nmap scan report - scan @ January 14, 2010 - 10:19
• scan summary |
• scan info |
• 10.14.202.2 |
• runstats
scan summary
nmap was initiated at January 14, 2010 - 10:19 with these arguments:
nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 10.14.202.2
The process stopped at . Debugging was disabled, the verbosity level was 1.
10.14.202.2(online)
ping results
•
address
• 10.14.202.2 (ipv4)
ports
The 994 ports scanned but not shown below are in state: closed
Port State Service Reason Product Version Extra info
22 tcp open ssh syn-ack OpenSSH 5.0 protocol 2.0
37 tcp open time syn-ack 32 bits
53 tcp open domain syn-ack dnsmasq 2.41
113 tcp open ident syn-ack
1720 tcp filtered H.323/Q.931 no-response
8080 tcp open http-proxy syn-ack Squid webproxy 3.0.STABLE9
remote operating system guess
• used port 22/tcp (open)
• used port 1/tcp (closed)
• used port 43887/udp (closed)
• os match: Linux 2.6.8 - 2.6.27
• accuracy: 100%
• reference fingerprint line number: 21604
tcpsequence
• index: 204
• difficulty: Good luck!
• values: 3CE7F7C0,3D0DAFA5,3DB7FB5E,3D0910A2,3DD120BB
ipidsequence
• class: All zeros
• values: 0,0,0,0,0
traceroute
• port: 23
• proto:
Hop Rtt IP Host
1 843.00 10.100.0.1
2 859.00 10.0.1.130
3 766.00 10.14.202.2
runstats
• 253 sec. scanned
• 1 host(s) scanned
• 1 host(s) online
• 0 host(s) offline
• nmap version: 5.00
• xml output version: 1.03
• nmap.xsl version: 0.9b
berkut adalah yang di blok
Tidak ada komentar:
Posting Komentar