Potential leak of data: Nmap Scan Report
Detected 1 occurrence(s) of ‘Nmap scan report for’:
comcast.net (184.108.40.206) Initiating Traceroute at 20:06 Completed Traceroute at 20:06, 5.04s elapsed NSE: Script scanning 220.127.116.11. Initiating NSE at 20:07 Discovered open port 67/udp on 18.104.22.168 Completed NSE at 20:09, 120.67s elapsed Nmap scan report for c-24-60-237-118.hsd1.nh.comcast.net (22.214.171.124) Host is up (0.0035s latency). Not shown: 998 open|filtered ports, 997 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp? |_ftp-bounce: no banner 554/tcp open rtsp? 7070/tcp op
This entry was posted on Tuesday, June 26th, 2012 at 06:39 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.