· 8 years ago · Jan 20, 2017, 08:58 PM
1Starting Nmap 7.40 ( https://nmap.org ) at 2017-01-20 20:49 GMT Standard Time
2
3NSE: Loaded 143 scripts for scanning.
4
5NSE: Script Pre-scanning.
6
7Initiating NSE at 20:49
8
9Completed NSE at 20:49, 0.00s elapsed
10
11Initiating NSE at 20:49
12
13Completed NSE at 20:49, 0.00s elapsed
14
15Initiating ARP Ping Scan at 20:49
16
17Scanning 255 hosts [1 port/host]
18
19Completed ARP Ping Scan at 20:49, 5.22s elapsed (255 total hosts)
20
21Initiating Parallel DNS resolution of 255 hosts. at 20:49
22
23Completed Parallel DNS resolution of 255 hosts. at 20:50, 26.00s elapsed
24
25Nmap scan report for 192.168.1.0 [host down]
26
27Nmap scan report for 192.168.1.2 [host down]
28
29Nmap scan report for 192.168.1.3 [host down]
30
31Nmap scan report for 192.168.1.5 [host down]
32
33Nmap scan report for 192.168.1.6 [host down]
34
35Nmap scan report for 192.168.1.7 [host down]
36
37Nmap scan report for 192.168.1.9 [host down]
38
39Nmap scan report for 192.168.1.10 [host down]
40
41Nmap scan report for 192.168.1.11 [host down]
42
43Nmap scan report for 192.168.1.12 [host down]
44
45Nmap scan report for 192.168.1.13 [host down]
46
47Nmap scan report for 192.168.1.14 [host down]
48
49Nmap scan report for 192.168.1.17 [host down]
50
51Nmap scan report for 192.168.1.18 [host down]
52
53Nmap scan report for 192.168.1.19 [host down]
54
55Nmap scan report for 192.168.1.22 [host down]
56
57Nmap scan report for 192.168.1.23 [host down]
58
59Nmap scan report for 192.168.1.27 [host down]
60
61Nmap scan report for 192.168.1.29 [host down]
62
63Nmap scan report for 192.168.1.30 [host down]
64
65Nmap scan report for 192.168.1.31 [host down]
66
67Nmap scan report for 192.168.1.32 [host down]
68
69Nmap scan report for 192.168.1.33 [host down]
70
71Nmap scan report for 192.168.1.34 [host down]
72
73Nmap scan report for 192.168.1.35 [host down]
74
75Nmap scan report for 192.168.1.36 [host down]
76
77Nmap scan report for 192.168.1.37 [host down]
78
79Nmap scan report for 192.168.1.38 [host down]
80
81Nmap scan report for 192.168.1.39 [host down]
82
83Nmap scan report for 192.168.1.40 [host down]
84
85Nmap scan report for 192.168.1.41 [host down]
86
87Nmap scan report for 192.168.1.42 [host down]
88
89Nmap scan report for 192.168.1.43 [host down]
90
91Nmap scan report for 192.168.1.44 [host down]
92
93Nmap scan report for 192.168.1.45 [host down]
94
95Nmap scan report for 192.168.1.46 [host down]
96
97Nmap scan report for 192.168.1.47 [host down]
98
99Nmap scan report for 192.168.1.48 [host down]
100
101Nmap scan report for 192.168.1.49 [host down]
102
103Nmap scan report for 192.168.1.50 [host down]
104
105Nmap scan report for 192.168.1.51 [host down]
106
107Nmap scan report for 192.168.1.52 [host down]
108
109Nmap scan report for 192.168.1.53 [host down]
110
111Nmap scan report for 192.168.1.54 [host down]
112
113Nmap scan report for 192.168.1.55 [host down]
114
115Nmap scan report for 192.168.1.56 [host down]
116
117Nmap scan report for 192.168.1.57 [host down]
118
119Nmap scan report for 192.168.1.58 [host down]
120
121Nmap scan report for 192.168.1.59 [host down]
122
123Nmap scan report for 192.168.1.60 [host down]
124
125Nmap scan report for 192.168.1.61 [host down]
126
127Nmap scan report for 192.168.1.62 [host down]
128
129Nmap scan report for 192.168.1.63 [host down]
130
131Nmap scan report for 192.168.1.64 [host down]
132
133Nmap scan report for 192.168.1.66 [host down]
134
135Nmap scan report for 192.168.1.67 [host down]
136
137Nmap scan report for 192.168.1.68 [host down]
138
139Nmap scan report for 192.168.1.69 [host down]
140
141Nmap scan report for 192.168.1.70 [host down]
142
143Nmap scan report for 192.168.1.71 [host down]
144
145Nmap scan report for 192.168.1.72 [host down]
146
147Nmap scan report for 192.168.1.73 [host down]
148
149Nmap scan report for 192.168.1.74 [host down]
150
151Nmap scan report for 192.168.1.75 [host down]
152
153Nmap scan report for 192.168.1.76 [host down]
154
155Nmap scan report for 192.168.1.77 [host down]
156
157Nmap scan report for 192.168.1.78 [host down]
158
159Nmap scan report for 192.168.1.79 [host down]
160
161Nmap scan report for 192.168.1.80 [host down]
162
163Nmap scan report for 192.168.1.81 [host down]
164
165Nmap scan report for 192.168.1.82 [host down]
166
167Nmap scan report for 192.168.1.83 [host down]
168
169Nmap scan report for 192.168.1.84 [host down]
170
171Nmap scan report for 192.168.1.85 [host down]
172
173Nmap scan report for 192.168.1.86 [host down]
174
175Nmap scan report for 192.168.1.87 [host down]
176
177Nmap scan report for 192.168.1.88 [host down]
178
179Nmap scan report for 192.168.1.89 [host down]
180
181Nmap scan report for 192.168.1.90 [host down]
182
183Nmap scan report for 192.168.1.91 [host down]
184
185Nmap scan report for 192.168.1.92 [host down]
186
187Nmap scan report for 192.168.1.93 [host down]
188
189Nmap scan report for 192.168.1.94 [host down]
190
191Nmap scan report for 192.168.1.95 [host down]
192
193Nmap scan report for 192.168.1.96 [host down]
194
195Nmap scan report for 192.168.1.97 [host down]
196
197Nmap scan report for 192.168.1.98 [host down]
198
199Nmap scan report for 192.168.1.99 [host down]
200
201Nmap scan report for 192.168.1.100 [host down]
202
203Nmap scan report for 192.168.1.101 [host down]
204
205Nmap scan report for 192.168.1.102 [host down]
206
207Nmap scan report for 192.168.1.103 [host down]
208
209Nmap scan report for 192.168.1.104 [host down]
210
211Nmap scan report for 192.168.1.105 [host down]
212
213Nmap scan report for 192.168.1.106 [host down]
214
215Nmap scan report for 192.168.1.107 [host down]
216
217Nmap scan report for 192.168.1.108 [host down]
218
219Nmap scan report for 192.168.1.109 [host down]
220
221Nmap scan report for 192.168.1.110 [host down]
222
223Nmap scan report for 192.168.1.111 [host down]
224
225Nmap scan report for 192.168.1.112 [host down]
226
227Nmap scan report for 192.168.1.113 [host down]
228
229Nmap scan report for 192.168.1.114 [host down]
230
231Nmap scan report for 192.168.1.115 [host down]
232
233Nmap scan report for 192.168.1.116 [host down]
234
235Nmap scan report for 192.168.1.117 [host down]
236
237Nmap scan report for 192.168.1.118 [host down]
238
239Nmap scan report for 192.168.1.119 [host down]
240
241Nmap scan report for 192.168.1.120 [host down]
242
243Nmap scan report for 192.168.1.121 [host down]
244
245Nmap scan report for 192.168.1.122 [host down]
246
247Nmap scan report for 192.168.1.123 [host down]
248
249Nmap scan report for 192.168.1.124 [host down]
250
251Nmap scan report for 192.168.1.125 [host down]
252
253Nmap scan report for 192.168.1.126 [host down]
254
255Nmap scan report for 192.168.1.127 [host down]
256
257Nmap scan report for 192.168.1.128 [host down]
258
259Nmap scan report for 192.168.1.129 [host down]
260
261Nmap scan report for 192.168.1.130 [host down]
262
263Nmap scan report for 192.168.1.131 [host down]
264
265Nmap scan report for 192.168.1.132 [host down]
266
267Nmap scan report for 192.168.1.133 [host down]
268
269Nmap scan report for 192.168.1.134 [host down]
270
271Nmap scan report for 192.168.1.135 [host down]
272
273Nmap scan report for 192.168.1.136 [host down]
274
275Nmap scan report for 192.168.1.137 [host down]
276
277Nmap scan report for 192.168.1.138 [host down]
278
279Nmap scan report for 192.168.1.139 [host down]
280
281Nmap scan report for 192.168.1.140 [host down]
282
283Nmap scan report for 192.168.1.141 [host down]
284
285Nmap scan report for 192.168.1.142 [host down]
286
287Nmap scan report for 192.168.1.143 [host down]
288
289Nmap scan report for 192.168.1.144 [host down]
290
291Nmap scan report for 192.168.1.145 [host down]
292
293Nmap scan report for 192.168.1.146 [host down]
294
295Nmap scan report for 192.168.1.147 [host down]
296
297Nmap scan report for 192.168.1.148 [host down]
298
299Nmap scan report for 192.168.1.149 [host down]
300
301Nmap scan report for 192.168.1.150 [host down]
302
303Nmap scan report for 192.168.1.151 [host down]
304
305Nmap scan report for 192.168.1.152 [host down]
306
307Nmap scan report for 192.168.1.153 [host down]
308
309Nmap scan report for 192.168.1.154 [host down]
310
311Nmap scan report for 192.168.1.155 [host down]
312
313Nmap scan report for 192.168.1.156 [host down]
314
315Nmap scan report for 192.168.1.157 [host down]
316
317Nmap scan report for 192.168.1.158 [host down]
318
319Nmap scan report for 192.168.1.159 [host down]
320
321Nmap scan report for 192.168.1.160 [host down]
322
323Nmap scan report for 192.168.1.161 [host down]
324
325Nmap scan report for 192.168.1.162 [host down]
326
327Nmap scan report for 192.168.1.163 [host down]
328
329Nmap scan report for 192.168.1.164 [host down]
330
331Nmap scan report for 192.168.1.165 [host down]
332
333Nmap scan report for 192.168.1.166 [host down]
334
335Nmap scan report for 192.168.1.167 [host down]
336
337Nmap scan report for 192.168.1.168 [host down]
338
339Nmap scan report for 192.168.1.169 [host down]
340
341Nmap scan report for 192.168.1.170 [host down]
342
343Nmap scan report for 192.168.1.171 [host down]
344
345Nmap scan report for 192.168.1.172 [host down]
346
347Nmap scan report for 192.168.1.173 [host down]
348
349Nmap scan report for 192.168.1.174 [host down]
350
351Nmap scan report for 192.168.1.175 [host down]
352
353Nmap scan report for 192.168.1.176 [host down]
354
355Nmap scan report for 192.168.1.177 [host down]
356
357Nmap scan report for 192.168.1.178 [host down]
358
359Nmap scan report for 192.168.1.179 [host down]
360
361Nmap scan report for 192.168.1.180 [host down]
362
363Nmap scan report for 192.168.1.181 [host down]
364
365Nmap scan report for 192.168.1.182 [host down]
366
367Nmap scan report for 192.168.1.183 [host down]
368
369Nmap scan report for 192.168.1.184 [host down]
370
371Nmap scan report for 192.168.1.185 [host down]
372
373Nmap scan report for 192.168.1.186 [host down]
374
375Nmap scan report for 192.168.1.187 [host down]
376
377Nmap scan report for 192.168.1.188 [host down]
378
379Nmap scan report for 192.168.1.189 [host down]
380
381Nmap scan report for 192.168.1.190 [host down]
382
383Nmap scan report for 192.168.1.191 [host down]
384
385Nmap scan report for 192.168.1.192 [host down]
386
387Nmap scan report for 192.168.1.193 [host down]
388
389Nmap scan report for 192.168.1.194 [host down]
390
391Nmap scan report for 192.168.1.195 [host down]
392
393Nmap scan report for 192.168.1.196 [host down]
394
395Nmap scan report for 192.168.1.197 [host down]
396
397Nmap scan report for 192.168.1.198 [host down]
398
399Nmap scan report for 192.168.1.199 [host down]
400
401Nmap scan report for 192.168.1.200 [host down]
402
403Nmap scan report for 192.168.1.201 [host down]
404
405Nmap scan report for 192.168.1.202 [host down]
406
407Nmap scan report for 192.168.1.203 [host down]
408
409Nmap scan report for 192.168.1.204 [host down]
410
411Nmap scan report for 192.168.1.205 [host down]
412
413Nmap scan report for 192.168.1.206 [host down]
414
415Nmap scan report for 192.168.1.207 [host down]
416
417Nmap scan report for 192.168.1.208 [host down]
418
419Nmap scan report for 192.168.1.209 [host down]
420
421Nmap scan report for 192.168.1.210 [host down]
422
423Nmap scan report for 192.168.1.211 [host down]
424
425Nmap scan report for 192.168.1.212 [host down]
426
427Nmap scan report for 192.168.1.213 [host down]
428
429Nmap scan report for 192.168.1.214 [host down]
430
431Nmap scan report for 192.168.1.215 [host down]
432
433Nmap scan report for 192.168.1.216 [host down]
434
435Nmap scan report for 192.168.1.217 [host down]
436
437Nmap scan report for 192.168.1.218 [host down]
438
439Nmap scan report for 192.168.1.219 [host down]
440
441Nmap scan report for 192.168.1.220 [host down]
442
443Nmap scan report for 192.168.1.221 [host down]
444
445Nmap scan report for 192.168.1.222 [host down]
446
447Nmap scan report for 192.168.1.223 [host down]
448
449Nmap scan report for 192.168.1.224 [host down]
450
451Nmap scan report for 192.168.1.225 [host down]
452
453Nmap scan report for 192.168.1.226 [host down]
454
455Nmap scan report for 192.168.1.227 [host down]
456
457Nmap scan report for 192.168.1.228 [host down]
458
459Nmap scan report for 192.168.1.229 [host down]
460
461Nmap scan report for 192.168.1.230 [host down]
462
463Nmap scan report for 192.168.1.231 [host down]
464
465Nmap scan report for 192.168.1.232 [host down]
466
467Nmap scan report for 192.168.1.233 [host down]
468
469Nmap scan report for 192.168.1.234 [host down]
470
471Nmap scan report for 192.168.1.235 [host down]
472
473Nmap scan report for 192.168.1.236 [host down]
474
475Nmap scan report for 192.168.1.237 [host down]
476
477Nmap scan report for 192.168.1.238 [host down]
478
479Nmap scan report for 192.168.1.239 [host down]
480
481Nmap scan report for 192.168.1.240 [host down]
482
483Nmap scan report for 192.168.1.241 [host down]
484
485Nmap scan report for 192.168.1.242 [host down]
486
487Nmap scan report for 192.168.1.243 [host down]
488
489Nmap scan report for 192.168.1.244 [host down]
490
491Nmap scan report for 192.168.1.245 [host down]
492
493Nmap scan report for 192.168.1.246 [host down]
494
495Nmap scan report for 192.168.1.247 [host down]
496
497Nmap scan report for 192.168.1.248 [host down]
498
499Nmap scan report for 192.168.1.249 [host down]
500
501Nmap scan report for 192.168.1.250 [host down]
502
503Nmap scan report for 192.168.1.251 [host down]
504
505Nmap scan report for 192.168.1.252 [host down]
506
507Nmap scan report for 192.168.1.253 [host down]
508
509Nmap scan report for 192.168.1.254 [host down]
510
511Nmap scan report for 192.168.1.255 [host down]
512
513Initiating Parallel DNS resolution of 1 host. at 20:50
514
515Completed Parallel DNS resolution of 1 host. at 20:50, 13.00s elapsed
516
517Initiating SYN Stealth Scan at 20:50
518
519Scanning 11 hosts [1000 ports/host]
520
521Discovered open port 8080/tcp on 192.168.1.8
522
523Discovered open port 53/tcp on 192.168.1.8
524
525Discovered open port 53/tcp on 192.168.1.1
526
527Discovered open port 21/tcp on 192.168.1.1
528
529Discovered open port 80/tcp on 192.168.1.21
530
531Discovered open port 80/tcp on 192.168.1.1
532
533Discovered open port 80/tcp on 192.168.1.8
534
535Discovered open port 5001/tcp on 192.168.1.65
536
537Discovered open port 9100/tcp on 192.168.1.21
538
539Increasing send delay for 192.168.1.15 from 0 to 5 due to 15 out of 37 dropped probes since last increase.
540
541Discovered open port 515/tcp on 192.168.1.21
542
543Discovered open port 8086/tcp on 192.168.1.8
544
545Discovered open port 5000/tcp on 192.168.1.1
546
547SYN Stealth Scan Timing: About 36.40% done; ETC: 20:51 (0:00:54 remaining)
548
549Discovered open port 8087/tcp on 192.168.1.8
550
551Increasing send delay for 192.168.1.15 from 5 to 10 due to max_successful_tryno increase to 5
552
553Increasing send delay for 192.168.1.4 from 0 to 5 due to 11 out of 12 dropped probes since last increase.
554
555Increasing send delay for 192.168.1.4 from 5 to 10 due to max_successful_tryno increase to 5
556
557Warning: 192.168.1.4 giving up on port because retransmission cap hit (6).
558
559SYN Stealth Scan Timing: About 60.60% done; ETC: 20:52 (0:00:57 remaining)
560
561Discovered open port 20005/tcp on 192.168.1.1
562
563Discovered open port 8200/tcp on 192.168.1.1
564
565Warning: 192.168.1.15 giving up on port because retransmission cap hit (6).
566
567Completed SYN Stealth Scan against 192.168.1.21 in 107.73s (10 hosts left)
568
569Completed SYN Stealth Scan against 192.168.1.24 in 110.67s (9 hosts left)
570
571Completed SYN Stealth Scan against 192.168.1.1 in 121.58s (8 hosts left)
572
573Completed SYN Stealth Scan against 192.168.1.65 in 125.42s (7 hosts left)
574
575Completed SYN Stealth Scan against 192.168.1.8 in 133.59s (6 hosts left)
576
577Completed SYN Stealth Scan against 192.168.1.20 in 140.70s (5 hosts left)
578
579Completed SYN Stealth Scan against 192.168.1.16 in 145.94s (4 hosts left)
580
581Completed SYN Stealth Scan against 192.168.1.15 in 148.30s (3 hosts left)
582
583Completed SYN Stealth Scan against 192.168.1.28 in 148.32s (2 hosts left)
584
585Completed SYN Stealth Scan against 192.168.1.26 in 148.83s (1 host left)
586
587Discovered open port 62078/tcp on 192.168.1.4
588
589Completed SYN Stealth Scan at 20:53, 159.72s elapsed (11000 total ports)
590
591Initiating Service scan at 20:53
592
593Scanning 15 services on 11 hosts
594
595Completed Service scan at 20:55, 126.83s elapsed (16 services on 11 hosts)
596
597Initiating OS detection (try #1) against 11 hosts
598
599RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
600
601RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
602
603Retrying OS detection (try #2) against 8 hosts
604
605WARNING: OS didn't match until try #2
606
607Retrying OS detection (try #3) against 192.168.1.65
608
609Retrying OS detection (try #4) against 192.168.1.65
610
611Retrying OS detection (try #5) against 192.168.1.65
612
613NSE: Script scanning 11 hosts.
614
615Initiating NSE at 20:55
616
617Completed NSE at 20:55, 15.05s elapsed
618
619Initiating NSE at 20:55
620
621Completed NSE at 20:55, 1.01s elapsed
622
623Nmap scan report for 192.168.1.1
624
625Host is up (0.0048s latency).
626
627Not shown: 994 closed ports
628
629PORT STATE SERVICE VERSION
630
63121/tcp open ftp Bftpd 1.6.6
632
63353/tcp open domain dnsmasq 2.15-OpenDNS-1
634
635| dns-nsid:
636
637| id.server:
638
639|_ bind.version: dnsmasq-2.15-OpenDNS-1
640
64180/tcp open tcpwrapped
642
643| http-auth:
644
645| HTTP/1.0 401 Unauthorized\x0D
646
647|_ Basic realm=NETGEAR R6300v2
648
649|_http-title: 401 Unauthorized
650
6515000/tcp open tcpwrapped
652
6538200/tcp open tcpwrapped
654
65520005/tcp open btx?
656
657MAC Address: 6C:B0:CE:B2:4F:BC (Netgear)
658
659Device type: general purpose
660
661Running: Linux 2.6.X
662
663OS CPE: cpe:/o:linux:linux_kernel:2.6
664
665OS details: Linux 2.6.19 - 2.6.36
666
667Uptime guess: 11.594 days (since Mon Jan 09 06:39:55 2017)
668
669Network Distance: 1 hop
670
671TCP Sequence Prediction: Difficulty=201 (Good luck!)
672
673IP ID Sequence Generation: All zeros
674
675Service Info: Host: 192.168.1.1
676
677
678
679TRACEROUTE
680
681HOP RTT ADDRESS
682
6831 4.79 ms 192.168.1.1
684
685
686
687Nmap scan report for 192.168.1.4
688
689Host is up (0.0060s latency).
690
691Not shown: 908 closed ports, 91 filtered ports
692
693PORT STATE SERVICE VERSION
694
69562078/tcp open tcpwrapped
696
697MAC Address: 78:7E:61:BB:4B:92 (Apple)
698
699Device type: firewall
700
701Running (JUST GUESSING): Fortinet embedded (87%)
702
703OS CPE: cpe:/h:fortinet:fortigate_100d
704
705Aggressive OS guesses: Fortinet FortiGate 100D firewall (87%)
706
707No exact OS matches for host (test conditions non-ideal).
708
709Network Distance: 1 hop
710
711
712
713TRACEROUTE
714
715HOP RTT ADDRESS
716
7171 6.02 ms 192.168.1.4
718
719
720
721Nmap scan report for 192.168.1.8
722
723Host is up (0.0053s latency).
724
725Not shown: 995 closed ports
726
727PORT STATE SERVICE VERSION
728
72953/tcp open tcpwrapped
730
73180/tcp open http
732
733| fingerprint-strings:
734
735| FourOhFourRequest:
736
737| HTTP/1.0 404 Not Found
738
739| Connection: close
740
741| Content-Type: text/html
742
743| <h1>Not Found</h1>The requested URL /nice%20ports%2C/Tri%6Eity.txt%2ebak was not found on this server.
744
745| GetRequest:
746
747| HTTP/1.0 200 OK
748
749| Connection: close
750
751| ETag: "504-439d-56463aae"
752
753| Last-Modified: Fri, 13 Nov 2015 19:31:58 GMT
754
755| Date: Fri, 20 Jan 2017 20:52:59 GMT
756
757| Content-Type: text/html
758
759| Content-Length: 17309
760
761| <!DOCTYPE html>
762
763| <html xmlns="http://www.w3.org/1999/xhtml">
764
765| <head>
766
767| <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
768
769| <meta http-equiv="Pragma" content="no-cache">
770
771| <meta http-equiv="expires" content="0">
772
773| <meta http-equiv="Cache-Control" content="no-cache, must-revalidate">
774
775| <title>Gramofon - </title>
776
777| <link rel="shortcut icon" href="images/favicon.ico" />
778
779| <meta name="viewport" content="width=device-width, initial-scale=-1, maximum-scale=-1" />
780
781| <!-- CSS -->
782
783| <link rel="stylesheet" type="text/css" href="css/style_0b879c15.css" media="screen"/>
784
785| <script type="text/javascript">
786
787| (/*@cc_on!@*/false) {
788
789| document.documentElement.className += ' ie';
790
791| HTTPOptions, RTSPRequest, SIPOptions:
792
793| HTTP/1.0 400 Bad Request
794
795| Connection: Keep-Alive
796
797| Keep-Alive: timeout=20
798
799| Content-Type: text/html
800
801| <h1>Bad Request</h1>
802
803| Help:
804
805| HTTP/0.9 400 Bad Request
806
807| Connection: Keep-Alive
808
809| Keep-Alive: timeout=20
810
811| Content-Type: text/html
812
813|_ <h1>Bad Request</h1>
814
815| http-methods:
816
817|_ Supported Methods: GET HEAD POST
818
819|_http-title: Gramofon -
820
8218080/tcp open http-proxy
822
823| fingerprint-strings:
824
825| FourOhFourRequest:
826
827| HTTP/1.0 404 Not Found
828
829| Date: Fri, 20 Jan 2017 20:52:59 GMT
830
831| Connection: close
832
833| Cache-Control: no-cache,no-store
834
835| Content-Length: 190
836
837| Content-Type: text/html; charset=utf-8
838
839| <html>
840
841| <head><title>404 Not Found</title></head>
842
843| <body>
844
845| <h1>404 Not Found</h1>
846
847| <p>The requested URL '/nice ports,/Trinity.txt.bak' was not found on this server.</p>
848
849| </body>
850
851| </html>
852
853| GetRequest:
854
855| HTTP/1.0 404 Not Found
856
857| Date: Fri, 20 Jan 2017 20:52:59 GMT
858
859| Connection: close
860
861| Cache-Control: no-cache,no-store
862
863| Content-Length: 163
864
865| Content-Type: text/html; charset=utf-8
866
867| <html>
868
869| <head><title>404 Not Found</title></head>
870
871| <body>
872
873| <h1>404 Not Found</h1>
874
875| <p>The requested URL '/' was not found on this server.</p>
876
877| </body>
878
879| </html>
880
881| HTTPOptions:
882
883| HTTP/1.0 501 Not Implemented
884
885| Date: Fri, 20 Jan 2017 20:52:59 GMT
886
887| Connection: close
888
889| Cache-Control: no-cache,no-store
890
891| Content-Length: 189
892
893| Content-Type: text/html; charset=utf-8
894
895| <html>
896
897| <head><title>501 Not Implemented</title></head>
898
899| <body>
900
901| <h1>501 Not Implemented</h1>
902
903| <p>The requested method 'OPTIONS' is not implemented by this server.</p>
904
905| </body>
906
907| </html>
908
909| RTSPRequest:
910
911| 400 Bad Request
912
913| Date: Fri, 20 Jan 2017 20:52:59 GMT
914
915| Connection: close
916
917| Cache-Control: no-cache,no-store
918
919| Content-Length: 122
920
921| Content-Type: text/html; charset=utf-8
922
923| <html>
924
925| <head><title>400 Bad Request</title></head>
926
927| <body>
928
929| <h1>400 Bad Request</h1>
930
931| <p>Unknown protocol</p>
932
933| </body>
934
935| </html>
936
937| Socks5:
938
939| 400 Bad Request
940
941| Date: Fri, 20 Jan 2017 20:52:59 GMT
942
943| Connection: close
944
945| Cache-Control: no-cache,no-store
946
947| Content-Length: 126
948
949| Content-Type: text/html; charset=utf-8
950
951| <html>
952
953| <head><title>400 Bad Request</title></head>
954
955| <body>
956
957| <h1>400 Bad Request</h1>
958
959| <p>Invalid request line</p>
960
961| </body>
962
963|_ </html>
964
965|_http-title: 404 Not Found
966
9678086/tcp open d-s-n?
968
969| fingerprint-strings:
970
971| GenericLines:
972
973| 400 Bad Request
974
975| Date: Fri, 20 Jan 2017 20:52:59 GMT
976
977| Connection: close
978
979| Cache-Control: no-cache,no-store
980
981| Content-Length: 126
982
983| Content-Type: text/html; charset=utf-8
984
985| <html>
986
987| <head><title>400 Bad Request</title></head>
988
989| <body>
990
991| <h1>400 Bad Request</h1>
992
993| <p>Invalid request line</p>
994
995| </body>
996
997| </html>
998
999| GetRequest:
1000
1001| HTTP/1.0 404 Not Found
1002
1003| Date: Fri, 20 Jan 2017 20:52:59 GMT
1004
1005| Connection: close
1006
1007| Cache-Control: no-cache,no-store
1008
1009| Content-Length: 163
1010
1011| Content-Type: text/html; charset=utf-8
1012
1013| <html>
1014
1015| <head><title>404 Not Found</title></head>
1016
1017| <body>
1018
1019| <h1>404 Not Found</h1>
1020
1021| <p>The requested URL '/' was not found on this server.</p>
1022
1023| </body>
1024
1025| </html>
1026
1027| HTTPOptions:
1028
1029| HTTP/1.0 501 Not Implemented
1030
1031| Date: Fri, 20 Jan 2017 20:52:59 GMT
1032
1033| Connection: close
1034
1035| Cache-Control: no-cache,no-store
1036
1037| Content-Length: 189
1038
1039| Content-Type: text/html; charset=utf-8
1040
1041| <html>
1042
1043| <head><title>501 Not Implemented</title></head>
1044
1045| <body>
1046
1047| <h1>501 Not Implemented</h1>
1048
1049| <p>The requested method 'OPTIONS' is not implemented by this server.</p>
1050
1051| </body>
1052
1053| </html>
1054
1055| Help:
1056
1057| 400 Bad Request
1058
1059| Date: Fri, 20 Jan 2017 20:53:14 GMT
1060
1061| Connection: close
1062
1063| Cache-Control: no-cache,no-store
1064
1065| Content-Length: 126
1066
1067| Content-Type: text/html; charset=utf-8
1068
1069| <html>
1070
1071| <head><title>400 Bad Request</title></head>
1072
1073| <body>
1074
1075| <h1>400 Bad Request</h1>
1076
1077| <p>Invalid request line</p>
1078
1079| </body>
1080
1081| </html>
1082
1083| RTSPRequest:
1084
1085| 400 Bad Request
1086
1087| Date: Fri, 20 Jan 2017 20:52:59 GMT
1088
1089| Connection: close
1090
1091| Cache-Control: no-cache,no-store
1092
1093| Content-Length: 122
1094
1095| Content-Type: text/html; charset=utf-8
1096
1097| <html>
1098
1099| <head><title>400 Bad Request</title></head>
1100
1101| <body>
1102
1103| <h1>400 Bad Request</h1>
1104
1105| <p>Unknown protocol</p>
1106
1107| </body>
1108
1109|_ </html>
1110
11118087/tcp open ssl/simplifymedia?
1112
1113| fingerprint-strings:
1114
1115| GenericLines:
1116
1117| 400 Bad Request
1118
1119| Date: Fri, 20 Jan 2017 20:53:23 GMT
1120
1121| Connection: close
1122
1123| Cache-Control: no-cache,no-store
1124
1125| Content-Length: 126
1126
1127| Content-Type: text/html; charset=utf-8
1128
1129| <html>
1130
1131| <head><title>400 Bad Request</title></head>
1132
1133| <body>
1134
1135| <h1>400 Bad Request</h1>
1136
1137| <p>Invalid request line</p>
1138
1139| </body>
1140
1141| </html>
1142
1143| GetRequest:
1144
1145| HTTP/1.0 404 Not Found
1146
1147| Date: Fri, 20 Jan 2017 20:53:23 GMT
1148
1149| Connection: close
1150
1151| Cache-Control: no-cache,no-store
1152
1153| Content-Length: 163
1154
1155| Content-Type: text/html; charset=utf-8
1156
1157| <html>
1158
1159| <head><title>404 Not Found</title></head>
1160
1161| <body>
1162
1163| <h1>404 Not Found</h1>
1164
1165| <p>The requested URL '/' was not found on this server.</p>
1166
1167| </body>
1168
1169| </html>
1170
1171| HTTPOptions:
1172
1173| HTTP/1.0 501 Not Implemented
1174
1175| Date: Fri, 20 Jan 2017 20:53:23 GMT
1176
1177| Connection: close
1178
1179| Cache-Control: no-cache,no-store
1180
1181| Content-Length: 189
1182
1183| Content-Type: text/html; charset=utf-8
1184
1185| <html>
1186
1187| <head><title>501 Not Implemented</title></head>
1188
1189| <body>
1190
1191| <h1>501 Not Implemented</h1>
1192
1193| <p>The requested method 'OPTIONS' is not implemented by this server.</p>
1194
1195| </body>
1196
1197| </html>
1198
1199| Help:
1200
1201| 400 Bad Request
1202
1203| Date: Fri, 20 Jan 2017 20:53:38 GMT
1204
1205| Connection: close
1206
1207| Cache-Control: no-cache,no-store
1208
1209| Content-Length: 126
1210
1211| Content-Type: text/html; charset=utf-8
1212
1213| <html>
1214
1215| <head><title>400 Bad Request</title></head>
1216
1217| <body>
1218
1219| <h1>400 Bad Request</h1>
1220
1221| <p>Invalid request line</p>
1222
1223| </body>
1224
1225| </html>
1226
1227| RTSPRequest:
1228
1229| 400 Bad Request
1230
1231| Date: Fri, 20 Jan 2017 20:53:23 GMT
1232
1233| Connection: close
1234
1235| Cache-Control: no-cache,no-store
1236
1237| Content-Length: 122
1238
1239| Content-Type: text/html; charset=utf-8
1240
1241| <html>
1242
1243| <head><title>400 Bad Request</title></head>
1244
1245| <body>
1246
1247| <h1>400 Bad Request</h1>
1248
1249| <p>Unknown protocol</p>
1250
1251| </body>
1252
1253|_ </html>
1254
1255| ssl-cert: Subject: commonName=AllPlay Http Server/organizationName=Qualcomm Connected Experiences, Inc./stateOrProvinceName=California/countryName=US
1256
1257| Issuer: commonName=AllPlay/organizationName=Qualcomm Connected Experiences, Inc./stateOrProvinceName=California/countryName=US
1258
1259| Public Key type: rsa
1260
1261| Public Key bits: 2048
1262
1263| Signature Algorithm: sha1WithRSAEncryption
1264
1265| Not valid before: 2014-04-18T14:45:46
1266
1267| Not valid after: 2041-09-03T14:45:46
1268
1269| MD5: 8388 d990 8078 8936 8c43 50f5 3910 1579
1270
1271|_SHA-1: 3c73 ff6c 781b ab1b d95c 257c 4099 ac32 c36a 75bf
1272
1273|_ssl-date: TLS randomness does not represent time
1274
12754 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
1276
1277==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1278
1279SF-Port80-TCP:V=7.40%I=7%D=1/20%Time=588278B8%P=i686-pc-windows-windows%r(
1280
1281SF:GetRequest,30C4,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\r\nETag
1282
1283SF::\x20\"504-439d-56463aae\"\r\nLast-Modified:\x20Fri,\x2013\x20Nov\x2020
1284
1285SF:15\x2019:31:58\x20GMT\r\nDate:\x20Fri,\x2020\x20Jan\x202017\x2020:52:59
1286
1287SF:\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2017309\r\n\r
1288
1289SF:\n<!DOCTYPE\x20html>\n<html\x20xmlns=\"http://www\.w3\.org/1999/xhtml\"
1290
1291SF:>\n\t<head>\n\t\t<meta\x20http-equiv=\"Content-Type\"\x20content=\"text
1292
1293SF:/html;\x20charset=utf-8\"\x20/>\n\n\t\t<meta\x20http-equiv=\"Pragma\"\x
1294
1295SF:20content=\"no-cache\">\n\t\t<meta\x20http-equiv=\"expires\"\x20content
1296
1297SF:=\"0\">\n\t\t<meta\x20http-equiv=\"Cache-Control\"\x20content=\"no-cach
1298
1299SF:e,\x20must-revalidate\">\n\n\t\t<title>Gramofon\x20-\x20</title>\n\n\t\
1300
1301SF:t<link\x20rel=\"shortcut\x20icon\"\x20\x20href=\"images/favicon\.ico\"\
1302
1303SF:x20/>\n\t\t<meta\x20name=\"viewport\"\x20content=\"width=device-width,\
1304
1305SF:x20initial-scale=-1,\x20maximum-scale=-1\"\x20/>\n\n\t\t<!--\x20CSS\x20
1306
1307SF:-->\n\t\t<link\x20rel=\"stylesheet\"\x20type=\"text/css\"\x20href=\"css
1308
1309SF:/style_0b879c15\.css\"\x20media=\"screen\"/>\n\n\t\t<script\x20type=\"t
1310
1311SF:ext/javascript\">\n\t\t\tif\x20\(/\*@cc_on!@\*/false\)\x20{\n\t\t\t\tdo
1312
1313SF:cument\.documentElement\.className\x20\+=\x20'\x20ie';\n\t\t\t}")%r(HTT
1314
1315SF:POptions,79,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nConnection:\x20Keep-
1316
1317SF:Alive\r\nKeep-Alive:\x20timeout=20\r\nContent-Type:\x20text/html\r\n\r\
1318
1319SF:n<h1>Bad\x20Request</h1>")%r(RTSPRequest,79,"HTTP/1\.0\x20400\x20Bad\x2
1320
1321SF:0Request\r\nConnection:\x20Keep-Alive\r\nKeep-Alive:\x20timeout=20\r\nC
1322
1323SF:ontent-Type:\x20text/html\r\n\r\n<h1>Bad\x20Request</h1>")%r(FourOhFour
1324
1325SF:Request,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nConnection:\x20close\r\
1326
1327SF:nContent-Type:\x20text/html\r\n\r\n<h1>Not\x20Found</h1>The\x20requeste
1328
1329SF:d\x20URL\x20/nice%20ports%2C/Tri%6Eity\.txt%2ebak\x20was\x20not\x20foun
1330
1331SF:d\x20on\x20this\x20server\.")%r(Help,79,"HTTP/0\.9\x20400\x20Bad\x20Req
1332
1333SF:uest\r\nConnection:\x20Keep-Alive\r\nKeep-Alive:\x20timeout=20\r\nConte
1334
1335SF:nt-Type:\x20text/html\r\n\r\n<h1>Bad\x20Request</h1>")%r(SIPOptions,79,
1336
1337SF:"HTTP/1\.0\x20400\x20Bad\x20Request\r\nConnection:\x20Keep-Alive\r\nKee
1338
1339SF:p-Alive:\x20timeout=20\r\nContent-Type:\x20text/html\r\n\r\n<h1>Bad\x20
1340
1341SF:Request</h1>");
1342
1343==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1344
1345SF-Port8080-TCP:V=7.40%I=7%D=1/20%Time=588278B8%P=i686-pc-windows-windows%
1346
1347SF:r(GetRequest,154,"HTTP/1\.0\x20404\x20Not\x20Found\r\nDate:\x20Fri,\x20
1348
1349SF:20\x20Jan\x202017\x2020:52:59\x20GMT\r\nConnection:\x20close\r\nCache-C
1350
1351SF:ontrol:\x20no-cache,no-store\r\nContent-Length:\x20163\r\nContent-Type:
1352
1353SF:\x20text/html;\x20charset=utf-8\r\n\r\n<html>\n<head><title>404\x20Not\
1354
1355SF:x20Found</title></head>\n<body>\n<h1>404\x20Not\x20Found</h1>\n<p>The\x
1356
1357SF:20requested\x20URL\x20'/'\x20was\x20not\x20found\x20on\x20thi
1358
1359SF:s\x20server\.</p>\n</body>\n</html>")%r(HTTPOptions,174,"HTTP/1\.0\x205
1360
1361SF:01\x20Not\x20Implemented\r\nDate:\x20Fri,\x2020\x20Jan\x202017\x2020:52
1362
1363SF::59\x20GMT\r\nConnection:\x20close\r\nCache-Control:\x20no-cache,no-sto
1364
1365SF:re\r\nContent-Length:\x20189\r\nContent-Type:\x20text/html;\x20charset=
1366
1367SF:utf-8\r\n\r\n<html>\n<head><title>501\x20Not\x20Implemented</title></he
1368
1369SF:ad>\n<body>\n<h1>501\x20Not\x20Implemented</h1>\n<p>The\x20requested\x2
1370
1371SF:0method\x20'OPTIONS'\x20is\x20not\x20implemented\x20by\x20thi
1372
1373SF:s\x20server\.</p>\n</body>\n</html>")%r(RTSPRequest,125,"\x20400\x20Bad
1374
1375SF:\x20Request\r\nDate:\x20Fri,\x2020\x20Jan\x202017\x2020:52:59\x20GMT\r\
1376
1377SF:nConnection:\x20close\r\nCache-Control:\x20no-cache,no-store\r\nContent
1378
1379SF:-Length:\x20122\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\n\r\n
1380
1381SF:<html>\n<head><title>400\x20Bad\x20Request</title></head>\n<body>\n<h1>
1382
1383SF:400\x20Bad\x20Request</h1>\n<p>Unknown\x20protocol</p>\n</body>\n</html
1384
1385SF:>")%r(FourOhFourRequest,16F,"HTTP/1\.0\x20404\x20Not\x20Found\r\nDate:\
1386
1387SF:x20Fri,\x2020\x20Jan\x202017\x2020:52:59\x20GMT\r\nConnection:\x20close
1388
1389SF:\r\nCache-Control:\x20no-cache,no-store\r\nContent-Length:\x20190\r\nCo
1390
1391SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\n\r\n<html>\n<head><title>
1392
1393SF:404\x20Not\x20Found</title></head>\n<body>\n<h1>404\x20Not\x20Found</h1
1394
1395SF:>\n<p>The\x20requested\x20URL\x20'/nice\x20ports,/Trinity\.txt\.ba
1396
1397SF:k'\x20was\x20not\x20found\x20on\x20this\x20server\.</p>\n</body>\n
1398
1399SF:</html>")%r(Socks5,129,"\x20400\x20Bad\x20Request\r\nDate:\x20Fri,\x202
1400
1401SF:0\x20Jan\x202017\x2020:52:59\x20GMT\r\nConnection:\x20close\r\nCache-Co
1402
1403SF:ntrol:\x20no-cache,no-store\r\nContent-Length:\x20126\r\nContent-Type:\
1404
1405SF:x20text/html;\x20charset=utf-8\r\n\r\n<html>\n<head><title>400\x20Bad\x
1406
1407SF:20Request</title></head>\n<body>\n<h1>400\x20Bad\x20Request</h1>\n<p>In
1408
1409SF:valid\x20request\x20line</p>\n</body>\n</html>");
1410
1411==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1412
1413SF-Port8086-TCP:V=7.40%I=7%D=1/20%Time=588278B8%P=i686-pc-windows-windows%
1414
1415SF:r(GenericLines,129,"\x20400\x20Bad\x20Request\r\nDate:\x20Fri,\x2020\x2
1416
1417SF:0Jan\x202017\x2020:52:59\x20GMT\r\nConnection:\x20close\r\nCache-Contro
1418
1419SF:l:\x20no-cache,no-store\r\nContent-Length:\x20126\r\nContent-Type:\x20t
1420
1421SF:ext/html;\x20charset=utf-8\r\n\r\n<html>\n<head><title>400\x20Bad\x20Re
1422
1423SF:quest</title></head>\n<body>\n<h1>400\x20Bad\x20Request</h1>\n<p>Invali
1424
1425SF:d\x20request\x20line</p>\n</body>\n</html>")%r(GetRequest,154,"HTTP/1\.
1426
1427SF:0\x20404\x20Not\x20Found\r\nDate:\x20Fri,\x2020\x20Jan\x202017\x2020:52
1428
1429SF::59\x20GMT\r\nConnection:\x20close\r\nCache-Control:\x20no-cache,no-sto
1430
1431SF:re\r\nContent-Length:\x20163\r\nContent-Type:\x20text/html;\x20charset=
1432
1433SF:utf-8\r\n\r\n<html>\n<head><title>404\x20Not\x20Found</title></head>\n<
1434
1435SF:body>\n<h1>404\x20Not\x20Found</h1>\n<p>The\x20requested\x20URL\x20&apo
1436
1437SF:s;/'\x20was\x20not\x20found\x20on\x20this\x20server\.</p>\n</body>
1438
1439SF:\n</html>")%r(HTTPOptions,174,"HTTP/1\.0\x20501\x20Not\x20Implemented\r
1440
1441SF:\nDate:\x20Fri,\x2020\x20Jan\x202017\x2020:52:59\x20GMT\r\nConnection:\
1442
1443SF:x20close\r\nCache-Control:\x20no-cache,no-store\r\nContent-Length:\x201
1444
1445SF:89\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\n\r\n<html>\n<head
1446
1447SF:><title>501\x20Not\x20Implemented</title></head>\n<body>\n<h1>501\x20No
1448
1449SF:t\x20Implemented</h1>\n<p>The\x20requested\x20method\x20'OPTIONS&a
1450
1451SF:pos;\x20is\x20not\x20implemented\x20by\x20this\x20server\.</p>\n</body>
1452
1453SF:\n</html>")%r(RTSPRequest,125,"\x20400\x20Bad\x20Request\r\nDate:\x20Fr
1454
1455SF:i,\x2020\x20Jan\x202017\x2020:52:59\x20GMT\r\nConnection:\x20close\r\nC
1456
1457SF:ache-Control:\x20no-cache,no-store\r\nContent-Length:\x20122\r\nContent
1458
1459SF:-Type:\x20text/html;\x20charset=utf-8\r\n\r\n<html>\n<head><title>400\x
1460
1461SF:20Bad\x20Request</title></head>\n<body>\n<h1>400\x20Bad\x20Request</h1>
1462
1463SF:\n<p>Unknown\x20protocol</p>\n</body>\n</html>")%r(Help,129,"\x20400\x2
1464
1465SF:0Bad\x20Request\r\nDate:\x20Fri,\x2020\x20Jan\x202017\x2020:53:14\x20GM
1466
1467SF:T\r\nConnection:\x20close\r\nCache-Control:\x20no-cache,no-store\r\nCon
1468
1469SF:tent-Length:\x20126\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\n
1470
1471SF:\r\n<html>\n<head><title>400\x20Bad\x20Request</title></head>\n<body>\n
1472
1473SF:<h1>400\x20Bad\x20Request</h1>\n<p>Invalid\x20request\x20line</p>\n</bo
1474
1475SF:dy>\n</html>");
1476
1477==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1478
1479SF-Port8087-TCP:V=7.40%T=SSL%I=7%D=1/20%Time=588278D0%P=i686-pc-windows-wi
1480
1481SF:ndows%r(GenericLines,129,"\x20400\x20Bad\x20Request\r\nDate:\x20Fri,\x2
1482
1483SF:020\x20Jan\x202017\x2020:53:23\x20GMT\r\nConnection:\x20close\r\nCache-
1484
1485SF:Control:\x20no-cache,no-store\r\nContent-Length:\x20126\r\nContent-Type
1486
1487SF::\x20text/html;\x20charset=utf-8\r\n\r\n<html>\n<head><title>400\x20Bad
1488
1489SF:\x20Request</title></head>\n<body>\n<h1>400\x20Bad\x20Request</h1>\n<p>
1490
1491SF:Invalid\x20request\x20line</p>\n</body>\n</html>")%r(GetRequest,154,"HT
1492
1493SF:TP/1\.0\x20404\x20Not\x20Found\r\nDate:\x20Fri,\x2020\x20Jan\x202017\x2
1494
1495SF:020:53:23\x20GMT\r\nConnection:\x20close\r\nCache-Control:\x20no-cache,
1496
1497SF:no-store\r\nContent-Length:\x20163\r\nContent-Type:\x20text/html;\x20ch
1498
1499SF:arset=utf-8\r\n\r\n<html>\n<head><title>404\x20Not\x20Found</title></he
1500
1501SF:ad>\n<body>\n<h1>404\x20Not\x20Found</h1>\n<p>The\x20requested\x20URL\x
1502
1503SF:20'/'\x20was\x20not\x20found\x20on\x20this\x20server\.</p>\n<
1504
1505SF:/body>\n</html>")%r(HTTPOptions,174,"HTTP/1\.0\x20501\x20Not\x20Impleme
1506
1507SF:nted\r\nDate:\x20Fri,\x2020\x20Jan\x202017\x2020:53:23\x20GMT\r\nConnec
1508
1509SF:tion:\x20close\r\nCache-Control:\x20no-cache,no-store\r\nContent-Length
1510
1511SF::\x20189\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\n\r\n<html>\
1512
1513SF:n<head><title>501\x20Not\x20Implemented</title></head>\n<body>\n<h1>501
1514
1515SF:\x20Not\x20Implemented</h1>\n<p>The\x20requested\x20method\x20'OPT
1516
1517SF:IONS'\x20is\x20not\x20implemented\x20by\x20this\x20server\.</p>\n<
1518
1519SF:/body>\n</html>")%r(RTSPRequest,125,"\x20400\x20Bad\x20Request\r\nDate:
1520
1521SF:\x20Fri,\x2020\x20Jan\x202017\x2020:53:23\x20GMT\r\nConnection:\x20clos
1522
1523SF:e\r\nCache-Control:\x20no-cache,no-store\r\nContent-Length:\x20122\r\nC
1524
1525SF:ontent-Type:\x20text/html;\x20charset=utf-8\r\n\r\n<html>\n<head><title
1526
1527SF:>400\x20Bad\x20Request</title></head>\n<body>\n<h1>400\x20Bad\x20Reques
1528
1529SF:t</h1>\n<p>Unknown\x20protocol</p>\n</body>\n</html>")%r(Help,129,"\x20
1530
1531SF:400\x20Bad\x20Request\r\nDate:\x20Fri,\x2020\x20Jan\x202017\x2020:53:38
1532
1533SF:\x20GMT\r\nConnection:\x20close\r\nCache-Control:\x20no-cache,no-store\
1534
1535SF:r\nContent-Length:\x20126\r\nContent-Type:\x20text/html;\x20charset=utf
1536
1537SF:-8\r\n\r\n<html>\n<head><title>400\x20Bad\x20Request</title></head>\n<b
1538
1539SF:ody>\n<h1>400\x20Bad\x20Request</h1>\n<p>Invalid\x20request\x20line</p>
1540
1541SF:\n</body>\n</html>");
1542
1543MAC Address: C4:71:30:44:68:B7 (Fon Technology S.L.)
1544
1545Device type: general purpose
1546
1547Running: Linux 2.6.X|3.X
1548
1549OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
1550
1551OS details: Linux 2.6.32 - 3.10
1552
1553Uptime guess: 19.893 days (since Sat Dec 31 23:30:32 2016)
1554
1555Network Distance: 1 hop
1556
1557TCP Sequence Prediction: Difficulty=256 (Good luck!)
1558
1559IP ID Sequence Generation: All zeros
1560
1561
1562
1563TRACEROUTE
1564
1565HOP RTT ADDRESS
1566
15671 5.28 ms 192.168.1.8
1568
1569
1570
1571Nmap scan report for 192.168.1.15
1572
1573Host is up (0.025s latency).
1574
1575All 1000 scanned ports on 192.168.1.15 are closed
1576
1577MAC Address: EC:1F:72:1E:0B:BB (Samsung Electro-mechanics(thailand))
1578
1579Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1580
1581Device type: storage-misc|general purpose
1582
1583Running: Buffalo embedded, Linux 2.6.X
1584
1585OS CPE: cpe:/o:linux:linux_kernel:2.6
1586
1587OS details: Buffalo Cloudstor NAS device, Linux 2.6.14 - 2.6.34, Linux 2.6.17 (Mandriva), Linux 2.6.23, Linux 2.6.24, Linux 2.6.32
1588
1589Network Distance: 1 hop
1590
1591
1592
1593TRACEROUTE
1594
1595HOP RTT ADDRESS
1596
15971 25.50 ms 192.168.1.15
1598
1599
1600
1601Nmap scan report for 192.168.1.16
1602
1603Host is up (0.060s latency).
1604
1605All 1000 scanned ports on 192.168.1.16 are filtered
1606
1607MAC Address: C8:E0:EB:4F:FD:F3 (Apple)
1608
1609Too many fingerprints match this host to give specific OS details
1610
1611Network Distance: 1 hop
1612
1613
1614
1615TRACEROUTE
1616
1617HOP RTT ADDRESS
1618
16191 60.00 ms 192.168.1.16
1620
1621
1622
1623Nmap scan report for 192.168.1.20
1624
1625Host is up (0.049s latency).
1626
1627All 1000 scanned ports on 192.168.1.20 are filtered
1628
1629MAC Address: 80:19:34:3F:D4:FA (Intel Corporate)
1630
1631Too many fingerprints match this host to give specific OS details
1632
1633Network Distance: 1 hop
1634
1635
1636
1637TRACEROUTE
1638
1639HOP RTT ADDRESS
1640
16411 49.00 ms 192.168.1.20
1642
1643
1644
1645Nmap scan report for 192.168.1.21
1646
1647Host is up (0.025s latency).
1648
1649Not shown: 997 closed ports
1650
1651PORT STATE SERVICE VERSION
1652
165380/tcp open http Canon i-SENSYS MF8040Cn printer http admin
1654
1655|_http-favicon: Unknown favicon MD5: 1A2AE01408C6283F770CC47175A614F6
1656
1657| http-methods:
1658
1659|_ Supported Methods: GET
1660
1661|_http-title: Remote UI: Login: LBP6230dw: LBP6230dw
1662
1663515/tcp open printer
1664
16659100/tcp open jetdirect?
1666
1667MAC Address: 40:E2:30:D9:BC:3E (AzureWave Technology)
1668
1669Device type: printer
1670
1671Running: Canon embedded
1672
1673OS CPE: cpe:/h:canon:pixma_ms410 cpe:/h:canon:pixma_mp495 cpe:/h:canon:pixma_mp980 cpe:/h:canon:pixma_mx870 cpe:/h:canon:pixma_mx882 cpe:/h:canon:pixma_mx920 cpe:/h:canon:pixma_mg6100
1674
1675OS details: Canon PIXMA MS410, MP495, MP980, MX870, MX882, MX920, MG6100, or MG6450 printer
1676
1677Network Distance: 1 hop
1678
1679TCP Sequence Prediction: Difficulty=0 (Trivial joke)
1680
1681IP ID Sequence Generation: Randomized
1682
1683Service Info: Device: printer; CPE: cpe:/h:canon:i-sensys_mf8040cn
1684
1685
1686
1687TRACEROUTE
1688
1689HOP RTT ADDRESS
1690
16911 25.39 ms 192.168.1.21
1692
1693
1694
1695Nmap scan report for 192.168.1.24
1696
1697Host is up (0.029s latency).
1698
1699All 1000 scanned ports on 192.168.1.24 are closed
1700
1701MAC Address: F4:F5:24:DB:4F:97 (Motorola Mobility, a Lenovo Company)
1702
1703Too many fingerprints match this host to give specific OS details
1704
1705Network Distance: 1 hop
1706
1707
1708
1709TRACEROUTE
1710
1711HOP RTT ADDRESS
1712
17131 28.63 ms 192.168.1.24
1714
1715
1716
1717Nmap scan report for 192.168.1.26
1718
1719Host is up (0.064s latency).
1720
1721All 1000 scanned ports on 192.168.1.26 are filtered
1722
1723MAC Address: A4:5E:60:DA:3E:91 (Apple)
1724
1725Too many fingerprints match this host to give specific OS details
1726
1727Network Distance: 1 hop
1728
1729
1730
1731TRACEROUTE
1732
1733HOP RTT ADDRESS
1734
17351 63.63 ms 192.168.1.26
1736
1737
1738
1739Nmap scan report for 192.168.1.28
1740
1741Host is up (0.021s latency).
1742
1743All 1000 scanned ports on 192.168.1.28 are closed
1744
1745MAC Address: CC:61:E5:1C:A3:E0 (Motorola Mobility, a Lenovo Company)
1746
1747Too many fingerprints match this host to give specific OS details
1748
1749Network Distance: 1 hop
1750
1751
1752
1753TRACEROUTE
1754
1755HOP RTT ADDRESS
1756
17571 21.15 ms 192.168.1.28
1758
1759
1760
1761Nmap scan report for 192.168.1.65
1762
1763Host is up (0.0047s latency).
1764
1765Not shown: 999 closed ports
1766
1767PORT STATE SERVICE VERSION
1768
17695001/tcp open commplex-link?
1770
1771MAC Address: A4:5E:60:DA:5A:A1 (Apple)
1772
1773No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
1774
1775TCP/IP fingerprint:
1776
1777OS:SCAN(V=7.40%E=4%D=1/20%OT=5001%CT=1%CU=34972%PV=Y%DS=1%DC=D%G=Y%M=A45E60
1778
1779OS:%TM=58827952%P=i686-pc-windows-windows)SEQ(CI=RD%II=RI)ECN(R=N)T1(R=N)T2
1780
1781OS:(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=N%T=40
1782
1783OS:%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q
1784
1785OS:=)T7(R=Y%DF=N%T=40%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=38%U
1786
1787OS:N=0%RIPL=G%RID=G%RIPCK=G%RUCK=0%RUD=G)IE(R=Y%DFI=S%T=40%CD=S)
1788
1789
1790
1791Network Distance: 1 hop
1792
1793
1794
1795TRACEROUTE
1796
1797HOP RTT ADDRESS
1798
17991 4.66 ms 192.168.1.65
1800
1801
1802
1803Initiating SYN Stealth Scan at 20:55
1804
1805Scanning 192.168.1.25 [1000 ports]
1806
1807Discovered open port 139/tcp on 192.168.1.25
1808
1809Discovered open port 445/tcp on 192.168.1.25
1810
1811Discovered open port 135/tcp on 192.168.1.25
1812
1813Discovered open port 6000/tcp on 192.168.1.25
1814
1815Discovered open port 5357/tcp on 192.168.1.25
1816
1817Completed SYN Stealth Scan at 20:55, 0.14s elapsed (1000 total ports)
1818
1819Initiating Service scan at 20:55