LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘Nmap Scan Report’

Nmap Scan Report

3 votedvote

Detected 5 occurrence(s) of ‘Nmap scan report for’:

t]
[*] Nmap: Completed Ping Scan at 02:28, 1.88s elapsed (256 total hosts)
[*] Nmap: Nmap scan report for 50.63.197.0 [host down]
[*] Nmap: Nmap scan report for 50.63.197.5 [host down]
[*] Nmap: Nmap scan report for 50.63.197.37 [host down]
[*] Nmap: Nmap scan report for 50.63.197.39 [host down]
[*] Nmap: Initiating SYN Stealth Scan at 02:28
[*] Nmap: Scanning 96 hosts [1000 ports/host]
[*] Nmap: Discovered open port 443/tcp on 50.63.197.8
[*] Nmap: Discovered open port 443/tcp on 50.63.197.4
[*] Nmap: Discovered ope

Source: http://pastebin.com/raw.php?i=kTHsywLK

Nmap Scan Report

0 votedvote

Detected 1 occurrence(s) of ‘Nmap scan report for’:

$ nmap 103.15.74.24

Starting Nmap 6.40 ( http://nmap.org ) at 2016-11-09 11:44 GMT
Nmap scan report for 103.15.74.24
Host is up (0.15s latency).
Not shown: 979 filtered ports
PORT     STATE  SERVICE
22/tcp   open   ssh
25/tcp   closed smtp
80/tcp   open   http
443/tcp  closed https
1433/tcp closed ms-sql-s
1935/tcp closed rtmp
3306/tcp closed mysq

Source: http://pastebin.com/raw.php?i=5zce0MHS

Nmap Scan Report

0 votedvote

Detected 1 occurrence(s) of ‘Nmap scan report for’:

Discovered open port 443/tcp on 192.168.1.22
Discovered open port 135/tcp on 192.168.1.22
Discovered open port 139/tcp on 192.168.1.22
Discovered open port 1079/tcp on 192.168.1.22
Completed SYN Stealth Scan at 22:53, 4.83s elapsed (1000 total ports)
Nmap scan report for 192.168.1.22
Host is up (0.00s latency).
Not shown: 993 filtered ports
PORT     STATE SERVICE
21/tcp   open  ftp
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
443/tcp  open  https
445/tcp  open  microsoft-ds
1079/tcp open  asprovatalk
1723/tcp

Source: http://pastebin.com/raw.php?i=khaC6bxB

Nmap Scan Report

2 votedvote

Detected 1 occurrence(s) of ‘Nmap scan report for’:

ng)
Completed Service scan at 14:16, 48.73s elapsed (5 services on 1 host)
NSE: Script scanning 148.229.0.110.
NSE: Starting runlevel 1 (of 2) scan.
Initiating NSE at 14:16
Completed NSE at 14:16, 0.04s elapsed
NSE: Starting runlevel 2 (of 2) scan.
Nmap scan report for 148.229.0.110
Host is up (0.00038s latency).
Scanned at 2016-11-07 14:15:48 MST for 51s
Not shown: 65530 closed ports
PORT      STATE SERVICE VERSION
45131/tcp open  unknown
45133/tcp open  unknown
45134/tcp open  unknown
45137/tcp open  unknown

Source: http://pastebin.com/raw.php?i=mYVqDCdL

Nmap Scan Report

0 votedvote

Detected 1 occurrence(s) of ‘Nmap scan report for’:

Starting Nmap 7.31 ( https://nmap.org ) at 2016-11-06 17:47 CET
Nmap scan report for ctf01.root-me.org (212.129.28.18)
Host is up, received echo-reply ttl 120 (0.019s latency).
PORT     STATE    SERVICE        REASON          VERSION
1/tcp    closed   tcpmux         reset ttl 120
22/tcp   open     ssh            syn-ack ttl 120 OpenSS

Source: http://pastebin.com/raw.php?i=3hY3F4LR