Potential leak of data: Nmap Scan Report
Detected 8 occurrence(s) of ‘Nmap scan report for’:
p open rpcbind Nmap scan report for 10.10.10.92 Host is up (0.015s latency). Not shown: 995 closed ports PORT STATE SERVICE 22/tcp open ssh 53/tcp open domain 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds Nmap scan report for 10.10.10.93 Host is up (0.013s latency). Not shown: 995 closed ports PORT STATE SERVICE 80/tcp open http 139/tcp open netbios-ssn 445/tcp open microsoft-ds 515/tcp open printer 9100/tcp open jetdirect Nmap done: 256 IP addresses (
If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.
This entry was posted on Tuesday, June 12th, 2012 at 20:26 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.
Thank you very much for your report. We will process it as soon as possible!