viewing paste Mck | Text

Posted on the
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129
 
Ip: 168.11.48.100
 
Whois: Georgia Department of Education GDOENET (NET-168-8-0-0-2) 168.8.0.0 - 168.11.255.255
 
Starting Nmap 6.00 ( http://nmap.org ) at 2015-09-15 17:23 EEST
NSE: Loaded 17 scripts for scanning.
Initiating Ping Scan at 17:23
Scanning 168.11.48.100 [4 ports]
Completed Ping Scan at 17:23, 0.13s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 17:23
Scanning 168.11.48.100 [100 ports]
Discovered open port 443/tcp on 168.11.48.100
Completed SYN Stealth Scan at 17:23, 2.35s elapsed (100 total ports)
Initiating Service scan at 17:23
Scanning 1 service on 168.11.48.100
Completed Service scan at 17:25, 107.18s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 168.11.48.100
Initiating Traceroute at 17:25
Completed Traceroute at 17:25, 2.02s elapsed
NSE: Script scanning 168.11.48.100.
Initiating NSE at 17:25
Completed NSE at 17:25, 0.21s elapsed
 
[+] Nmap scan report for 168.11.48.100
Host is up (0.100s latency).
Not shown: 99 filtered ports
 
PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?
 
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port443-TCP:V=6.00%T=SSL%I=7%D=9/15%Time=55F82A06%P=x86_64-unknown-linu
SF:x-gnu%r(GetRequest,1BB,"HTTP/1\.0\x20200\x20OK\r\nDate:\x20Tue,\x2015\x
SF:20Sep\x202015\x2014:24:02\x20GMT\r\nServer:\x20PanWeb\x20Server/\x20-\x
SF:20\r\nContent-Length:\x20170\r\nContent-Type:\x20text/html\r\nConnectio
SF:n:\x20close\r\nPragma:\x20private\r\nCache-Control:\x20private,\x20must
SF:-revalidate,\x20post-check=0,\x20pre-check=0\r\nExpires:\x20Mon,\x2026\
SF:x20Jul\x201997\x2005:00:00\x20GMT\r\n\r\n<script\x20LANGUAGE=JavaScript
SF:>\nwindow\.location=\"/global-protect/login\.esp\";\x20\n</script>\n<ht
SF:ml><head></head><body><p>JavaScript\x20must\x20be\x20enabled\x20to\x20c
SF:ontinue!</p></body></html>")%r(GenericLines,159,"HTTP/1\.0\x20400\x20Ba
SF:d\x20Request\r\nDate:\x20Tue,\x2015\x20Sep\x202015\x2014:24:03\x20GMT\r
SF:\nServer:\x20PanWeb\x20Server/\x20-\x20\r\nContent-Length:\x20173\r\nCo
SF:ntent-Type:\x20application/x-appweb-php\r\nConnection:\x20close\r\n\r\n
SF:<!DOCTYPE\x20html>\r\n<html><head><title>Document\x20Error:\x20Bad\x20R
SF:equest</title></head>\r\n<body><h2>Access\x20Error:\x20400\x20--\x20Bad
SF:\x20Request</h2>\r\n<p>Bad\x20header\x20format</p>\r\n</body>\r\n</html
SF:>\r\n")%r(HTTPOptions,15C,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nDate:\
SF:x20Tue,\x2015\x20Sep\x202015\x2014:24:04\x20GMT\r\nServer:\x20PanWeb\x2
SF:0Server/\x20-\x20\r\nContent-Length:\x20176\r\nContent-Type:\x20applica
SF:tion/x-appweb-php\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20html>\r\n
SF:<html><head><title>Document\x20Error:\x20Bad\x20Request</title></head>\
SF:r\n<body><h2>Access\x20Error:\x20400\x20--\x20Bad\x20Request</h2>\r\n<p
SF:>Bad\x20header\x20key\x20value</p>\r\n</body>\r\n</html>\r\n")%r(RTSPRe
SF:quest,15C,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2015\x2
SF:0Sep\x202015\x2014:24:04\x20GMT\r\nServer:\x20PanWeb\x20Server/\x20-\x2
SF:0\r\nContent-Length:\x20176\r\nContent-Type:\x20application/x-appweb-ph
SF:p\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20html>\r\n<html><head><tit
SF:le>Document\x20Error:\x20Bad\x20Request</title></head>\r\n<body><h2>Acc
SF:ess\x20Error:\x20400\x20--\x20Bad\x20Request</h2>\r\n<p>Bad\x20header\x
SF:20key\x20value</p>\r\n</body>\r\n</html>\r\n");
 
Device type: switch
Running: HP embedded
OS CPE: cpe:/h:hp:procurve_switch_4000m
OS details: HP 4000M ProCurve switch (J4121A)
Network Distance: 13 hops
TCP Sequence Prediction: Difficulty=259 (Good luck!)
IP ID Sequence Generation: Randomized
 
 
TRACEROUTE (using port 443/tcp)
HOP RTT       ADDRESS
1   0.59 ms   router1-lon.linode.com (212.111.33.229)
2   1.15 ms   212.111.33.233
3   1.04 ms   te0-7-1-6.rcr21.b015591-1.lon01.atlas.cogentco.com (149.11.30.61)
4   1.30 ms   be2572.ccr21.lon01.atlas.cogentco.com (154.54.38.105)
5   1.71 ms   be2178.ccr42.lon13.atlas.cogentco.com (130.117.50.206)
6   77.71 ms  be2286.ccr41.lon13.atlas.cogentco.com (130.117.50.245)
7   75.06 ms  be2386.ccr21.bos01.atlas.cogentco.com (154.54.44.161)
8   90.92 ms  be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
9   91.22 ms  be2034.ccr21.atl04.atlas.cogentco.com (154.54.6.114)
10  92.64 ms  38.122.46.14
11  100.11 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
12  ...
13  99.92 ms  168.11.48.100
 
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
 
Nmap done: 1 IP address (1 host up) scanned in 114.80 seconds
           Raw packets sent: 271 (14.492KB) | Rcvd: 1010 (75.029KB)
 
 
----------------------
 
 
 
Starting Nmap 6.00 ( http://nmap.org ) at 2015-09-15 17:36 EEST
NSE: Loaded 17 scripts for scanning.
Initiating Ping Scan at 17:36
Scanning 168.11.48.100 [4 ports]
Completed Ping Scan at 17:36, 0.13s elapsed (1 total hosts)
Initiating UDP Scan at 17:36
Scanning 168.11.48.100 [100 ports]
Completed UDP Scan at 17:36, 1.74s elapsed (100 total ports)
Initiating Service scan at 17:36
Scanning 100 services on 168.11.48.100
Service scan Timing: About 2.00% done; ETC: 18:44 (1:06:58 remaining)
Service scan Timing: About 32.00% done; ETC: 17:44 (0:05:40 remaining)
Service scan Timing: About 62.00% done; ETC: 17:42 (0:02:28 remaining)
Completed Service scan at 17:41, 330.24s elapsed (100 services on 1 host)
Initiating OS detection (try #1) against 168.11.48.100
Retrying OS detection (try #2) against 168.11.48.100
NSE: Script scanning 168.11.48.100.
Initiating NSE at 17:42
Completed NSE at 17:42, 3.01s elapsed
 
[+] Nmap scan report for 168.11.48.100
Host is up (0.10s latency).
All 100 scanned ports on 168.11.48.100 are open|filtered
 
Too many fingerprints match this host to give specific OS details
 
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
 
Nmap done: 1 IP address (1 host up) scanned in 338.81 seconds
Raw packets sent: 153 (10.261KB) | Rcvd: 45 (4.126KB)
 
Viewed 668 times, submitted by unknown.