60.190.154.158hostname: 60.190.154.158
|
# Nmap 7.60 scan initiated Sun Jul 30 02:23:49 2023 as: nmap -oA data/nweb.yvg5plnpd7 -sC -sV --open -Pn --system-dns -p 444, 1723 60.190.154.158 Nmap scan report for 60.190.154.158 Host is up (0.15s latency). Not shown: 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 444/tcp open ssl/http Cisco ASA 5510 firewall http config | http-title: Cisco ASDM 6.4(5) |_Requested resource was /admin/public/index.html | ssl-cert: Subject: commonName=60.190.154.158 | Not valid before: 2003-01-01T00:01:16 |_Not valid after: 2012-12-29T00:01:16 |_ssl-date: 2023-07-30T09:24:03+00:00; -4s from scanner time. Service Info: Device: firewall; CPE: cpe:/h:cisco:asa_5510 Host script results: |_clock-skew: mean: -4s, deviation: 0s, median: -4s Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:24:14 2023 -- 1 IP address (1 host up) scanned in 24.95 seconds |
202.66.174.112hostname: web-22.znetlive.in
|
# Nmap 7.60 scan initiated Sun Jul 30 02:22:43 2023 as: nmap -oA data/nweb.nl42z5kxip -sC -sV --open -Pn --system-dns -p 21, 80, 135, 443, 445, 2000, 3306, 5060, 8081, 49153, 49154 202.66.174.112 Nmap scan report for web-22.znetlive.in (202.66.174.112) Host is up (0.25s latency). Not shown: 5 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd | ftp-syst: |_ SYST: Windows_NT 80/tcp open http Microsoft IIS httpd 10.0 | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/10.0 |_http-title: IIS Windows Server 135/tcp open msrpc Microsoft Windows RPC 443/tcp open ssl/http Microsoft IIS httpd 10.0 | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/10.0 |_http-title: Did not follow redirect to https://web-22.znetlive.in/Default.aspx?pid=Login&ReturnUrl=/ | ssl-cert: Subject: commonName=*.znetindia.net | Subject Alternative Name: DNS:*.znetindia.net, DNS:znetindia.net | Not valid before: 2023-01-18T07:00:43 |_Not valid after: 2024-02-19T07:00:42 |_ssl-date: 2023-07-30T09:23:11+00:00; -1s from scanner time. |_sstp-discover: SSTP is supported. 445/tcp open microsoft-ds? 8081/tcp open blackice-icecap? | fingerprint-strings: | HTTPOptions: | HTTP/1.1 404 Not Found | Content-Type: text/plain; charset=utf-8 | Content-Length: 13 |_ Found 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port8081-TCP:V=7.60%I=7%D=7/30%Time=64C62BF4%P=x86_64-pc-linux-gnu%r(HT SF:TPOptions,64,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Type:\x20text SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2013\r\n\r\n404\x20Not\x20 SF:Found"); Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: |_clock-skew: mean: -1s, deviation: 0s, median: -1s | smb2-security-mode: | 2.02: |_ Message signing enabled but not required | smb2-time: | date: 2023-07-30 02:23:14 |_ start_date: 1600-12-31 16:07:02 Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:23:52 2023 -- 1 IP address (1 host up) scanned in 68.69 seconds |
118.201.125.114hostname: 118.201.125.114
|
# Nmap 7.60 scan initiated Sun Jul 30 02:23:02 2023 as: nmap -oA data/nweb.xpqtwgnhw3 -sC -sV --open -Pn --system-dns -p 1720 118.201.125.114 Nmap scan report for 118.201.125.114 Host is up (0.19s latency). PORT STATE SERVICE VERSION 1720/tcp open h323q931 Polycom ViewStation H.323 Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:23:41 2023 -- 1 IP address (1 host up) scanned in 39.24 seconds |
141.96.6.64hostname: mail.candriam.com
|
# Nmap 7.60 scan initiated Sun Jul 30 02:22:19 2023 as: nmap -oA data/nweb.ps9qta5162 -sC -sV --open -Pn --system-dns -p 25 141.96.6.64 Nmap scan report for mail.candriam.com (141.96.6.64) Host is up (0.16s latency). PORT STATE SERVICE VERSION 25/tcp open smtp IronPort smtpd | smtp-commands: mail.candriam.com, 8BITMIME, SIZE 26214400, STARTTLS, |_ The following commands are recognized auth data ehlo helo help mail noop quit rcpt rset starttls vrfy | ssl-cert: Subject: commonName=mail.candriam.com/organizationName=Candriam/countryName=BE | Subject Alternative Name: DNS:mail.candriam.com, DNS:www.mail.candriam.com | Not valid before: 2023-05-04T00:00:00 |_Not valid after: 2024-06-03T23:59:59 |_ssl-date: TLS randomness does not represent time Service Info: OS: AsyncOS; Device: specialized; CPE: cpe:/o:cisco:asyncos Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:22:41 2023 -- 1 IP address (1 host up) scanned in 22.08 seconds |
86.92.231.54hostname: 86-92-231-54.fixed.kpn.net
|
# Nmap 7.60 scan initiated Sun Jul 30 02:21:25 2023 as: nmap -oA data/nweb.atdx498yn4 -sC -sV --open -Pn --system-dns -p 80, 8000 86.92.231.54 Nmap scan report for 86-92-231-54.fixed.kpn.net (86.92.231.54) Host is up (0.16s latency). PORT STATE SERVICE VERSION 80/tcp open http Hikvision Network Video Recorder http admin | http-methods: |_ Potentially risky methods: PUT DELETE |_http-server-header: DNVRS-Webs |_http-title: Site doesn't have a title (text/html). 8000/tcp open ipcam Hikvision IPCam control port Service Info: Device: webcam Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:22:23 2023 -- 1 IP address (1 host up) scanned in 58.97 seconds |
163.209.59.5hostname: lss.kic.kagoshima-u.ac.jp
|
# Nmap 7.60 scan initiated Sun Jul 30 02:21:57 2023 as: nmap -oA data/nweb.j9ey6o6rgd -sC -sV --open -Pn --system-dns -p 80, 443 163.209.59.5 Nmap scan report for lss.kic.kagoshima-u.ac.jp (163.209.59.5) Host is up (0.12s latency). PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 8.5 | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/8.5 |_http-title: IIS Windows Server 443/tcp open ssl/http Microsoft IIS httpd 8.5 | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/8.5 |_http-title: IIS Windows Server | ssl-cert: Subject: commonName=lss.kic.kagoshima-u.ac.jp/organizationName=Kagoshima University/stateOrProvinceName=Kagoshima/countryName=JP | Subject Alternative Name: DNS:lss.kic.kagoshima-u.ac.jp | Not valid before: 2023-03-09T07:17:25 |_Not valid after: 2024-04-08T07:17:25 Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:22:20 2023 -- 1 IP address (1 host up) scanned in 23.66 seconds |
206.112.176.45hostname: 206.112.176.45
|
# Nmap 7.60 scan initiated Sun Jul 30 02:22:11 2023 as: nmap -oA data/nweb.pfxlas50a4 -sC -sV --open -Pn --system-dns -p 179 206.112.176.45 Nmap scan report for 206.112.176.45 Host is up (0.062s latency). PORT STATE SERVICE VERSION 179/tcp open tcpwrapped Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:22:17 2023 -- 1 IP address (1 host up) scanned in 5.95 seconds |
189.202.203.130hostname: 130.189-202-203.bestelclientes.com.mx
|
# Nmap 7.60 scan initiated Sun Jul 30 02:21:44 2023 as: nmap -oA data/nweb.4i921xsqu2 -sC -sV --open -Pn --system-dns -p 22, 53, 443 189.202.203.130 Nmap scan report for 130.189-202-203.bestelclientes.com.mx (189.202.203.130) Host is up (0.085s latency). Not shown: 1 closed port, 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 443/tcp open ssl/http SonicWALL firewall http config |_http-server-header: SonicWALL | http-title: Site doesn't have a title (text/html; charset=UTF-8;). |_Requested resource was https://130.189-202-203.bestelclientes.com.mx/sonicui/7/login/ | ssl-cert: Subject: commonName=192.168.168.168/organizationName=HTTPS Management Certificate for SonicWALL (self-signed)/stateOrProvinceName=California/countryName=US | Not valid before: 1970-01-01T00:00:01 |_Not valid after: 2038-01-19T03:14:07 Service Info: Device: firewall Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:22:03 2023 -- 1 IP address (1 host up) scanned in 18.82 seconds |
61.71.99.124hostname: host-61-71-99-124.static.kbtelecom.net
|
# Nmap 7.60 scan initiated Sun Jul 30 02:21:41 2023 as: nmap -oA data/nweb.fdlw6une5a -sC -sV --open -Pn --system-dns -p 80 61.71.99.124 Nmap scan report for host-61-71-99-124.static.kbtelecom.net (61.71.99.124) Host is up (0.17s latency). PORT STATE SERVICE VERSION 80/tcp open http AkamaiGHost (Akamai's HTTP Acceleration/Mirror service) |_http-server-header: AkamaiGHost |_http-title: Invalid URL Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:21:54 2023 -- 1 IP address (1 host up) scanned in 12.87 seconds |
165.3.5.61hostname: 165.3.5.61
|
# Nmap 7.60 scan initiated Sun Jul 30 02:20:23 2023 as: nmap -oA data/nweb.2x6xn4pzfr -sC -sV --open -Pn --system-dns -p 22, 80 165.3.5.61 Nmap scan report for 165.3.5.61 Host is up (0.0023s latency). PORT STATE SERVICE VERSION 22/tcp open tcpwrapped 80/tcp open tcpwrapped Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:21:30 2023 -- 1 IP address (1 host up) scanned in 67.68 seconds |
90.160.190.141hostname: 141.pool90-160-190.dynamic.orange.es
|
# Nmap 7.60 scan initiated Sun Jul 30 02:21:01 2023 as: nmap -oA data/nweb.r4u6h1zwtg -sC -sV --open -Pn --system-dns -p 80 90.160.190.141 Nmap scan report for 141.pool90-160-190.dynamic.orange.es (90.160.190.141) Host is up (0.18s latency). PORT STATE SERVICE VERSION 80/tcp open http AuraHyperCache | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 403 Forbidden | Server: AuraHyperCache | Date: Sun, 30 Jul 2023 09:21:10 GMT | Content-Type: text/html | Content-Length: 134 | Connection: close | <html> | <head><title>403 Forbidden</title></head> | <body bgcolor="white"> | <center><h1>403 Forbidden</h1></center> | </body> | </html> | GetRequest: | HTTP/1.0 403 Forbidden | Server: AuraHyperCache | Date: Sun, 30 Jul 2023 09:21:08 GMT | Content-Type: text/html | Content-Length: 134 | Connection: close | <html> | <head><title>403 Forbidden</title></head> | <body bgcolor="white"> | <center><h1>403 Forbidden</h1></center> | </body> | </html> | HTTPOptions: | HTTP/1.0 403 Forbidden | Server: AuraHyperCache | Date: Sun, 30 Jul 2023 09:21:09 GMT | Content-Type: text/html | Content-Length: 134 | Connection: close | <html> | <head><title>403 Forbidden</title></head> | <body bgcolor="white"> | <center><h1>403 Forbidden</h1></center> | </body> | </html> | RPCCheck: | HTTP/1.0 400 Bad Request | Server: AuraHyperCache | Date: Sun, 30 Jul 2023 09:21:15 GMT | Content-Type: text/html | Content-Length: 138 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | X11Probe: | HTTP/1.0 400 Bad Request | Server: AuraHyperCache | Date: Sun, 30 Jul 2023 09:21:09 GMT | Content-Type: text/html | Content-Length: 138 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-server-header: AuraHyperCache |_http-title: 403 Forbidden 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.60%I=7%D=7/30%Time=64C62B84%P=x86_64-pc-linux-gnu%r(GetR SF:equest,11E,"HTTP/1\.0\x20403\x20Forbidden\r\nServer:\x20AuraHyperCache\ SF:r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:21:08\x20GMT\r\nContent-Typ SF:e:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x20close\r\n\r SF:\n<html>\r\n<head><title>403\x20Forbidden</title></head>\r\n<body\x20bg SF:color=\"white\">\r\n<center><h1>403\x20Forbidden</h1></center>\r\n</bod SF:y>\r\n</html>\r\n")%r(HTTPOptions,11E,"HTTP/1\.0\x20403\x20Forbidden\r\ SF:nServer:\x20AuraHyperCache\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009: SF:21:09\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20134\r\ SF:nConnection:\x20close\r\n\r\n<html>\r\n<head><title>403\x20Forbidden</t SF:itle></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>403\x20Forbi SF:dden</h1></center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,8A,"<html> SF:\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcol SF:or=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</b SF:ody>\r\n</html>\r\n")%r(X11Probe,124,"HTTP/1\.0\x20400\x20Bad\x20Reques SF:t\r\nServer:\x20AuraHyperCache\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2 SF:009:21:09\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2013 SF:8\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20R Click here to see the complete results for 90.160.190.141
|
59.50.95.43hostname: 59.50.95.43
|
# Nmap 7.60 scan initiated Sun Jul 30 02:20:59 2023 as: nmap -oA data/nweb.2pgi0a6ckx -sC -sV --open -Pn --system-dns -p 80 59.50.95.43 Nmap scan report for 59.50.95.43 Host is up (0.21s latency). PORT STATE SERVICE VERSION 80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Safedog/4.0.0 | http-title: Not Found |_Requested resource was /?WebShieldDRSessionVerify=tJg35r9gQjoRVN5wYIVw Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:21:16 2023 -- 1 IP address (1 host up) scanned in 17.68 seconds |
190.227.173.136hostname: host136.190-227-173.telecom.net.ar
|
# Nmap 7.60 scan initiated Sun Jul 30 02:20:28 2023 as: nmap -oA data/nweb.1jveibim2n -sC -sV --open -Pn --system-dns -p 22, 80 190.227.173.136 Nmap scan report for host136.190-227-173.telecom.net.ar (190.227.173.136) Host is up (0.21s latency). Not shown: 1 filtered port Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 22/tcp open ssh Dropbear sshd 2017.75 (protocol 2.0) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:21:08 2023 -- 1 IP address (1 host up) scanned in 40.31 seconds |
136.253.223.14hostname: host.slb.com
|
# Nmap 7.60 scan initiated Sun Jul 30 02:19:18 2023 as: nmap -oA data/nweb.kkaec0aimu -sC -sV --open -Pn --system-dns -p 443 136.253.223.14 Nmap scan report for host.slb.com (136.253.223.14) Host is up (0.043s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https? | fingerprint-strings: | NotesRPC: | CGP/01 |_ Citrix.TcpProxyService | ssl-cert: Subject: commonName=remoteapps.nam.gateway.slb.com/organizationName=Schlumberger/stateOrProvinceName=Texas/countryName=US | Subject Alternative Name: DNS:remoteapps.nam.gateway.slb.com, DNS:remoteapps.gateway.slb.com | Not valid before: 2023-03-06T13:52:19 |_Not valid after: 2024-03-15T13:52:19 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.60%T=SSL%I=7%D=7/30%Time=64C62B58%P=x86_64-pc-linux-gnu SF:%r(NotesRPC,3A,"\x1aCGP/01\xac\0\x02\0\0\0\x81\0\xa4\0\0\0\x01\0\0\0\x0 SF:1\x1c\x01\0\x01\0\0\x16Citrix\.TcpProxyService\x04\x03\0\0\x15"); Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:20:51 2023 -- 1 IP address (1 host up) scanned in 93.14 seconds |
216.101.17.250hostname: 216.101.17.250
|
# Nmap 7.60 scan initiated Sun Jul 30 02:19:57 2023 as: nmap -oA data/nweb.6j0ewizjnf -sC -sV --open -Pn --system-dns -p 80, 443 216.101.17.250 Nmap scan report for 216.101.17.250 Host is up (0.0042s latency). PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 301 Moved Permanently | Date: Sun, 30 Jul 2023 09:20:04 GMT | Content-Type: text/html | Content-Length: 157 | Connection: close | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak | Strict-Transport-Security: max-age=31536000; | <html> | <head><title>301 Moved Permanently</title></head> | <body> | <center><h1>301 Moved Permanently</h1></center> | <hr><center></center> | </body> | </html> | GetRequest, HTTPOptions: | HTTP/1.1 301 Moved Permanently | Date: Sun, 30 Jul 2023 09:20:04 GMT | Content-Type: text/html | Content-Length: 157 | Connection: close | Location: https:/// | Strict-Transport-Security: max-age=31536000; | <html> | <head><title>301 Moved Permanently</title></head> | <body> | <center><h1>301 Moved Permanently</h1></center> | <hr><center></center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Sun, 30 Jul 2023 09:20:09 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Date: Sun, 30 Jul 2023 09:20:04 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> |_ </html> |_http-title: Did not follow redirect to https://216.101.17.250/ 443/tcp open ssl/https | fingerprint-strings: | DNSVersionBindReq, RPCCheck: | HTTP/1.1 400 Bad Request | Date: Sun, 30 Jul 2023 09:20:15 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> | </html> | FourOhFourRequest: | HTTP/1.1 404 Not Found | Date: Sun, 30 Jul 2023 09:20:10 GMT | Content-Type: text/html | Content-Length: 141 | Connection: close | <html> | <head><title>404 Not Found</title></head> | <body> | <center><h1>404 Not Found</h1></center> | <hr><center></center> | </body> | </html> Click here to see the complete results for 216.101.17.250
|
187.84.236.139hostname: smtp612.umblergrid.com
|
# Nmap 7.60 scan initiated Sun Jul 30 02:20:05 2023 as: nmap -oA data/nweb.wzh8c0gkpq -sC -sV --open -Pn --system-dns -p 25 187.84.236.139 Nmap scan report for smtp612.umblergrid.com (187.84.236.139) Host is up (0.17s latency). PORT STATE SERVICE VERSION 25/tcp open smtp cbdev cmail smtpd | smtp-commands: ubpmta01.umbler.local says hello, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, 8BITMIME, AUTH CRAM-MD5 PLAIN LOGIN, AUTH=CRAM-MD5 PLAIN LOGIN, XACK, SIZE 0, VERP, SMTPUTF8, DSN, |_ 2.0.0 sorry, no help available here. Service Info: Host: ubpmta01.umbler.local Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:20:13 2023 -- 1 IP address (1 host up) scanned in 8.66 seconds |
212.118.187.10hostname: 212.118.187.10
|
# Nmap 7.60 scan initiated Sun Jul 30 02:18:56 2023 as: nmap -oA data/nweb.lh3gkbuq5r -sC -sV --open -Pn --system-dns -p 443 212.118.187.10 Nmap scan report for 212.118.187.10 Host is up (0.16s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https | fingerprint-strings: | DNSStatusRequest, DNSVersionBindReq: | HTTP/1.1 400 Bad Request | Date: Sun, 30 Jul 2023 09:19:19 GMT | Content-Type: text/html | Content-Length: 154 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>openresty</center> | </body> | </html> | FourOhFourRequest: | HTTP/1.1 442 | Date: Sun, 30 Jul 2023 09:19:11 GMT | Content-Length: 0 | Connection: close | GetRequest, HTTPOptions: | HTTP/1.1 442 | Date: Sun, 30 Jul 2023 09:19:10 GMT | Content-Length: 0 | Connection: close | RPCCheck, RTSPRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 30 Jul 2023 09:19:18 GMT | Content-Type: text/html | Content-Length: 154 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>openresty</center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Date: Sun, 30 Jul 2023 09:19:12 GMT | Content-Type: text/html | Content-Length: 154 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>openresty</center> | </body> |_ </html> | http-robots.txt: 16 disallowed entries (15 shown) | / /admin/ /bin/ /modules/ /katalog/ /languages/ | /rondeladmin/ /schublade/ /videoplayer/ *?*template=leertemplate | /bestellen.php /anmelden.php /warenkorb.php /administration.php |_/myshop.php | http-title: Site doesn't have a title (text/html; charset=utf-8). |_Requested resource was https://212.118.187.10/administration.php?SessID=3d0318d5834b041521072a80872dcc73&redirect=shop&globalerror= | ssl-cert: Subject: commonName=wwsanbindung.ede-shop.de | Subject Alternative Name: DNS:wwsanbindung.ede-shop.de | Not valid before: 2023-06-21T19:45:53 |_Not valid after: 2023-09-19T19:45:52 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.60%T=SSL%I=7%D=7/30%Time=64C62B0E%P=x86_64-pc-linux-gnu SF:%r(GetRequest,5C,"HTTP/1\.1\x20442\x20\r\nDate:\x20Sun,\x2030\x20Jul\x2 SF:02023\x2009:19:10\x20GMT\r\nContent-Length:\x200\r\nConnection:\x20clos SF:e\r\n\r\n")%r(HTTPOptions,5C,"HTTP/1\.1\x20442\x20\r\nDate:\x20Sun,\x20 SF:30\x20Jul\x202023\x2009:19:10\x20GMT\r\nContent-Length:\x200\r\nConnect SF:ion:\x20close\r\n\r\n")%r(FourOhFourRequest,5C,"HTTP/1\.1\x20442\x20\r\ SF:nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:19:11\x20GMT\r\nContent-Lengt SF:h:\x200\r\nConnection:\x20close\r\n\r\n")%r(tor-versions,11C,"HTTP/1\.1 SF:\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:1 SF:9:12\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20154\r\n SF:Connection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Reques SF:t</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></c SF:enter>\r\n<hr><center>openresty</center>\r\n</body>\r\n</html>\r\n")%r( SF:RTSPRequest,11C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2 SF:030\x20Jul\x202023\x2009:19:18\x20GMT\r\nContent-Type:\x20text/html\r\n SF:Content-Length:\x20154\r\nConnection:\x20close\r\n\r\n<html>\r\n<head>< SF:title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400 SF:\x20Bad\x20Request</h1></center>\r\n<hr><center>openresty</center>\r\n< SF:/body>\r\n</html>\r\n")%r(RPCCheck,11C,"HTTP/1\.1\x20400\x20Bad\x20Requ SF:est\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:19:18\x20GMT\r\nContent SF:-Type:\x20text/html\r\nContent-Length:\x20154\r\nConnection:\x20close\r SF:\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<b SF:ody>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center> SF:openresty</center>\r\n</body>\r\n</html>\r\n")%r(DNSVersionBindReq,11C, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2030\x20Jul\x2020 SF:23\x2009:19:19\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\ SF:x20154\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad SF:\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reque SF:st</h1></center>\r\n<hr><center>openresty</center>\r\n</body>\r\n</html SF:>\r\n")%r(DNSStatusRequest,11C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nD SF:ate:\x20Sun,\x2030\x20Jul\x202023\x2009:19:19\x20GMT\r\nContent-Type:\x SF:20text/html\r\nContent-Length:\x20154\r\nConnection:\x20close\r\n\r\n<h Click here to see the complete results for 212.118.187.10
|
134.68.104.213hostname: 134.68.104.213
|
# Nmap 7.60 scan initiated Sun Jul 30 02:19:07 2023 as: nmap -oA data/nweb.ogazpetcug -sC -sV --open -Pn --system-dns -p 22 134.68.104.213 Nmap scan report for 134.68.104.213 Host is up (0.055s latency). PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.3 (protocol 2.0) | ssh-hostkey: |_ 1024 d8:0e:4d:d3:d7:00:d7:aa:8f:69:9f:ec:af:90:b3:16 (RSA) Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:19:39 2023 -- 1 IP address (1 host up) scanned in 31.98 seconds |
201.184.129.131hostname: static-adsl201-184-129-131.une.net.co
|
# Nmap 7.60 scan initiated Sun Jul 30 02:18:17 2023 as: nmap -oA data/nweb.9q6k7mfdjs -sC -sV --open -Pn --system-dns -p 80 201.184.129.131 Nmap scan report for static-adsl201-184-129-131.une.net.co (201.184.129.131) Host is up (0.12s latency). PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 404 Not Found | Date: Sun, 30 Jul 2023 09:18:25 GMT | Connection: close | Content-Type: text/html | <HTML><HEAD><TITLE>404 Not Found</TITLE></HEAD> | <BODY><H1>The request URL was not found!</H1> | </BODY></HTML> | GenericLines, Kerberos, LDAPSearchReq, LPDString, SSLSessionReq, TLSSessionReq: | <B>ERROR : Method Not Implemented</B> | GetRequest: | HTTP/1.0 303 See Other | Location: http://201.184.129.131/default/en_US/status.html | Date: Sun, 30 Jul 2023 09:18:21 GMT | Connection: close | Content-Type: text/html | <HTML> | <HEAD> | <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://201.184.129.131/default/en_US/status.html"> | </HEAD> | <BODY><a href="http://201.184.129.131/default/en_US/status.html | ">Click here</a></BODY> | </HTML> | HTTPOptions, RTSPRequest, SIPOptions: | <B>ERROR : Method Not Implemented</B> | OPTIONS | Help: | <B>ERROR : Method Not Implemented</B> |_ HELP 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.60%I=7%D=7/30%Time=64C62ADE%P=x86_64-pc-linux-gnu%r(GetR SF:equest,175,"HTTP/1\.0\x20303\x20See\x20Other\nLocation:\x20http://201\. SF:184\.129\.131/default/en_US/status\.html\nDate:\x20Sun,\x2030\x20Jul\x2 SF:02023\x2009:18:21\x20GMT\nConnection:\x20close\nContent-Type:\x20text/h SF:tml\n\n<HTML>\n<HEAD>\n<META\x20HTTP-EQUIV=\"refresh\"\x20CONTENT=\"0;\ SF:x20URL=http://201\.184\.129\.131/default/en_US/status\.html\">\n</HEAD> SF:\n<BODY><a\x20href=\"http://201\.184\.129\.131/default/en_US/status\.ht SF:ml\n\">Click\x20here</a></BODY>\n</HTML>\n")%r(HTTPOptions,2F,"\n<B>ERR SF:OR\x20:\x20Method\x20Not\x20Implemented</B>\n\nOPTIONS")%r(RTSPRequest, SF:2F,"\n<B>ERROR\x20:\x20Method\x20Not\x20Implemented</B>\n\nOPTIONS")%r( SF:FourOhFourRequest,D3,"HTTP/1\.0\x20404\x20Not\x20Found\nDate:\x20Sun,\x SF:2030\x20Jul\x202023\x2009:18:25\x20GMT\nConnection:\x20close\nContent-T SF:ype:\x20text/html\n\n<HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HE SF:AD>\n<BODY><H1>The\x20request\x20URL\x20was\x20not\x20found!</H1>\n</BO SF:DY></HTML>\n")%r(GenericLines,28,"\n<B>ERROR\x20:\x20Method\x20Not\x20I SF:mplemented</B>\n\n")%r(Help,2C,"\n<B>ERROR\x20:\x20Method\x20Not\x20Imp SF:lemented</B>\n\nHELP")%r(SSLSessionReq,28,"\n<B>ERROR\x20:\x20Method\x2 SF:0Not\x20Implemented</B>\n\n")%r(TLSSessionReq,28,"\n<B>ERROR\x20:\x20Me SF:thod\x20Not\x20Implemented</B>\n\n")%r(Kerberos,28,"\n<B>ERROR\x20:\x20 SF:Method\x20Not\x20Implemented</B>\n\n")%r(LPDString,28,"\n<B>ERROR\x20:\ SF:x20Method\x20Not\x20Implemented</B>\n\n")%r(LDAPSearchReq,28,"\n<B>ERRO SF:R\x20:\x20Method\x20Not\x20Implemented</B>\n\n")%r(SIPOptions,2F,"\n<B> SF:ERROR\x20:\x20Method\x20Not\x20Implemented</B>\n\nOPTIONS"); Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:19:16 2023 -- 1 IP address (1 host up) scanned in 59.33 seconds |
147.9.253.99hostname: roster.wcl.american.edu
|
# Nmap 7.60 scan initiated Sun Jul 30 02:18:29 2023 as: nmap -oA data/nweb.zjic21lfe5 -sC -sV --open -Pn --system-dns -p 80, 443 147.9.253.99 Nmap scan report for roster.wcl.american.edu (147.9.253.99) Host is up (0.069s latency). PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 8.5 |_http-server-header: Microsoft-IIS/8.5 |_http-title: Did not follow redirect to https://roster.wcl.american.edu// 443/tcp open ssl/http Microsoft IIS httpd 8.5 |_http-server-header: Microsoft-IIS/8.5 | http-title: LISTSERV 16.0 - LISTSERV Archives at ROSTER.WCL.AMERICAN.EDU -... |_Requested resource was https://roster.wcl.american.edu/scripts/wa.exe?HOME | ssl-cert: Subject: commonName=*.wcl.american.edu | Subject Alternative Name: DNS:*.wcl.american.edu, DNS:wcl.american.edu | Not valid before: 2023-02-03T00:00:00 |_Not valid after: 2024-03-05T23:59:59 Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sun Jul 30 02:18:46 2023 -- 1 IP address (1 host up) scanned in 16.79 seconds |