Potential leak of data: Nmap Scan Report
Detected 1 occurrence(s) of ‘Nmap scan report for’:
comcast.net (126.96.36.199) Initiating Traceroute at 20:06 Completed Traceroute at 20:06, 5.04s elapsed NSE: Script scanning 188.8.131.52. Initiating NSE at 20:07 Discovered open port 67/udp on 184.108.40.206 Completed NSE at 20:09, 120.67s elapsed Nmap scan report for c-24-60-237-118.hsd1.nh.comcast.net (220.127.116.11) Host is up (0.0035s latency). Not shown: 998 open|filtered ports, 997 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp? |_ftp-bounce: no banner 554/tcp open rtsp? 7070/tcp op
If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.
This entry was posted on Tuesday, June 26th, 2012 at 06:39 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.
Thank you very much for your report. We will process it as soon as possible!