
2800138.117.148.94 53 udp domain unknown ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
2801138.117.148.94 67 tcp dhcps filtered
2802138.117.148.94 67 udp dhcps unknown
2803138.117.148.94 68 tcp dhcpc filtered
2804138.117.148.94 68 udp dhcpc unknown
2805138.117.148.94 69 tcp tftp filtered
2806138.117.148.94 69 udp tftp unknown
2807138.117.148.94 88 tcp kerberos-sec filtered
2808138.117.148.94 88 udp kerberos-sec unknown
2809138.117.148.94 123 tcp ntp filtered
2810138.117.148.94 123 udp ntp unknown
2811138.117.148.94 137 tcp netbios-ns filtered
2812138.117.148.94 137 udp netbios-ns filtered
2813138.117.148.94 138 tcp netbios-dgm filtered
2814138.117.148.94 138 udp netbios-dgm filtered
2815138.117.148.94 139 tcp netbios-ssn closed
2816138.117.148.94 139 udp netbios-ssn unknown
2817138.117.148.94 161 tcp snmp filtered
2818138.117.148.94 161 udp snmp unknown
2819138.117.148.94 162 tcp snmptrap filtered
2820138.117.148.94 162 udp snmptrap unknown
2821138.117.148.94 389 tcp ldap filtered
2822138.117.148.94 389 udp ldap unknown
2823138.117.148.94 445 tcp microsoft-ds closed
2824138.117.148.94 520 tcp efs filtered
2825138.117.148.94 520 udp route unknown
2826138.117.148.94 2049 tcp nfs filtered
2827138.117.148.94 2049 udp nfs unknown
2828144.76.114.219 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 02:45. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
2829144.202.14.242 22 tcp ssh open SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.1
2830157.71.194.7 25 tcp smtp closed
2831157.71.194.7 53 tcp domain filtered
2832157.71.194.7 53 udp domain unknown
2833157.71.194.7 67 tcp dhcps filtered
2834157.71.194.7 67 udp dhcps unknown
2835157.71.194.7 68 tcp dhcpc filtered
2836157.71.194.7 68 udp dhcpc unknown
2837157.71.194.7 69 tcp tftp filtered
2838157.71.194.7 69 udp tftp unknown
2839157.71.194.7 80 tcp upnp open Microsoft IIS httpd
2840157.71.194.7 88 tcp kerberos-sec filtered
2841157.71.194.7 88 udp kerberos-sec unknown
2842157.71.194.7 123 tcp ntp filtered
2843157.71.194.7 123 udp ntp unknown
2844157.71.194.7 137 tcp netbios-ns filtered
2845157.71.194.7 137 udp netbios-ns filtered
2846157.71.194.7 138 tcp netbios-dgm filtered
2847157.71.194.7 138 udp netbios-dgm filtered
2848157.71.194.7 139 tcp netbios-ssn closed
2849157.71.194.7 139 udp netbios-ssn unknown
2850157.71.194.7 161 tcp snmp filtered
2851157.71.194.7 161 udp snmp unknown
2852157.71.194.7 162 tcp snmptrap filtered
2853157.71.194.7 162 udp snmptrap unknown
2854157.71.194.7 389 tcp ldap filtered
2855157.71.194.7 389 udp ldap unknown
2856157.71.194.7 443 tcp ssl/upnp open Microsoft IIS httpd
2857157.71.194.7 445 tcp microsoft-ds closed
2858157.71.194.7 520 tcp efs filtered
2859157.71.194.7 520 udp route unknown
2860157.71.194.7 2049 tcp nfs filtered
2861157.71.194.7 2049 udp nfs unknown
2862163.172.115.13 21 tcp ftp open 220 Microsoft FTP Service\x0d\x0a
2863184.154.7.82 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 16:02. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
2864186.67.125.5 21 tcp ftp open 220 Bienvenido al FTP de DIBAM - Usted sera monitoreado en sus acciones por motivos de seguridad.\x0d\x0a
2865188.165.237.39 21 tcp ftp open 220 ProFTPD 1.3.5 Server (GLFF) [::ffff:188.165.237.39]\x0d\x0a
2866191.232.193.90 25 tcp smtp closed
2867191.232.193.90 53 tcp domain filtered
2868191.232.193.90 53 udp domain unknown
2869191.232.193.90 67 tcp dhcps filtered
2870191.232.193.90 67 udp dhcps unknown
2871191.232.193.90 68 tcp dhcpc filtered
2872191.232.193.90 68 udp dhcpc unknown
2873191.232.193.90 69 tcp tftp filtered
2874191.232.193.90 69 udp tftp unknown
2875191.232.193.90 80 tcp http open Apache httpd
2876191.232.193.90 88 tcp kerberos-sec filtered
2877191.232.193.90 88 udp kerberos-sec unknown
2878191.232.193.90 123 tcp ntp filtered
2879191.232.193.90 123 udp ntp unknown
2880191.232.193.90 137 tcp netbios-ns filtered
2881191.232.193.90 137 udp netbios-ns filtered
2882191.232.193.90 138 tcp netbios-dgm filtered
2883191.232.193.90 138 udp netbios-dgm filtered
2884191.232.193.90 139 tcp netbios-ssn closed
2885191.232.193.90 139 udp netbios-ssn unknown
2886191.232.193.90 161 tcp snmp filtered
2887191.232.193.90 161 udp snmp unknown
2888191.232.193.90 162 tcp snmptrap filtered
2889191.232.193.90 162 udp snmptrap unknown
2890191.232.193.90 389 tcp ldap filtered
2891191.232.193.90 389 udp ldap unknown
2892191.232.193.90 443 tcp ssl/http open Apache httpd
2893191.232.193.90 445 tcp microsoft-ds closed
2894191.232.193.90 520 tcp efs filtered
2895191.232.193.90 520 udp route unknown
2896191.232.193.90 2049 tcp nfs filtered
2897191.232.193.90 2049 udp nfs unknown
2898191.234.162.247 21 tcp ftp open 220 (vsFTPd 2.2.2)\x0d\x0a
2899191.234.162.247 22 tcp ssh open SSH-2.0-OpenSSH_5.3
2900192.0.78.12 25 tcp smtp closed
2901192.0.78.12 53 tcp domain filtered
2902192.0.78.12 53 udp domain unknown
2903192.0.78.12 67 tcp dhcps filtered
2904192.0.78.12 67 udp dhcps unknown
2905192.0.78.12 68 tcp dhcpc filtered
2906192.0.78.12 68 udp dhcpc unknown
2907192.0.78.12 69 tcp tftp filtered
2908192.0.78.12 69 udp tftp unknown
2909192.0.78.12 80 tcp http open nginx
2910192.0.78.12 88 tcp kerberos-sec filtered
2911192.0.78.12 88 udp kerberos-sec unknown
2912192.0.78.12 123 tcp ntp filtered
2913192.0.78.12 123 udp ntp unknown
2914192.0.78.12 137 tcp netbios-ns filtered
2915192.0.78.12 137 udp netbios-ns filtered
2916192.0.78.12 138 tcp netbios-dgm filtered
2917192.0.78.12 138 udp netbios-dgm filtered
2918192.0.78.12 139 tcp netbios-ssn closed
2919192.0.78.12 139 udp netbios-ssn unknown
2920192.0.78.12 161 tcp snmp filtered
2921192.0.78.12 161 udp snmp unknown
2922192.0.78.12 162 tcp snmptrap filtered
2923192.0.78.12 162 udp snmptrap unknown
2924192.0.78.12 389 tcp ldap filtered
2925192.0.78.12 389 udp ldap unknown
2926192.0.78.12 443 tcp ssl/http open nginx
2927192.0.78.12 445 tcp microsoft-ds closed
2928192.0.78.12 520 tcp efs filtered
2929192.0.78.12 520 udp route unknown
2930192.0.78.12 2049 tcp nfs filtered
2931192.0.78.12 2049 udp nfs unknown
2932192.0.78.13 25 tcp smtp closed
2933192.0.78.13 53 tcp domain filtered
2934192.0.78.13 53 udp domain unknown
2935192.0.78.13 67 tcp dhcps filtered
2936192.0.78.13 67 udp dhcps unknown
2937192.0.78.13 68 tcp dhcpc filtered
2938192.0.78.13 68 udp dhcpc unknown
2939192.0.78.13 69 tcp tftp filtered
2940192.0.78.13 69 udp tftp unknown
2941192.0.78.13 80 tcp http open nginx
2942192.0.78.13 88 tcp kerberos-sec filtered
2943192.0.78.13 88 udp kerberos-sec unknown
2944192.0.78.13 123 tcp ntp filtered
2945192.0.78.13 123 udp ntp unknown
2946192.0.78.13 137 tcp netbios-ns filtered
2947192.0.78.13 137 udp netbios-ns filtered
2948192.0.78.13 138 tcp netbios-dgm filtered
2949192.0.78.13 138 udp netbios-dgm filtered
2950192.0.78.13 139 tcp netbios-ssn closed
2951192.0.78.13 139 udp netbios-ssn unknown
2952192.0.78.13 161 tcp snmp filtered
2953192.0.78.13 161 udp snmp unknown
2954192.0.78.13 162 tcp snmptrap filtered
2955192.0.78.13 162 udp snmptrap unknown
2956192.0.78.13 389 tcp ldap filtered
2957192.0.78.13 389 udp ldap unknown
2958192.0.78.13 443 tcp ssl/http open nginx
2959192.0.78.13 445 tcp microsoft-ds closed
2960192.0.78.13 520 tcp efs filtered
2961192.0.78.13 520 udp route unknown
2962192.0.78.13 2049 tcp nfs filtered
2963192.0.78.13 2049 udp nfs unknown
2964192.99.38.90 21 tcp ftp open 220 (vsFTPd 3.0.2)\x0d\x0a
2965192.169.188.31 53 tcp domain open
2966192.169.188.31 53 udp domain open
2967192.169.188.31 69 udp tftp unknown
2968192.169.188.31 80 tcp http open Apache httpd
2969192.169.188.31 88 udp kerberos-sec unknown
2970192.169.188.31 139 udp netbios-ssn unknown
2971192.169.188.31 389 udp ldap unknown
2972192.169.188.31 443 tcp ssl/http open Apache httpd
2973192.169.188.31 993 tcp ssl/imaps open
2974192.252.144.58 21 tcp ftp open 220 192.252.144.58 FTP server ready\x0d\x0a
2975192.252.144.58 22 tcp ssh open
2976192.252.149.45 21 tcp ftp open 220 192.252.149.45 FTP server ready\x0d\x0a
2977192.252.149.45 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7
2978193.238.47.73 22 tcp ssh open SSH-2.0-OpenSSH_7.4
2979198.46.81.182 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 3 of 150 allowed.\x0d\x0a220-Local time is now 22:22. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 30 minutes of inactivity.\x0d\x0a
2980198.136.62.34 25 tcp smtp closed
2981198.136.62.34 53 tcp domain open PowerDNS Authoritative Server 4.1.10
2982198.136.62.34 53 udp domain open PowerDNS Authoritative Server 4.1.10
2983198.136.62.34 67 tcp dhcps filtered
2984198.136.62.34 67 udp dhcps unknown
2985198.136.62.34 68 tcp dhcpc filtered
2986198.136.62.34 68 udp dhcpc unknown
2987198.136.62.34 69 tcp tftp filtered
2988198.136.62.34 69 udp tftp unknown
2989198.136.62.34 88 tcp kerberos-sec filtered
2990198.136.62.34 88 udp kerberos-sec unknown
2991198.136.62.34 123 tcp ntp filtered
2992198.136.62.34 123 udp ntp unknown
2993198.136.62.34 137 tcp netbios-ns filtered
2994198.136.62.34 137 udp netbios-ns filtered
2995198.136.62.34 138 tcp netbios-dgm filtered
2996198.136.62.34 138 udp netbios-dgm filtered
2997198.136.62.34 139 tcp netbios-ssn closed
2998198.136.62.34 139 udp netbios-ssn unknown
2999198.136.62.34 161 tcp snmp filtered
3000198.136.62.34 161 udp snmp unknown
3001198.136.62.34 162 tcp snmptrap filtered
3002198.136.62.34 162 udp snmptrap unknown
3003198.136.62.34 389 tcp ldap filtered
3004198.136.62.34 389 udp ldap unknown
3005198.136.62.34 445 tcp microsoft-ds closed
3006198.136.62.34 520 tcp efs filtered
3007198.136.62.34 520 udp route unknown
3008198.136.62.34 2049 tcp nfs filtered
3009198.136.62.34 2049 udp nfs unknown
3010200.2.249.28 21 tcp ftp open 220 (vsFTPd 3.0.2)\x0d\x0a
3011200.2.249.28 53 tcp domain filtered
3012200.2.249.28 53 udp domain unknown
3013200.2.249.28 67 tcp dhcps filtered
3014200.2.249.28 67 udp dhcps unknown
3015200.2.249.28 68 tcp dhcpc filtered
3016200.2.249.28 68 udp dhcpc unknown
3017200.2.249.28 69 tcp tftp filtered
3018200.2.249.28 69 udp tftp unknown
3019200.2.249.28 88 tcp kerberos-sec filtered
3020200.2.249.28 88 udp kerberos-sec unknown
3021200.2.249.28 123 tcp ntp filtered
3022200.2.249.28 123 udp ntp unknown
3023200.2.249.28 137 tcp netbios-ns filtered
3024200.2.249.28 137 udp netbios-ns filtered
3025200.2.249.28 138 tcp netbios-dgm filtered
3026200.2.249.28 138 udp netbios-dgm filtered
3027200.2.249.28 139 tcp netbios-ssn closed
3028200.2.249.28 139 udp netbios-ssn unknown
3029200.2.249.28 161 tcp snmp filtered
3030200.2.249.28 161 udp snmp unknown
3031200.2.249.28 162 tcp snmptrap filtered
3032200.2.249.28 162 udp snmptrap unknown
3033200.2.249.28 389 tcp ldap filtered
3034200.2.249.28 389 udp ldap unknown
3035200.2.249.28 520 tcp efs filtered
3036200.2.249.28 520 udp route unknown
3037200.2.249.28 2049 tcp nfs filtered
3038200.2.249.28 2049 udp nfs unknown
3039200.74.161.66 25 tcp smtp closed
3040200.74.161.66 53 tcp domain filtered
3041200.74.161.66 53 udp domain unknown
3042200.74.161.66 67 tcp dhcps filtered
3043200.74.161.66 67 udp dhcps unknown
3044200.74.161.66 68 tcp dhcpc filtered
3045200.74.161.66 68 udp dhcpc unknown
3046200.74.161.66 69 tcp tftp filtered
3047200.74.161.66 69 udp tftp unknown
3048200.74.161.66 88 tcp kerberos-sec filtered
3049200.74.161.66 88 udp kerberos-sec unknown
3050200.74.161.66 123 tcp ntp filtered
3051200.74.161.66 123 udp ntp unknown
3052200.74.161.66 137 tcp netbios-ns filtered
3053200.74.161.66 137 udp netbios-ns filtered
3054200.74.161.66 138 tcp netbios-dgm filtered
3055200.74.161.66 138 udp netbios-dgm filtered
3056200.74.161.66 139 tcp netbios-ssn closed
3057200.74.161.66 139 udp netbios-ssn unknown
3058200.74.161.66 161 tcp snmp filtered
3059200.74.161.66 161 udp snmp unknown
3060200.74.161.66 162 tcp snmptrap filtered
3061200.74.161.66 162 udp snmptrap unknown
3062200.74.161.66 389 tcp ldap filtered
3063200.74.161.66 389 udp ldap unknown
3064200.74.161.66 445 tcp microsoft-ds closed
3065200.74.161.66 520 tcp efs filtered
3066200.74.161.66 520 udp route unknown
3067200.74.161.66 2049 tcp nfs filtered
3068200.74.161.66 2049 udp nfs unknown
3069201.148.104.123 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 8 of 50 allowed.\x0d\x0a220-Local time is now 19:55. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
3070201.217.241.136 25 tcp smtp closed
3071201.217.241.136 53 tcp domain filtered ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
3072201.217.241.136 53 udp domain unknown ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
3073201.217.241.136 67 tcp dhcps filtered
3074201.217.241.136 67 udp dhcps unknown
3075201.217.241.136 68 tcp dhcpc filtered
3076201.217.241.136 68 udp dhcpc unknown
3077201.217.241.136 69 tcp tftp filtered
3078201.217.241.136 69 udp tftp unknown
3079201.217.241.136 88 tcp kerberos-sec filtered
3080201.217.241.136 88 udp kerberos-sec unknown
3081201.217.241.136 123 tcp ntp filtered
3082201.217.241.136 123 udp ntp unknown
3083201.217.241.136 137 tcp netbios-ns filtered
3084201.217.241.136 137 udp netbios-ns filtered
3085201.217.241.136 138 tcp netbios-dgm filtered
3086201.217.241.136 138 udp netbios-dgm filtered
3087201.217.241.136 139 tcp netbios-ssn closed
3088201.217.241.136 139 udp netbios-ssn unknown
3089201.217.241.136 161 tcp snmp filtered
3090201.217.241.136 161 udp snmp unknown
3091201.217.241.136 162 tcp snmptrap filtered
3092201.217.241.136 162 udp snmptrap unknown
3093201.217.241.136 389 tcp ldap filtered
3094201.217.241.136 389 udp ldap unknown
3095201.217.241.136 445 tcp microsoft-ds closed
3096201.217.241.136 520 tcp efs filtered
3097201.217.241.136 520 udp route unknown
3098201.217.241.136 2049 tcp nfs filtered
3099201.217.241.136 2049 udp nfs unknown
3100208.113.216.34 21 tcp ftp open 220 DreamHost FTP Server\x0d\x0a
3101217.12.199.143 22 tcp ssh open SSH-2.0-OpenSSH_7.4
3102217.12.199.143 53 tcp domain closed
3103217.12.199.143 53 udp domain closed
3104217.12.199.143 67 tcp dhcps closed
3105217.12.199.143 67 udp dhcps unknown
3106217.12.199.143 68 tcp dhcpc closed
3107217.12.199.143 68 udp dhcpc closed
3108217.12.199.143 69 tcp tftp closed
3109217.12.199.143 69 udp tftp closed
3110217.12.199.143 88 tcp kerberos-sec closed
3111217.12.199.143 88 udp kerberos-sec closed
3112217.12.199.143 123 tcp ntp closed
3113217.12.199.143 123 udp ntp unknown
3114217.12.199.143 137 tcp netbios-ns filtered
3115217.12.199.143 137 udp netbios-ns filtered
3116217.12.199.143 138 tcp netbios-dgm filtered
3117217.12.199.143 138 udp netbios-dgm filtered
3118217.12.199.143 139 tcp netbios-ssn closed
3119217.12.199.143 139 udp netbios-ssn closed
3120217.12.199.143 161 tcp snmp closed
3121217.12.199.143 161 udp snmp unknown
3122217.12.199.143 162 tcp snmptrap closed
3123217.12.199.143 162 udp snmptrap closed
3124217.12.199.143 389 tcp ldap closed
3125217.12.199.143 389 udp ldap closed
3126217.12.199.143 520 tcp efs closed
3127217.12.199.143 520 udp route closed
3128217.12.199.143 2049 tcp nfs closed
3129217.12.199.143 2049 udp nfs closed
3130219.94.128.83 53 tcp domain closed
3131219.94.128.83 53 udp domain closed
3132219.94.128.83 67 tcp dhcps closed
3133219.94.128.83 67 udp dhcps closed
3134219.94.128.83 68 tcp dhcpc closed
3135219.94.128.83 68 udp dhcpc closed
3136219.94.128.83 69 tcp tftp filtered
3137219.94.128.83 69 udp tftp unknown
3138219.94.128.83 88 tcp kerberos-sec closed
3139219.94.128.83 88 udp kerberos-sec closed
3140219.94.128.83 123 tcp ntp filtered
3141219.94.128.83 123 udp ntp unknown
3142219.94.128.83 137 tcp netbios-ns filtered
3143219.94.128.83 137 udp netbios-ns filtered
3144219.94.128.83 138 tcp netbios-dgm filtered
3145219.94.128.83 138 udp netbios-dgm filtered
3146219.94.128.83 139 tcp netbios-ssn closed
3147219.94.128.83 139 udp netbios-ssn unknown
3148219.94.128.83 161 tcp snmp closed
3149219.94.128.83 161 udp snmp unknown
3150219.94.128.83 162 tcp snmptrap closed
3151219.94.128.83 162 udp snmptrap closed
3152219.94.128.83 389 tcp ldap closed
3153219.94.128.83 389 udp ldap closed
3154219.94.128.83 520 tcp efs closed
3155219.94.128.83 520 udp route closed
3156219.94.128.83 2049 tcp nfs closed
3157219.94.128.83 2049 udp nfs closed
3158219.94.128.84 21 tcp ftp open 220 ProFTPD 1.3.5a Server (SAKURA Internet FTP Server) [::ffff:219.94.128.84]\x0d\x0a
3159219.94.128.84 22 tcp ssh open SSH-2.0-OpenSSH_5.8p2_hpn13v11 FreeBSD-20110503
3160######################################################################################################################################
3161[INFO] ------TARGET info------
3162[*] TARGET: https://www.aafp.cl/
3163[*] TARGET IP: 138.117.148.94
3164[INFO] NO load balancer detected for www.aafp.cl...
3165[*] DNS servers: cpanel1.soporte.cl.
3166[*] TARGET server: Apache
3167[*] CC: CL
3168[*] Country: Chile
3169[*] RegionCode: RM
3170[*] RegionName: Santiago Metropolitan
3171[*] City: Penalolen
3172[*] ASN: AS265831
3173[*] BGP_PREFIX: 138.117.148.0/24
3174[*] ISP: SOC. COMERCIAL WIRENET CHILE LTDA., CL
3175[INFO] SSL/HTTPS certificate detected
3176[*] Issuer: issuer=C = US, ST = TX, L = Houston, O = "cPanel, Inc.", CN = "cPanel, Inc. Certification Authority"
3177[*] Subject: subject=CN = aafp.cl
3178[INFO] DNS enumeration:
3179[*] ftp.aafp.cl 200.55.200.5
3180[*] mail.aafp.cl aafp.cl. 138.117.148.94
3181[*] ns1.aafp.cl 138.117.148.94
3182[*] ns2.aafp.cl 138.117.148.94
3183[*] webmail.aafp.cl 200.55.200.5
3184[INFO] Possible abuse mails are:
3185[*] abuse@aafp.cl
3186[*] abuse@www.aafp.cl
3187[*] admin@wirenetchile.com
3188[INFO] NO PAC (Proxy Auto Configuration) file FOUND
3189[ALERT] robots.txt file FOUND in http://www.aafp.cl/robots.txt
3190[INFO] Checking for HTTP status codes recursively from http://www.aafp.cl/robots.txt
3191[INFO] Status code Folders
3192[INFO] Starting FUZZing in http://www.aafp.cl/FUzZzZzZzZz...
3193[INFO] Status code Folders
3194[ALERT] Look in the source code. It may contain passwords
3195[INFO] Links found from https://www.aafp.cl/ http://138.117.148.94/:
3196[*] http://138.117.148.94/cgi-sys/defaultwebpage.cgi
3197[*] https://afiliadoinformado.cl/
3198[*] https://nuevo.cuprum.cl/
3199[*] https://twitter.com/AFPdeChile
3200[*] https://www.aafp.cl/
3201[*] https://www.aafp.cl/agenda-de-relacionamiento/
3202[*] https://www.aafp.cl/aspectos-que-propone-el-proyecto-de-reforma-a-las-pensiones/
3203[*] https://www.aafp.cl/biblioteca/
3204[*] https://www.aafp.cl/blog/
3205[*] https://www.aafp.cl/boletines-multifondos/
3206[*] https://www.aafp.cl/calculo-pensiones/
3207[*] https://www.aafp.cl/categoria/prensa/
3208[*] https://www.aafp.cl/comments/feed/
3209[*] https://www.aafp.cl/directorio-y-presidentes/
3210[*] https://www.aafp.cl/encuestas-2/
3211[*] https://www.aafp.cl/estructura-del-equipo/
3212[*] https://www.aafp.cl/feed/
3213[*] https://www.aafp.cl/#main
3214[*] https://www.aafp.cl/perfiles-de-afiliados/
3215[*] https://www.aafp.cl/perfiles-de-afiliados/empleador/
3216[*] https://www.aafp.cl/perfiles-de-afiliados/familiar-fallecido/
3217[*] https://www.aafp.cl/perfiles-de-afiliados/inmigrantes/
3218[*] https://www.aafp.cl/perfiles-de-afiliados/mi-primer-trabajo/
3219[*] https://www.aafp.cl/perfiles-de-afiliados/mujer/
3220[*] https://www.aafp.cl/perfiles-de-afiliados/pensionado/
3221[*] https://www.aafp.cl/perfiles-de-afiliados/pensionado-por-invalidez/
3222[*] https://www.aafp.cl/perfiles-de-afiliados/trabajador-dependiente/
3223[*] https://www.aafp.cl/perfiles-de-afiliados/trabajador-en-edad-de-pensionarse/
3224[*] https://www.aafp.cl/perfiles-de-afiliados/trabajador-independiente/
3225[*] https://www.aafp.cl/programas-aafp/
3226[*] https://www.aafp.cl/programas-de-educacion-previsional-de-la-asociacion-de-aafp/
3227[*] https://www.aafp.cl/que-hacemos/
3228[*] https://www.aafp.cl/quienes-somos/
3229[*] https://www.aafp.cl/resumenes-de-prensa/
3230[*] https://www.aafp.cl/retiro-de-ahorros-de-afp-tc-rechaza-recursos-porque-no-se-afecta-el-derecho-de-propiedad/
3231[*] https://www.aafp.cl/revista-institucional/
3232[*] https://www.aafp.cl/#search-lightbox
3233[*] https://www.aafp.cl/sistema-previsional/
3234[*] https://www.aafp.cl/temas-previsionales/
3235[*] https://www.aafp.cl/#top
3236[*] https://www.aafp.cl/transparencia/
3237[*] https://www.aafp.cl/wp-content/uploads/2019/12/Boleti%CC%81n-Multifondos-Tercer-Trimestre.pdf#new_tab
3238[*] https://www.aafp.cl/wp-json/oembed/1.0/embed?url=https://www.aafp.cl/
3239[*] https://www.aafp.cl/wp-json/oembed/1.0/embed?url=https://www.aafp.cl/&format=xml
3240[*] https://www.aafp.cl/y-encuestas/
3241[*] https://www.afpcapital.cl/Paginas/default.aspx
3242[*] https://www.afpmodelo.cl/AFP/Home.aspx
3243[*] https://www.facebook.com/AFPdeChile
3244[*] https://www.linkedin.com/company/asociaci-n-de-afp-de-chile/
3245[*] https://www.misbeneficiosafp.cl/
3246[*] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=c2FsdWQ=&idcat=MzYx
3247[*] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=c2hvcHBpbmc=&idcat=MzY1
3248[*] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=c2VydmljaW9z&idcat=MzY0
3249[*] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=cGVuc2lvbmFkb3M=&idcat=MzY3
3250[*] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=dGllbXBv&idcat=MzY2
3251[*] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=Z2FzdHJvbm9taWE=&idcat=MzYz
3252[*] https://www.misbeneficiosafp.cl/beneficios-convenios.php?idclass=ZWR1Y2FjaW9u&idcat=MzYy
3253[*] https://www.planvital.cl/
3254[*] https://www.previred.com/
3255[*] https://www.previsionsocial.gob.cl/sps/
3256[*] https://www.provida.cl/
3257[*] https://www.sontuslucas.cl/#/
3258[*] https://www.youtube.com/user/AAFPdeCHile
3259[*] http://url/
3260[*] http://www.mitosyrealidades.cl/#new_tab
3261[*] http://www.scomp.cl/
3262[*] http://www.sontuslucas.cl/
3263[*] http://www.spensiones.cl/portal/institucional/594/w3-channel.html
3264cut: intervalle de champ incorrecte
3265Saisissez « cut --help » pour plus d'informations.
3266[INFO] Shodan detected the following opened ports on 138.117.148.94:
3267[*] 1
3268[*] 110
3269[*] 143
3270[*] 2077
3271[*] 2082
3272[*] 2083
3273[*] 2086
3274[*] 2087
3275[*] 3306
3276[*] 4
3277[*] 443
3278[*] 465
3279[*] 53
3280[*] 80
3281[*] 993
3282[INFO] ------VirusTotal SECTION------
3283[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
3284[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
3285[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
3286[INFO] ------Alexa Rank SECTION------
3287[INFO] Percent of Visitors Rank in Country:
3288[INFO] Percent of Search Traffic:
3289[INFO] Percent of Unique Visits:
3290[INFO] Total Sites Linking In:
3291[*] Total Sites
3292[INFO] Useful links related to www.aafp.cl - 138.117.148.94:
3293[*] https://www.virustotal.com/pt/ip-address/138.117.148.94/information/
3294[*] https://www.hybrid-analysis.com/search?host=138.117.148.94
3295[*] https://www.shodan.io/host/138.117.148.94
3296[*] https://www.senderbase.org/lookup/?search_string=138.117.148.94
3297[*] https://www.alienvault.com/open-threat-exchange/ip/138.117.148.94
3298[*] http://pastebin.com/search?q=138.117.148.94
3299[*] http://urlquery.net/search.php?q=138.117.148.94
3300[*] http://www.alexa.com/siteinfo/www.aafp.cl
3301[*] http://www.google.com/safebrowsing/diagnostic?site=www.aafp.cl
3302[*] https://censys.io/ipv4/138.117.148.94
3303[*] https://www.abuseipdb.com/check/138.117.148.94
3304[*] https://urlscan.io/search/#138.117.148.94
3305[*] https://github.com/search?q=138.117.148.94&type=Code
3306[INFO] Useful links related to AS265831 - 138.117.148.0/24:
3307[*] http://www.google.com/safebrowsing/diagnostic?site=AS:265831
3308[*] https://www.senderbase.org/lookup/?search_string=138.117.148.0/24
3309[*] http://bgp.he.net/AS265831
3310[*] https://stat.ripe.net/AS265831
3311[INFO] Date: 25/12/19 | Time: 18:18:20
3312[INFO] Total time: 3 minute(s) and 8 second(s)
3313#####################################################################################################################################
3314[+] URL: https://www.aafp.cl/
3315[+] Started: Wed Dec 25 18:10:54 2019
3316
3317Interesting Finding(s):
3318
3319[+] https://www.aafp.cl/
3320 | Interesting Entry: Server: Apache
3321 | Found By: Headers (Passive Detection)
3322 | Confidence: 100%
3323
3324[+] https://www.aafp.cl/xmlrpc.php
3325 | Found By: Link Tag (Passive Detection)
3326 | Confidence: 100%
3327 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
3328 | References:
3329 | - http://codex.wordpress.org/XML-RPC_Pingback_API
3330 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
3331 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
3332 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
3333 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
3334
3335[+] This site has 'Must Use Plugins': https://www.aafp.cl/wp-content/mu-plugins/
3336 | Found By: Direct Access (Aggressive Detection)
3337 | Confidence: 80%
3338 | Reference: http://codex.wordpress.org/Must_Use_Plugins
3339
3340[+] WordPress version 5.3.2 identified (Latest, released on 2019-12-18).
3341 | Found By: Meta Generator (Passive Detection)
3342 | - https://www.aafp.cl/, Match: 'WordPress 5.3.2'
3343 | Confirmed By: Most Common Wp Includes Query Parameter In Homepage (Passive Detection)
3344 | - https://www.aafp.cl/wp-includes/css/dist/block-library/style.min.css?ver=5.3.2
3345 | - https://www.aafp.cl/wp-includes/js/wp-embed.min.js?ver=5.3.2
3346
3347[+] WordPress theme in use: asociacion-afp-chile
3348 | Location: https://www.aafp.cl/wp-content/themes/asociacion-afp-chile/
3349 | Style URL: https://www.aafp.cl/wp-content/themes/asociacion-afp-chile/style.css?ver=3.0
3350 | Style Name: Asociación AFP Chile
3351 | Description: This is a child theme for Flatsome Theme...
3352 | Author: UX Themes
3353 |
3354 | Found By: Css Style In 404 Page (Passive Detection)
3355 |
3356 | Version: 3.0 (80% confidence)
3357 | Found By: Style (Passive Detection)
3358 | - https://www.aafp.cl/wp-content/themes/asociacion-afp-chile/style.css?ver=3.0, Match: 'Version: 3.0'
3359
3360[+] Enumerating All Plugins (via Passive Methods)
3361[+] Checking Plugin Versions (via Passive and Aggressive Methods)
3362
3363[i] Plugin(s) Identified:
3364
3365[+] contact-form-7
3366 | Location: https://www.aafp.cl/wp-content/plugins/contact-form-7/
3367 | Latest Version: 5.1.6 (up to date)
3368 | Last Updated: 2019-11-30T13:01:00.000Z
3369 |
3370 | Found By: Urls In Homepage (Passive Detection)
3371 | Confirmed By:
3372 | Urls In 404 Page (Passive Detection)
3373 | Hidden Input (Passive Detection)
3374 |
3375 | Version: 5.1.6 (80% confidence)
3376 | Found By: Query Parameter (Passive Detection)
3377 | - https://www.aafp.cl/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=5.1.6
3378 | - https://www.aafp.cl/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.1.6
3379 | Confirmed By: Hidden Input (Passive Detection)
3380 | - https://www.aafp.cl/, Match: '5.1.6'
3381
3382[+] ninja-forms
3383 | Location: https://www.aafp.cl/wp-content/plugins/ninja-forms/
3384 | Latest Version: 3.4.22
3385 | Last Updated: 2019-11-21T15:33:00.000Z
3386 |
3387 | Found By: Urls In Homepage (Passive Detection)
3388 |
3389 | The version could not be determined.
3390
3391[+] ninja-forms-style
3392 | Location: https://www.aafp.cl/wp-content/plugins/ninja-forms-style/
3393 |
3394 | Found By: Urls In Homepage (Passive Detection)
3395 |
3396 | The version could not be determined.
3397
3398[+] page-links-to
3399 | Location: https://www.aafp.cl/wp-content/plugins/page-links-to/
3400 | Latest Version: 3.2.1
3401 | Last Updated: 2019-11-15T05:08:00.000Z
3402 |
3403 | Found By: Urls In 404 Page (Passive Detection)
3404 |
3405 | The version could not be determined.
3406
3407[+] simple-tooltips
3408 | Location: https://www.aafp.cl/wp-content/plugins/simple-tooltips/
3409 | Latest Version: 2.1.3
3410 | Last Updated: 2019-01-14T18:07:00.000Z
3411 |
3412 | Found By: Urls In Homepage (Passive Detection)
3413 | Confirmed By: Urls In 404 Page (Passive Detection)
3414 |
3415 | The version could not be determined.
3416
3417[+] tablepress
3418 | Location: https://www.aafp.cl/wp-content/plugins/tablepress/
3419 | Latest Version: 1.10 (up to date)
3420 | Last Updated: 2019-11-29T17:19:00.000Z
3421 |
3422 | Found By: Urls In Homepage (Passive Detection)
3423 | Confirmed By: Urls In 404 Page (Passive Detection)
3424 |
3425 | Version: 1.10 (10% confidence)
3426 | Found By: Query Parameter (Passive Detection)
3427 | - https://www.aafp.cl/wp-content/plugins/tablepress/css/default.min.css?ver=1.10
3428
3429[+] wordpress-seo-premium
3430 | Location: https://www.aafp.cl/wp-content/plugins/wordpress-seo-premium/
3431 |
3432 | Found By: Comment (Passive Detection)
3433 |
3434 | The version could not be determined.
3435
3436[+] wp-rocket
3437 | Location: https://www.aafp.cl/wp-content/plugins/wp-rocket/
3438 |
3439 | Found By: Comment (Passive Detection)
3440 |
3441 | The version could not be determined.
3442
3443[+] Enumerating Config Backups (via Passive and Aggressive Methods)
3444 Checking Config Backups - Time: 00:00:27 <=============> (21 / 21) 100.00% Time: 00:00:27
3445
3446[i] No Config Backups Found.
3447
3448[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
3449[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up.
3450
3451[+] Finished: Wed Dec 25 18:12:58 2019
3452[+] Requests Done: 79
3453[+] Cached Requests: 7
3454[+] Data Sent: 15.665 KB
3455[+] Data Received: 673.486 KB
3456[+] Memory used: 170.662 MB
3457[+] Elapsed time: 00:02:04
3458######################################################################################################################################
3459[+] URL: https://www.aafp.cl/
3460[+] Started: Wed Dec 25 18:10:59 2019
3461
3462Interesting Finding(s):
3463
3464[+] https://www.aafp.cl/
3465 | Interesting Entry: Server: Apache
3466 | Found By: Headers (Passive Detection)
3467 | Confidence: 100%
3468
3469[+] https://www.aafp.cl/xmlrpc.php
3470 | Found By: Link Tag (Passive Detection)
3471 | Confidence: 100%
3472 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
3473 | References:
3474 | - http://codex.wordpress.org/XML-RPC_Pingback_API
3475 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
3476 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
3477 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
3478 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
3479
3480[+] This site has 'Must Use Plugins': https://www.aafp.cl/wp-content/mu-plugins/
3481 | Found By: Direct Access (Aggressive Detection)
3482 | Confidence: 80%
3483 | Reference: http://codex.wordpress.org/Must_Use_Plugins
3484
3485[+] WordPress version 5.3.2 identified (Latest, released on 2019-12-18).
3486 | Found By: Meta Generator (Passive Detection)
3487 | - https://www.aafp.cl/, Match: 'WordPress 5.3.2'
3488 | Confirmed By: Most Common Wp Includes Query Parameter In Homepage (Passive Detection)
3489 | - https://www.aafp.cl/wp-includes/css/dist/block-library/style.min.css?ver=5.3.2
3490 | - https://www.aafp.cl/wp-includes/js/wp-embed.min.js?ver=5.3.2
3491
3492[+] WordPress theme in use: asociacion-afp-chile
3493 | Location: https://www.aafp.cl/wp-content/themes/asociacion-afp-chile/
3494 | Style URL: https://www.aafp.cl/wp-content/themes/asociacion-afp-chile/style.css?ver=3.0
3495 | Style Name: Asociación AFP Chile
3496 | Description: This is a child theme for Flatsome Theme...
3497 | Author: UX Themes
3498 |
3499 | Found By: Css Style In 404 Page (Passive Detection)
3500 |
3501 | Version: 3.0 (80% confidence)
3502 | Found By: Style (Passive Detection)
3503 | - https://www.aafp.cl/wp-content/themes/asociacion-afp-chile/style.css?ver=3.0, Match: 'Version: 3.0'
3504
3505[+] Enumerating Users (via Passive and Aggressive Methods)
3506 Brute Forcing Author IDs - Time: 00:00:11 <==> (10 / 10) 100.00% Time: 00:00:11
3507
3508[i] No Users Found.
3509
3510[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
3511[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up.
3512
3513[+] Finished: Wed Dec 25 18:12:15 2019
3514[+] Requests Done: 46
3515[+] Cached Requests: 17
3516[+] Data Sent: 8.752 KB
3517[+] Data Received: 334.593 KB
3518[+] Memory used: 109.092 MB
3519[+] Elapsed time: 00:01:16
3520######################################################################################################################################
3521[+] URL: https://www.aafp.cl/
3522[+] Started: Wed Dec 25 18:15:10 2019
3523
3524Interesting Finding(s):
3525
3526[+] https://www.aafp.cl/
3527 | Interesting Entry: Server: Apache
3528 | Found By: Headers (Passive Detection)
3529 | Confidence: 100%
3530
3531[+] https://www.aafp.cl/xmlrpc.php
3532 | Found By: Link Tag (Passive Detection)
3533 | Confidence: 30%
3534 | References:
3535 | - http://codex.wordpress.org/XML-RPC_Pingback_API
3536 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
3537 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
3538 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
3539 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
3540
3541Fingerprinting the version - Time: 00:10:59 <=========> (406 / 406) 100.00% Time: 00:10:59
3542[+] WordPress version 5.3.2 identified (Latest, released on 2019-12-18).
3543 | Found By: Meta Generator (Passive Detection)
3544 | - https://www.aafp.cl/, Match: 'WordPress 5.3.2'
3545
3546[+] WordPress theme in use: flatsome
3547 | Location: https://www.aafp.cl/wp-content/themes/flatsome/
3548 | Style URL: https://www.aafp.cl/wp-content/themes/flatsome/style.css
3549 | Style Name: Flatsome
3550 | Style URI: http://flatsome.uxthemes.com/
3551 | Description: Multi-Purpose Responsive WooCommerce Theme...
3552 | Author: UX-Themes
3553 | Author URI: http://www.uxthemes.com/
3554 |
3555 | Found By: Urls In Homepage (Passive Detection)
3556 |
3557 | Version: 3.8.3 (80% confidence)
3558 | Found By: Style (Passive Detection)
3559 | - https://www.aafp.cl/wp-content/themes/flatsome/style.css, Match: 'Version: 3.8.3'
3560
3561[+] Enumerating Users (via Passive and Aggressive Methods)
3562 Brute Forcing Author IDs - Time: 00:00:16 <============> (10 / 10) 100.00% Time: 00:00:16
3563
3564[i] User(s) Identified:
3565
3566[+] aafp
3567 | Found By: Wp Json Api (Aggressive Detection)
3568 | - https://www.aafp.cl/wp-json/wp/v2/users/?per_page=100&page=1
3569
3570[+] nicole
3571 | Found By: Wp Json Api (Aggressive Detection)
3572 | - https://www.aafp.cl/wp-json/wp/v2/users/?per_page=100&page=1
3573
3574[+] rolando
3575 | Found By: Wp Json Api (Aggressive Detection)
3576 | - https://www.aafp.cl/wp-json/wp/v2/users/?per_page=100&page=1
3577
3578[+] selva
3579 | Found By: Wp Json Api (Aggressive Detection)
3580 | - https://www.aafp.cl/wp-json/wp/v2/users/?per_page=100&page=1
3581
3582[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
3583[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up.
3584
3585[+] Finished: Wed Dec 25 18:27:49 2019
3586[+] Requests Done: 448
3587[+] Cached Requests: 34
3588[+] Data Sent: 96.994 KB
3589[+] Data Received: 258.117 KB
3590[+] Memory used: 129.021 MB
3591[+] Elapsed time: 00:12:38
3592#####################################################################################################################################
3593[-] Target: https://www.aafp.cl (138.117.148.94)
3594[I] Server: Apache
3595[I] X-Powered-By: WP Rocket/3.4.1.2
3596[L] X-Frame-Options: Not Enforced
3597[I] Strict-Transport-Security: Not Enforced
3598[I] X-Content-Security-Policy: Not Enforced
3599[I] X-Content-Type-Options: Not Enforced
3600[L] Robots.txt Found: https://www.aafp.cl/robots.txt
3601[I] CMS Detection: WordPress
3602[I] Wordpress Version: 5.3.2
3603[I] Wordpress Theme: flatsome
3604[M] XML-RPC services are enabled
3605[I] Autocomplete Off Not Found: https://www.aafp.cl/wp-login.php
3606[-] Default WordPress Files:
3607[I] https://www.aafp.cl/readme.html
3608[-] Searching Wordpress Plugins ...
3609[I] adrotate
3610[M] EDB-ID: 17888 "WordPress Plugin AdRotate 3.6.5 - SQL Injection"
3611[M] EDB-ID: 18114 "WordPress Plugin AdRotate 3.6.6 - SQL Injection"
3612[M] EDB-ID: 31834 "WordPress Plugin AdRotate 3.9.4 - 'clicktracker.ph?track' SQL Injection"
3613[I] ads-box
3614[M] EDB-ID: 38060 "WordPress Plugin Ads Box - 'count' SQL Injection"
3615[I] advanced-dewplayer
3616[M] EDB-ID: 38936 "WordPress Plugin Advanced Dewplayer - 'download-file.php' Script Directory Traversal"
3617[I] advanced-text-widget
3618[M] EDB-ID: 36324 "WordPress Plugin Advanced Text Widget 2.0 - 'page' Cross-Site Scripting"
3619[I] advanced-uploader
3620[M] EDB-ID: 38867 "WordPress Plugin Advanced uploader 2.10 - Multiple Vulnerabilities"
3621[I] advertizer
3622[M] EDB-ID: 17750 "WordPress Plugin Advertizer 1.0 - SQL Injection"
3623[I] age-verification
3624[M] EDB-ID: 18350 "WordPress Plugin Age Verification 0.4 - Open Redirect"
3625[M] EDB-ID: 36540 "WordPress Plugin Age Verification 0.4 - 'redirect_to' Open Redirection"
3626[I] ajax-category-dropdown
3627[M] EDB-ID: 17207 "WordPress Plugin Ajax Category Dropdown 0.1.5 - Multiple Vulnerabilities"
3628[I] ajax-store-locator-wordpress_0
3629[M] EDB-ID: 35493 "WordPress Plugin Ajax Store Locator 1.2 - Arbitrary File Download"
3630[I] contact-form-7
3631[I] like-dislike-counter-for-posts-pages-and-comments
3632[M] EDB-ID: 34553 "WordPress Plugin Like Dislike Counter 1.2.3 - SQL Injection"
3633[I] link-library
3634[M] EDB-ID: 17887 "WordPress Plugin Link Library 5.2.1 - SQL Injection"
3635[I] lisl-last-image-slider
3636[M] EDB-ID: 17872 "Multiple WordPress Plugins - 'timthumb.php' File Upload"
3637[I] livesig
3638[M] EDB-ID: 17864 "WordPress Plugin Livesig 0.4 - Remote File Inclusion"
3639[I] localize-my-post
3640[M] EDB-ID: 45439 "WordPress Plugin Localize My Post 1.0 - Local File Inclusion"
3641[I] mac-dock-gallery
3642[M] EDB-ID: 19056 "WordPress Plugin Mac Photo Gallery 2.7 - Arbitrary File Upload"
3643[I] madebymilk
3644[M] EDB-ID: 38041 "WordPress Theme Madebymilk - 'id' SQL Injection"
3645[I] mail-masta
3646[M] EDB-ID: 40290 "WordPress Plugin Mail Masta 1.0 - Local File Inclusion"
3647[M] EDB-ID: 41438 "WordPress Plugin Mail Masta 1.0 - SQL Injection"
3648[I] mailz
3649[M] EDB-ID: 17866 "WordPress Plugin Mailing List 1.3.2 - Remote File Inclusion"
3650[M] EDB-ID: 18276 "WordPress Plugin Mailing List - Arbitrary File Download"
3651[I] media-library-categories
3652[M] EDB-ID: 17628 "WordPress Plugin Media Library Categories 1.0.6 - SQL Injection"
3653[I] ninja-forms
3654[I] ninja-forms-style
3655[I] simple-tooltips
3656[I] tablepress
3657[I] wp-responsive-thumbnail-slider
3658[M] EDB-ID: 45099 "WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit)"
3659[I] wp-safe-search
3660[M] EDB-ID: 35067 "WordPress Plugin Safe Search - 'v1' Cross-Site Scripting"
3661[I] wp-shopping-cart
3662[M] EDB-ID: 6867 "Huawei eSpace 1.1.11.103 - Image File Format Handling Buffer Overflow"
3663[I] wp-source-control
3664[M] EDB-ID: 39287 "WordPress Plugin WP Content Source Control - 'download.php' Directory Traversal"
3665[I] wp-spamfree
3666[M] EDB-ID: 17970 "WordPress Plugin WP-SpamFree Spam Plugin - SQL Injection"
3667[I] wp-starsratebox
3668[M] EDB-ID: 35634 "WordPress Plugin WP-StarsRateBox 1.1 - 'j' SQL Injection"
3669[I] wp-stats-dashboard
3670[I] wp-support-plus-responsive-ticket-system
3671[M] EDB-ID: 34589 "SCO UnixWare < 7.1.4 p534589 - 'pkgadd' Local Privilege Escalation"
3672[I] wp-survey-and-quiz-tool
3673[M] EDB-ID: 34974 "WordPress Plugin WP Survey And Quiz Tool 1.2.1 - Cross-Site Scripting"
3674[I] wp-swimteam
3675[M] EDB-ID: 37601 "WordPress Plugin Swim Team 1.44.10777 - Arbitrary File Download"
3676[I] wp-syntax
3677[M] EDB-ID: 9431 "Adobe Photoshop CC / Bridge CC - '.iff' Parsing Memory Corruption"
3678[I] wp-table-reloaded
3679[M] EDB-ID: 38251 "WordPress Plugin WP-Table Reloaded - 'id' Cross-Site Scripting"
3680[I] wp-twitter-feed
3681[M] EDB-ID: 35084 "WordPress Plugin Twitter Feed - 'url' Cross-Site Scripting"
3682[I] wp-whois
3683[M] EDB-ID: 36488 "WordPress Plugin WHOIS 1.4.2 3 - 'domain' Cross-Site Scripting"
3684[I] wp-with-spritz
3685[M] EDB-ID: 44544 "WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion"
3686[I] wpSS
3687[M] EDB-ID: 39279 "WordPress Plugin wpSS - 'ss_handler.php' SQL Injection"
3688[M] EDB-ID: 5486 "PHP < 5.3.6 'OpenSSL' Extension - 'openssl_encrypt' Plaintext Data Memory Leak Denial of Service"
3689[I] Checking for Directory Listing Enabled ...
3690[L] https://www.aafp.cl/wp-admin/css
3691[L] https://www.aafp.cl/wp-admin/images
3692[L] https://www.aafp.cl/wp-admin/includes
3693[L] https://www.aafp.cl/wp-admin/js
3694[L] https://www.aafp.cl/wp-admin/maint
3695[L] https://www.aafp.cl/wp-includes
3696[L] https://www.aafp.cl/wp-includes/ID3
3697[L] https://www.aafp.cl/wp-includes/IXR
3698[L] https://www.aafp.cl/wp-includes/Requests
3699[L] https://www.aafp.cl/wp-includes/SimplePie
3700[L] https://www.aafp.cl/wp-includes/Text
3701[L] https://www.aafp.cl/wp-includes/blocks
3702[L] https://www.aafp.cl/wp-includes/certificates
3703[L] https://www.aafp.cl/wp-includes/css
3704[L] https://www.aafp.cl/wp-includes/customize
3705[L] https://www.aafp.cl/wp-includes/fonts
3706[L] https://www.aafp.cl/wp-includes/images
3707[L] https://www.aafp.cl/wp-includes/js
3708[L] https://www.aafp.cl/wp-includes/pomo
3709[L] https://www.aafp.cl/wp-includes/random_compat
3710[L] https://www.aafp.cl/wp-includes/rest-api
3711[L] https://www.aafp.cl/wp-includes/sodium_compat
3712[L] https://www.aafp.cl/wp-includes/theme-compat
3713[L] https://www.aafp.cl/wp-includes/widgets
3714[-] Date & Time: 25/12/2019 18:31:42
3715[-] Completed in: 0:20:39
3716######################################################################################################################################
3717 Anonymous JTSEC #OpChili Full Recon #24