Ip: 168.11.48.100 Whois: Georgia Department of Education GDOENET (NET-168-8-0-0-2) 168.8.0.0 - 168.11.255.255 Starting Nmap 6.00 ( http://nmap.org ) at 2015-09-15 17:23 EEST NSE: Loaded 17 scripts for scanning. Initiating Ping Scan at 17:23 Scanning 168.11.48.100 [4 ports] Completed Ping Scan at 17:23, 0.13s elapsed (1 total hosts) Initiating SYN Stealth Scan at 17:23 Scanning 168.11.48.100 [100 ports] Discovered open port 443/tcp on 168.11.48.100 Completed SYN Stealth Scan at 17:23, 2.35s elapsed (100 total ports) Initiating Service scan at 17:23 Scanning 1 service on 168.11.48.100 Completed Service scan at 17:25, 107.18s elapsed (1 service on 1 host) Initiating OS detection (try #1) against 168.11.48.100 Initiating Traceroute at 17:25 Completed Traceroute at 17:25, 2.02s elapsed NSE: Script scanning 168.11.48.100. Initiating NSE at 17:25 Completed NSE at 17:25, 0.21s elapsed [+] Nmap scan report for 168.11.48.100 Host is up (0.100s latency). Not shown: 99 filtered ports PORT STATE SERVICE VERSION 443/tcp open ssl/https? 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : SF-Port443-TCP:V=6.00%T=SSL%I=7%D=9/15%Time=55F82A06%P=x86_64-unknown-linu SF:x-gnu%r(GetRequest,1BB,"HTTP/1\.0\x20200\x20OK\r\nDate:\x20Tue,\x2015\x SF:20Sep\x202015\x2014:24:02\x20GMT\r\nServer:\x20PanWeb\x20Server/\x20-\x SF:20\r\nContent-Length:\x20170\r\nContent-Type:\x20text/html\r\nConnectio SF:n:\x20close\r\nPragma:\x20private\r\nCache-Control:\x20private,\x20must SF:-revalidate,\x20post-check=0,\x20pre-check=0\r\nExpires:\x20Mon,\x2026\ SF:x20Jul\x201997\x2005:00:00\x20GMT\r\n\r\n\nwindow\.location=\"/global-protect/login\.esp\";\x20\n\n

JavaScript\x20must\x20be\x20enabled\x20to\x20c SF:ontinue!

")%r(GenericLines,159,"HTTP/1\.0\x20400\x20Ba SF:d\x20Request\r\nDate:\x20Tue,\x2015\x20Sep\x202015\x2014:24:03\x20GMT\r SF:\nServer:\x20PanWeb\x20Server/\x20-\x20\r\nContent-Length:\x20173\r\nCo SF:ntent-Type:\x20application/x-appweb-php\r\nConnection:\x20close\r\n\r\n SF:\r\nDocument\x20Error:\x20Bad\x20R SF:equest\r\n

Access\x20Error:\x20400\x20--\x20Bad SF:\x20Request

\r\n

Bad\x20header\x20format

\r\n\r\n\r\n")%r(HTTPOptions,15C,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nDate:\ SF:x20Tue,\x2015\x20Sep\x202015\x2014:24:04\x20GMT\r\nServer:\x20PanWeb\x2 SF:0Server/\x20-\x20\r\nContent-Length:\x20176\r\nContent-Type:\x20applica SF:tion/x-appweb-php\r\nConnection:\x20close\r\n\r\n\r\n SF:Document\x20Error:\x20Bad\x20Request\ SF:r\n

Access\x20Error:\x20400\x20--\x20Bad\x20Request

\r\n

Bad\x20header\x20key\x20value

\r\n\r\n\r\n")%r(RTSPRe SF:quest,15C,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2015\x2 SF:0Sep\x202015\x2014:24:04\x20GMT\r\nServer:\x20PanWeb\x20Server/\x20-\x2 SF:0\r\nContent-Length:\x20176\r\nContent-Type:\x20application/x-appweb-ph SF:p\r\nConnection:\x20close\r\n\r\n\r\nDocument\x20Error:\x20Bad\x20Request\r\n

Acc SF:ess\x20Error:\x20400\x20--\x20Bad\x20Request

\r\n

Bad\x20header\x SF:20key\x20value

\r\n\r\n\r\n"); Device type: switch Running: HP embedded OS CPE: cpe:/h:hp:procurve_switch_4000m OS details: HP 4000M ProCurve switch (J4121A) Network Distance: 13 hops TCP Sequence Prediction: Difficulty=259 (Good luck!) IP ID Sequence Generation: Randomized TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.59 ms router1-lon.linode.com (212.111.33.229) 2 1.15 ms 212.111.33.233 3 1.04 ms te0-7-1-6.rcr21.b015591-1.lon01.atlas.cogentco.com (149.11.30.61) 4 1.30 ms be2572.ccr21.lon01.atlas.cogentco.com (154.54.38.105) 5 1.71 ms be2178.ccr42.lon13.atlas.cogentco.com (130.117.50.206) 6 77.71 ms be2286.ccr41.lon13.atlas.cogentco.com (130.117.50.245) 7 75.06 ms be2386.ccr21.bos01.atlas.cogentco.com (154.54.44.161) 8 90.92 ms be2112.ccr41.atl01.atlas.cogentco.com (154.54.7.158) 9 91.22 ms be2034.ccr21.atl04.atlas.cogentco.com (154.54.6.114) 10 92.64 ms 38.122.46.14 11 100.11 ms be2113.ccr42.atl01.atlas.cogentco.com (154.54.24.222) 12 ... 13 99.92 ms 168.11.48.100 OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 114.80 seconds Raw packets sent: 271 (14.492KB) | Rcvd: 1010 (75.029KB) ---------------------- Starting Nmap 6.00 ( http://nmap.org ) at 2015-09-15 17:36 EEST NSE: Loaded 17 scripts for scanning. Initiating Ping Scan at 17:36 Scanning 168.11.48.100 [4 ports] Completed Ping Scan at 17:36, 0.13s elapsed (1 total hosts) Initiating UDP Scan at 17:36 Scanning 168.11.48.100 [100 ports] Completed UDP Scan at 17:36, 1.74s elapsed (100 total ports) Initiating Service scan at 17:36 Scanning 100 services on 168.11.48.100 Service scan Timing: About 2.00% done; ETC: 18:44 (1:06:58 remaining) Service scan Timing: About 32.00% done; ETC: 17:44 (0:05:40 remaining) Service scan Timing: About 62.00% done; ETC: 17:42 (0:02:28 remaining) Completed Service scan at 17:41, 330.24s elapsed (100 services on 1 host) Initiating OS detection (try #1) against 168.11.48.100 Retrying OS detection (try #2) against 168.11.48.100 NSE: Script scanning 168.11.48.100. Initiating NSE at 17:42 Completed NSE at 17:42, 3.01s elapsed [+] Nmap scan report for 168.11.48.100 Host is up (0.10s latency). All 100 scanned ports on 168.11.48.100 are open|filtered Too many fingerprints match this host to give specific OS details OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 338.81 seconds Raw packets sent: 153 (10.261KB) | Rcvd: 45 (4.126KB)