· 7 years ago · Nov 27, 2017, 06:42 PM
1# Nmap 7.60 scan initiated Mon Nov 27 18:11:29 2017 as: nmap -v -sV -oA subnet_1 192.168.1.0/24
2Nmap scan report for 192.168.1.0 [host down]
3Nmap scan report for 192.168.1.3 [host down]
4Nmap scan report for 192.168.1.4 [host down]
5Nmap scan report for 192.168.1.5 [host down]
6Nmap scan report for 192.168.1.6 [host down]
7Nmap scan report for 192.168.1.7 [host down]
8Nmap scan report for 192.168.1.8 [host down]
9Nmap scan report for 192.168.1.9 [host down]
10Nmap scan report for 192.168.1.10 [host down]
11Nmap scan report for 192.168.1.11 [host down]
12Nmap scan report for 192.168.1.12 [host down]
13Nmap scan report for 192.168.1.13 [host down]
14Nmap scan report for 192.168.1.14 [host down]
15Nmap scan report for 192.168.1.15 [host down]
16Nmap scan report for 192.168.1.17 [host down]
17Nmap scan report for 192.168.1.18 [host down]
18Nmap scan report for 192.168.1.19 [host down]
19Nmap scan report for 192.168.1.20 [host down]
20Nmap scan report for 192.168.1.24 [host down]
21Nmap scan report for 192.168.1.25 [host down]
22Nmap scan report for 192.168.1.26 [host down]
23Nmap scan report for 192.168.1.27 [host down]
24Nmap scan report for 192.168.1.28 [host down]
25Nmap scan report for 192.168.1.29 [host down]
26Nmap scan report for 192.168.1.30 [host down]
27Nmap scan report for 192.168.1.31 [host down]
28Nmap scan report for 192.168.1.33 [host down]
29Nmap scan report for 192.168.1.34 [host down]
30Nmap scan report for 192.168.1.35 [host down]
31Nmap scan report for 192.168.1.37 [host down]
32Nmap scan report for 192.168.1.41 [host down]
33Nmap scan report for 192.168.1.46 [host down]
34Nmap scan report for 192.168.1.47 [host down]
35Nmap scan report for 192.168.1.49 [host down]
36Nmap scan report for 192.168.1.50 [host down]
37Nmap scan report for 192.168.1.51 [host down]
38Nmap scan report for 192.168.1.52 [host down]
39Nmap scan report for 192.168.1.54 [host down]
40Nmap scan report for 192.168.1.56 [host down]
41Nmap scan report for 192.168.1.60 [host down]
42Nmap scan report for 192.168.1.63 [host down]
43Nmap scan report for 192.168.1.70 [host down]
44Nmap scan report for 192.168.1.71 [host down]
45Nmap scan report for 192.168.1.72 [host down]
46Nmap scan report for 192.168.1.73 [host down]
47Nmap scan report for 192.168.1.74 [host down]
48Nmap scan report for 192.168.1.77 [host down]
49Nmap scan report for 192.168.1.78 [host down]
50Nmap scan report for 192.168.1.79 [host down]
51Nmap scan report for 192.168.1.80 [host down]
52Nmap scan report for 192.168.1.81 [host down]
53Nmap scan report for 192.168.1.84 [host down]
54Nmap scan report for 192.168.1.85 [host down]
55Nmap scan report for 192.168.1.86 [host down]
56Nmap scan report for 192.168.1.87 [host down]
57Nmap scan report for 192.168.1.88 [host down]
58Nmap scan report for 192.168.1.89 [host down]
59Nmap scan report for 192.168.1.90 [host down]
60Nmap scan report for 192.168.1.91 [host down]
61Nmap scan report for 192.168.1.92 [host down]
62Nmap scan report for 192.168.1.93 [host down]
63Nmap scan report for 192.168.1.94 [host down]
64Nmap scan report for 192.168.1.95 [host down]
65Nmap scan report for 192.168.1.96 [host down]
66Nmap scan report for 192.168.1.97 [host down]
67Nmap scan report for 192.168.1.98 [host down]
68Nmap scan report for 192.168.1.99 [host down]
69Nmap scan report for 192.168.1.100 [host down]
70Nmap scan report for 192.168.1.101 [host down]
71Nmap scan report for 192.168.1.102 [host down]
72Nmap scan report for 192.168.1.103 [host down]
73Nmap scan report for 192.168.1.104 [host down]
74Nmap scan report for 192.168.1.105 [host down]
75Nmap scan report for 192.168.1.106 [host down]
76Nmap scan report for 192.168.1.107 [host down]
77Nmap scan report for 192.168.1.108 [host down]
78Nmap scan report for 192.168.1.109 [host down]
79Nmap scan report for 192.168.1.110 [host down]
80Nmap scan report for 192.168.1.111 [host down]
81Nmap scan report for 192.168.1.112 [host down]
82Nmap scan report for 192.168.1.113 [host down]
83Nmap scan report for 192.168.1.114 [host down]
84Nmap scan report for 192.168.1.115 [host down]
85Nmap scan report for 192.168.1.116 [host down]
86Nmap scan report for 192.168.1.117 [host down]
87Nmap scan report for 192.168.1.118 [host down]
88Nmap scan report for 192.168.1.119 [host down]
89Nmap scan report for 192.168.1.120 [host down]
90Nmap scan report for 192.168.1.121 [host down]
91Nmap scan report for 192.168.1.122 [host down]
92Nmap scan report for 192.168.1.123 [host down]
93Nmap scan report for 192.168.1.124 [host down]
94Nmap scan report for 192.168.1.125 [host down]
95Nmap scan report for 192.168.1.126 [host down]
96Nmap scan report for 192.168.1.127 [host down]
97Nmap scan report for 192.168.1.128 [host down]
98Nmap scan report for 192.168.1.129 [host down]
99Nmap scan report for 192.168.1.130 [host down]
100Nmap scan report for 192.168.1.131 [host down]
101Nmap scan report for 192.168.1.132 [host down]
102Nmap scan report for 192.168.1.133 [host down]
103Nmap scan report for 192.168.1.134 [host down]
104Nmap scan report for 192.168.1.135 [host down]
105Nmap scan report for 192.168.1.136 [host down]
106Nmap scan report for 192.168.1.137 [host down]
107Nmap scan report for 192.168.1.138 [host down]
108Nmap scan report for 192.168.1.139 [host down]
109Nmap scan report for 192.168.1.140 [host down]
110Nmap scan report for 192.168.1.142 [host down]
111Nmap scan report for 192.168.1.143 [host down]
112Nmap scan report for 192.168.1.147 [host down]
113Nmap scan report for 192.168.1.148 [host down]
114Nmap scan report for 192.168.1.150 [host down]
115Nmap scan report for 192.168.1.151 [host down]
116Nmap scan report for 192.168.1.152 [host down]
117Nmap scan report for 192.168.1.153 [host down]
118Nmap scan report for 192.168.1.154 [host down]
119Nmap scan report for 192.168.1.155 [host down]
120Nmap scan report for 192.168.1.156 [host down]
121Nmap scan report for 192.168.1.157 [host down]
122Nmap scan report for 192.168.1.158 [host down]
123Nmap scan report for 192.168.1.159 [host down]
124Nmap scan report for 192.168.1.161 [host down]
125Nmap scan report for 192.168.1.162 [host down]
126Nmap scan report for 192.168.1.163 [host down]
127Nmap scan report for 192.168.1.164 [host down]
128Nmap scan report for 192.168.1.165 [host down]
129Nmap scan report for 192.168.1.166 [host down]
130Nmap scan report for 192.168.1.167 [host down]
131Nmap scan report for 192.168.1.168 [host down]
132Nmap scan report for 192.168.1.169 [host down]
133Nmap scan report for 192.168.1.170 [host down]
134Nmap scan report for 192.168.1.171 [host down]
135Nmap scan report for 192.168.1.172 [host down]
136Nmap scan report for 192.168.1.173 [host down]
137Nmap scan report for 192.168.1.174 [host down]
138Nmap scan report for 192.168.1.175 [host down]
139Nmap scan report for 192.168.1.176 [host down]
140Nmap scan report for 192.168.1.177 [host down]
141Nmap scan report for 192.168.1.178 [host down]
142Nmap scan report for 192.168.1.180 [host down]
143Nmap scan report for 192.168.1.181 [host down]
144Nmap scan report for 192.168.1.182 [host down]
145Nmap scan report for 192.168.1.183 [host down]
146Nmap scan report for 192.168.1.184 [host down]
147Nmap scan report for 192.168.1.185 [host down]
148Nmap scan report for 192.168.1.186 [host down]
149Nmap scan report for 192.168.1.187 [host down]
150Nmap scan report for 192.168.1.188 [host down]
151Nmap scan report for 192.168.1.189 [host down]
152Nmap scan report for 192.168.1.190 [host down]
153Nmap scan report for 192.168.1.191 [host down]
154Nmap scan report for 192.168.1.192 [host down]
155Nmap scan report for 192.168.1.193 [host down]
156Nmap scan report for 192.168.1.194 [host down]
157Nmap scan report for 192.168.1.195 [host down]
158Nmap scan report for 192.168.1.196 [host down]
159Nmap scan report for 192.168.1.197 [host down]
160Nmap scan report for 192.168.1.198 [host down]
161Nmap scan report for 192.168.1.199 [host down]
162Nmap scan report for 192.168.1.200 [host down]
163Nmap scan report for 192.168.1.201 [host down]
164Nmap scan report for 192.168.1.202 [host down]
165Nmap scan report for 192.168.1.203 [host down]
166Nmap scan report for 192.168.1.204 [host down]
167Nmap scan report for 192.168.1.205 [host down]
168Nmap scan report for 192.168.1.206 [host down]
169Nmap scan report for 192.168.1.207 [host down]
170Nmap scan report for 192.168.1.208 [host down]
171Nmap scan report for 192.168.1.209 [host down]
172Nmap scan report for 192.168.1.210 [host down]
173Nmap scan report for 192.168.1.211 [host down]
174Nmap scan report for 192.168.1.212 [host down]
175Nmap scan report for 192.168.1.213 [host down]
176Nmap scan report for 192.168.1.214 [host down]
177Nmap scan report for 192.168.1.215 [host down]
178Nmap scan report for 192.168.1.216 [host down]
179Nmap scan report for 192.168.1.217 [host down]
180Nmap scan report for 192.168.1.218 [host down]
181Nmap scan report for 192.168.1.219 [host down]
182Nmap scan report for 192.168.1.220 [host down]
183Nmap scan report for 192.168.1.221 [host down]
184Nmap scan report for 192.168.1.222 [host down]
185Nmap scan report for 192.168.1.230 [host down]
186Nmap scan report for 192.168.1.232 [host down]
187Nmap scan report for 192.168.1.233 [host down]
188Nmap scan report for 192.168.1.234 [host down]
189Nmap scan report for 192.168.1.242 [host down]
190Nmap scan report for 192.168.1.246 [host down]
191Nmap scan report for 192.168.1.247 [host down]
192Nmap scan report for 192.168.1.249 [host down]
193Nmap scan report for 192.168.1.250 [host down]
194Nmap scan report for 192.168.1.252 [host down]
195Nmap scan report for 192.168.1.253 [host down]
196Increasing send delay for 192.168.1.38 from 0 to 5 due to 11 out of 32 dropped probes since last increase.
197Increasing send delay for 192.168.1.16 from 0 to 5 due to 11 out of 24 dropped probes since last increase.
198Increasing send delay for 192.168.1.2 from 0 to 5 due to 11 out of 36 dropped probes since last increase.
199Increasing send delay for 192.168.1.23 from 0 to 5 due to 11 out of 36 dropped probes since last increase.
200Increasing send delay for 192.168.1.21 from 0 to 5 due to 12 out of 39 dropped probes since last increase.
201Increasing send delay for 192.168.1.236 from 0 to 5 due to 11 out of 22 dropped probes since last increase.
202Increasing send delay for 192.168.1.238 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
203Increasing send delay for 192.168.1.237 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
204Increasing send delay for 192.168.1.36 from 0 to 5 due to 13 out of 42 dropped probes since last increase.
205Increasing send delay for 192.168.1.32 from 0 to 5 due to 13 out of 41 dropped probes since last increase.
206Increasing send delay for 192.168.1.53 from 0 to 5 due to 11 out of 22 dropped probes since last increase.
207Increasing send delay for 192.168.1.55 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
208Increasing send delay for 192.168.1.146 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
209Increasing send delay for 192.168.1.145 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
210Increasing send delay for 192.168.1.160 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
211Increasing send delay for 192.168.1.235 from 0 to 5 due to 11 out of 22 dropped probes since last increase.
212Increasing send delay for 192.168.1.22 from 0 to 5 due to 12 out of 39 dropped probes since last increase.
213Increasing send delay for 192.168.1.48 from 0 to 5 due to 11 out of 29 dropped probes since last increase.
214Increasing send delay for 192.168.1.57 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
215Increasing send delay for 192.168.1.1 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
216Increasing send delay for 192.168.1.16 from 5 to 10 due to 11 out of 16 dropped probes since last increase.
217Increasing send delay for 192.168.1.83 from 0 to 5 due to 11 out of 24 dropped probes since last increase.
218Increasing send delay for 192.168.1.255 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
219Increasing send delay for 192.168.1.2 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
220Increasing send delay for 192.168.1.44 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
221Increasing send delay for 192.168.1.76 from 0 to 5 due to 11 out of 22 dropped probes since last increase.
222Increasing send delay for 192.168.1.82 from 0 to 5 due to 11 out of 22 dropped probes since last increase.
223Increasing send delay for 192.168.1.239 from 0 to 5 due to 11 out of 27 dropped probes since last increase.
224Increasing send delay for 192.168.1.141 from 0 to 5 due to 11 out of 25 dropped probes since last increase.
225Increasing send delay for 192.168.1.144 from 0 to 5 due to 11 out of 24 dropped probes since last increase.
226Increasing send delay for 192.168.1.21 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
227Increasing send delay for 192.168.1.23 from 5 to 10 due to 11 out of 19 dropped probes since last increase.
228Increasing send delay for 192.168.1.58 from 0 to 5 due to 11 out of 26 dropped probes since last increase.
229Increasing send delay for 192.168.1.223 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
230Increasing send delay for 192.168.1.224 from 0 to 5 due to 11 out of 21 dropped probes since last increase.
231Increasing send delay for 192.168.1.251 from 0 to 5 due to 11 out of 25 dropped probes since last increase.
232Increasing send delay for 192.168.1.53 from 5 to 10 due to 11 out of 19 dropped probes since last increase.
233Increasing send delay for 192.168.1.55 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
234Increasing send delay for 192.168.1.236 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
235Increasing send delay for 192.168.1.16 from 20 to 40 due to 11 out of 16 dropped probes since last increase.
236Increasing send delay for 192.168.1.43 from 0 to 5 due to 11 out of 25 dropped probes since last increase.
237Increasing send delay for 192.168.1.75 from 0 to 5 due to 11 out of 25 dropped probes since last increase.
238Increasing send delay for 192.168.1.69 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
239Increasing send delay for 192.168.1.2 from 10 to 20 due to 11 out of 17 dropped probes since last increase.
240Increasing send delay for 192.168.1.48 from 5 to 10 due to 11 out of 19 dropped probes since last increase.
241Increasing send delay for 192.168.1.235 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
242Increasing send delay for 192.168.1.1 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
243Increasing send delay for 192.168.1.22 from 5 to 10 due to 11 out of 19 dropped probes since last increase.
244Increasing send delay for 192.168.1.68 from 0 to 5 due to 11 out of 25 dropped probes since last increase.
245Increasing send delay for 192.168.1.21 from 10 to 20 due to 11 out of 18 dropped probes since last increase.
246Increasing send delay for 192.168.1.82 from 5 to 10 due to 11 out of 17 dropped probes since last increase.
247Increasing send delay for 192.168.1.76 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
248Increasing send delay for 192.168.1.39 from 0 to 5 due to 14 out of 46 dropped probes since last increase.
249Increasing send delay for 192.168.1.61 from 0 to 5 due to 11 out of 22 dropped probes since last increase.
250Increasing send delay for 192.168.1.83 from 5 to 10 due to 11 out of 19 dropped probes since last increase.
251Increasing send delay for 192.168.1.44 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
252Increasing send delay for 192.168.1.240 from 0 to 5 due to 11 out of 31 dropped probes since last increase.
253Increasing send delay for 192.168.1.16 from 80 to 160 due to 11 out of 15 dropped probes since last increase.
254Increasing send delay for 192.168.1.238 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
255Increasing send delay for 192.168.1.38 from 5 to 10 due to 11 out of 22 dropped probes since last increase.
256Increasing send delay for 192.168.1.32 from 5 to 10 due to 11 out of 19 dropped probes since last increase.
257Increasing send delay for 192.168.1.62 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
258Increasing send delay for 192.168.1.42 from 0 to 5 due to 11 out of 29 dropped probes since last increase.
259Increasing send delay for 192.168.1.40 from 0 to 5 due to 15 out of 49 dropped probes since last increase.
260Increasing send delay for 192.168.1.64 from 0 to 5 due to 11 out of 23 dropped probes since last increase.
261Increasing send delay for 192.168.1.224 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
262Increasing send delay for 192.168.1.145 from 5 to 10 due to 11 out of 22 dropped probes since last increase.
263Increasing send delay for 192.168.1.237 from 5 to 10 due to 11 out of 19 dropped probes since last increase.
264Increasing send delay for 192.168.1.255 from 5 to 10 due to 11 out of 22 dropped probes since last increase.
265Increasing send delay for 192.168.1.2 from 20 to 40 due to 11 out of 18 dropped probes since last increase.
266Increasing send delay for 192.168.1.53 from 10 to 20 due to 11 out of 21 dropped probes since last increase.
267Increasing send delay for 192.168.1.251 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
268Increasing send delay for 192.168.1.66 from 0 to 5 due to 13 out of 41 dropped probes since last increase.
269Increasing send delay for 192.168.1.67 from 0 to 5 due to 12 out of 39 dropped probes since last increase.
270Increasing send delay for 192.168.1.149 from 0 to 5 due to 25 out of 83 dropped probes since last increase.
271Increasing send delay for 192.168.1.146 from 5 to 10 due to 11 out of 21 dropped probes since last increase.
272Increasing send delay for 192.168.1.160 from 5 to 10 due to 11 out of 21 dropped probes since last increase.
273Increasing send delay for 192.168.1.223 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
274Increasing send delay for 192.168.1.23 from 10 to 20 due to 11 out of 20 dropped probes since last increase.
275Increasing send delay for 192.168.1.48 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
276Increasing send delay for 192.168.1.75 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
277Increasing send delay for 192.168.1.1 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
278Increasing send delay for 192.168.1.55 from 10 to 20 due to 11 out of 20 dropped probes since last increase.
279Increasing send delay for 192.168.1.57 from 5 to 10 due to 11 out of 22 dropped probes since last increase.
280Increasing send delay for 192.168.1.235 from 10 to 20 due to 11 out of 17 dropped probes since last increase.
281Increasing send delay for 192.168.1.69 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
282Increasing send delay for 192.168.1.21 from 20 to 40 due to 11 out of 17 dropped probes since last increase.
283Increasing send delay for 192.168.1.44 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
284Increasing send delay for 192.168.1.239 from 5 to 10 due to 11 out of 23 dropped probes since last increase.
285Increasing send delay for 192.168.1.236 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
286Increasing send delay for 192.168.1.43 from 5 to 10 due to 11 out of 21 dropped probes since last increase.
287Increasing send delay for 192.168.1.141 from 5 to 10 due to 11 out of 23 dropped probes since last increase.
288Increasing send delay for 192.168.1.83 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
289Increasing send delay for 192.168.1.82 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
290Increasing send delay for 192.168.1.2 from 40 to 80 due to 11 out of 16 dropped probes since last increase.
291Increasing send delay for 192.168.1.62 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
292Increasing send delay for 192.168.1.144 from 5 to 10 due to 11 out of 21 dropped probes since last increase.
293Increasing send delay for 192.168.1.61 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
294Increasing send delay for 192.168.1.36 from 5 to 10 due to 11 out of 21 dropped probes since last increase.
295Increasing send delay for 192.168.1.58 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
296Increasing send delay for 192.168.1.237 from 10 to 20 due to 11 out of 17 dropped probes since last increase.
297Increasing send delay for 192.168.1.76 from 10 to 20 due to 11 out of 20 dropped probes since last increase.
298Increasing send delay for 192.168.1.68 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
299Increasing send delay for 192.168.1.42 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
300Increasing send delay for 192.168.1.223 from 10 to 20 due to 11 out of 18 dropped probes since last increase.
301Increasing send delay for 192.168.1.224 from 10 to 20 due to 11 out of 18 dropped probes since last increase.
302Increasing send delay for 192.168.1.1 from 20 to 40 due to 11 out of 17 dropped probes since last increase.
303Increasing send delay for 192.168.1.22 from 10 to 20 due to 11 out of 21 dropped probes since last increase.
304Increasing send delay for 192.168.1.53 from 20 to 40 due to 11 out of 17 dropped probes since last increase.
305Increasing send delay for 192.168.1.236 from 20 to 40 due to 11 out of 17 dropped probes since last increase.
306Increasing send delay for 192.168.1.251 from 10 to 20 due to 11 out of 21 dropped probes since last increase.
307Increasing send delay for 192.168.1.75 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
308Increasing send delay for 192.168.1.48 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
309Increasing send delay for 192.168.1.160 from 10 to 20 due to 11 out of 18 dropped probes since last increase.
310Increasing send delay for 192.168.1.235 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
311Increasing send delay for 192.168.1.238 from 10 to 20 due to 11 out of 24 dropped probes since last increase.
312Increasing send delay for 192.168.1.39 from 5 to 10 due to 11 out of 22 dropped probes since last increase.
313Increasing send delay for 192.168.1.66 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
314Increasing send delay for 192.168.1.23 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
315Increasing send delay for 192.168.1.67 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
316Increasing send delay for 192.168.1.32 from 10 to 20 due to 11 out of 21 dropped probes since last increase.
317Increasing send delay for 192.168.1.38 from 10 to 20 due to 11 out of 23 dropped probes since last increase.
318Increasing send delay for 192.168.1.57 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
319Increasing send delay for 192.168.1.55 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
320Increasing send delay for 192.168.1.64 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
321Increasing send delay for 192.168.1.40 from 5 to 10 due to 11 out of 21 dropped probes since last increase.
322Increasing send delay for 192.168.1.44 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
323Increasing send delay for 192.168.1.43 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
324Increasing send delay for 192.168.1.83 from 20 to 40 due to 11 out of 19 dropped probes since last increase.
325Increasing send delay for 192.168.1.239 from 10 to 20 due to 11 out of 21 dropped probes since last increase.
326Increasing send delay for 192.168.1.21 from 40 to 80 due to 11 out of 18 dropped probes since last increase.
327Increasing send delay for 192.168.1.2 from 80 to 160 due to 11 out of 18 dropped probes since last increase.
328Increasing send delay for 192.168.1.146 from 10 to 20 due to 11 out of 22 dropped probes since last increase.
329Increasing send delay for 192.168.1.149 from 5 to 10 due to 11 out of 24 dropped probes since last increase.
330Increasing send delay for 192.168.1.145 from 10 to 20 due to 11 out of 23 dropped probes since last increase.
331Increasing send delay for 192.168.1.237 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
332Increasing send delay for 192.168.1.240 from 5 to 10 due to 11 out of 20 dropped probes since last increase.
333Increasing send delay for 192.168.1.235 from 40 to 80 due to 11 out of 18 dropped probes since last increase.
334Increasing send delay for 192.168.1.236 from 40 to 80 due to 11 out of 17 dropped probes since last increase.
335Increasing send delay for 192.168.1.62 from 10 to 20 due to 11 out of 18 dropped probes since last increase.
336Increasing send delay for 192.168.1.1 from 40 to 80 due to 11 out of 18 dropped probes since last increase.
337Increasing send delay for 192.168.1.36 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
338Increasing send delay for 192.168.1.22 from 20 to 40 due to 11 out of 19 dropped probes since last increase.
339Increasing send delay for 192.168.1.58 from 10 to 20 due to 11 out of 20 dropped probes since last increase.
340Increasing send delay for 192.168.1.61 from 10 to 20 due to 11 out of 21 dropped probes since last increase.
341Increasing send delay for 192.168.1.144 from 10 to 20 due to 11 out of 20 dropped probes since last increase.
342Increasing send delay for 192.168.1.255 from 10 to 20 due to 11 out of 23 dropped probes since last increase.
343Increasing send delay for 192.168.1.42 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
344Increasing send delay for 192.168.1.82 from 20 to 40 due to 11 out of 21 dropped probes since last increase.
345Increasing send delay for 192.168.1.69 from 10 to 20 due to 11 out of 24 dropped probes since last increase.
346Increasing send delay for 192.168.1.66 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
347Increasing send delay for 192.168.1.68 from 10 to 20 due to 11 out of 23 dropped probes since last increase.
348Increasing send delay for 192.168.1.223 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
349Increasing send delay for 192.168.1.251 from 20 to 40 due to 11 out of 23 dropped probes since last increase.
350Increasing send delay for 192.168.1.43 from 20 to 40 due to 11 out of 18 dropped probes since last increase.
351Increasing send delay for 192.168.1.67 from 10 to 20 due to 11 out of 18 dropped probes since last increase.
352Increasing send delay for 192.168.1.64 from 10 to 20 due to 11 out of 19 dropped probes since last increase.
353Increasing send delay for 192.168.1.160 from 20 to 40 due to 11 out of 19 dropped probes since last increase.
354Increasing send delay for 192.168.1.224 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
355Increasing send delay for 192.168.1.238 from 20 to 40 due to 11 out of 19 dropped probes since last increase.
356Increasing send delay for 192.168.1.23 from 40 to 80 due to 11 out of 20 dropped probes since last increase.
357Increasing send delay for 192.168.1.21 from 80 to 160 due to 11 out of 18 dropped probes since last increase.
358Increasing send delay for 192.168.1.48 from 40 to 80 due to 11 out of 21 dropped probes since last increase.
359Increasing send delay for 192.168.1.76 from 20 to 40 due to 11 out of 19 dropped probes since last increase.
360Increasing send delay for 192.168.1.53 from 40 to 80 due to 11 out of 23 dropped probes since last increase.
361Increasing send delay for 192.168.1.44 from 40 to 80 due to 11 out of 21 dropped probes since last increase.
362Increasing send delay for 192.168.1.146 from 20 to 40 due to 11 out of 18 dropped probes since last increase.
363Increasing send delay for 192.168.1.235 from 80 to 160 due to 11 out of 17 dropped probes since last increase.
364Increasing send delay for 192.168.1.1 from 80 to 160 due to 11 out of 17 dropped probes since last increase.
365Increasing send delay for 192.168.1.2 from 160 to 320 due to 11 out of 21 dropped probes since last increase.
366Increasing send delay for 192.168.1.248 from 0 to 5 due to 37 out of 122 dropped probes since last increase.
367Increasing send delay for 192.168.1.38 from 20 to 40 due to 11 out of 18 dropped probes since last increase.
368Increasing send delay for 192.168.1.22 from 40 to 80 due to 11 out of 17 dropped probes since last increase.
369Increasing send delay for 192.168.1.141 from 10 to 20 due to 11 out of 22 dropped probes since last increase.
370Increasing send delay for 192.168.1.32 from 20 to 40 due to 11 out of 21 dropped probes since last increase.
371Increasing send delay for 192.168.1.57 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
372Increasing send delay for 192.168.1.55 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
373Increasing send delay for 192.168.1.69 from 20 to 40 due to 11 out of 19 dropped probes since last increase.
374Increasing send delay for 192.168.1.66 from 20 to 40 due to 11 out of 19 dropped probes since last increase.
375Increasing send delay for 192.168.1.75 from 20 to 40 due to 11 out of 23 dropped probes since last increase.
376Increasing send delay for 192.168.1.223 from 40 to 80 due to 11 out of 17 dropped probes since last increase.
377Increasing send delay for 192.168.1.237 from 40 to 80 due to 11 out of 20 dropped probes since last increase.
378Increasing send delay for 192.168.1.39 from 10 to 20 due to 11 out of 24 dropped probes since last increase.
379Increasing send delay for 192.168.1.48 from 80 to 160 due to 11 out of 18 dropped probes since last increase.
380Increasing send delay for 192.168.1.67 from 20 to 40 due to 11 out of 19 dropped probes since last increase.
381Increasing send delay for 192.168.1.68 from 20 to 40 due to 11 out of 18 dropped probes since last increase.
382Increasing send delay for 192.168.1.149 from 10 to 20 due to 11 out of 22 dropped probes since last increase.
383Increasing send delay for 192.168.1.224 from 40 to 80 due to 11 out of 17 dropped probes since last increase.
384Increasing send delay for 192.168.1.53 from 80 to 160 due to 11 out of 18 dropped probes since last increase.
385Increasing send delay for 192.168.1.145 from 20 to 40 due to 11 out of 21 dropped probes since last increase.
386Increasing send delay for 192.168.1.239 from 20 to 40 due to 11 out of 22 dropped probes since last increase.
387Increasing send delay for 192.168.1.240 from 10 to 20 due to 11 out of 21 dropped probes since last increase.
388Increasing send delay for 192.168.1.23 from 80 to 160 due to 11 out of 20 dropped probes since last increase.
389Increasing send delay for 192.168.1.251 from 40 to 80 due to 11 out of 20 dropped probes since last increase.
390Increasing send delay for 192.168.1.236 from 80 to 160 due to 11 out of 20 dropped probes since last increase.
391Increasing send delay for 192.168.1.248 from 5 to 10 due to 11 out of 18 dropped probes since last increase.
392Increasing send delay for 192.168.1.40 from 10 to 20 due to 11 out of 22 dropped probes since last increase.
393Increasing send delay for 192.168.1.83 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
394Increasing send delay for 192.168.1.144 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
395Increasing send delay for 192.168.1.64 from 20 to 40 due to 11 out of 19 dropped probes since last increase.
396Increasing send delay for 192.168.1.58 from 20 to 40 due to 11 out of 18 dropped probes since last increase.
397Increasing send delay for 192.168.1.62 from 20 to 40 due to 11 out of 20 dropped probes since last increase.
398Increasing send delay for 192.168.1.160 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
399Increasing send delay for 192.168.1.255 from 20 to 40 due to 11 out of 23 dropped probes since last increase.
400Increasing send delay for 192.168.1.245 from 0 to 5 due to 37 out of 123 dropped probes since last increase.
401Increasing send delay for 192.168.1.42 from 20 to 40 due to 11 out of 21 dropped probes since last increase.
402Increasing send delay for 192.168.1.141 from 20 to 40 due to 11 out of 19 dropped probes since last increase.
403Increasing send delay for 192.168.1.43 from 40 to 80 due to 11 out of 20 dropped probes since last increase.
404Increasing send delay for 192.168.1.146 from 40 to 80 due to 11 out of 20 dropped probes since last increase.
405Increasing send delay for 192.168.1.82 from 40 to 80 due to 11 out of 22 dropped probes since last increase.
406Increasing send delay for 192.168.1.237 from 80 to 160 due to 11 out of 18 dropped probes since last increase.
407Increasing send delay for 192.168.1.238 from 40 to 80 due to 11 out of 23 dropped probes since last increase.
408Increasing send delay for 192.168.1.1 from 160 to 320 due to 11 out of 23 dropped probes since last increase.
409Increasing send delay for 192.168.1.61 from 20 to 40 due to 11 out of 24 dropped probes since last increase.
410Increasing send delay for 192.168.1.66 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
411Increasing send delay for 192.168.1.22 from 80 to 160 due to 11 out of 21 dropped probes since last increase.
412Increasing send delay for 192.168.1.144 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
413Increasing send delay for 192.168.1.76 from 40 to 80 due to 11 out of 23 dropped probes since last increase.
414Increasing send delay for 192.168.1.235 from 160 to 320 due to 11 out of 23 dropped probes since last increase.
415Increasing send delay for 192.168.1.38 from 40 to 80 due to 11 out of 23 dropped probes since last increase.
416Increasing send delay for 192.168.1.57 from 40 to 80 due to 11 out of 20 dropped probes since last increase.
417Increasing send delay for 192.168.1.64 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
418Increasing send delay for 192.168.1.39 from 20 to 40 due to 11 out of 24 dropped probes since last increase.
419Increasing send delay for 192.168.1.21 from 160 to 320 due to 11 out of 26 dropped probes since last increase.
420Increasing send delay for 192.168.1.58 from 40 to 80 due to 11 out of 18 dropped probes since last increase.
421Increasing send delay for 192.168.1.145 from 40 to 80 due to 11 out of 20 dropped probes since last increase.
422Increasing send delay for 192.168.1.149 from 20 to 40 due to 11 out of 22 dropped probes since last increase.
423Increasing send delay for 192.168.1.62 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
424Increasing send delay for 192.168.1.141 from 40 to 80 due to 11 out of 18 dropped probes since last increase.
425Increasing send delay for 192.168.1.32 from 40 to 80 due to 11 out of 24 dropped probes since last increase.
426Increasing send delay for 192.168.1.36 from 20 to 40 due to 11 out of 24 dropped probes since last increase.
427Increasing send delay for 192.168.1.55 from 80 to 160 due to 11 out of 19 dropped probes since last increase.
428Increasing send delay for 192.168.1.83 from 80 to 160 due to 11 out of 20 dropped probes since last increase.
429Increasing send delay for 192.168.1.236 from 160 to 320 due to 11 out of 23 dropped probes since last increase.
430Increasing send delay for 192.168.1.61 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
431Increasing send delay for 192.168.1.75 from 40 to 80 due to 11 out of 22 dropped probes since last increase.
432Increasing send delay for 192.168.1.58 from 80 to 160 due to 11 out of 20 dropped probes since last increase.
433Increasing send delay for 192.168.1.146 from 80 to 160 due to 11 out of 22 dropped probes since last increase.
434Increasing send delay for 192.168.1.223 from 80 to 160 due to 11 out of 24 dropped probes since last increase.
435Increasing send delay for 192.168.1.160 from 80 to 160 due to 11 out of 20 dropped probes since last increase.
436Increasing send delay for 192.168.1.240 from 20 to 40 due to 11 out of 22 dropped probes since last increase.
437Increasing send delay for 192.168.1.238 from 80 to 160 due to 11 out of 19 dropped probes since last increase.
438Increasing send delay for 192.168.1.239 from 40 to 80 due to 11 out of 20 dropped probes since last increase.
439Increasing send delay for 192.168.1.144 from 80 to 160 due to 11 out of 18 dropped probes since last increase.
440Increasing send delay for 192.168.1.82 from 80 to 160 due to 11 out of 18 dropped probes since last increase.
441Increasing send delay for 192.168.1.69 from 40 to 80 due to 11 out of 22 dropped probes since last increase.
442Increasing send delay for 192.168.1.67 from 40 to 80 due to 11 out of 22 dropped probes since last increase.
443Increasing send delay for 192.168.1.40 from 20 to 40 due to 11 out of 24 dropped probes since last increase.
444Increasing send delay for 192.168.1.42 from 40 to 80 due to 11 out of 22 dropped probes since last increase.
445Increasing send delay for 192.168.1.23 from 160 to 320 due to 11 out of 26 dropped probes since last increase.
446Increasing send delay for 192.168.1.44 from 80 to 160 due to 11 out of 26 dropped probes since last increase.
447Increasing send delay for 192.168.1.39 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
448Increasing send delay for 192.168.1.38 from 80 to 160 due to 11 out of 18 dropped probes since last increase.
449Increasing send delay for 192.168.1.43 from 80 to 160 due to 11 out of 25 dropped probes since last increase.
450Increasing send delay for 192.168.1.141 from 80 to 160 due to 11 out of 21 dropped probes since last increase.
451Increasing send delay for 192.168.1.76 from 80 to 160 due to 11 out of 20 dropped probes since last increase.
452Increasing send delay for 192.168.1.224 from 80 to 160 due to 11 out of 21 dropped probes since last increase.
453Increasing send delay for 192.168.1.248 from 10 to 20 due to 11 out of 21 dropped probes since last increase.
454Increasing send delay for 192.168.1.36 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
455Increasing send delay for 192.168.1.255 from 40 to 80 due to 11 out of 23 dropped probes since last increase.
456Increasing send delay for 192.168.1.251 from 80 to 160 due to 11 out of 27 dropped probes since last increase.
457Increasing send delay for 192.168.1.62 from 80 to 160 due to 11 out of 21 dropped probes since last increase.
458Increasing send delay for 192.168.1.66 from 80 to 160 due to 11 out of 21 dropped probes since last increase.
459Increasing send delay for 192.168.1.145 from 80 to 160 due to 11 out of 21 dropped probes since last increase.
460Increasing send delay for 192.168.1.32 from 80 to 160 due to 11 out of 20 dropped probes since last increase.
461Increasing send delay for 192.168.1.64 from 80 to 160 due to 11 out of 22 dropped probes since last increase.
462Increasing send delay for 192.168.1.68 from 40 to 80 due to 11 out of 21 dropped probes since last increase.
463Increasing send delay for 192.168.1.149 from 40 to 80 due to 11 out of 22 dropped probes since last increase.
464Increasing send delay for 192.168.1.57 from 80 to 160 due to 11 out of 18 dropped probes since last increase.
465Increasing send delay for 192.168.1.61 from 80 to 160 due to 11 out of 19 dropped probes since last increase.
466Increasing send delay for 192.168.1.22 from 160 to 320 due to 11 out of 25 dropped probes since last increase.
467Increasing send delay for 192.168.1.240 from 40 to 80 due to 11 out of 19 dropped probes since last increase.
468Increasing send delay for 192.168.1.239 from 80 to 160 due to 11 out of 20 dropped probes since last increase.
469Increasing send delay for 192.168.1.243 from 0 to 5 due to 46 out of 153 dropped probes since last increase.
470Increasing send delay for 192.168.1.237 from 160 to 320 due to 11 out of 23 dropped probes since last increase.
471Increasing send delay for 192.168.1.40 from 40 to 80 due to 11 out of 21 dropped probes since last increase.
472Increasing send delay for 192.168.1.36 from 80 to 160 due to 11 out of 19 dropped probes since last increase.
473Increasing send delay for 192.168.1.149 from 80 to 160 due to 11 out of 18 dropped probes since last increase.
474Increasing send delay for 192.168.1.245 from 5 to 10 due to 11 out of 29 dropped probes since last increase.
475Increasing send delay for 192.168.1.42 from 80 to 160 due to 11 out of 22 dropped probes since last increase.
476Increasing send delay for 192.168.1.39 from 80 to 160 due to 11 out of 22 dropped probes since last increase.
477Increasing send delay for 192.168.1.146 from 160 to 320 due to 11 out of 24 dropped probes since last increase.
478Increasing send delay for 192.168.1.240 from 80 to 160 due to 11 out of 20 dropped probes since last increase.
479Increasing send delay for 192.168.1.67 from 80 to 160 due to 11 out of 19 dropped probes since last increase.
480Increasing send delay for 192.168.1.75 from 80 to 160 due to 11 out of 32 dropped probes since last increase.
481Increasing send delay for 192.168.1.61 from 160 to 320 due to 11 out of 24 dropped probes since last increase.
482Increasing send delay for 192.168.1.62 from 160 to 320 due to 11 out of 27 dropped probes since last increase.
483Increasing send delay for 192.168.1.160 from 160 to 320 due to 11 out of 31 dropped probes since last increase.
484Increasing send delay for 192.168.1.245 from 10 to 20 due to 11 out of 21 dropped probes since last increase.
485Increasing send delay for 192.168.1.238 from 160 to 320 due to 11 out of 27 dropped probes since last increase.
486Increasing send delay for 192.168.1.32 from 160 to 320 due to 11 out of 27 dropped probes since last increase.
487Increasing send delay for 192.168.1.38 from 160 to 320 due to 11 out of 28 dropped probes since last increase.
488Increasing send delay for 192.168.1.64 from 160 to 320 due to 11 out of 29 dropped probes since last increase.
489Increasing send delay for 192.168.1.243 from 5 to 10 due to 11 out of 21 dropped probes since last increase.
490Increasing send delay for 192.168.1.248 from 20 to 40 due to 11 out of 28 dropped probes since last increase.
491Increasing send delay for 192.168.1.40 from 80 to 160 due to 11 out of 24 dropped probes since last increase.
492Increasing send delay for 192.168.1.69 from 80 to 160 due to 11 out of 30 dropped probes since last increase.
493Increasing send delay for 192.168.1.144 from 160 to 320 due to 11 out of 27 dropped probes since last increase.
494Increasing send delay for 192.168.1.239 from 160 to 320 due to 11 out of 24 dropped probes since last increase.
495Increasing send delay for 192.168.1.68 from 80 to 160 due to 11 out of 24 dropped probes since last increase.
496Increasing send delay for 192.168.1.66 from 160 to 320 due to 11 out of 31 dropped probes since last increase.
497Increasing send delay for 192.168.1.36 from 160 to 320 due to 11 out of 28 dropped probes since last increase.
498Increasing send delay for 192.168.1.255 from 80 to 160 due to 11 out of 23 dropped probes since last increase.
499Increasing send delay for 192.168.1.245 from 20 to 40 due to 11 out of 23 dropped probes since last increase.
500Increasing send delay for 192.168.1.83 from 160 to 320 due to 11 out of 33 dropped probes since last increase.
501Increasing send delay for 192.168.1.248 from 40 to 80 due to 11 out of 22 dropped probes since last increase.
502Increasing send delay for 192.168.1.243 from 10 to 20 due to 11 out of 20 dropped probes since last increase.
503Increasing send delay for 192.168.1.240 from 160 to 320 due to 11 out of 26 dropped probes since last increase.
504Increasing send delay for 192.168.1.39 from 160 to 320 due to 11 out of 36 dropped probes since last increase.
505Increasing send delay for 192.168.1.245 from 40 to 80 due to 11 out of 18 dropped probes since last increase.
506Increasing send delay for 192.168.1.141 from 160 to 320 due to 11 out of 34 dropped probes since last increase.
507Increasing send delay for 192.168.1.75 from 160 to 320 due to 11 out of 29 dropped probes since last increase.
508Increasing send delay for 192.168.1.40 from 160 to 320 due to 11 out of 30 dropped probes since last increase.
509Increasing send delay for 192.168.1.67 from 160 to 320 due to 11 out of 36 dropped probes since last increase.
510Increasing send delay for 192.168.1.248 from 80 to 160 due to 11 out of 21 dropped probes since last increase.
511Increasing send delay for 192.168.1.68 from 160 to 320 due to 11 out of 32 dropped probes since last increase.
512Increasing send delay for 192.168.1.69 from 160 to 320 due to 11 out of 32 dropped probes since last increase.
513Increasing send delay for 192.168.1.245 from 80 to 160 due to 11 out of 21 dropped probes since last increase.
514Increasing send delay for 192.168.1.42 from 160 to 320 due to 13 out of 43 dropped probes since last increase.
515Increasing send delay for 192.168.1.243 from 20 to 40 due to 11 out of 22 dropped probes since last increase.
516Increasing send delay for 192.168.1.76 from 160 to 320 due to 21 out of 69 dropped probes since last increase.
517Increasing send delay for 192.168.1.223 from 160 to 320 due to 22 out of 73 dropped probes since last increase.
518Increasing send delay for 192.168.1.243 from 40 to 80 due to 11 out of 20 dropped probes since last increase.
519Increasing send delay for 192.168.1.243 from 80 to 160 due to 11 out of 24 dropped probes since last increase.
520Increasing send delay for 192.168.1.149 from 160 to 320 due to 34 out of 113 dropped probes since last increase.
521Increasing send delay for 192.168.1.145 from 160 to 320 due to 43 out of 143 dropped probes since last increase.
522Increasing send delay for 192.168.1.43 from 160 to 320 due to 46 out of 152 dropped probes since last increase.
523Increasing send delay for 192.168.1.82 from 160 to 320 due to 64 out of 213 dropped probes since last increase.
524Increasing send delay for 192.168.1.243 from 160 to 320 due to 46 out of 152 dropped probes since last increase.
525Increasing send delay for 192.168.1.245 from 160 to 320 due to 160 out of 533 dropped probes since last increase.
526Increasing send delay for 192.168.1.53 from 160 to 320 due to 199 out of 663 dropped probes since last increase.
527Increasing send delay for 192.168.1.248 from 160 to 320 due to 284 out of 946 dropped probes since last increase.
528Nmap scan report for 192.168.1.1
529Host is up (0.00044s latency).
530Not shown: 998 closed ports
531PORT STATE SERVICE VERSION
53222/tcp open tcpwrapped
533443/tcp open tcpwrapped
534
535Nmap scan report for key-15114-01.tccnet.edu (192.168.1.2)
536Host is up (0.00086s latency).
537Not shown: 997 closed ports
538PORT STATE SERVICE VERSION
53980/tcp open http TargetWeb/2011.0 (TargetOS)
540443/tcp open ssl/https?
5414001/tcp open newoak?
5421 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
543SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C58D5%P=x86_64-pc-linux-gnu%r(Get
544SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
545SF:0Nov\x202017\x2018:26:29\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
546SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
547SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
548SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
549SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:29
550SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
551SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
552SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
553SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
554SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:29\x20UTC\r\nServer:\x20Ta
555SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
556SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
557SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
558SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
559SF:27\x20Nov\x202017\x2018:26:34\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
560SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
561SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
562SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
563SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
564SF::26:34\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
565SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
566SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
567SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
568SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:31\x20UTC\r\nServer:\
569SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
570SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
571SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
572
573Nmap scan report for 192.168.1.16
574Host is up (0.0046s latency).
575Not shown: 998 closed ports
576PORT STATE SERVICE VERSION
57723/tcp open telnet
57880/tcp open tcpwrapped
5791 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
580SF-Port23-TCP:V=7.60%I=7%D=11/27%Time=5A1C58D5%P=x86_64-pc-linux-gnu%r(NUL
581SF:L,67,"\xff\xfc\x01\xff\xfc\x03\xff\xfd\x01\x1b\[2J\x1b\[H\n\r\0Siemens\
582SF:x20SEA\x20Meter\x20ION\x209350V277\x20ETH\x20ETH9350V272\n\r\0Serial#:\
583SF:x20SE-0610A006-11\n\r\n\r\0login:\x20")%r(GenericLines,75,"\xff\xfc\x01
584SF:\xff\xfc\x03\xff\xfd\x01\x1b\[2J\x1b\[H\n\r\0Siemens\x20SEA\x20Meter\x2
585SF:0ION\x209350V277\x20ETH\x20ETH9350V272\n\r\0Serial#:\x20SE-0610A006-11\
586SF:n\r\n\r\0login:\x20\r\n\r\0password:\x20")%r(tn3270,76,"\xff\xfc\x01\xf
587SF:f\xfc\x03\xff\xfd\x01\x1b\[2J\x1b\[H\n\r\0Siemens\x20SEA\x20Meter\x20IO
588SF:N\x209350V277\x20ETH\x20ETH9350V272\n\r\0Serial#:\x20SE-0610A006-11\n\r
589SF:\n\r\0login:\x20\xff\xfe\x18\xff\xfe\x19\xff\xfc\x19\xff\xfe\0\xff\xfc\
590SF:0")%r(GetRequest,83,"\xff\xfc\x01\xff\xfc\x03\xff\xfd\x01\x1b\[2J\x1b\[
591SF:H\n\r\0Siemens\x20SEA\x20Meter\x20ION\x209350V277\x20ETH\x20ETH9350V272
592SF:\n\r\0Serial#:\x20SE-0610A006-11\n\r\n\r\0login:\x20GET\x20/\x20HTTP/1\
593SF:.0\r\n\r\0password:\x20")%r(RPCCheck,93,"\xff\xfc\x01\xff\xfc\x03\xff\x
594SF:fd\x01\x1b\[2J\x1b\[H\n\r\0Siemens\x20SEA\x20Meter\x20ION\x209350V277\x
595SF:20ETH\x20ETH9350V272\n\r\0Serial#:\x20SE-0610A006-11\n\r\n\r\0login:\x2
596SF:0\x80\0\0\(r\xfe\x1d\x13\0\0\0\0\0\0\0\x02\0\x01\x86\xa0\0\x01\x97\|\0\
597SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0")%r(Help,79,"\xff\xfc\x01\xff\xfc
598SF:\x03\xff\xfd\x01\x1b\[2J\x1b\[H\n\r\0Siemens\x20SEA\x20Meter\x20ION\x20
599SF:9350V277\x20ETH\x20ETH9350V272\n\r\0Serial#:\x20SE-0610A006-11\n\r\n\r\
600SF:0login:\x20HELP\r\n\r\0password:\x20")%r(SIPOptions,8B,"\xff\xfc\x01\xf
601SF:f\xfc\x03\xff\xfd\x01\x1b\[2J\x1b\[H\n\r\0Siemens\x20SEA\x20Meter\x20IO
602SF:N\x209350V277\x20ETH\x20ETH9350V272\n\r\0Serial#:\x20SE-0610A006-11\n\r
603SF:\n\r\0login:\x20OPTIONS\x20sip:nm\x20SIP/2\.0\r\n\r\0password:\x20")%r(
604SF:NCP,7A,"\xff\xfc\x01\xff\xfc\x03\xff\xfd\x01\x1b\[2J\x1b\[H\n\r\0Siemen
605SF:s\x20SEA\x20Meter\x20ION\x209350V277\x20ETH\x20ETH9350V272\n\r\0Serial#
606SF::\x20SE-0610A006-11\n\r\n\r\0login:\x20DmdT\0\0\0\x17\0\0\0\x01\0\0\0\0
607SF:\x11\x11\0");
608
609Nmap scan report for siemensbas.tccnet.edu (192.168.1.21)
610Host is up (0.00094s latency).
611Not shown: 987 closed ports
612PORT STATE SERVICE VERSION
613135/tcp open msrpc Microsoft Windows RPC
614139/tcp open netbios-ssn Microsoft Windows netbios-ssn
615445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: TCCNET)
6161244/tcp open msrpc Microsoft Windows RPC
6171247/tcp open msrpc Microsoft Windows RPC
6181248/tcp open msrpc Microsoft Windows RPC
6192701/tcp open cmrcservice Microsoft Configuration Manager Remote Control service (CmRcService.exe)
6203389/tcp open ms-wbt-server Microsoft Terminal Services
6215033/tcp open jtnetd-server?
6226779/tcp open unknown
6238192/tcp open sophos Sophos Message Router (Interroperable Object Reference Service)
6248193/tcp open tcpwrapped
6258194/tcp open ssl/giop omg.org CORBA naming service
626Service Info: Host: SIEMENSBAS; OS: Windows; CPE: cpe:/o:microsoft:windows
627
628Nmap scan report for 192.168.1.22
629Host is up (0.00085s latency).
630Not shown: 997 closed ports
631PORT STATE SERVICE VERSION
63280/tcp open http TargetWeb/2011.0 (TargetOS)
633443/tcp open ssl/https?
6344001/tcp open newoak?
6351 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
636SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C58D5%P=x86_64-pc-linux-gnu%r(Get
637SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
638SF:0Nov\x202017\x2018:26:29\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
639SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
640SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
641SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
642SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:29
643SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
644SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
645SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
646SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
647SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:29\x20UTC\r\nServer:\x20Ta
648SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
649SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
650SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
651SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
652SF:27\x20Nov\x202017\x2018:26:34\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
653SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
654SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
655SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
656SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
657SF::26:34\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
658SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
659SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
660SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
661SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:31\x20UTC\r\nServer:\
662SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
663SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
664SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
665
666Nmap scan report for 192.168.1.23
667Host is up (0.00079s latency).
668Not shown: 997 closed ports
669PORT STATE SERVICE VERSION
67080/tcp open http TargetWeb/2011.0 (TargetOS)
671443/tcp open ssl/https?
6724001/tcp open newoak?
6731 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
674SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C58D5%P=x86_64-pc-linux-gnu%r(Get
675SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
676SF:0Nov\x202017\x2018:26:29\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
677SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
678SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
679SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
680SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:29
681SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
682SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
683SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
684SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
685SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:29\x20UTC\r\nServer:\x20Ta
686SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
687SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
688SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
689SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
690SF:27\x20Nov\x202017\x2018:26:34\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
691SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
692SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
693SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
694SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
695SF::26:34\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
696SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
697SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
698SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
699SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:31\x20UTC\r\nServer:\
700SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
701SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
702SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
703
704Nmap scan report for honeywellddc.tccnet.edu (192.168.1.32)
705Host is up (0.0012s latency).
706Not shown: 993 closed ports
707PORT STATE SERVICE VERSION
70880/tcp open http Sun Niagara httpd 1.1 (Niagara release 2.301.522.v2)
709135/tcp open msrpc Microsoft Windows RPC
710139/tcp open netbios-ssn Microsoft Windows netbios-ssn
711445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds
7122701/tcp open cmrcservice Microsoft Configuration Manager Remote Control service (CmRcService.exe)
7133011/tcp open http Tridium Niagara httpd 1.1 (Platform: NT)
7143389/tcp open ms-wbt-server Microsoft Terminal Service
715Service Info: OSs: Windows, Windows XP; Device: specialized; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_xp
716
717Nmap scan report for 192.168.1.36
718Host is up (0.00076s latency).
719Not shown: 997 closed ports
720PORT STATE SERVICE VERSION
72180/tcp open http TargetWeb/2011.0 (TargetOS)
722443/tcp open ssl/https?
7234001/tcp open newoak?
7242 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
725==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
726SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C58E0%P=x86_64-pc-linux-gnu%r(Get
727SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
728SF:0Nov\x202017\x2018:26:40\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
729SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
730SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
731SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
732SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:40
733SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
734SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
735SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
736SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
737SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:40\x20UTC\r\nServer:\x20Ta
738SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
739SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
740SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
741SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
742SF:27\x20Nov\x202017\x2018:26:45\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
743SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
744SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
745SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
746SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
747SF::26:45\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
748SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
749SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
750SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
751SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:43\x20UTC\r\nServer:\
752SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
753SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
754SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
755==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
756SF-Port443-TCP:V=7.60%T=SSL%I=7%D=11/27%Time=5A1C58EA%P=x86_64-pc-linux-gn
757SF:u%r(GetRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x
758SF:2027\x20Nov\x202017\x2018:26:50\x20UTC\r\nServer:\x20TargetWeb/2011\.0\
759SF:x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r
760SF:\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><
761SF:BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/
762SF:1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x201
763SF:8:26:53\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConne
764SF:ction:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\
765SF:r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20
766SF:Request</BODY></HTML>")%r(FourOhFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\
767SF:x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:56\x20UTC\r\n
768SF:Server:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\
769SF:nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITL
770SF:E>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HT
771SF:ML>")%r(GenericLines,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20
772SF:Mon,\x2027\x20Nov\x202017\x2018:27:08\x20UTC\r\nServer:\x20TargetWeb/20
773SF:11\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/
774SF:html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</T
775SF:ITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(RTSPRequest,F1,
776SF:"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x20201
777SF:7\x2018:27:11\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\
778SF:nConnection:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\
779SF:x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:B
780SF:ad\x20Request</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x
781SF:20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:54\x20UTC\r\nS
782SF:erver:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\n
783SF:Content-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE
784SF:>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTM
785SF:L>");
786
787Nmap scan report for 192.168.1.38
788Host is up (0.00084s latency).
789Not shown: 997 closed ports
790PORT STATE SERVICE VERSION
79180/tcp open http TargetWeb/2011.0 (TargetOS)
792443/tcp open ssl/https?
7934001/tcp open newoak?
7942 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
795==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
796SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C58E1%P=x86_64-pc-linux-gnu%r(Get
797SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
798SF:0Nov\x202017\x2018:26:42\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
799SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
800SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
801SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
802SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:42
803SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
804SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
805SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
806SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
807SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:42\x20UTC\r\nServer:\x20Ta
808SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
809SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
810SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
811SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
812SF:27\x20Nov\x202017\x2018:26:47\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
813SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
814SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
815SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
816SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
817SF::26:47\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
818SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
819SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
820SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
821SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:44\x20UTC\r\nServer:\
822SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
823SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
824SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
825==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
826SF-Port443-TCP:V=7.60%T=SSL%I=7%D=11/27%Time=5A1C58EC%P=x86_64-pc-linux-gn
827SF:u%r(GetRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x
828SF:2027\x20Nov\x202017\x2018:26:52\x20UTC\r\nServer:\x20TargetWeb/2011\.0\
829SF:x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r
830SF:\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><
831SF:BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/
832SF:1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x201
833SF:8:26:55\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConne
834SF:ction:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\
835SF:r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20
836SF:Request</BODY></HTML>")%r(FourOhFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\
837SF:x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:59\x20UTC\r\n
838SF:Server:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\
839SF:nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITL
840SF:E>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HT
841SF:ML>")%r(GenericLines,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20
842SF:Mon,\x2027\x20Nov\x202017\x2018:27:10\x20UTC\r\nServer:\x20TargetWeb/20
843SF:11\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/
844SF:html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</T
845SF:ITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(RTSPRequest,F1,
846SF:"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x20201
847SF:7\x2018:27:13\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\
848SF:nConnection:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\
849SF:x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:B
850SF:ad\x20Request</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x
851SF:20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:56\x20UTC\r\nS
852SF:erver:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\n
853SF:Content-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE
854SF:>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTM
855SF:L>");
856
857Nmap scan report for 192.168.1.39
858Host is up (0.0011s latency).
859Not shown: 997 closed ports
860PORT STATE SERVICE VERSION
86180/tcp open http TargetWeb/2011.0 (TargetOS)
862443/tcp open ssl/https?
8634001/tcp open newoak?
8642 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
865==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
866SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C58E3%P=x86_64-pc-linux-gnu%r(Get
867SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
868SF:0Nov\x202017\x2018:26:43\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
869SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
870SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
871SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
872SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:43
873SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
874SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
875SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
876SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
877SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:43\x20UTC\r\nServer:\x20Ta
878SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
879SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
880SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
881SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
882SF:27\x20Nov\x202017\x2018:26:48\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
883SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
884SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
885SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
886SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
887SF::26:48\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
888SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
889SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
890SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
891SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:45\x20UTC\r\nServer:\
892SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
893SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
894SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
895==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
896SF-Port443-TCP:V=7.60%T=SSL%I=7%D=11/27%Time=5A1C58EF%P=x86_64-pc-linux-gn
897SF:u%r(GetRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x
898SF:2027\x20Nov\x202017\x2018:26:55\x20UTC\r\nServer:\x20TargetWeb/2011\.0\
899SF:x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r
900SF:\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><
901SF:BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/
902SF:1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x201
903SF:8:26:58\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConne
904SF:ction:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\
905SF:r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20
906SF:Request</BODY></HTML>")%r(FourOhFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\
907SF:x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:01\x20UTC\r\n
908SF:Server:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\
909SF:nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITL
910SF:E>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HT
911SF:ML>")%r(GenericLines,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20
912SF:Mon,\x2027\x20Nov\x202017\x2018:27:13\x20UTC\r\nServer:\x20TargetWeb/20
913SF:11\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/
914SF:html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</T
915SF:ITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(RTSPRequest,F1,
916SF:"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x20201
917SF:7\x2018:27:16\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\
918SF:nConnection:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\
919SF:x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:B
920SF:ad\x20Request</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x
921SF:20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:59\x20UTC\r\nS
922SF:erver:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\n
923SF:Content-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE
924SF:>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTM
925SF:L>");
926
927Nmap scan report for 192.168.1.40
928Host is up (0.00079s latency).
929Not shown: 997 closed ports
930PORT STATE SERVICE VERSION
93180/tcp open http TargetWeb/2011.0 (TargetOS)
932443/tcp open ssl/https?
9334001/tcp open newoak?
9342 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
935==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
936SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C58EB%P=x86_64-pc-linux-gnu%r(Get
937SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
938SF:0Nov\x202017\x2018:26:51\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
939SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
940SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
941SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
942SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:52
943SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
944SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
945SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
946SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
947SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:26:52\x20UTC\r\nServer:\x20Ta
948SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
949SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
950SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
951SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
952SF:27\x20Nov\x202017\x2018:26:57\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
953SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
954SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
955SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
956SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
957SF::26:57\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
958SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
959SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
960SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
961SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:54\x20UTC\r\nServer:\
962SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
963SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
964SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
965==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
966SF-Port443-TCP:V=7.60%T=SSL%I=7%D=11/27%Time=5A1C58F5%P=x86_64-pc-linux-gn
967SF:u%r(GetRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x
968SF:2027\x20Nov\x202017\x2018:27:01\x20UTC\r\nServer:\x20TargetWeb/2011\.0\
969SF:x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r
970SF:\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><
971SF:BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/
972SF:1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x201
973SF:8:27:05\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConne
974SF:ction:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\
975SF:r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20
976SF:Request</BODY></HTML>")%r(FourOhFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\
977SF:x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:08\x20UTC\r\n
978SF:Server:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\
979SF:nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITL
980SF:E>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HT
981SF:ML>")%r(GenericLines,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20
982SF:Mon,\x2027\x20Nov\x202017\x2018:27:19\x20UTC\r\nServer:\x20TargetWeb/20
983SF:11\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/
984SF:html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</T
985SF:ITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(RTSPRequest,F1,
986SF:"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x20201
987SF:7\x2018:27:22\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\
988SF:nConnection:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\
989SF:x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:B
990SF:ad\x20Request</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x
991SF:20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:06\x20UTC\r\nS
992SF:erver:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\n
993SF:Content-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE
994SF:>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTM
995SF:L>");
996
997Nmap scan report for 192.168.1.42
998Host is up (0.00079s latency).
999Not shown: 997 closed ports
1000PORT STATE SERVICE VERSION
100180/tcp open http TargetWeb/2011.0 (TargetOS)
1002443/tcp open ssl/https?
10034001/tcp open newoak?
10041 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1005SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C58F4%P=x86_64-pc-linux-gnu%r(Get
1006SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1007SF:0Nov\x202017\x2018:27:00\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1008SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1009SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1010SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1011SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:00
1012SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1013SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1014SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1015SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1016SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:00\x20UTC\r\nServer:\x20Ta
1017SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1018SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1019SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1020SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1021SF:27\x20Nov\x202017\x2018:27:05\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1022SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1023SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1024SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1025SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1026SF::27:05\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1027SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1028SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1029SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1030SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:02\x20UTC\r\nServer:\
1031SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1032SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1033SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1034
1035Nmap scan report for 192.168.1.43
1036Host is up (0.00079s latency).
1037Not shown: 997 closed ports
1038PORT STATE SERVICE VERSION
103980/tcp open http TargetWeb/2011.0 (TargetOS)
1040443/tcp open ssl/https?
10414001/tcp open newoak?
10422 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
1043==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1044SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C58FE%P=x86_64-pc-linux-gnu%r(Get
1045SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1046SF:0Nov\x202017\x2018:27:09\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1047SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1048SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1049SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1050SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:09
1051SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1052SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1053SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1054SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1055SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:09\x20UTC\r\nServer:\x20Ta
1056SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1057SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1058SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1059SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1060SF:27\x20Nov\x202017\x2018:27:14\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1061SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1062SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1063SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1064SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1065SF::27:14\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1066SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1067SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1068SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1069SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:12\x20UTC\r\nServer:\
1070SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1071SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1072SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1073==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1074SF-Port443-TCP:V=7.60%T=SSL%I=7%D=11/27%Time=5A1C590C%P=x86_64-pc-linux-gn
1075SF:u%r(GetRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x
1076SF:2027\x20Nov\x202017\x2018:27:24\x20UTC\r\nServer:\x20TargetWeb/2011\.0\
1077SF:x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r
1078SF:\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><
1079SF:BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/
1080SF:1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x201
1081SF:8:27:27\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConne
1082SF:ction:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\
1083SF:r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20
1084SF:Request</BODY></HTML>")%r(FourOhFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\
1085SF:x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:30\x20UTC\r\n
1086SF:Server:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\
1087SF:nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITL
1088SF:E>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HT
1089SF:ML>")%r(GenericLines,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20
1090SF:Mon,\x2027\x20Nov\x202017\x2018:27:41\x20UTC\r\nServer:\x20TargetWeb/20
1091SF:11\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/
1092SF:html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</T
1093SF:ITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(RTSPRequest,F1,
1094SF:"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x20201
1095SF:7\x2018:27:44\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\
1096SF:nConnection:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\
1097SF:x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:B
1098SF:ad\x20Request</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x
1099SF:20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:28\x20UTC\r\nS
1100SF:erver:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\n
1101SF:Content-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE
1102SF:>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTM
1103SF:L>");
1104
1105Nmap scan report for 192.168.1.44
1106Host is up (0.00076s latency).
1107Not shown: 997 closed ports
1108PORT STATE SERVICE VERSION
110980/tcp open http TargetWeb/2011.0 (TargetOS)
1110443/tcp open ssl/https?
11114001/tcp open newoak?
11122 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
1113==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1114SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C5904%P=x86_64-pc-linux-gnu%r(Get
1115SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1116SF:0Nov\x202017\x2018:27:15\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1117SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1118SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1119SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1120SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:15
1121SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1122SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1123SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1124SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1125SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:15\x20UTC\r\nServer:\x20Ta
1126SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1127SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1128SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1129SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1130SF:27\x20Nov\x202017\x2018:27:20\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1131SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1132SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1133SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1134SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1135SF::27:20\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1136SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1137SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1138SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1139SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:18\x20UTC\r\nServer:\
1140SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1141SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1142SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1143==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1144SF-Port443-TCP:V=7.60%T=SSL%I=7%D=11/27%Time=5A1C5913%P=x86_64-pc-linux-gn
1145SF:u%r(GetRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x
1146SF:2027\x20Nov\x202017\x2018:27:31\x20UTC\r\nServer:\x20TargetWeb/2011\.0\
1147SF:x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r
1148SF:\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><
1149SF:BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/
1150SF:1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x201
1151SF:8:27:34\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConne
1152SF:ction:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\
1153SF:r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20
1154SF:Request</BODY></HTML>")%r(FourOhFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\
1155SF:x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:27:37\x20UTC\r\n
1156SF:Server:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\
1157SF:nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITL
1158SF:E>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HT
1159SF:ML>")%r(GenericLines,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20
1160SF:Mon,\x2027\x20Nov\x202017\x2018:27:49\x20UTC\r\nServer:\x20TargetWeb/20
1161SF:11\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/
1162SF:html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</T
1163SF:ITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(RTSPRequest,F1,
1164SF:"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x20201
1165SF:7\x2018:27:52\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\
1166SF:nConnection:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\
1167SF:x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:B
1168SF:ad\x20Request</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x
1169SF:20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:36\x20UTC\r\nS
1170SF:erver:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\n
1171SF:Content-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE
1172SF:>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTM
1173SF:L>");
1174
1175Nmap scan report for 192.168.1.45
1176Host is up (0.00087s latency).
1177All 1000 scanned ports on 192.168.1.45 are filtered
1178
1179Nmap scan report for 192.168.1.48
1180Host is up (0.00028s latency).
1181Not shown: 991 closed ports
1182PORT STATE SERVICE VERSION
118321/tcp open ftp?
118423/tcp open telnet
118579/tcp open tcpwrapped
118680/tcp open http Boa HTTPd 0.94.14rc21
1187113/tcp open tcpwrapped
1188513/tcp open tcpwrapped
1189514/tcp open tcpwrapped
11909002/tcp open dynamid?
11919200/tcp open wap-wsp?
11921 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1193SF-Port23-TCP:V=7.60%I=7%D=11/27%Time=5A1C590F%P=x86_64-pc-linux-gnu%r(NUL
1194SF:L,6A,"\xff\xfd\x01\xff\xfd\x1f\xff\xfb\x01\xff\xfb\x03\r\r\n\r\n\r\x20\
1195SF:x20\x20\x20\x20\x20\x20\x20Welcome\x20to\x20LG\x20Electronics,Inc\.\x20
1196SF:Embedded\x20Linux\x20Environment\r\n\r\r\n\r\r\n\rLG-ACP\x20login:\x20"
1197SF:)%r(GenericLines,8A,"\xff\xfd\x01\xff\xfd\x1f\xff\xfb\x01\xff\xfb\x03\r
1198SF:\r\n\r\n\r\x20\x20\x20\x20\x20\x20\x20\x20Welcome\x20to\x20LG\x20Electr
1199SF:onics,Inc\.\x20Embedded\x20Linux\x20Environment\r\n\r\r\n\r\r\n\rLG-ACP
1200SF:\x20login:\x20\r\n\r\nLG-ACP\x20login:\x20LG-ACP\x20login:\x20")%r(tn32
1201SF:70,7B,"\xff\xfd\x01\xff\xfd\x1f\xff\xfb\x01\xff\xfb\x03\r\r\n\r\n\r\x20
1202SF:\x20\x20\x20\x20\x20\x20\x20Welcome\x20to\x20LG\x20Electronics,Inc\.\x2
1203SF:0Embedded\x20Linux\x20Environment\r\n\r\r\n\r\r\n\rLG-ACP\x20login:\x20
1204SF:\^@IBM-3279-4-E\xfb\^Y")%r(GetRequest,86,"\xff\xfd\x01\xff\xfd\x1f\xff\
1205SF:xfb\x01\xff\xfb\x03\r\r\n\r\n\r\x20\x20\x20\x20\x20\x20\x20\x20Welcome\
1206SF:x20to\x20LG\x20Electronics,Inc\.\x20Embedded\x20Linux\x20Environment\r\
1207SF:n\r\r\n\r\r\n\rLG-ACP\x20login:\x20GET\x20/\x20HTTP/1\.0\r\n\r\nPasswor
1208SF:d:\x20")%r(RPCCheck,74,"\xff\xfd\x01\xff\xfd\x1f\xff\xfb\x01\xff\xfb\x0
1209SF:3\r\r\n\r\n\r\x20\x20\x20\x20\x20\x20\x20\x20Welcome\x20to\x20LG\x20Ele
1210SF:ctronics,Inc\.\x20Embedded\x20Linux\x20Environment\r\n\r\r\n\r\r\n\rLG-
1211SF:ACP\x20login:\x20\x80\^@\^@\(r\xfe\^\]")%r(Help,7A,"\xff\xfd\x01\xff\xf
1212SF:d\x1f\xff\xfb\x01\xff\xfb\x03\r\r\n\r\n\r\x20\x20\x20\x20\x20\x20\x20\x
1213SF:20Welcome\x20to\x20LG\x20Electronics,Inc\.\x20Embedded\x20Linux\x20Envi
1214SF:ronment\r\n\r\r\n\r\r\n\rLG-ACP\x20login:\x20HELP\r\nPassword:\x20")%r(
1215SF:SIPOptions,153,"\xff\xfd\x01\xff\xfd\x1f\xff\xfb\x01\xff\xfb\x03\r\r\n\
1216SF:r\n\r\x20\x20\x20\x20\x20\x20\x20\x20Welcome\x20to\x20LG\x20Electronics
1217SF:,Inc\.\x20Embedded\x20Linux\x20Environment\r\n\r\r\n\r\r\n\rLG-ACP\x20l
1218SF:ogin:\x20OPTIONS\x20sip:nm\x20SIP/2\.0\r\nVia:\x20SIP/2\.0/TCP\x20nm;br
1219SF:anch=foo\r\nFrom:\x20<sip:nm@nm>;tag=root\r\nTo:\x20<sip:nm2@nm2>\r\nCa
1220SF:ll-ID:\x2050000\r\nCSeq:\x2042\x20OPTIONS\r\nMax-Forwards:\x2070\r\nCon
1221SF:tent-Length:\x200\r\nContact:\x20<sip:nm@nm>\r\nAccept:\x20application/
1222SF:sdp\r\n\r\nPassword:\x20");
1223
1224Nmap scan report for 192.168.1.53
1225Host is up (0.00054s latency).
1226All 1000 scanned ports on 192.168.1.53 are closed
1227
1228Nmap scan report for 192.168.1.55
1229Host is up (0.00060s latency).
1230All 1000 scanned ports on 192.168.1.55 are closed
1231
1232Nmap scan report for 192.168.1.57
1233Host is up (0.00052s latency).
1234All 1000 scanned ports on 192.168.1.57 are closed
1235
1236Nmap scan report for 192.168.1.58
1237Host is up (0.00053s latency).
1238All 1000 scanned ports on 192.168.1.58 are closed
1239
1240Nmap scan report for 192.168.1.59
1241Host is up (0.0016s latency).
1242All 1000 scanned ports on 192.168.1.59 are filtered
1243
1244Nmap scan report for 192.168.1.61
1245Host is up (0.00052s latency).
1246All 1000 scanned ports on 192.168.1.61 are closed
1247
1248Nmap scan report for 192.168.1.62
1249Host is up (0.00057s latency).
1250All 1000 scanned ports on 192.168.1.62 are closed
1251
1252Nmap scan report for 192.168.1.64
1253Host is up (0.00049s latency).
1254All 1000 scanned ports on 192.168.1.64 are closed
1255
1256Nmap scan report for 192.168.1.65
1257Host is up (0.10s latency).
1258All 1000 scanned ports on 192.168.1.65 are closed
1259
1260Nmap scan report for 192.168.1.66
1261Host is up (0.00050s latency).
1262All 1000 scanned ports on 192.168.1.66 are closed
1263
1264Nmap scan report for 192.168.1.67
1265Host is up (0.00049s latency).
1266All 1000 scanned ports on 192.168.1.67 are closed
1267
1268Nmap scan report for 192.168.1.68
1269Host is up (0.00051s latency).
1270All 1000 scanned ports on 192.168.1.68 are closed
1271
1272Nmap scan report for 192.168.1.69
1273Host is up (0.00055s latency).
1274All 1000 scanned ports on 192.168.1.69 are closed
1275
1276Nmap scan report for 192.168.1.75
1277Host is up (0.00054s latency).
1278All 1000 scanned ports on 192.168.1.75 are closed
1279
1280Nmap scan report for 192.168.1.76
1281Host is up (0.00094s latency).
1282Not shown: 999 closed ports
1283PORT STATE SERVICE VERSION
128480/tcp open http Ethernut demo httpd 4.8.7.0
1285Service Info: OS: Nut/OS; CPE: cpe:/o:ethernut:nut_os
1286
1287Nmap scan report for 192.168.1.82
1288Host is up (0.00046s latency).
1289Not shown: 999 closed ports
1290PORT STATE SERVICE VERSION
129180/tcp open http Ethernut demo httpd 4.8.7.0
1292Service Info: OS: Nut/OS; CPE: cpe:/o:ethernut:nut_os
1293
1294Nmap scan report for 192.168.1.83
1295Host is up (0.00024s latency).
1296Not shown: 997 closed ports
1297PORT STATE SERVICE VERSION
12982601/tcp open zebra Quagga routing software
12992602/tcp open zebra Quagga routing software
13003011/tcp open http Tridium Niagara httpd 3.0 (Platform: Linux)
1301Service Info: Device: specialized
1302
1303Nmap scan report for hvac06.tccnet.edu (192.168.1.141)
1304Host is up (0.00034s latency).
1305Not shown: 998 closed ports
1306PORT STATE SERVICE VERSION
130780/tcp open http Sun Niagara httpd 1.1 (Niagara release 2.301.522.v2)
13083011/tcp open http Tridium Niagara httpd 1.1 (Platform: JACE_403)
1309Service Info: Device: specialized
1310
1311Nmap scan report for 192.168.1.144
1312Host is up (0.00043s latency).
1313Not shown: 998 closed ports
1314PORT STATE SERVICE VERSION
131580/tcp open http Sun Niagara httpd 1.1 (Niagara release 2.301.522.v2)
13163011/tcp open http Tridium Niagara httpd 1.1 (Platform: JACE_403)
1317Service Info: Device: specialized
1318
1319Nmap scan report for 192.168.1.145
1320Host is up (0.00076s latency).
1321Not shown: 997 closed ports
1322PORT STATE SERVICE VERSION
132323/tcp open telnet
132480/tcp open tcpwrapped
132520000/tcp open tcpwrapped
13261 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1327SF-Port23-TCP:V=7.60%I=7%D=11/27%Time=5A1C5949%P=x86_64-pc-linux-gnu%r(NUL
1328SF:L,67,"\xff\xfb\x03\xff\xfd\x03\x1b\[2J\x1b\[H\n\rSiemens\x20Industry,\x
1329SF:20Inc\.\x20-\x20PDS\x209510RTU\x20ION\x209510RTUV371\n\rSerial#:\x20SI-
1330SF:1403B019-04\n\r\n\rlogin:\x20")%r(GenericLines,80,"\xff\xfb\x03\xff\xfd
1331SF:\x03\x1b\[2J\x1b\[H\n\rSiemens\x20Industry,\x20Inc\.\x20-\x20PDS\x20951
1332SF:0RTU\x20ION\x209510RTUV371\n\rSerial#:\x20SI-1403B019-04\n\r\n\rlogin:\
1333SF:x20\n\r\n\rpassword:\x20\n\r\n\rlogin:\x20")%r(GetRequest,8E,"\xff\xfb\
1334SF:x03\xff\xfd\x03\x1b\[2J\x1b\[H\n\rSiemens\x20Industry,\x20Inc\.\x20-\x2
1335SF:0PDS\x209510RTU\x20ION\x209510RTUV371\n\rSerial#:\x20SI-1403B019-04\n\r
1336SF:\n\rlogin:\x20GET\x20/\x20HTTP/1\.0\n\r\n\rpassword:\x20\n\r\n\rlogin:\
1337SF:x20")%r(Help,79,"\xff\xfb\x03\xff\xfd\x03\x1b\[2J\x1b\[H\n\rSiemens\x20
1338SF:Industry,\x20Inc\.\x20-\x20PDS\x209510RTU\x20ION\x209510RTUV371\n\rSeri
1339SF:al#:\x20SI-1403B019-04\n\r\n\rlogin:\x20HELP\n\r\n\rpassword:\x20")%r(N
1340SF:CP,6F,"\xff\xfb\x03\xff\xfd\x03\x1b\[2J\x1b\[H\n\rSiemens\x20Industry,\
1341SF:x20Inc\.\x20-\x20PDS\x209510RTU\x20ION\x209510RTUV371\n\rSerial#:\x20SI
1342SF:-1403B019-04\n\r\n\rlogin:\x20DmdT\x17\x01\x11\x11");
1343
1344Nmap scan report for 192.168.1.146
1345Host is up (0.00052s latency).
1346Not shown: 998 closed ports
1347PORT STATE SERVICE VERSION
134880/tcp open http Tridium Niagara httpd 1.1
13493011/tcp open http Tridium Niagara httpd 3.0 (Platform: QNX)
1350Service Info: Device: specialized
1351
1352Nmap scan report for hvac16.tccnet.edu (192.168.1.149)
1353Host is up (0.00035s latency).
1354Not shown: 998 closed ports
1355PORT STATE SERVICE VERSION
135680/tcp open http Sun Niagara httpd 1.1 (Niagara release 2.301.522.v2)
13573011/tcp open http Tridium Niagara httpd 1.1 (Platform: JACE_51x)
1358Service Info: Device: specialized
1359
1360Nmap scan report for 192.168.1.160
1361Host is up (0.00078s latency).
1362Not shown: 997 closed ports
1363PORT STATE SERVICE VERSION
136480/tcp open http TargetWeb/2011.0 (TargetOS)
1365443/tcp open ssl/https?
13664001/tcp open newoak?
13672 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
1368==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1369SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C5952%P=x86_64-pc-linux-gnu%r(Get
1370SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1371SF:0Nov\x202017\x2018:28:33\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1372SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1373SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1374SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1375SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:33
1376SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1377SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1378SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1379SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1380SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:33\x20UTC\r\nServer:\x20Ta
1381SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1382SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1383SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1384SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1385SF:27\x20Nov\x202017\x2018:28:38\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1386SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1387SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1388SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1389SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1390SF::28:38\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1391SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1392SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1393SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1394SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:36\x20UTC\r\nServer:\
1395SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1396SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1397SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1398==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1399SF-Port443-TCP:V=7.60%T=SSL%I=7%D=11/27%Time=5A1C595B%P=x86_64-pc-linux-gn
1400SF:u%r(GetRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x
1401SF:2027\x20Nov\x202017\x2018:28:42\x20UTC\r\nServer:\x20TargetWeb/2011\.0\
1402SF:x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r
1403SF:\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><
1404SF:BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/
1405SF:1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x201
1406SF:8:28:46\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConne
1407SF:ction:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\
1408SF:r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20
1409SF:Request</BODY></HTML>")%r(FourOhFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\
1410SF:x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:49\x20UTC\r\n
1411SF:Server:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\
1412SF:nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITL
1413SF:E>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HT
1414SF:ML>")%r(GenericLines,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20
1415SF:Mon,\x2027\x20Nov\x202017\x2018:29:00\x20UTC\r\nServer:\x20TargetWeb/20
1416SF:11\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/
1417SF:html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</T
1418SF:ITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(RTSPRequest,F1,
1419SF:"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x20201
1420SF:7\x2018:29:03\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\
1421SF:nConnection:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\
1422SF:x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:B
1423SF:ad\x20Request</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x
1424SF:20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:30:46\x20UTC\r\nS
1425SF:erver:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\n
1426SF:Content-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE
1427SF:>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTM
1428SF:L>");
1429
1430Nmap scan report for 192.168.1.179
1431Host is up (0.0012s latency).
1432All 1000 scanned ports on 192.168.1.179 are filtered
1433
1434Nmap scan report for 192.168.1.223
1435Host is up (0.00076s latency).
1436Not shown: 997 closed ports
1437PORT STATE SERVICE VERSION
143880/tcp open http TargetWeb/2011.0 (TargetOS)
1439443/tcp open ssl/https?
14404001/tcp open newoak?
14411 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1442SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C5955%P=x86_64-pc-linux-gnu%r(Get
1443SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1444SF:0Nov\x202017\x2018:28:37\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1445SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1446SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1447SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1448SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:37
1449SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1450SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1451SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1452SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1453SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:37\x20UTC\r\nServer:\x20Ta
1454SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1455SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1456SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1457SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1458SF:27\x20Nov\x202017\x2018:28:42\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1459SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1460SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1461SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1462SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1463SF::28:42\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1464SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1465SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1466SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1467SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:39\x20UTC\r\nServer:\
1468SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1469SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1470SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1471
1472Nmap scan report for 192.168.1.224
1473Host is up (0.00089s latency).
1474Not shown: 997 closed ports
1475PORT STATE SERVICE VERSION
147680/tcp open http TargetWeb/2011.0 (TargetOS)
1477443/tcp open ssl/https?
14784001/tcp open newoak?
14791 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1480SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C595C%P=x86_64-pc-linux-gnu%r(Get
1481SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1482SF:0Nov\x202017\x2018:28:44\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1483SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1484SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1485SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1486SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:44
1487SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1488SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1489SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1490SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1491SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:44\x20UTC\r\nServer:\x20Ta
1492SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1493SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1494SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1495SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1496SF:27\x20Nov\x202017\x2018:28:50\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1497SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1498SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1499SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1500SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1501SF::28:50\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1502SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1503SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1504SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1505SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:47\x20UTC\r\nServer:\
1506SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1507SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1508SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1509
1510Nmap scan report for 192.168.1.225
1511Host is up (0.0053s latency).
1512All 1000 scanned ports on 192.168.1.225 are filtered
1513
1514Nmap scan report for 192.168.1.226
1515Host is up (0.0073s latency).
1516All 1000 scanned ports on 192.168.1.226 are filtered
1517
1518Nmap scan report for 192.168.1.227
1519Host is up (0.0094s latency).
1520All 1000 scanned ports on 192.168.1.227 are filtered
1521
1522Nmap scan report for 192.168.1.228
1523Host is up (0.0073s latency).
1524All 1000 scanned ports on 192.168.1.228 are filtered
1525
1526Nmap scan report for 192.168.1.229
1527Host is up (0.0029s latency).
1528All 1000 scanned ports on 192.168.1.229 are filtered
1529
1530Nmap scan report for 192.168.1.231
1531Host is up (0.00072s latency).
1532All 1000 scanned ports on 192.168.1.231 are filtered
1533
1534Nmap scan report for 192.168.1.235
1535Host is up (0.00082s latency).
1536Not shown: 997 closed ports
1537PORT STATE SERVICE VERSION
153880/tcp open http TargetWeb/2011.0 (TargetOS)
1539443/tcp open ssl/https?
15404001/tcp open newoak?
15411 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1542SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C5962%P=x86_64-pc-linux-gnu%r(Get
1543SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1544SF:0Nov\x202017\x2018:28:50\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1545SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1546SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1547SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1548SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:51
1549SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1550SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1551SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1552SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1553SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:51\x20UTC\r\nServer:\x20Ta
1554SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1555SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1556SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1557SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1558SF:27\x20Nov\x202017\x2018:28:56\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1559SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1560SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1561SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1562SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1563SF::28:56\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1564SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1565SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1566SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1567SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:53\x20UTC\r\nServer:\
1568SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1569SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1570SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1571
1572Nmap scan report for 192.168.1.236
1573Host is up (0.00071s latency).
1574Not shown: 997 closed ports
1575PORT STATE SERVICE VERSION
157680/tcp open http TargetWeb/2011.0 (TargetOS)
1577443/tcp open ssl/https?
15784001/tcp open newoak?
15791 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1580SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C5968%P=x86_64-pc-linux-gnu%r(Get
1581SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1582SF:0Nov\x202017\x2018:28:53\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1583SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1584SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1585SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1586SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:55
1587SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1588SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1589SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1590SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1591SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:28:55\x20UTC\r\nServer:\x20Ta
1592SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1593SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1594SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1595SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1596SF:27\x20Nov\x202017\x2018:29:00\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1597SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1598SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1599SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1600SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1601SF::29:00\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1602SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1603SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1604SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1605SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:58\x20UTC\r\nServer:\
1606SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1607SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1608SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1609
1610Nmap scan report for 192.168.1.237
1611Host is up (0.00075s latency).
1612Not shown: 997 closed ports
1613PORT STATE SERVICE VERSION
161480/tcp open http TargetWeb/2011.0 (TargetOS)
1615443/tcp open ssl/https?
16164001/tcp open newoak?
16171 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1618SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C596F%P=x86_64-pc-linux-gnu%r(Get
1619SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1620SF:0Nov\x202017\x2018:29:03\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1621SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1622SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1623SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1624SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:03
1625SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1626SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1627SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1628SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1629SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:03\x20UTC\r\nServer:\x20Ta
1630SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1631SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1632SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1633SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1634SF:27\x20Nov\x202017\x2018:29:08\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1635SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1636SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1637SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1638SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1639SF::29:08\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1640SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1641SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1642SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1643SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:30:05\x20UTC\r\nServer:\
1644SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1645SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1646SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1647
1648Nmap scan report for 192.168.1.238
1649Host is up (0.00075s latency).
1650Not shown: 997 closed ports
1651PORT STATE SERVICE VERSION
165280/tcp open http TargetWeb/2011.0 (TargetOS)
1653443/tcp open ssl/https?
16544001/tcp open newoak?
16551 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1656SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C5976%P=x86_64-pc-linux-gnu%r(Get
1657SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1658SF:0Nov\x202017\x2018:29:10\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1659SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1660SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1661SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1662SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:10
1663SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1664SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1665SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1666SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1667SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:10\x20UTC\r\nServer:\x20Ta
1668SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1669SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1670SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1671SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1672SF:27\x20Nov\x202017\x2018:29:15\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1673SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1674SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1675SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1676SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1677SF::29:15\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1678SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1679SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1680SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1681SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:30:13\x20UTC\r\nServer:\
1682SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1683SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1684SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1685
1686Nmap scan report for 192.168.1.239
1687Host is up (0.00075s latency).
1688Not shown: 997 closed ports
1689PORT STATE SERVICE VERSION
169080/tcp open http TargetWeb/2011.0 (TargetOS)
1691443/tcp open ssl/https?
16924001/tcp open newoak?
16931 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
1694SF-Port80-TCP:V=7.60%I=7%D=11/27%Time=5A1C597E%P=x86_64-pc-linux-gnu%r(Get
1695SF:Request,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x2
1696SF:0Nov\x202017\x2018:29:18\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(Ta
1697SF:rgetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConte
1698SF:nt-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ER
1699SF:ROR\x20-1:Bad\x20Request</BODY></HTML>")%r(HTTPOptions,F1,"HTTP/1\.1\x2
1700SF:0-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:18
1701SF:\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\
1702SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n
1703SF:<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request
1704SF:</BODY></HTML>")%r(RTSPRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\
1705SF:nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:29:18\x20UTC\r\nServer:\x20Ta
1706SF:rgetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type
1707SF::\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x
1708SF:20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(FourO
1709SF:hFourRequest,F1,"HTTP/1\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x20
1710SF:27\x20Nov\x202017\x2018:29:23\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x2
1711SF:0\(TargetOS\)\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
1712SF:Content-Length:\x2096\r\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BO
1713SF:DY>ERROR\x20-1:Bad\x20Request</BODY></HTML>")%r(GenericLines,F1,"HTTP/1
1714SF:\.1\x20-1\x20Bad\x20Request\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018
1715SF::29:23\x20UTC\r\nServer:\x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnec
1716SF:tion:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x2096\r
1717SF:\n\r\n<HEAD><TITLE>TargetWeb\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20R
1718SF:equest</BODY></HTML>")%r(SIPOptions,F1,"HTTP/1\.1\x20-1\x20Bad\x20Reque
1719SF:st\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2018:30:21\x20UTC\r\nServer:\
1720SF:x20TargetWeb/2011\.0\x20\(TargetOS\)\r\nConnection:\x20close\r\nContent
1721SF:-Type:\x20text/html\r\nContent-Length:\x2096\r\n\r\n<HEAD><TITLE>Target
1722SF:Web\x20ERROR</TITLE><BODY>ERROR\x20-1:Bad\x20Request</BODY></HTML>");
1723
1724Nmap scan report for envisionsvr.tccnet.edu (192.168.1.240)
1725Host is up (0.00033s latency).
1726Not shown: 989 closed ports
1727PORT STATE SERVICE VERSION
172880/tcp open http Microsoft IIS httpd 10.0
172988/tcp open http Tridium Niagara httpd 3.5.34
1730135/tcp open msrpc Microsoft Windows RPC
1731139/tcp open netbios-ssn Microsoft Windows netbios-ssn
1732445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: TCCNET)
17333389/tcp open ms-wbt-server Microsoft Terminal Services
17348088/tcp open radan-http Tiny WebServer
17358192/tcp open sophos Sophos Message Router (Interroperable Object Reference Service)
17368193/tcp open tcpwrapped
17378194/tcp open ssl/giop omg.org CORBA naming service
17389090/tcp open zeus-admin?
17392 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
1740==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1741SF-Port8088-TCP:V=7.60%I=7%D=11/27%Time=5A1C5993%P=x86_64-pc-linux-gnu%r(G
1742SF:etRequest,D4,"HTTP/1\.0\x20404\x20Internal\x20server\x20error\r\nDate:\
1743SF:x20Mon,\x2027\x20Nov\x202017\x2018:29:39\x20GMT\r\nContent-Length:\x204
1744SF:8\r\nContent-Type:\x20text/plain\r\nServer:\x20Tiny\x20WebServer\r\nCon
1745SF:nection:\x20close\r\n\r\nResource\x20not\x20found:\x20http://192\.168\.
1746SF:1\.240:8088/\r\n")%r(Socks5,32,"HTTP/1\.0\x20400\x20BadRequest:\x20Inva
1747SF:lid\x20request\x20line\.\r\n\r\n")%r(Socks4,32,"HTTP/1\.0\x20400\x20Bad
1748SF:Request:\x20Invalid\x20request\x20line\.\r\n\r\n")%r(GenericLines,32,"H
1749SF:TTP/1\.0\x20400\x20BadRequest:\x20Invalid\x20request\x20line\.\r\n\r\n"
1750SF:)%r(HTTPOptions,D4,"HTTP/1\.0\x20404\x20Internal\x20server\x20error\r\n
1751SF:Date:\x20Mon,\x2027\x20Nov\x202017\x2018:29:39\x20GMT\r\nContent-Length
1752SF::\x2048\r\nContent-Type:\x20text/plain\r\nServer:\x20Tiny\x20WebServer\
1753SF:r\nConnection:\x20close\r\n\r\nResource\x20not\x20found:\x20http://192\
1754SF:.168\.1\.240:8088/\r\n")%r(RTSPRequest,5B,"HTTP/1\.0\x20400\x20BadReque
1755SF:st:\x20Invalid\x20HTTP\x20version\x20in\x20Request\x20line\.\x20Line:\x
1756SF:20OPTIONS\x20/\x20RTSP/1\.0\r\n\r\n")%r(RPCCheck,32,"HTTP/1\.0\x20400\x
1757SF:20BadRequest:\x20Invalid\x20request\x20line\.\r\n\r\n")%r(DNSVersionBin
1758SF:dReq,32,"HTTP/1\.0\x20400\x20BadRequest:\x20Invalid\x20request\x20line\
1759SF:.\r\n\r\n")%r(DNSStatusRequest,32,"HTTP/1\.0\x20400\x20BadRequest:\x20I
1760SF:nvalid\x20request\x20line\.\r\n\r\n")%r(Help,4D,"HTTP/1\.0\x20400\x20Ba
1761SF:dRequest:\x20Invalid\x20request\x20line,\x20missing\x20Method\.\x20Line
1762SF::\x20HELP\r\n\r\n")%r(SSLSessionReq,32,"HTTP/1\.0\x20400\x20BadRequest:
1763SF:\x20Invalid\x20request\x20line\.\r\n\r\n")%r(TLSSessionReq,32,"HTTP/1\.
1764SF:0\x20400\x20BadRequest:\x20Invalid\x20request\x20line\.\r\n\r\n")%r(Ker
1765SF:beros,32,"HTTP/1\.0\x20400\x20BadRequest:\x20Invalid\x20request\x20line
1766SF:\.\r\n\r\n")%r(SMBProgNeg,32,"HTTP/1\.0\x20400\x20BadRequest:\x20Invali
1767SF:d\x20request\x20line\.\r\n\r\n")%r(FourOhFourRequest,EF,"HTTP/1\.0\x204
1768SF:04\x20Internal\x20server\x20error\r\nDate:\x20Mon,\x2027\x20Nov\x202017
1769SF:\x2018:29:44\x20GMT\r\nContent-Length:\x2075\r\nContent-Type:\x20text/p
1770SF:lain\r\nServer:\x20Tiny\x20WebServer\r\nConnection:\x20close\r\n\r\nRes
1771SF:ource\x20not\x20found:\x20http://192\.168\.1\.240:8088/nice\x20ports,/T
1772SF:rinity\.txt\.bak\r\n");
1773==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
1774SF-Port9090-TCP:V=7.60%I=7%D=11/27%Time=5A1C599D%P=x86_64-pc-linux-gnu%r(G
1775SF:etRequest,9B3,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Mon,\x2027\x20Nov\x20
1776SF:2017\x2018:29:48\x20GMT\r\nSet-Cookie:\x20JSESSIONID=1s2lne7s309xexsrs4
1777SF:i217w21;Path=/;HttpOnly\r\nExpires:\x20Thu,\x2001\x20Jan\x201970\x2000:
1778SF:00:00\x20GMT\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nCo
1779SF:ntent-Type:\x20text/html\r\nContent-Length:\x202231\r\n\r\n<!doctype\x2
1780SF:0html>\n<html>\n\x20<head>\n\x20\x20<meta\x20http-equiv=\"Content-Type\
1781SF:"\x20content=\"text/html;\x20charset=utf-8\">\n\x20\x20<meta\x20http-eq
1782SF:uiv=\"X-UA-Compatible\"\x20content=\"IE=11;chrome=1\">\n\x20\x20<title>
1783SF:AirHippo\x20Console</title>\n\x20\x20<style\x20type=\"text/css\">html,\
1784SF:x20body\x20{height:100%;margin:0;}</style>\n\x20\x20<link\x20rel=\"shor
1785SF:tcut\x20icon\"\x20type=\"image/vnd\.microsoft\.icon\"\x20href=\"\./VAAD
1786SF:IN/themes/airhippotheme/favicon\.ico\">\n\x20\x20<link\x20rel=\"icon\"\
1787SF:x20type=\"image/vnd\.microsoft\.icon\"\x20href=\"\./VAADIN/themes/airhi
1788SF:ppotheme/favicon\.ico\">\n\x20</head>\n\x20<body\x20scroll=\"auto\"\x20
1789SF:class=\"v-generated-body\">\n\x20\x20<div\x20id=\"ROOT-2521314\"\x20cla
1790SF:ss=\"v-app\x20airhippotheme\x20consoleui\">\n\x20\x20\x20<div\x20class=
1791SF:\"v-app-loading\"></div>\n\x20\x20\x20<noscript>\n")%r(JavaRMI,4C,"HTTP
1792SF:/1\.1\x20400\x20Illegal\x20character\x200x0\r\nContent-Length:\x200\r\n
1793SF:Connection:\x20close\r\n\r\n")%r(WMSRequest,4C,"HTTP/1\.1\x20400\x20Ill
1794SF:egal\x20character\x200x1\r\nContent-Length:\x200\r\nConnection:\x20clos
1795SF:e\r\n\r\n")%r(ibm-db2-das,4C,"HTTP/1\.1\x20400\x20Illegal\x20character\
1796SF:x200x0\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(Sque
1797SF:ezeCenter_CLI,3D,"HTTP/1\.1\x20400\x20No\x20URI\r\nContent-Length:\x200
1798SF:\r\nConnection:\x20close\r\n\r\n")%r(informix,4C,"HTTP/1\.1\x20400\x20I
1799SF:llegal\x20character\x200x0\r\nContent-Length:\x200\r\nConnection:\x20cl
1800SF:ose\r\n\r\n")%r(drda,4C,"HTTP/1\.1\x20400\x20Illegal\x20character\x200x
1801SF:0\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(HTTPOptio
1802SF:ns,9B4,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Mon,\x2027\x20Nov\x202017\x2
1803SF:018:29:54\x20GMT\r\nSet-Cookie:\x20JSESSIONID=1l9wdlkmi1bxl19rx3c33hjb7
1804SF:7;Path=/;HttpOnly\r\nExpires:\x20Thu,\x2001\x20Jan\x201970\x2000:00:00\
1805SF:x20GMT\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-
1806SF:Type:\x20text/html\r\nContent-Length:\x202231\r\n\r\n<!doctype\x20html>
1807SF:\n<html>\n\x20<head>\n\x20\x20<meta\x20http-equiv=\"Content-Type\"\x20c
1808SF:ontent=\"text/html;\x20charset=utf-8\">\n\x20\x20<meta\x20http-equiv=\"
1809SF:X-UA-Compatible\"\x20content=\"IE=11;chrome=1\">\n\x20\x20<title>AirHip
1810SF:po\x20Console</title>\n\x20\x20<style\x20type=\"text/css\">html,\x20bod
1811SF:y\x20{height:100%;margin:0;}</style>\n\x20\x20<link\x20rel=\"shortcut\x
1812SF:20icon\"\x20type=\"image/vnd\.microsoft\.icon\"\x20href=\"\./VAADIN/the
1813SF:mes/airhippotheme/favicon\.ico\">\n\x20\x20<link\x20rel=\"icon\"\x20typ
1814SF:e=\"image/vnd\.microsoft\.icon\"\x20href=\"\./VAADIN/themes/airhippothe
1815SF:me/favicon\.ico\">\n\x20</head>\n\x20<body\x20scroll=\"auto\"\x20class=
1816SF:\"v-generated-body\">\n\x20\x20<div\x20id=\"ROOT-2521314\"\x20class=\"v
1817SF:-app\x20airhippotheme\x20consoleui\">\n\x20\x20\x20<div\x20class=\"v-ap
1818SF:p-loading\"></div>\n\x20\x20\x20<noscript>");
1819Service Info: Host: ENVISIONSVR; OS: Windows; Device: specialized; CPE: cpe:/o:microsoft:windows
1820
1821Nmap scan report for 192.168.1.241
1822Host is up (0.0033s latency).
1823All 1000 scanned ports on 192.168.1.241 are filtered
1824
1825Nmap scan report for hvac21.tccnet.edu (192.168.1.243)
1826Host is up (0.0012s latency).
1827Not shown: 999 closed ports
1828PORT STATE SERVICE VERSION
182923/tcp open telnet Linux telnetd
1830Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
1831
1832Nmap scan report for hvac19.tccnet.edu (192.168.1.244)
1833Host is up (0.00057s latency).
1834All 1000 scanned ports on hvac19.tccnet.edu (192.168.1.244) are filtered
1835
1836Nmap scan report for hvac14.tccnet.edu (192.168.1.245)
1837Host is up (0.0011s latency).
1838Not shown: 999 closed ports
1839PORT STATE SERVICE VERSION
184023/tcp open telnet Linux telnetd
1841Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
1842
1843Nmap scan report for hvac05.tccnet.edu (192.168.1.248)
1844Host is up (0.0011s latency).
1845Not shown: 999 closed ports
1846PORT STATE SERVICE VERSION
184723/tcp open telnet Linux telnetd
1848Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
1849
1850Nmap scan report for 192.168.1.251
1851Host is up (0.00022s latency).
1852Not shown: 998 closed ports
1853PORT STATE SERVICE VERSION
18542601/tcp open zebra Quagga routing software
18552602/tcp open zebra Quagga routing software
1856
1857Nmap scan report for 192.168.1.254
1858Host is up (0.0021s latency).
1859All 1000 scanned ports on 192.168.1.254 are filtered
1860
1861Nmap scan report for 192.168.1.255
1862Host is up (0.00063s latency).
1863Not shown: 997 closed ports
1864PORT STATE SERVICE VERSION
186580/tcp open tcpwrapped
1866443/tcp open tcpwrapped
18674001/tcp open tcpwrapped
1868
1869Read data files from: /usr/bin/../share/nmap
1870Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
1871# Nmap done at Mon Nov 27 18:32:55 2017 -- 256 IP addresses (62 hosts up) scanned in 1286.38 seconds