Starting Nmap 5.35DC1 ( http://nmap.org ) at 2010-11-24 13:14 CET
NSE: Loaded 49 scripts for scanning.
Initiating Ping Scan at 13:14
Scanning 255 hosts [8 ports/host]
Completed Ping Scan at 13:15, 19.43s elapsed (255 total hosts)
Initiating Parallel DNS resolution of 255 hosts. at 13:15
Completed Parallel DNS resolution of 255 hosts. at 13:15, 0.32s elapsed
Nmap scan report for 175.45.176.1 [host down]
Nmap scan report for 175.45.176.2 [host down]
Nmap scan report for 175.45.176.4 [host down]
Nmap scan report for 175.45.176.5 [host down]
Nmap scan report for 175.45.176.8 [host down]
Nmap scan report for 175.45.176.9 [host down]
Nmap scan report for 175.45.176.12 [host down]
Nmap scan report for 175.45.176.13 [host down]
Initiating SYN Stealth Scan at 13:15
Scanning 8 hosts [65535 ports/host]
Discovered open port 443/tcp on 175.45.176.14
Discovered open port 443/tcp on 175.45.176.7
Discovered open port 443/tcp on 175.45.176.6
Discovered open port 8080/tcp on 175.45.176.14
Discovered open port 80/tcp on 175.45.176.6
Discovered open port 80/tcp on 175.45.176.7
Discovered open port 80/tcp on 175.45.176.14
Discovered open port 25/tcp on 175.45.176.11
Discovered open port 110/tcp on 175.45.176.14
Discovered open port 25/tcp on 175.45.176.10
SYN Stealth Scan Timing: About 0.47% done
SYN Stealth Scan Timing: About 1.43% done; ETC: 14:26 (1:10:03 remaining)
SYN Stealth Scan Timing: About 2.84% done; ETC: 14:08 (0:51:58 remaining)
SYN Stealth Scan Timing: About 4.19% done; ETC: 14:03 (0:46:10 remaining)
SYN Stealth Scan Timing: About 5.67% done; ETC: 13:59 (0:41:52 remaining)
SYN Stealth Scan Timing: About 7.15% done; ETC: 13:57 (0:39:12 remaining)
SYN Stealth Scan Timing: About 9.36% done; ETC: 13:55 (0:36:57 remaining)
SYN Stealth Scan Timing: About 11.71% done; ETC: 13:54 (0:34:48 remaining)
SYN Stealth Scan Timing: About 14.63% done; ETC: 13:53 (0:32:46 remaining)
SYN Stealth Scan Timing: About 17.99% done; ETC: 13:52 (0:30:50 remaining)
SYN Stealth Scan Timing: About 21.80% done; ETC: 13:52 (0:28:56 remaining)
SYN Stealth Scan Timing: About 26.01% done; ETC: 13:51 (0:27:04 remaining)
SYN Stealth Scan Timing: About 30.42% done; ETC: 13:51 (0:25:12 remaining)
SYN Stealth Scan Timing: About 34.97% done; ETC: 13:51 (0:23:22 remaining)
SYN Stealth Scan Timing: About 39.67% done; ETC: 13:50 (0:21:32 remaining)
SYN Stealth Scan Timing: About 44.53% done; ETC: 13:50 (0:19:42 remaining)
SYN Stealth Scan Timing: About 49.48% done; ETC: 13:50 (0:17:53 remaining)
SYN Stealth Scan Timing: About 54.47% done; ETC: 13:50 (0:16:04 remaining)
SYN Stealth Scan Timing: About 59.52% done; ETC: 13:50 (0:14:18 remaining)
SYN Stealth Scan Timing: About 64.52% done; ETC: 13:50 (0:12:30 remaining)
SYN Stealth Scan Timing: About 69.54% done; ETC: 13:50 (0:10:43 remaining)
SYN Stealth Scan Timing: About 74.51% done; ETC: 13:50 (0:08:57 remaining)
SYN Stealth Scan Timing: About 79.70% done; ETC: 13:50 (0:07:09 remaining)
SYN Stealth Scan Timing: About 84.68% done; ETC: 13:50 (0:05:23 remaining)
SYN Stealth Scan Timing: About 89.71% done; ETC: 13:50 (0:03:37 remaining)
SYN Stealth Scan Timing: About 94.74% done; ETC: 13:50 (0:01:51 remaining)
Completed SYN Stealth Scan against 175.45.176.6 in 2094.20s (7 hosts left)
Completed SYN Stealth Scan against 175.45.176.11 in 2095.70s (6 hosts left)
Completed SYN Stealth Scan against 175.45.176.3 in 2101.00s (5 hosts left)
Completed SYN Stealth Scan against 175.45.176.10 in 2103.25s (4 hosts left)
Completed SYN Stealth Scan against 175.45.176.7 in 2105.36s (3 hosts left)
Completed SYN Stealth Scan against 175.45.176.14 in 2107.24s (2 hosts left)
Completed SYN Stealth Scan against 175.45.176.16 in 2107.67s (1 host left)
Completed SYN Stealth Scan at 13:50, 2109.66s elapsed (524280 total ports)
Initiating Service scan at 13:50
Scanning 10 services on 8 hosts
Service scan Timing: About 70.00% done; ETC: 13:52 (0:00:48 remaining)
Completed Service scan at 13:52, 137.43s elapsed (10 services on 8 hosts)
Initiating OS detection (try #1) against 8 hosts
Retrying OS detection (try #2) against 5 hosts
Initiating Traceroute at 13:52
Completed Traceroute at 13:52, 5.21s elapsed
Initiating Parallel DNS resolution of 31 hosts. at 13:52
Completed Parallel DNS resolution of 31 hosts. at 13:52, 0.18s elapsed
NSE: Script scanning 8 hosts.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 13:52
Completed NSE at 13:53, 31.51s elapsed
Nmap scan report for 175.45.176.3
Host is up (0.39s latency).
Not shown: 65527 closed ports
PORT STATE SERVICE VERSION
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
4444/tcp filtered krb524
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: firewall|webcam|router|WAP
Running: Cisco PIX OS 8.X, D-Link embedded, Linksys embedded, Planet embedded
OS details: Cisco ASA 5540 firewall (PIX OS 8.0), Linksys BEFSR41 EtherFast router or D-Link DCS-6620G webcam, Linksys BEFSR41 EtherFast router, Linksys BEFSR41 or RT31P2 router, or WRK54G WAP, Linksys BEFSR81 router, Linksys BEFW11S4 WAP, Linksys WRK54G WAP, Planet WAP-1950 WAP
Network Distance: 24 hops
TRACEROUTE (using port 1723/tcp)
HOP RTT ADDRESS
- Hops 1-23 are the same as for 175.45.176.15
24 387.10 ms 175.45.176.3
Nmap scan report for 175.45.176.6
Host is up (0.39s latency).
Not shown: 65533 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.2.3 ((Red Hat))
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_html-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux
443/tcp open ssl/http Apache httpd 2.2.3 ((Red Hat))
|_html-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.9 - 2.6.18
Uptime guess: 10.478 days (since Sun Nov 14 02:24:43 2010)
Network Distance: 24 hops
TCP Sequence Prediction: Difficulty=254 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
- Hops 1-23 are the same as for 175.45.176.15
24 386.42 ms 175.45.176.6
Nmap scan report for 175.45.176.7
Host is up (0.39s latency).
Not shown: 65533 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.2.3 ((Red Hat))
|_html-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
443/tcp open ssl/http Apache httpd 2.2.3 ((Red Hat))
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_html-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.9 - 2.6.18
Uptime guess: 10.478 days (since Sun Nov 14 02:24:27 2010)
Network Distance: 24 hops
TCP Sequence Prediction: Difficulty=259 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
- Hops 1-23 are the same as for 175.45.176.15
24 384.88 ms 175.45.176.7
Nmap scan report for 175.45.176.10
Host is up (0.39s latency).
Not shown: 65534 filtered ports
PORT STATE SERVICE VERSION
25/tcp open smtp?
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: phone|firewall|general purpose
Running (JUST GUESSING) : Nokia Symbian OS (89%), Juniper embedded (89%), FreeBSD 6.X (88%)
Aggressive OS guesses: Nokia N81 mobile phone (Symbian OS) (89%), Juniper Networks SSG 20 firewall (89%), FreeBSD 6.2-RELEASE (88%), FreeBSD 6.3-RELEASE (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 24 hops
TCP Sequence Prediction: Difficulty=259 (Good luck!)
IP ID Sequence Generation: Incremental
TRACEROUTE (using port 25/tcp)
HOP RTT ADDRESS
- Hops 1-23 are the same as for 175.45.176.15
24 386.03 ms 175.45.176.10
Nmap scan report for 175.45.176.11
Host is up (0.39s latency).
Not shown: 65534 filtered ports
PORT STATE SERVICE VERSION
25/tcp open smtp?
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: phone|firewall|general purpose
Running (JUST GUESSING) : Nokia Symbian OS (89%), Juniper embedded (89%), FreeBSD 6.X (88%)
Aggressive OS guesses: Nokia N81 mobile phone (Symbian OS) (89%), Juniper Networks SSG 20 firewall (89%), FreeBSD 6.2-RELEASE (88%), FreeBSD 6.3-RELEASE (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 24 hops
TCP Sequence Prediction: Difficulty=264 (Good luck!)
IP ID Sequence Generation: Incremental
TRACEROUTE (using port 25/tcp)
HOP RTT ADDRESS
- Hops 1-23 are the same as for 175.45.176.15
24 385.58 ms 175.45.176.11
Nmap scan report for 175.45.176.14
Host is up (0.39s latency).
Not shown: 65531 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.2.10 ((Unix) mod_ssl/2.2.10 OpenSSL/0.9.8g PHP/5.2.8)
| html-title: "Naenara"
|_Requested resource was http://175.45.176.14/en/
|_http-favicon: Unknown favicon MD5: 428881784FA088797E46E966BB5B0A54
|_http-methods: No Allow or Public header in OPTIONS response (status code 302)
110/tcp open pop3?
443/tcp open ssl/http Apache httpd 2.2.10 ((Unix) mod_ssl/2.2.10 OpenSSL/0.9.8g PHP/5.2.8)
|_sslv2: server still supports SSLv2
|_http-methods: No Allow or Public header in OPTIONS response (status code 302)
| html-title: "Naenara"
|_Requested resource was http://175.45.176.14/en/
|_http-favicon: Unknown favicon MD5: 428881784FA088797E46E966BB5B0A54
8080/tcp open http-proxy?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port8080-TCP:V=5.35DC1%I=7%D=11/24%Time=4CED0A0E%P=i686-redhat-linux-gnu%r(GetRequest,5A,"HTTP/1\.0\x20404\x20File\x20Not\x20Found\r\nContent-Type
SF::\x20text/html\r\n\r\nCould\x20not\x20parse\x20XSLT\x20file\r\n"
SF:)%r(FourOhFourRequest,6A,"HTTP/1\.0\x20404\x20File\x20Not\x20Found\r\nC
SF:ontent-Type:\x20text/html\r\n\r\nThe\x20file\x20you\x20requested\x20
SF:could\x20not\x20be\x20found\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|remote management|broadband router|phone|VoIP phone
Running (JUST GUESSING) : Linux 2.6.X (87%), HP embedded (86%), Linksys embedded (86%), Nokia Symbian OS (86%), Thomson embedded (86%)
Aggressive OS guesses: Linux 2.6.23 (87%), Linux 2.6.22 (Debian 4.0) (86%), Linux 2.6.24 (Debian) (86%), Linux 2.6.26 (86%), HP Onboard Administrator management console (86%), HP Onboard Administrator remote management for BladeSystem server enclosures (86%), Linksys WRV200 wireless broadband router (86%), Linux 2.6.15 (Ubuntu) (86%), Linux 2.6.15 - 2.6.26 (86%), Linux 2.6.24 (Ubuntu 8.04) (86%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 29.331 days (since Tue Oct 26 06:56:12 2010)
Network Distance: 25 hops
TCP Sequence Prediction: Difficulty=260 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
- Hops 1-23 are the same as for 175.45.176.15
24 ...
25 386.05 ms 175.45.176.14
Nmap scan report for 175.45.176.15
Host is up (0.39s latency).
All 65535 scanned ports on 175.45.176.15 are filtered
Too many fingerprints match this host to give specific OS details
Network Distance: 24 hops
TRACEROUTE (using proto 1/icmp)
HOP RTT ADDRESS
1 1.07 ms 10.255.255.253
2 0.29 ms vl-1998.gw-distp-a.bs.ka.oneandone.net (195.20.247.130)
3 0.20 ms te-1-2.bb-c.bs.kae.de.oneandone.net (212.227.121.205)
4 2.56 ms te-1-1.bb-c.act.fra.de.oneandone.net (212.227.120.54)
5 9.01 ms te-1-1.bb-c.nkf.ams.nl.oneandone.net (212.227.120.129)
6 9.63 ms xe-10-1-0.edge3.Amsterdam1.Level3.net (212.72.40.29)
7 9.61 ms ae-34-52.ebr2.Amsterdam1.Level3.net (4.69.139.161)
8 16.95 ms ae-48-48.ebr2.London1.Level3.net (4.69.143.82)
9 86.10 ms ae-44-44.ebr1.NewYork1.Level3.net (4.69.137.78)
10 94.29 ms ae-71-71.csw2.NewYork1.Level3.net (4.69.134.70)
11 85.95 ms ae-2-79.edge3.NewYork1.Level3.net (4.68.16.81)
12 86.33 ms 192.205.37.69
13 163.76 ms cr1.n54ny.ip.att.net (12.122.131.6)
14 164.90 ms cr2.cgcil.ip.att.net (12.122.1.2)
15 164.06 ms cr1.cgcil.ip.att.net (12.122.2.53)
16 162.22 ms cr2.dvmco.ip.att.net (12.122.31.85)
17 162.45 ms cr1.slkut.ip.att.net (12.122.30.25)
18 163.95 ms cr2.la2ca.ip.att.net (12.122.30.30)
19 164.32 ms cr84.la2ca.ip.att.net (12.123.30.249)
20 162.66 ms gar1.lsrca.ip.att.net (12.122.129.121)
21 328.08 ms 12.119.9.50
22 385.01 ms 219.158.32.174
23 386.50 ms 175.45.177.194
24 386.42 ms 175.45.176.15
Nmap scan report for 175.45.176.16
Host is up (0.39s latency).
All 65535 scanned ports on 175.45.176.16 are filtered
Too many fingerprints match this host to give specific OS details
Network Distance: 24 hops
TRACEROUTE (using proto 1/icmp)
HOP RTT ADDRESS
- Hops 1-23 are the same as for 175.45.176.15
24 386.55 ms 175.45.176.16
Nmap scan report for 175.45.176.17 [host down]
Nmap scan report for 175.45.176.18 [host down]
Nmap scan report for 175.45.176.19 [host down]
Nmap scan report for 175.45.176.20 [host down]
Nmap scan report for 175.45.176.21 [host down]
Nmap scan report for 175.45.176.22 [host down]
Nmap scan report for 175.45.176.23 [host down]
Nmap scan report for 175.45.176.24 [host down]
Nmap scan report for 175.45.176.25 [host down]
Nmap scan report for 175.45.176.26 [host down]
Nmap scan report for 175.45.176.27 [host down]
Nmap scan report for 175.45.176.28 [host down]
Nmap scan report for 175.45.176.29 [host down]
Nmap scan report for 175.45.176.30 [host down]
Nmap scan report for 175.45.176.31 [host down]
Nmap scan report for 175.45.176.32 [host down]
Nmap scan report for 175.45.176.33 [host down]
Nmap scan report for 175.45.176.34 [host down]
Nmap scan report for 175.45.176.35 [host down]
Nmap scan report for 175.45.176.36 [host down]
Nmap scan report for 175.45.176.37 [host down]
Nmap scan report for 175.45.176.38 [host down]
Nmap scan report for 175.45.176.39 [host down]
Nmap scan report for 175.45.176.40 [host down]
Nmap scan report for 175.45.176.41 [host down]
Nmap scan report for 175.45.176.42 [host down]
Nmap scan report for 175.45.176.43 [host down]
Nmap scan report for 175.45.176.44 [host down]
Nmap scan report for 175.45.176.45 [host down]
Nmap scan report for 175.45.176.46 [host down]
Nmap scan report for 175.45.176.47 [host down]
Nmap scan report for 175.45.176.48 [host down]
Nmap scan report for 175.45.176.49 [host down]
Nmap scan report for 175.45.176.50 [host down]
Nmap scan report for 175.45.176.51 [host down]
Nmap scan report for 175.45.176.52 [host down]
Nmap scan report for 175.45.176.53 [host down]
Nmap scan report for 175.45.176.54 [host down]
Nmap scan report for 175.45.176.55 [host down]
Nmap scan report for 175.45.176.56 [host down]
Nmap scan report for 175.45.176.57 [host down]
Nmap scan report for 175.45.176.58 [host down]
Nmap scan report for 175.45.176.59 [host down]
Nmap scan report for 175.45.176.60 [host down]
Nmap scan report for 175.45.176.62 [host down]
Nmap scan report for 175.45.176.63 [host down]
Nmap scan report for 175.45.176.64 [host down]
Nmap scan report for 175.45.176.65 [host down]
Nmap scan report for 175.45.176.66 [host down]
Nmap scan report for 175.45.176.67 [host down]
Nmap scan report for 175.45.176.68 [host down]
Nmap scan report for 175.45.176.69 [host down]
Nmap scan report for 175.45.176.70 [host down]
Nmap scan report for 175.45.176.71 [host down]
Nmap scan report for 175.45.176.72 [host down]
Nmap scan report for 175.45.176.73 [host down]
Nmap scan report for 175.45.176.74 [host down]
Nmap scan report for 175.45.176.75 [host down]
Nmap scan report for 175.45.176.76 [host down]
Nmap scan report for 175.45.176.77 [host down]
Nmap scan report for 175.45.176.78 [host down]
Nmap scan report for 175.45.176.79 [host down]
Nmap scan report for 175.45.176.80 [host down]
Nmap scan report for 175.45.176.81 [host down]
Nmap scan report for 175.45.176.82 [host down]
Nmap scan report for 175.45.176.83 [host down]
Nmap scan report for 175.45.176.84 [host down]
Nmap scan report for 175.45.176.85 [host down]
Nmap scan report for 175.45.176.86 [host down]
Nmap scan report for 175.45.176.87 [host down]
Nmap scan report for 175.45.176.88 [host down]
Nmap scan report for 175.45.176.89 [host down]
Nmap scan report for 175.45.176.90 [host down]
Nmap scan report for 175.45.176.91 [host down]
Nmap scan report for 175.45.176.92 [host down]
Nmap scan report for 175.45.176.93 [host down]
Nmap scan report for 175.45.176.94 [host down]
Nmap scan report for 175.45.176.95 [host down]
Nmap scan report for 175.45.176.96 [host down]
Nmap scan report for 175.45.176.97 [host down]
Nmap scan report for 175.45.176.98 [host down]
Nmap scan report for 175.45.176.99 [host down]
Nmap scan report for 175.45.176.100 [host down]
Nmap scan report for 175.45.176.101 [host down]
Nmap scan report for 175.45.176.102 [host down]
Nmap scan report for 175.45.176.103 [host down]
Nmap scan report for 175.45.176.104 [host down]
Nmap scan report for 175.45.176.105 [host down]
Nmap scan report for 175.45.176.106 [host down]
Nmap scan report for 175.45.176.107 [host down]
Nmap scan report for 175.45.176.108 [host down]
Nmap scan report for 175.45.176.109 [host down]
Nmap scan report for 175.45.176.110 [host down]
Nmap scan report for 175.45.176.111 [host down]
Nmap scan report for 175.45.176.112 [host down]
Nmap scan report for 175.45.176.113 [host down]
Nmap scan report for 175.45.176.114 [host down]
Nmap scan report for 175.45.176.115 [host down]
Nmap scan report for 175.45.176.116 [host down]
Nmap scan report for 175.45.176.117 [host down]
Nmap scan report for 175.45.176.118 [host down]
Nmap scan report for 175.45.176.119 [host down]
Nmap scan report for 175.45.176.120 [host down]
Nmap scan report for 175.45.176.121 [host down]
Nmap scan report for 175.45.176.122 [host down]
Nmap scan report for 175.45.176.123 [host down]
Nmap scan report for 175.45.176.124 [host down]
Nmap scan report for 175.45.176.125 [host down]
Nmap scan report for 175.45.176.126 [host down]
Nmap scan report for 175.45.176.127 [host down]
Nmap scan report for 175.45.176.128 [host down]
Nmap scan report for 175.45.176.130 [host down]
Nmap scan report for 175.45.176.132 [host down]
Nmap scan report for 175.45.176.133 [host down]
Nmap scan report for 175.45.176.134 [host down]
Nmap scan report for 175.45.176.135 [host down]
Nmap scan report for 175.45.176.136 [host down]
Nmap scan report for 175.45.176.137 [host down]
Nmap scan report for 175.45.176.138 [host down]
Nmap scan report for 175.45.176.139 [host down]
Nmap scan report for 175.45.176.140 [host down]
Nmap scan report for 175.45.176.141 [host down]
Nmap scan report for 175.45.176.142 [host down]
Nmap scan report for 175.45.176.143 [host down]
Nmap scan report for 175.45.176.144 [host down]
Nmap scan report for 175.45.176.145 [host down]
Nmap scan report for 175.45.176.146 [host down]
Nmap scan report for 175.45.176.147 [host down]
Nmap scan report for 175.45.176.148 [host down]
Nmap scan report for 175.45.176.149 [host down]
Nmap scan report for 175.45.176.150 [host down]
Nmap scan report for 175.45.176.151 [host down]
Nmap scan report for 175.45.176.152 [host down]
Nmap scan report for 175.45.176.153 [host down]
Nmap scan report for 175.45.176.154 [host down]
Nmap scan report for 175.45.176.155 [host down]
Nmap scan report for 175.45.176.156 [host down]
Nmap scan report for 175.45.176.157 [host down]
Nmap scan report for 175.45.176.158 [host down]
Nmap scan report for 175.45.176.159 [host down]
Nmap scan report for 175.45.176.160 [host down]
Nmap scan report for 175.45.176.161 [host down]
Nmap scan report for 175.45.176.162 [host down]
Nmap scan report for 175.45.176.163 [host down]
Nmap scan report for 175.45.176.164 [host down]
Nmap scan report for 175.45.176.165 [host down]
Nmap scan report for 175.45.176.166 [host down]
Nmap scan report for 175.45.176.167 [host down]
Nmap scan report for 175.45.176.168 [host down]
Nmap scan report for 175.45.176.169 [host down]
Nmap scan report for 175.45.176.170 [host down]
Nmap scan report for 175.45.176.171 [host down]
Nmap scan report for 175.45.176.172 [host down]
Nmap scan report for 175.45.176.173 [host down]
Nmap scan report for 175.45.176.174 [host down]
Nmap scan report for 175.45.176.175 [host down]
Nmap scan report for 175.45.176.176 [host down]
Nmap scan report for 175.45.176.177 [host down]
Nmap scan report for 175.45.176.178 [host down]
Nmap scan report for 175.45.176.179 [host down]
Nmap scan report for 175.45.176.180 [host down]
Nmap scan report for 175.45.176.181 [host down]
Nmap scan report for 175.45.176.182 [host down]
Nmap scan report for 175.45.176.183 [host down]
Nmap scan report for 175.45.176.184 [host down]
Nmap scan report for 175.45.176.185 [host down]
Nmap scan report for 175.45.176.186 [host down]
Nmap scan report for 175.45.176.187 [host down]
Nmap scan report for 175.45.176.188 [host down]
Nmap scan report for 175.45.176.189 [host down]
Nmap scan report for 175.45.176.190 [host down]
Nmap scan report for 175.45.176.191 [host down]
Nmap scan report for 175.45.176.192 [host down]
Nmap scan report for 175.45.176.193 [host down]
Nmap scan report for 175.45.176.194 [host down]
Nmap scan report for 175.45.176.195 [host down]
Nmap scan report for 175.45.176.196 [host down]
Nmap scan report for 175.45.176.197 [host down]
Nmap scan report for 175.45.176.198 [host down]
Nmap scan report for 175.45.176.199 [host down]
Nmap scan report for 175.45.176.200 [host down]
Nmap scan report for 175.45.176.201 [host down]
Nmap scan report for 175.45.176.202 [host down]
Nmap scan report for 175.45.176.203 [host down]
Nmap scan report for 175.45.176.204 [host down]
Nmap scan report for 175.45.176.205 [host down]
Nmap scan report for 175.45.176.206 [host down]
Nmap scan report for 175.45.176.207 [host down]
Nmap scan report for 175.45.176.208 [host down]
Nmap scan report for 175.45.176.209 [host down]
Nmap scan report for 175.45.176.210 [host down]
Nmap scan report for 175.45.176.211 [host down]
Nmap scan report for 175.45.176.212 [host down]
Nmap scan report for 175.45.176.213 [host down]
Nmap scan report for 175.45.176.214 [host down]
Nmap scan report for 175.45.176.215 [host down]
Nmap scan report for 175.45.176.216 [host down]
Nmap scan report for 175.45.176.217 [host down]
Nmap scan report for 175.45.176.218 [host down]
Nmap scan report for 175.45.176.219 [host down]
Nmap scan report for 175.45.176.220 [host down]
Nmap scan report for 175.45.176.221 [host down]
Nmap scan report for 175.45.176.222 [host down]
Nmap scan report for 175.45.176.223 [host down]
Nmap scan report for 175.45.176.224 [host down]
Nmap scan report for 175.45.176.225 [host down]
Nmap scan report for 175.45.176.226 [host down]
Nmap scan report for 175.45.176.227 [host down]
Nmap scan report for 175.45.176.228 [host down]
Nmap scan report for 175.45.176.229 [host down]
Nmap scan report for 175.45.176.230 [host down]
Nmap scan report for 175.45.176.231 [host down]
Nmap scan report for 175.45.176.232 [host down]
Nmap scan report for 175.45.176.233 [host down]
Nmap scan report for 175.45.176.234 [host down]
Nmap scan report for 175.45.176.235 [host down]
Nmap scan report for 175.45.176.236 [host down]
Nmap scan report for 175.45.176.237 [host down]
Nmap scan report for 175.45.176.238 [host down]
Nmap scan report for 175.45.176.239 [host down]
Nmap scan report for 175.45.176.240 [host down]
Nmap scan report for 175.45.176.241 [host down]
Nmap scan report for 175.45.176.242 [host down]
Nmap scan report for 175.45.176.243 [host down]
Nmap scan report for 175.45.176.244 [host down]
Nmap scan report for 175.45.176.245 [host down]
Nmap scan report for 175.45.176.246 [host down]
Nmap scan report for 175.45.176.247 [host down]
Nmap scan report for 175.45.176.248 [host down]
Nmap scan report for 175.45.176.249 [host down]
Nmap scan report for 175.45.176.250 [host down]
Nmap scan report for 175.45.176.251 [host down]
Nmap scan report for 175.45.176.252 [host down]
Nmap scan report for 175.45.176.253 [host down]
Nmap scan report for 175.45.176.254 [host down]
Nmap scan report for 175.45.176.255 [host down]
Initiating SYN Stealth Scan at 13:53
Scanning 3 hosts [65535 ports/host]
Discovered open port 25/tcp on 175.45.176.61
SYN Stealth Scan Timing: About 2.08% done; ETC: 14:18 (0:24:23 remaining)
SYN Stealth Scan Timing: About 5.61% done; ETC: 14:11 (0:17:06 remaining)
SYN Stealth Scan Timing: About 10.64% done; ETC: 14:07 (0:12:44 remaining)
SYN Stealth Scan Timing: About 15.05% done; ETC: 14:06 (0:11:23 remaining)
SYN Stealth Scan Timing: About 20.38% done; ETC: 14:05 (0:09:50 remaining)
SYN Stealth Scan Timing: About 28.03% done; ETC: 14:06 (0:09:09 remaining)
SYN Stealth Scan Timing: About 33.33% done; ETC: 14:05 (0:08:08 remaining)
SYN Stealth Scan Timing: About 38.28% done; ETC: 14:05 (0:07:22 remaining)
SYN Stealth Scan Timing: About 45.05% done; ETC: 14:05 (0:06:44 remaining)
SYN Stealth Scan Timing: About 49.79% done; ETC: 14:05 (0:06:04 remaining)
SYN Stealth Scan Timing: About 55.15% done; ETC: 14:05 (0:05:28 remaining)
SYN Stealth Scan Timing: About 61.09% done; ETC: 14:05 (0:04:47 remaining)
SYN Stealth Scan Timing: About 66.76% done; ETC: 14:05 (0:04:00 remaining)
SYN Stealth Scan Timing: About 71.90% done; ETC: 14:05 (0:03:21 remaining)
SYN Stealth Scan Timing: About 78.24% done; ETC: 14:05 (0:02:31 remaining)
SYN Stealth Scan Timing: About 85.01% done; ETC: 14:04 (0:01:41 remaining)
SYN Stealth Scan Timing: About 91.33% done; ETC: 14:04 (0:00:57 remaining)
Completed SYN Stealth Scan against 175.45.176.61 in 652.75s (2 hosts left)
Completed SYN Stealth Scan against 175.45.176.129 in 653.58s (1 host left)
Completed SYN Stealth Scan at 14:04, 663.15s elapsed (196605 total ports)
Initiating Service scan at 14:04
Scanning 1 service on 3 hosts
Completed Service scan at 14:06, 137.45s elapsed (1 service on 3 hosts)
Initiating OS detection (try #1) against 3 hosts
Retrying OS detection (try #2) against 2 hosts
Initiating Traceroute at 14:06
Completed Traceroute at 14:06, 0.78s elapsed
Initiating Parallel DNS resolution of 26 hosts. at 14:06
Completed Parallel DNS resolution of 26 hosts. at 14:06, 0.11s elapsed
NSE: Script scanning 3 hosts.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 14:06
Completed NSE at 14:07, 30.40s elapsed
Nmap scan report for 175.45.176.61
Host is up (0.39s latency).
Not shown: 65534 filtered ports
PORT STATE SERVICE VERSION
25/tcp open smtp?
|_smtp-commands: Couldn't establish connection on port 25
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: phone|firewall|general purpose
Running (JUST GUESSING) : Nokia Symbian OS (89%), Juniper embedded (89%), FreeBSD 6.X (88%)
Aggressive OS guesses: Nokia N81 mobile phone (Symbian OS) (89%), Juniper Networks SSG 20 firewall (89%), FreeBSD 6.2-RELEASE (88%), FreeBSD 6.3-RELEASE (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 24 hops
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: Incremental
TRACEROUTE (using port 25/tcp)
HOP RTT ADDRESS
- Hops 1-23 are the same as for 175.45.176.15
24 385.89 ms 175.45.176.61
Nmap scan report for 175.45.176.129
Host is up (0.39s latency).
Not shown: 65527 closed ports
PORT STATE SERVICE VERSION
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
4444/tcp filtered krb524
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: firewall|webcam|router|WAP
Running: Cisco PIX OS 8.X, D-Link embedded, Linksys embedded, Planet embedded
OS details: Cisco ASA 5540 firewall (PIX OS 8.0), Linksys BEFSR41 EtherFast router or D-Link DCS-6620G webcam, Linksys BEFSR41 EtherFast router, Linksys BEFSR41 or RT31P2 router, or WRK54G WAP, Linksys BEFSR81 router, Linksys BEFW11S4 WAP, Linksys WRK54G WAP, Planet WAP-1950 WAP
Network Distance: 24 hops
TRACEROUTE (using port 1720/tcp)
HOP RTT ADDRESS
- Hops 1-23 are the same as for 175.45.176.15
24 385.62 ms 175.45.176.129
Nmap scan report for 175.45.176.131
Host is up (0.39s latency).
Not shown: 65527 closed ports
PORT STATE SERVICE VERSION
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
4444/tcp filtered krb524
Too many fingerprints match this host to give specific OS details
Network Distance: 23 hops
TRACEROUTE (using port 1723/tcp)
HOP RTT ADDRESS
- Hops 1-22 are the same as for 175.45.176.15
23 385.51 ms 175.45.176.131
Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 255 IP addresses (11 hosts up) scanned in 3167.77 seconds
Raw packets sent: 1256020 (55.292MB) | Rcvd: 204816 (8.239MB)