· 5 years ago · Mar 28, 2020, 06:04 PM
1$ nmap -T4 -A -v 192.168.1.1-255
2Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-28 16:13 CET
3NSE: Loaded 151 scripts for scanning.
4NSE: Script Pre-scanning.
5Initiating NSE at 16:13
6Completed NSE at 16:13, 0.00s elapsed
7Initiating NSE at 16:13
8Completed NSE at 16:13, 0.00s elapsed
9Initiating NSE at 16:13
10Completed NSE at 16:13, 0.00s elapsed
11Initiating Ping Scan at 16:13
12Scanning 255 hosts [2 ports/host]
13Completed Ping Scan at 16:13, 6.18s elapsed (255 total hosts)
14Initiating Parallel DNS resolution of 255 hosts. at 16:13
15Completed Parallel DNS resolution of 255 hosts. at 16:13, 0.05s elapsed
16Nmap scan report for 192.168.1.3 [host down]
17Nmap scan report for 192.168.1.4 [host down]
18Nmap scan report for 192.168.1.5 [host down]
19Nmap scan report for 192.168.1.6 [host down]
20Nmap scan report for 192.168.1.7 [host down]
21Nmap scan report for 192.168.1.8 [host down]
22Nmap scan report for 192.168.1.9 [host down]
23Nmap scan report for 192.168.1.10 [host down]
24Nmap scan report for 192.168.1.11 [host down]
25Nmap scan report for 192.168.1.12 [host down]
26Nmap scan report for 192.168.1.13 [host down]
27Nmap scan report for 192.168.1.14 [host down]
28Nmap scan report for 192.168.1.15 [host down]
29Nmap scan report for 192.168.1.16 [host down]
30Nmap scan report for 192.168.1.17 [host down]
31Nmap scan report for 192.168.1.18 [host down]
32Nmap scan report for 192.168.1.19 [host down]
33Nmap scan report for 192.168.1.20 [host down]
34Nmap scan report for 192.168.1.21 [host down]
35Nmap scan report for 192.168.1.22 [host down]
36Nmap scan report for 192.168.1.23 [host down]
37Nmap scan report for 192.168.1.24 [host down]
38Nmap scan report for 192.168.1.25 [host down]
39Nmap scan report for 192.168.1.26 [host down]
40Nmap scan report for 192.168.1.27 [host down]
41Nmap scan report for 192.168.1.28 [host down]
42Nmap scan report for 192.168.1.30 [host down]
43Nmap scan report for 192.168.1.31 [host down]
44Nmap scan report for 192.168.1.32 [host down]
45Nmap scan report for 192.168.1.33 [host down]
46Nmap scan report for 192.168.1.34 [host down]
47Nmap scan report for 192.168.1.35 [host down]
48Nmap scan report for 192.168.1.36 [host down]
49Nmap scan report for 192.168.1.37 [host down]
50Nmap scan report for 192.168.1.38 [host down]
51Nmap scan report for 192.168.1.40 [host down]
52Nmap scan report for 192.168.1.41 [host down]
53Nmap scan report for 192.168.1.42 [host down]
54Nmap scan report for 192.168.1.43 [host down]
55Nmap scan report for 192.168.1.44 [host down]
56Nmap scan report for 192.168.1.45 [host down]
57Nmap scan report for 192.168.1.46 [host down]
58Nmap scan report for 192.168.1.47 [host down]
59Nmap scan report for 192.168.1.48 [host down]
60Nmap scan report for 192.168.1.49 [host down]
61Nmap scan report for 192.168.1.50 [host down]
62Nmap scan report for 192.168.1.51 [host down]
63Nmap scan report for 192.168.1.52 [host down]
64Nmap scan report for 192.168.1.53 [host down]
65Nmap scan report for 192.168.1.54 [host down]
66Nmap scan report for 192.168.1.55 [host down]
67Nmap scan report for 192.168.1.56 [host down]
68Nmap scan report for 192.168.1.57 [host down]
69Nmap scan report for 192.168.1.58 [host down]
70Nmap scan report for 192.168.1.59 [host down]
71Nmap scan report for 192.168.1.60 [host down]
72Nmap scan report for 192.168.1.61 [host down]
73Nmap scan report for 192.168.1.62 [host down]
74Nmap scan report for 192.168.1.63 [host down]
75Nmap scan report for 192.168.1.64 [host down]
76Nmap scan report for 192.168.1.65 [host down]
77Nmap scan report for 192.168.1.66 [host down]
78Nmap scan report for 192.168.1.67 [host down]
79Nmap scan report for 192.168.1.68 [host down]
80Nmap scan report for 192.168.1.69 [host down]
81Nmap scan report for 192.168.1.70 [host down]
82Nmap scan report for 192.168.1.71 [host down]
83Nmap scan report for 192.168.1.72 [host down]
84Nmap scan report for 192.168.1.73 [host down]
85Nmap scan report for 192.168.1.74 [host down]
86Nmap scan report for 192.168.1.75 [host down]
87Nmap scan report for 192.168.1.76 [host down]
88Nmap scan report for 192.168.1.77 [host down]
89Nmap scan report for 192.168.1.78 [host down]
90Nmap scan report for 192.168.1.79 [host down]
91Nmap scan report for 192.168.1.81 [host down]
92Nmap scan report for 192.168.1.82 [host down]
93Nmap scan report for 192.168.1.83 [host down]
94Nmap scan report for 192.168.1.84 [host down]
95Nmap scan report for 192.168.1.85 [host down]
96Nmap scan report for 192.168.1.86 [host down]
97Nmap scan report for 192.168.1.87 [host down]
98Nmap scan report for 192.168.1.88 [host down]
99Nmap scan report for 192.168.1.89 [host down]
100Nmap scan report for 192.168.1.90 [host down]
101Nmap scan report for 192.168.1.91 [host down]
102Nmap scan report for 192.168.1.92 [host down]
103Nmap scan report for 192.168.1.93 [host down]
104Nmap scan report for 192.168.1.94 [host down]
105Nmap scan report for 192.168.1.95 [host down]
106Nmap scan report for 192.168.1.96 [host down]
107Nmap scan report for 192.168.1.97 [host down]
108Nmap scan report for 192.168.1.98 [host down]
109Nmap scan report for 192.168.1.99 [host down]
110Nmap scan report for 192.168.1.100 [host down]
111Nmap scan report for 192.168.1.101 [host down]
112Nmap scan report for 192.168.1.102 [host down]
113Nmap scan report for 192.168.1.104 [host down]
114Nmap scan report for 192.168.1.105 [host down]
115Nmap scan report for 192.168.1.106 [host down]
116Nmap scan report for 192.168.1.107 [host down]
117Nmap scan report for 192.168.1.108 [host down]
118Nmap scan report for 192.168.1.109 [host down]
119Nmap scan report for 192.168.1.110 [host down]
120Nmap scan report for 192.168.1.111 [host down]
121Nmap scan report for 192.168.1.112 [host down]
122Nmap scan report for 192.168.1.113 [host down]
123Nmap scan report for 192.168.1.114 [host down]
124Nmap scan report for 192.168.1.115 [host down]
125Nmap scan report for 192.168.1.116 [host down]
126Nmap scan report for 192.168.1.117 [host down]
127Nmap scan report for 192.168.1.118 [host down]
128Nmap scan report for 192.168.1.119 [host down]
129Nmap scan report for 192.168.1.120 [host down]
130Nmap scan report for 192.168.1.121 [host down]
131Nmap scan report for 192.168.1.122 [host down]
132Nmap scan report for 192.168.1.123 [host down]
133Nmap scan report for 192.168.1.124 [host down]
134Nmap scan report for 192.168.1.125 [host down]
135Nmap scan report for 192.168.1.126 [host down]
136Nmap scan report for 192.168.1.127 [host down]
137Nmap scan report for 192.168.1.128 [host down]
138Nmap scan report for 192.168.1.129 [host down]
139Nmap scan report for 192.168.1.130 [host down]
140Nmap scan report for 192.168.1.131 [host down]
141Nmap scan report for 192.168.1.132 [host down]
142Nmap scan report for 192.168.1.133 [host down]
143Nmap scan report for 192.168.1.134 [host down]
144Nmap scan report for 192.168.1.135 [host down]
145Nmap scan report for 192.168.1.136 [host down]
146Nmap scan report for 192.168.1.137 [host down]
147Nmap scan report for 192.168.1.138 [host down]
148Nmap scan report for 192.168.1.139 [host down]
149Nmap scan report for 192.168.1.140 [host down]
150Nmap scan report for 192.168.1.141 [host down]
151Nmap scan report for 192.168.1.142 [host down]
152Nmap scan report for 192.168.1.143 [host down]
153Nmap scan report for 192.168.1.144 [host down]
154Nmap scan report for 192.168.1.145 [host down]
155Nmap scan report for 192.168.1.146 [host down]
156Nmap scan report for 192.168.1.147 [host down]
157Nmap scan report for 192.168.1.148 [host down]
158Nmap scan report for 192.168.1.149 [host down]
159Nmap scan report for 192.168.1.150 [host down]
160Nmap scan report for 192.168.1.151 [host down]
161Nmap scan report for 192.168.1.152 [host down]
162Nmap scan report for 192.168.1.153 [host down]
163Nmap scan report for 192.168.1.154 [host down]
164Nmap scan report for 192.168.1.155 [host down]
165Nmap scan report for 192.168.1.156 [host down]
166Nmap scan report for 192.168.1.157 [host down]
167Nmap scan report for 192.168.1.158 [host down]
168Nmap scan report for 192.168.1.159 [host down]
169Nmap scan report for 192.168.1.160 [host down]
170Nmap scan report for 192.168.1.161 [host down]
171Nmap scan report for 192.168.1.162 [host down]
172Nmap scan report for 192.168.1.163 [host down]
173Nmap scan report for 192.168.1.164 [host down]
174Nmap scan report for 192.168.1.165 [host down]
175Nmap scan report for 192.168.1.166 [host down]
176Nmap scan report for 192.168.1.167 [host down]
177Nmap scan report for 192.168.1.168 [host down]
178Nmap scan report for 192.168.1.169 [host down]
179Nmap scan report for 192.168.1.170 [host down]
180Nmap scan report for 192.168.1.171 [host down]
181Nmap scan report for 192.168.1.172 [host down]
182Nmap scan report for 192.168.1.173 [host down]
183Nmap scan report for 192.168.1.174 [host down]
184Nmap scan report for 192.168.1.175 [host down]
185Nmap scan report for 192.168.1.176 [host down]
186Nmap scan report for 192.168.1.177 [host down]
187Nmap scan report for 192.168.1.178 [host down]
188Nmap scan report for 192.168.1.179 [host down]
189Nmap scan report for 192.168.1.181 [host down]
190Nmap scan report for 192.168.1.182 [host down]
191Nmap scan report for 192.168.1.183 [host down]
192Nmap scan report for 192.168.1.184 [host down]
193Nmap scan report for 192.168.1.185 [host down]
194Nmap scan report for 192.168.1.186 [host down]
195Nmap scan report for 192.168.1.187 [host down]
196Nmap scan report for 192.168.1.188 [host down]
197Nmap scan report for 192.168.1.189 [host down]
198Nmap scan report for 192.168.1.190 [host down]
199Nmap scan report for 192.168.1.191 [host down]
200Nmap scan report for 192.168.1.192 [host down]
201Nmap scan report for 192.168.1.193 [host down]
202Nmap scan report for 192.168.1.194 [host down]
203Nmap scan report for 192.168.1.195 [host down]
204Nmap scan report for 192.168.1.196 [host down]
205Nmap scan report for 192.168.1.197 [host down]
206Nmap scan report for 192.168.1.200 [host down]
207Nmap scan report for 192.168.1.201 [host down]
208Nmap scan report for 192.168.1.202 [host down]
209Nmap scan report for 192.168.1.203 [host down]
210Nmap scan report for 192.168.1.204 [host down]
211Nmap scan report for 192.168.1.205 [host down]
212Nmap scan report for 192.168.1.206 [host down]
213Nmap scan report for 192.168.1.207 [host down]
214Nmap scan report for 192.168.1.208 [host down]
215Nmap scan report for 192.168.1.209 [host down]
216Nmap scan report for 192.168.1.210 [host down]
217Nmap scan report for 192.168.1.211 [host down]
218Nmap scan report for 192.168.1.212 [host down]
219Nmap scan report for 192.168.1.213 [host down]
220Nmap scan report for 192.168.1.214 [host down]
221Nmap scan report for 192.168.1.215 [host down]
222Nmap scan report for 192.168.1.216 [host down]
223Nmap scan report for 192.168.1.217 [host down]
224Nmap scan report for 192.168.1.218 [host down]
225Nmap scan report for 192.168.1.219 [host down]
226Nmap scan report for 192.168.1.220 [host down]
227Nmap scan report for 192.168.1.221 [host down]
228Nmap scan report for 192.168.1.222 [host down]
229Nmap scan report for 192.168.1.223 [host down]
230Nmap scan report for 192.168.1.224 [host down]
231Nmap scan report for 192.168.1.225 [host down]
232Nmap scan report for 192.168.1.226 [host down]
233Nmap scan report for 192.168.1.227 [host down]
234Nmap scan report for 192.168.1.228 [host down]
235Nmap scan report for 192.168.1.229 [host down]
236Nmap scan report for 192.168.1.230 [host down]
237Nmap scan report for 192.168.1.231 [host down]
238Nmap scan report for 192.168.1.232 [host down]
239Nmap scan report for 192.168.1.233 [host down]
240Nmap scan report for 192.168.1.234 [host down]
241Nmap scan report for 192.168.1.235 [host down]
242Nmap scan report for 192.168.1.236 [host down]
243Nmap scan report for 192.168.1.237 [host down]
244Nmap scan report for 192.168.1.238 [host down]
245Nmap scan report for 192.168.1.239 [host down]
246Nmap scan report for 192.168.1.240 [host down]
247Nmap scan report for 192.168.1.241 [host down]
248Nmap scan report for 192.168.1.242 [host down]
249Nmap scan report for 192.168.1.243 [host down]
250Nmap scan report for 192.168.1.244 [host down]
251Nmap scan report for 192.168.1.245 [host down]
252Nmap scan report for 192.168.1.246 [host down]
253Nmap scan report for 192.168.1.247 [host down]
254Nmap scan report for 192.168.1.248 [host down]
255Nmap scan report for 192.168.1.249 [host down]
256Nmap scan report for 192.168.1.250 [host down]
257Nmap scan report for 192.168.1.251 [host down]
258Nmap scan report for 192.168.1.252 [host down]
259Nmap scan report for 192.168.1.253 [host down]
260Nmap scan report for 192.168.1.254 [host down]
261Nmap scan report for 192.168.1.255 [host down]
262Initiating Connect Scan at 16:13
263Scanning 9 hosts [1000 ports/host]
264Discovered open port 445/tcp on 192.168.1.199
265Discovered open port 111/tcp on 192.168.1.199
266Discovered open port 53/tcp on 192.168.1.1
267Discovered open port 80/tcp on 192.168.1.1
268Discovered open port 80/tcp on 192.168.1.103
269Discovered open port 80/tcp on 192.168.1.198
270Discovered open port 139/tcp on 192.168.1.199
271Discovered open port 554/tcp on 192.168.1.103
272Discovered open port 443/tcp on 192.168.1.1
273Discovered open port 5900/tcp on 192.168.1.199
274Discovered open port 62078/tcp on 192.168.1.29
275Completed Connect Scan against 192.168.1.39 in 1.26s (8 hosts left)
276Discovered open port 23/tcp on 192.168.1.103
277Discovered open port 8080/tcp on 192.168.1.199
278Increasing send delay for 192.168.1.1 from 0 to 5 due to 13 out of 31 dropped probes since last increase.
279Increasing send delay for 192.168.1.2 from 0 to 5 due to 13 out of 31 dropped probes since last increase.
280Increasing send delay for 192.168.1.180 from 0 to 5 due to 13 out of 32 dropped probes since last increase.
281Increasing send delay for 192.168.1.29 from 0 to 5 due to 35 out of 86 dropped probes since last increase.
282Increasing send delay for 192.168.1.80 from 0 to 5 due to max_successful_tryno increase to 5
283Increasing send delay for 192.168.1.80 from 5 to 10 due to max_successful_tryno increase to 6
284Discovered open port 5432/tcp on 192.168.1.199
285Warning: 192.168.1.80 giving up on port because retransmission cap hit (6).
286Increasing send delay for 192.168.1.180 from 5 to 10 due to max_successful_tryno increase to 5
287Increasing send delay for 192.168.1.1 from 5 to 10 due to max_successful_tryno increase to 5
288Increasing send delay for 192.168.1.29 from 5 to 10 due to max_successful_tryno increase to 5
289Warning: 192.168.1.1 giving up on port because retransmission cap hit (6).
290Discovered open port 6789/tcp on 192.168.1.103
291Discovered open port 2222/tcp on 192.168.1.199
292Discovered open port 3800/tcp on 192.168.1.103
293Increasing send delay for 192.168.1.103 from 0 to 5 due to max_successful_tryno increase to 5
294Increasing send delay for 192.168.1.2 from 5 to 10 due to max_successful_tryno increase to 5
295Completed Connect Scan against 192.168.1.199 in 38.64s (7 hosts left)
296Warning: 192.168.1.180 giving up on port because retransmission cap hit (6).
297Completed Connect Scan against 192.168.1.103 in 39.93s (6 hosts left)
298Warning: 192.168.1.2 giving up on port because retransmission cap hit (6).
299Completed Connect Scan against 192.168.1.29 in 52.02s (5 hosts left)
300Completed Connect Scan against 192.168.1.2 in 52.96s (4 hosts left)
301Completed Connect Scan against 192.168.1.80 in 55.06s (3 hosts left)
302Completed Connect Scan against 192.168.1.1 in 55.89s (2 hosts left)
303Completed Connect Scan against 192.168.1.180 in 56.45s (1 host left)
304Completed Connect Scan at 16:14, 58.56s elapsed (9000 total ports)
305Initiating Service scan at 16:14
306Scanning 17 services on 9 hosts
307Service scan Timing: About 82.35% done; ETC: 16:17 (0:00:34 remaining)
308Completed Service scan at 16:17, 172.84s elapsed (17 services on 9 hosts)
309NSE: Script scanning 9 hosts.
310Initiating NSE at 16:17
311Completed NSE at 16:18, 79.14s elapsed
312Initiating NSE at 16:18
313Completed NSE at 16:18, 2.76s elapsed
314Initiating NSE at 16:18
315Completed NSE at 16:18, 0.01s elapsed
316Nmap scan report for 192.168.1.1
317Host is up (0.0050s latency).
318Not shown: 932 closed ports, 65 filtered ports
319PORT STATE SERVICE VERSION
32053/tcp open domain?
32180/tcp open http ADB Broadband HTTP Server
322| fingerprint-strings:
323| FourOhFourRequest:
324| HTTP/1.0 505 HTTP Version Not Supported
325| Date: Sat, 28 Mar 2020 15:14:50 UTC
326| Server: ADB Broadband HTTP Server
327| X-Frame-Options: DENY
328| Connection: close
329| Content-Language: en
330| Content-Type: text/html
331| Content-Length: 432
332| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
333| <html>
334| <head>
335| <title>505 HTTP Version Not Supported</title>
336| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
337| </head>
338| <body>
339| <h1>505 HTTP Version Not Supported</h1>
340| HTTP Version Not Supported
341| <hr>
342| <br>ADB Broadband HTTP Server<br>protocol: HTTP<br>ipv4 192.168.1.1 port 80<br><br>connected peer 192.168.1.39 port 50448<br>
343| </body>
344| </html>
345| GetRequest:
346| HTTP/1.0 505 HTTP Version Not Supported
347| Date: Sat, 28 Mar 2020 15:14:30 UTC
348| Server: ADB Broadband HTTP Server
349| X-Frame-Options: DENY
350| Connection: close
351| Content-Language: en
352| Content-Type: text/html
353| Content-Length: 432
354| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
355| <html>
356| <head>
357| <title>505 HTTP Version Not Supported</title>
358| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
359| </head>
360| <body>
361| <h1>505 HTTP Version Not Supported</h1>
362| HTTP Version Not Supported
363| <hr>
364| <br>ADB Broadband HTTP Server<br>protocol: HTTP<br>ipv4 192.168.1.1 port 80<br><br>connected peer 192.168.1.39 port 50372<br>
365| </body>
366|_ </html>
367|_http-favicon: Unknown favicon MD5: 891B49BFCF85440A998A204EFE7E64BA
368| http-methods:
369|_ Supported Methods: GET POST
370|_http-server-header: ADB Broadband HTTP Server
371|_http-title: Site doesn't have a title (text/html).
372|_http-trane-info: Problem with XML parsing of /evox/about
373443/tcp open ssl/https ADB Broadband HTTP Server
374| fingerprint-strings:
375| FourOhFourRequest:
376| HTTP/1.0 505 HTTP Version Not Supported
377| Date: Sat, 28 Mar 2020 15:14:47 UTC
378| Server: ADB Broadband HTTP Server
379| X-Frame-Options: DENY
380| Connection: close
381| Content-Language: en
382| Content-Type: text/html
383| Content-Length: 434
384| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
385| <html>
386| <head>
387| <title>505 HTTP Version Not Supported</title>
388| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
389| </head>
390| <body>
391| <h1>505 HTTP Version Not Supported</h1>
392| HTTP Version Not Supported
393| <hr>
394| <br>ADB Broadband HTTP Server<br>protocol: HTTPS<br>ipv4 192.168.1.1 port 443<br><br>connected peer 192.168.1.39 port 34122<br>
395| </body>
396| </html>
397| GetRequest:
398| HTTP/1.0 505 HTTP Version Not Supported
399| Date: Sat, 28 Mar 2020 15:14:36 UTC
400| Server: ADB Broadband HTTP Server
401| X-Frame-Options: DENY
402| Connection: close
403| Content-Language: en
404| Content-Type: text/html
405| Content-Length: 434
406| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
407| <html>
408| <head>
409| <title>505 HTTP Version Not Supported</title>
410| <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
411| </head>
412| <body>
413| <h1>505 HTTP Version Not Supported</h1>
414| HTTP Version Not Supported
415| <hr>
416| <br>ADB Broadband HTTP Server<br>protocol: HTTPS<br>ipv4 192.168.1.1 port 443<br><br>connected peer 192.168.1.39 port 34082<br>
417| </body>
418|_ </html>
419|_http-favicon: Unknown favicon MD5: 891B49BFCF85440A998A204EFE7E64BA
420| http-methods:
421|_ Supported Methods: GET POST
422|_http-server-header: ADB Broadband HTTP Server
423|_http-title: Site doesn't have a title (text/html).
424|_http-trane-info: Problem with XML parsing of /evox/about
425| ssl-cert: Subject: commonName=192.168.1.1/organizationName=ADB Broadband S.p.A./stateOrProvinceName=Italy/countryName=IT
426| Issuer: commonName=192.168.1.1/organizationName=ADB Broadband S.p.A./stateOrProvinceName=Italy/countryName=IT
427| Public Key type: rsa
428| Public Key bits: 1024
429| Signature Algorithm: sha1WithRSAEncryption
430| Not valid before: 2011-10-17T16:22:37
431| Not valid after: 2016-10-15T16:22:37
432| MD5: db58 8fcd 893b 987e b8cd f85f 5bcb ff34
433|_SHA-1: dbb4 2b08 c5fb 2d30 f3de 4351 9128 efbc be25 1651
434|_ssl-date: 2020-03-28T15:18:36+00:00; 0s from scanner time.
4352 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
436==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
437SF-Port80-TCP:V=7.80%I=7%D=3/28%Time=5E7F69DA%P=aarch64-unknown-linux-andr
438SF:oid%r(GetRequest,291,"HTTP/1\.0\x20505\x20HTTP\x20Version\x20Not\x20Sup
439SF:ported\r\nDate:\x20Sat,\x2028\x20Mar\x202020\x2015:14:30\x20UTC\r\nServ
440SF:er:\x20ADB\x20Broadband\x20HTTP\x20Server\r\nX-Frame-Options:\x20DENY\r
441SF:\nConnection:\x20close\r\nContent-Language:\x20en\r\nContent-Type:\x20t
442SF:ext/html\r\nContent-Length:\x20432\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x
443SF:20\"-//W3C//DTD\x20HTML\x204\.01\x20Transitional//EN\">\n<html>\n<head>
444SF:\n<title>505\x20HTTP\x20Version\x20Not\x20Supported</title>\n<meta\x20h
445SF:ttp-equiv=\"content-type\"\x20content=\"text/html;\x20charset=iso-8859-
446SF:1\">\n</head>\n<body>\n\n<h1>505\x20HTTP\x20Version\x20Not\x20Supported
447SF:</h1>\n505\x20HTTP\x20Version\x20Not\x20Supported\n<hr>\n<br>ADB\x20Bro
448SF:adband\x20HTTP\x20Server<br>protocol:\x20HTTP<br>ipv4\x20192\.168\.1\.1
449SF:\x20port\x2080<br><br>connected\x20peer\x20192\.168\.1\.39\x20port\x205
450SF:0372<br>\n</body>\n</html>\r\n")%r(FourOhFourRequest,291,"HTTP/1\.0\x20
451SF:505\x20HTTP\x20Version\x20Not\x20Supported\r\nDate:\x20Sat,\x2028\x20Ma
452SF:r\x202020\x2015:14:50\x20UTC\r\nServer:\x20ADB\x20Broadband\x20HTTP\x20
453SF:Server\r\nX-Frame-Options:\x20DENY\r\nConnection:\x20close\r\nContent-L
454SF:anguage:\x20en\r\nContent-Type:\x20text/html\r\nContent-Length:\x20432\
455SF:r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x2
456SF:0Transitional//EN\">\n<html>\n<head>\n<title>505\x20HTTP\x20Version\x20
457SF:Not\x20Supported</title>\n<meta\x20http-equiv=\"content-type\"\x20conte
458SF:nt=\"text/html;\x20charset=iso-8859-1\">\n</head>\n<body>\n\n<h1>505\x2
459SF:0HTTP\x20Version\x20Not\x20Supported</h1>\n505\x20HTTP\x20Version\x20No
460SF:t\x20Supported\n<hr>\n<br>ADB\x20Broadband\x20HTTP\x20Server<br>protoco
461SF:l:\x20HTTP<br>ipv4\x20192\.168\.1\.1\x20port\x2080<br><br>connected\x20
462SF:peer\x20192\.168\.1\.39\x20port\x2050448<br>\n</body>\n</html>\r\n");
463==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
464SF-Port443-TCP:V=7.80%T=SSL%I=7%D=3/28%Time=5E7F69E1%P=aarch64-unknown-lin
465SF:ux-android%r(GetRequest,293,"HTTP/1\.0\x20505\x20HTTP\x20Version\x20Not
466SF:\x20Supported\r\nDate:\x20Sat,\x2028\x20Mar\x202020\x2015:14:36\x20UTC\
467SF:r\nServer:\x20ADB\x20Broadband\x20HTTP\x20Server\r\nX-Frame-Options:\x2
468SF:0DENY\r\nConnection:\x20close\r\nContent-Language:\x20en\r\nContent-Typ
469SF:e:\x20text/html\r\nContent-Length:\x20434\r\n\r\n<!DOCTYPE\x20HTML\x20P
470SF:UBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20Transitional//EN\">\n<html>\
471SF:n<head>\n<title>505\x20HTTP\x20Version\x20Not\x20Supported</title>\n<me
472SF:ta\x20http-equiv=\"content-type\"\x20content=\"text/html;\x20charset=is
473SF:o-8859-1\">\n</head>\n<body>\n\n<h1>505\x20HTTP\x20Version\x20Not\x20Su
474SF:pported</h1>\n505\x20HTTP\x20Version\x20Not\x20Supported\n<hr>\n<br>ADB
475SF:\x20Broadband\x20HTTP\x20Server<br>protocol:\x20HTTPS<br>ipv4\x20192\.1
476SF:68\.1\.1\x20port\x20443<br><br>connected\x20peer\x20192\.168\.1\.39\x20
477SF:port\x2034082<br>\n</body>\n</html>\r\n")%r(FourOhFourRequest,293,"HTTP
478SF:/1\.0\x20505\x20HTTP\x20Version\x20Not\x20Supported\r\nDate:\x20Sat,\x2
479SF:028\x20Mar\x202020\x2015:14:47\x20UTC\r\nServer:\x20ADB\x20Broadband\x2
480SF:0HTTP\x20Server\r\nX-Frame-Options:\x20DENY\r\nConnection:\x20close\r\n
481SF:Content-Language:\x20en\r\nContent-Type:\x20text/html\r\nContent-Length
482SF::\x20434\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x2
483SF:04\.01\x20Transitional//EN\">\n<html>\n<head>\n<title>505\x20HTTP\x20Ve
484SF:rsion\x20Not\x20Supported</title>\n<meta\x20http-equiv=\"content-type\"
485SF:\x20content=\"text/html;\x20charset=iso-8859-1\">\n</head>\n<body>\n\n<
486SF:h1>505\x20HTTP\x20Version\x20Not\x20Supported</h1>\n505\x20HTTP\x20Vers
487SF:ion\x20Not\x20Supported\n<hr>\n<br>ADB\x20Broadband\x20HTTP\x20Server<b
488SF:r>protocol:\x20HTTPS<br>ipv4\x20192\.168\.1\.1\x20port\x20443<br><br>co
489SF:nnected\x20peer\x20192\.168\.1\.39\x20port\x2034122<br>\n</body>\n</htm
490SF:l>\r\n");
491
492Nmap scan report for 192.168.1.2
493Host is up (0.010s latency).
494Not shown: 952 closed ports
495PORT STATE SERVICE VERSION
49617/tcp filtered qotd
49742/tcp filtered nameserver
498366/tcp filtered odmr
499500/tcp filtered isakmp
500616/tcp filtered sco-sysmgr
501783/tcp filtered spamassassin
5021027/tcp filtered IIS
5031056/tcp filtered vfo
5041083/tcp filtered ansoft-lm-1
5051090/tcp filtered ff-fms
5061095/tcp filtered nicelink
5071097/tcp filtered sunclustermgr
5081300/tcp filtered h323hostcallsc
5091309/tcp filtered jtag-server
5101521/tcp filtered oracle
5111717/tcp filtered fj-hdnet
5122004/tcp filtered mailbox
5132030/tcp filtered device2
5142099/tcp filtered h2250-annex-g
5152100/tcp filtered amiganetfs
5162811/tcp filtered gsiftp
5173052/tcp filtered powerchute
5183527/tcp filtered beserver-msg-q
5194848/tcp filtered appserv-http
5205050/tcp filtered mmcc
5215222/tcp filtered xmpp-client
5225269/tcp filtered xmpp-server
5235633/tcp filtered beorl
5245730/tcp filtered unieng
5255910/tcp filtered cm
5266101/tcp filtered backupexec
5276667/tcp filtered irc
5287004/tcp filtered afs3-kaserver
5298088/tcp filtered radan-http
5308093/tcp filtered unknown
5318800/tcp filtered sunwebadmin
5329100/tcp filtered jetdirect
5339110/tcp filtered unknown
5349207/tcp filtered wap-vcal-s
5359535/tcp filtered man
5369618/tcp filtered condor
53710002/tcp filtered documentum
53811111/tcp filtered vce
53919780/tcp filtered unknown
54020031/tcp filtered unknown
54127715/tcp filtered unknown
54230718/tcp filtered unknown
54349154/tcp filtered unknown
544
545Nmap scan report for 192.168.1.29
546Host is up (0.013s latency).
547Not shown: 999 closed ports
548PORT STATE SERVICE VERSION
54962078/tcp open tcpwrapped
550
551Nmap scan report for 192.168.1.39
552Host is up (0.0052s latency).
553All 1000 scanned ports on 192.168.1.39 are closed
554
555Nmap scan report for 192.168.1.80
556Host is up (0.0083s latency).
557Not shown: 957 closed ports
558PORT STATE SERVICE VERSION
55924/tcp filtered priv-mail
560524/tcp filtered ncp
561617/tcp filtered sco-dtmgr
562648/tcp filtered rrp
563800/tcp filtered mdbs_daemon
564901/tcp filtered samba-swat
5651043/tcp filtered boinc
5661067/tcp filtered instl_boots
5671086/tcp filtered cplscrambler-lg
5681106/tcp filtered isoipsigport-1
5691183/tcp filtered llsurfup-http
5701300/tcp filtered h323hostcallsc
5711443/tcp filtered ies-lm
5721501/tcp filtered sas-3
5731862/tcp filtered mysql-cm-agent
5742042/tcp filtered isis
5752383/tcp filtered ms-olap4
5762811/tcp filtered gsiftp
5773077/tcp filtered orbix-loc-ssl
5783323/tcp filtered active-net
5793703/tcp filtered adobeserver-3
5803971/tcp filtered lanrevserver
5815030/tcp filtered surfpass
5825550/tcp filtered sdadmind
5835631/tcp filtered pcanywheredata
5845904/tcp filtered unknown
5856000/tcp filtered X11
5866689/tcp filtered tsa
5877025/tcp filtered vmsvc-2
5888088/tcp filtered radan-http
5898093/tcp filtered unknown
5908100/tcp filtered xprint-server
5918500/tcp filtered fmtp
5929111/tcp filtered DragonIDSConsole
5939207/tcp filtered wap-vcal-s
59414000/tcp filtered scotty-ft
59519283/tcp filtered keysrvr
59619801/tcp filtered unknown
59719842/tcp filtered unknown
59820031/tcp filtered unknown
59932774/tcp filtered sometimes-rpc11
60038292/tcp filtered landesk-cba
60154045/tcp filtered unknown
602
603Nmap scan report for 192.168.1.103
604Host is up (0.0080s latency).
605Not shown: 995 closed ports
606PORT STATE SERVICE VERSION
60723/tcp open telnet BusyBox telnetd
60880/tcp open http
609| fingerprint-strings:
610| GetRequest:
611| HTTP/1.1 200 OK
612| Date: Thu, 02 Dec 2010 15:05:55 UTC
613| Content-Type: text/html
614| Content-Length: 58028
615| Connection: Close
616| <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
617| <html>
618| <head>
619| <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" >
620| <script type="text/javascript" src="wt.js"></script>
621| <script type="text/javascript" src="m.js"></script>
622| <script type="text/javascript" src="cap.js"></script>
623| <script type="text/javascript" src="qt.js"></script>
624| <link rel="stylesheet" type="text/css" media="screen" href="m.css" />
625| <script>
626| try{
627| //document.execCommand('BackgroundImageCache', false, true);
628| //catch(e) {}
629| </script>
630| <script>
631| gdomready=0;
632| gopenall=0;
633| gsld;
634| gslda;
635| gsldb;
636| gsldc;
637| gsldd;
638| //var gslde;
639| gca=0;
640| gcb=0;
641| gcc=0;
642|_ gcd=0;
643554/tcp open rtsp?
6443800/tcp open pwgpsi?
6456789/tcp open ibm-db2-admin?
646| fingerprint-strings:
647| JavaRMI:
648| /var/Challenge: ../../Src/Http/DH_HTTP.cpp: 831: virtual CompLib::RET_CODE CompLib::HTTPRequest::parseHead(const std::string&): Assertion `end != std::string::npos' failed.
649| :07:02|trace libkeyboard.a::KeepAlive ff a 0 0!
650| LIBDVR_MSG : 2020-3-28, weekday:6 time:16:7:13
651| libkeyboard.a::KeepAlive ff a 0 0!
652| CNetWorkService::onConnTimer-----------------
653| 16:07:32|trace libkeyboard.a::KeepAlive ff a 0 0!
654| libkeyboard.a::KeepAlive ff a 0 0!
655| CVFDCommandTimeLed::setParam>>16:8:0
656| 16:08:02|trace libkeyboard.a::KeepAlive ff a 0 0!
657| LIBDVR_MSG : 2020-3-28, weekday:6 time:16:8:13
658| libkeyboard.a::KeepAlive ff a 0 0!
659| CNetWorkService::onConnTimer-----------------
660| 16:08:32|trace libkeyboard.a::KeepAlive ff a 0 0!
661| libkeyboard.a::KeepAlive ff a 0 0!
662| CVFDCommandTimeLed::setParam>>16:9:0
663| 16:09:02|trace libkeyboard.a::KeepAlive ff a 0 0!
664| LIBDVR_MSG : 2020-3-28, weekday:6 time:16:9:13
665|_ libkeyboard.a::KeepAlive ff a 0
6662 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
667==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
668SF-Port80-TCP:V=7.80%I=7%D=3/28%Time=5E7F69D5%P=aarch64-unknown-linux-andr
669SF:oid%r(GetRequest,407B,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Thu,\x2002\x2
670SF:0Dec\x202010\x2015:05:55\x20UTC\r\nContent-Type:\x20text/html\r\nConten
671SF:t-Length:\x2058028\r\nConnection:\x20Close\r\n\r\n\xef\xbb\xbf<!DOCTYPE
672SF:\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XHTML\x201\.0\x20Strict//EN\"\x2
673SF:0\"http://www\.w3\.org/TR/xhtml1/DTD/xhtml1-strict\.dtd\">\r\n<html>\x2
674SF:0\r\n<head>\r\n<meta\x20http-equiv=\"Content-Type\"\x20content=\"text/h
675SF:tml;\x20charset=UTF-8\"\x20>\r\n<script\x20type=\"text/javascript\"\x20
676SF:src=\"wt\.js\"></script>\r\n<script\x20type=\"text/javascript\"\x20src=
677SF:\"m\.js\"></script>\r\n<script\x20type=\"text/javascript\"\x20src=\"cap
678SF:\.js\"></script>\r\n<script\x20type=\"text/javascript\"\x20src=\"qt\.js
679SF:\"></script>\r\n<link\x20rel=\"stylesheet\"\x20type=\"text/css\"\x20med
680SF:ia=\"screen\"\x20href=\"m\.css\"\x20/>\r\n<script>\r\n\t//\x20try{\r\n\
681SF:t\t//document\.execCommand\('BackgroundImageCache',\x20false,\x20true\)
682SF:;\r\n\t\t//}\r\n//catch\(e\)\x20{}\r\n</script>\r\n<script>\r\nvar\x20g
683SF:domready=0;\r\nvar\x20gopenall=0;\r\nvar\x20gsld;\r\nvar\x20gslda;\r\nv
684SF:ar\x20gsldb;\r\nvar\x20gsldc;\r\nvar\x20gsldd;\r\n//var\x20gslde;\r\nva
685SF:r\x20gca=0;\r\nvar\x20gcb=0;\r\nvar\x20gcc=0;\r\nvar\x20gcd=0;\r\nvar\x
686SF:20gw");
687==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
688SF-Port6789-TCP:V=7.80%I=7%D=3/28%Time=5E7F69DA%P=aarch64-unknown-linux-an
689SF:droid%r(JavaRMI,C14,"/var/Challenge:\x20\.\./\.\./Src/Http/DH_HTTP\.cpp
690SF::\x20831:\x20virtual\x20CompLib::RET_CODE\x20CompLib::HTTPRequest::pars
691SF:eHead\(const\x20std::string&\):\x20Assertion\x20`end\x20!=\x20std::stri
692SF:ng::npos'\x20failed\.\n:07:02\|trace\x20libkeyboard\.a::KeepAlive\x20ff
693SF:\x20a\x200\x200!\nLIBDVR_MSG\x20:\x202020-3-28,\x20weekday:6\x20time:16
694SF::7:13\nlibkeyboard\.a::KeepAlive\x20ff\x20a\x200\x200!\nCNetWorkService
695SF:::onConnTimer-----------------\n16:07:32\|trace\x20libkeyboard\.a::Keep
696SF:Alive\x20ff\x20a\x200\x200!\nlibkeyboard\.a::KeepAlive\x20ff\x20a\x200\
697SF:x200!\nCVFDCommandTimeLed::setParam>>16:8:0\n16:08:02\|trace\x20libkeyb
698SF:oard\.a::KeepAlive\x20ff\x20a\x200\x200!\nLIBDVR_MSG\x20:\x202020-3-28,
699SF:\x20weekday:6\x20time:16:8:13\nlibkeyboard\.a::KeepAlive\x20ff\x20a\x20
700SF:0\x200!\nCNetWorkService::onConnTimer-----------------\n16:08:32\|trace
701SF:\x20libkeyboard\.a::KeepAlive\x20ff\x20a\x200\x200!\nlibkeyboard\.a::Ke
702SF:epAlive\x20ff\x20a\x200\x200!\nCVFDCommandTimeLed::setParam>>16:9:0\n16
703SF::09:02\|trace\x20libkeyboard\.a::KeepAlive\x20ff\x20a\x200\x200!\nLIBDV
704SF:R_MSG\x20:\x202020-3-28,\x20weekday:6\x20time:16:9:13\nlibkeyboard\.a::
705SF:KeepAlive\x20ff\x20a\x200\x20");
706
707Nmap scan report for 192.168.1.180
708Host is up (0.0041s latency).
709Not shown: 962 closed ports
710PORT STATE SERVICE VERSION
711625/tcp filtered apple-xsrvr-admin
712646/tcp filtered ldp
7131027/tcp filtered IIS
7141030/tcp filtered iad1
7151046/tcp filtered wfremotertm
7161056/tcp filtered vfo
7171059/tcp filtered nimreg
7181061/tcp filtered kiosk
7191074/tcp filtered warmspotMgmt
7201236/tcp filtered bvcontrol
7211244/tcp filtered isbconference1
7221259/tcp filtered opennl-voice
7231521/tcp filtered oracle
7241935/tcp filtered rtmp
7252260/tcp filtered apc-2260
7262602/tcp filtered ripd
7273324/tcp filtered active-net
7283580/tcp filtered nati-svrloc
7293690/tcp filtered svn
7303995/tcp filtered iss-mgmt-ssl
7314224/tcp filtered xtell
7324443/tcp filtered pharos
7334567/tcp filtered tram
7345004/tcp filtered avt-profile-1
7355221/tcp filtered 3exmp
7365225/tcp filtered hp-server
7375631/tcp filtered pcanywheredata
7385987/tcp filtered wbem-rmi
7396002/tcp filtered X11:2
7407496/tcp filtered unknown
7418099/tcp filtered unknown
7429010/tcp filtered sdr
74310616/tcp filtered unknown
74413782/tcp filtered netbackup
74516080/tcp filtered osxwebadmin
74619283/tcp filtered keysrvr
74744501/tcp filtered unknown
74854045/tcp filtered unknown
749
750Nmap scan report for 192.168.1.198
751Host is up (0.015s latency).
752Not shown: 999 filtered ports
753PORT STATE SERVICE VERSION
75480/tcp open http nginx 1.14.0 (Ubuntu)
755| http-methods:
756|_ Supported Methods: GET HEAD OPTIONS
757|_http-server-header: nginx/1.14.0 (Ubuntu)
758| http-title: Prihl\xC3\xA1senie | FT5000 Admin
759|_Requested resource was /admin/login/?next=/admin/
760Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
761
762Nmap scan report for 192.168.1.199
763Host is up (0.0074s latency).
764Not shown: 993 closed ports
765PORT STATE SERVICE VERSION
766111/tcp open rpcbind 2-4 (RPC #100000)
767| rpcinfo:
768| program version port/proto service
769| 100000 2,3,4 111/tcp rpcbind
770| 100000 2,3,4 111/udp rpcbind
771| 100000 3,4 111/tcp6 rpcbind
772| 100000 3,4 111/udp6 rpcbind
773| 100024 1 50609/tcp status
774| 100024 1 53577/tcp6 status
775| 100024 1 54537/udp6 status
776|_ 100024 1 59172/udp status
777139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
778445/tcp open netbios-ssn Samba smbd 4.2.14-Debian (workgroup: WORKGROUP)
7792222/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u3 (protocol 2.0)
780| ssh-hostkey:
781| 1024 fa:67:83:46:ad:08:54:e2:a2:9a:3b:7a:32:f2:77:ba (DSA)
782| 2048 25:20:d0:70:0f:9d:68:ba:c6:e5:12:af:34:da:26:c5 (RSA)
783| 256 8b:05:3e:57:e9:41:39:65:70:ac:3f:e1:6d:24:b9:14 (ECDSA)
784|_ 256 d7:9d:f4:e6:73:b4:b6:48:1a:4d:61:da:e8:b5:ad:7d (ED25519)
7855432/tcp open postgresql PostgreSQL DB 9.4.13 - 9.4.15
786| ssl-cert: Subject: commonName=titan
787| Issuer: commonName=titan
788| Public Key type: rsa
789| Public Key bits: 2048
790| Signature Algorithm: sha256WithRSAEncryption
791| Not valid before: 2015-07-24T07:49:25
792| Not valid after: 2025-07-21T07:49:25
793| MD5: bbc1 fe93 c9a7 0957 d61c 9dd9 ee6f c4ec
794|_SHA-1: 8ca3 d090 5a1e a034 0676 3942 3422 0fe7 5846 bdd4
795|_ssl-date: TLS randomness does not represent time
7965900/tcp open vnc VNC (protocol 3.8)
797|_ssl-cert: ERROR: Script execution failed (use -d to debug)
798|_ssl-date: ERROR: Script execution failed (use -d to debug)
799|_sslv2: ERROR: Script execution failed (use -d to debug)
800|_tls-alpn: ERROR: Script execution failed (use -d to debug)
801|_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug)
802|_vnc-info: ERROR: Script execution failed (use -d to debug)
8038080/tcp open http lighttpd 1.4.35
804| http-methods:
805|_ Supported Methods: GET HEAD POST OPTIONS
806|_http-server-header: lighttpd/1.4.35
807| http-title: Publix - Informa\xC3\x84\xC2\x8Dn\xC3\x83\xC2\xBD port\xC3\x83\xC2\xA1l \xC3\x84\xC2\x8CS
808|_Requested resource was login.pl?err=3
809Service Info: Host: TITAN; OS: Linux; CPE: cpe:/o:linux:linux_kernel
810
811Host script results:
812|_clock-skew: mean: -19m58s, deviation: 34m36s, median: 0s
813| nbstat: NetBIOS name: TITAN, NetBIOS user: <unknown>, NetBIOS MAC: <unknown> (unknown)
814| Names:
815| TITAN<00> Flags: <unique><active>
816| TITAN<03> Flags: <unique><active>
817| TITAN<20> Flags: <unique><active>
818| \x01\x02__MSBROWSE__\x02<01> Flags: <group><active>
819| WORKGROUP<00> Flags: <group><active>
820| WORKGROUP<1d> Flags: <unique><active>
821|_ WORKGROUP<1e> Flags: <group><active>
822| smb-os-discovery:
823| OS: Windows 6.1 (Samba 4.2.14-Debian)
824| Computer name: titan
825| NetBIOS computer name: TITAN\x00
826| Domain name: \x00
827| FQDN: titan
828|_ System time: 2020-03-28T16:17:20+01:00
829| smb-security-mode:
830| account_used: guest
831| authentication_level: user
832| challenge_response: supported
833|_ message_signing: disabled (dangerous, but default)
834| smb2-security-mode:
835| 2.02:
836|_ Message signing enabled but not required
837| smb2-time:
838| date: 2020-03-28T15:17:20
839|_ start_date: N/A
840
841NSE: Script Post-scanning.
842Initiating NSE at 16:18
843Completed NSE at 16:18, 0.00s elapsed
844Initiating NSE at 16:18
845Completed NSE at 16:18, 0.00s elapsed
846Initiating NSE at 16:18
847Completed NSE at 16:18, 0.00s elapsed
848Post-scan script results:
849| clock-skew:
850| 0s:
851| 192.168.1.1
852|_ 192.168.1.199
853Read data files from: /data/data/com.termux/files/usr/bin/../share/nmap
854Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
855Nmap done: 255 IP addresses (9 hosts up) scanned in 321.19 seconds
856$