Ip: 168.11.48.100
Whois: Georgia Department of Education GDOENET (NET-168-8-0-0-2) 168.8.0.0 - 168.11.255.255
Starting Nmap 6.00 ( http://nmap.org ) at 2015-09-15 17:23 EEST
NSE: Loaded 17 scripts for scanning.
Initiating Ping Scan at 17:23
Scanning 168.11.48.100 [4 ports]
Completed Ping Scan at 17:23, 0.13s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 17:23
Scanning 168.11.48.100 [100 ports]
Discovered open port 443/tcp on 168.11.48.100
Completed SYN Stealth Scan at 17:23, 2.35s elapsed (100 total ports)
Initiating Service scan at 17:23
Scanning 1 service on 168.11.48.100
Completed Service scan at 17:25, 107.18s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 168.11.48.100
Initiating Traceroute at 17:25
Completed Traceroute at 17:25, 2.02s elapsed
NSE: Script scanning 168.11.48.100.
Initiating NSE at 17:25
Completed NSE at 17:25, 0.21s elapsed
[+] Nmap scan report for 168.11.48.100
Host is up (0.100s latency).
Not shown: 99 filtered ports
PORT STATE SERVICE VERSION
443/tcp open ssl/https?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port443-TCP:V=6.00%T=SSL%I=7%D=9/15%Time=55F82A06%P=x86_64-unknown-linu
SF:x-gnu%r(GetRequest,1BB,"HTTP/1\.0\x20200\x20OK\r\nDate:\x20Tue,\x2015\x
SF:20Sep\x202015\x2014:24:02\x20GMT\r\nServer:\x20PanWeb\x20Server/\x20-\x
SF:20\r\nContent-Length:\x20170\r\nContent-Type:\x20text/html\r\nConnectio
SF:n:\x20close\r\nPragma:\x20private\r\nCache-Control:\x20private,\x20must
SF:-revalidate,\x20post-check=0,\x20pre-check=0\r\nExpires:\x20Mon,\x2026\
SF:x20Jul\x201997\x2005:00:00\x20GMT\r\n\r\n<script\x20LANGUAGE=JavaScript
SF:>\nwindow\.location=\"/global-protect/login\.esp\";\x20\n</script>\n<ht
SF:ml><head></head><body><p>JavaScript\x20must\x20be\x20enabled\x20to\x20c
SF:ontinue!</p></body></html>")%r(GenericLines,159,"HTTP/1\.0\x20400\x20Ba
SF:d\x20Request\r\nDate:\x20Tue,\x2015\x20Sep\x202015\x2014:24:03\x20GMT\r
SF:\nServer:\x20PanWeb\x20Server/\x20-\x20\r\nContent-Length:\x20173\r\nCo
SF:ntent-Type:\x20application/x-appweb-php\r\nConnection:\x20close\r\n\r\n
SF:<!DOCTYPE\x20html>\r\n<html><head><title>Document\x20Error:\x20Bad\x20R
SF:equest</title></head>\r\n<body><h2>Access\x20Error:\x20400\x20--\x20Bad
SF:\x20Request</h2>\r\n<p>Bad\x20header\x20format</p>\r\n</body>\r\n</html
SF:>\r\n")%r(HTTPOptions,15C,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nDate:\
SF:x20Tue,\x2015\x20Sep\x202015\x2014:24:04\x20GMT\r\nServer:\x20PanWeb\x2
SF:0Server/\x20-\x20\r\nContent-Length:\x20176\r\nContent-Type:\x20applica
SF:tion/x-appweb-php\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20html>\r\n
SF:<html><head><title>Document\x20Error:\x20Bad\x20Request</title></head>\
SF:r\n<body><h2>Access\x20Error:\x20400\x20--\x20Bad\x20Request</h2>\r\n<p
SF:>Bad\x20header\x20key\x20value</p>\r\n</body>\r\n</html>\r\n")%r(RTSPRe
SF:quest,15C,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2015\x2
SF:0Sep\x202015\x2014:24:04\x20GMT\r\nServer:\x20PanWeb\x20Server/\x20-\x2
SF:0\r\nContent-Length:\x20176\r\nContent-Type:\x20application/x-appweb-ph
SF:p\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20html>\r\n<html><head><tit
SF:le>Document\x20Error:\x20Bad\x20Request</title></head>\r\n<body><h2>Acc
SF:ess\x20Error:\x20400\x20--\x20Bad\x20Request</h2>\r\n<p>Bad\x20header\x
SF:20key\x20value</p>\r\n</body>\r\n</html>\r\n");
Device type: switch
Running: HP embedded
OS CPE: cpe:/h:hp:procurve_switch_4000m
OS details: HP 4000M ProCurve switch (J4121A)
Network Distance: 13 hops
TCP Sequence Prediction: Difficulty=259 (Good luck!)
IP ID Sequence Generation: Randomized
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.59 ms router1-lon.linode.com (212.111.33.229)
2 1.15 ms 212.111.33.233
3 1.04 ms te0-7-1-6.rcr21.b015591-1.lon01.atlas.cogentco.com (149.11.30.61)
4 1.30 ms be2572.ccr21.lon01.atlas.cogentco.com (154.54.38.105)
5 1.71 ms be2178.ccr42.lon13.atlas.cogentco.com (130.117.50.206)
6 77.71 ms be2286.ccr41.lon13.atlas.cogentco.com (130.117.50.245)
7 75.06 ms be2386.ccr21.bos01.atlas.cogentco.com (154.54.44.161)
8 90.92 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158)
9 91.22 ms be2034.ccr21.atl04.atlas.cogentco.com (154.54.6.114)
10 92.64 ms 38.122.46.14
11 100.11 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222)
12 ...
13 99.92 ms 168.11.48.100
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 114.80 seconds
Raw packets sent: 271 (14.492KB) | Rcvd: 1010 (75.029KB)
----------------------
Starting Nmap 6.00 ( http://nmap.org ) at 2015-09-15 17:36 EEST
NSE: Loaded 17 scripts for scanning.
Initiating Ping Scan at 17:36
Scanning 168.11.48.100 [4 ports]
Completed Ping Scan at 17:36, 0.13s elapsed (1 total hosts)
Initiating UDP Scan at 17:36
Scanning 168.11.48.100 [100 ports]
Completed UDP Scan at 17:36, 1.74s elapsed (100 total ports)
Initiating Service scan at 17:36
Scanning 100 services on 168.11.48.100
Service scan Timing: About 2.00% done; ETC: 18:44 (1:06:58 remaining)
Service scan Timing: About 32.00% done; ETC: 17:44 (0:05:40 remaining)
Service scan Timing: About 62.00% done; ETC: 17:42 (0:02:28 remaining)
Completed Service scan at 17:41, 330.24s elapsed (100 services on 1 host)
Initiating OS detection (try #1) against 168.11.48.100
Retrying OS detection (try #2) against 168.11.48.100
NSE: Script scanning 168.11.48.100.
Initiating NSE at 17:42
Completed NSE at 17:42, 3.01s elapsed
[+] Nmap scan report for 168.11.48.100
Host is up (0.10s latency).
All 100 scanned ports on 168.11.48.100 are open|filtered
Too many fingerprints match this host to give specific OS details
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 338.81 seconds
Raw packets sent: 153 (10.261KB) | Rcvd: 45 (4.126KB)