LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘Nmap Scan Report’

Nmap Scan Report

0 votedvote

Detected 1 occurrence(s) of ‘Nmap scan report for’:

lapsed

NSE: Script scanning 78.6.66.109.

Initiating NSE at 20:23

Completed NSE at 21:03, 2380.70s elapsed

Initiating NSE at 21:03

Completed NSE at 21:05, 121.14s elapsed

Initiating NSE at 21:05

Completed NSE at 21:05, 9.49s elapsed

Nmap scan report for 78-6-66-109-static.albacom.net (78.6.66.109)

NSOCK ERROR [7939.9910s] mksock_bind_addr(): Bind to 0.0.0.0:500 failed (IOD #1490): Une tentative d’accès à un socket de manière interdite par ses autorisations d’accès a été tentée.  (10013)

NSOCK ERROR

Source: http://pastebin.com/raw.php?i=QxwLWRJ1

Nmap Scan Report

0 votedvote

Detected 3 occurrence(s) of ‘Nmap scan report for’:

/tcp    open   ssh
33899/tcp closed unknown

Nmap scan report for 185.146.127.2
Host is up (0.19s latency).
Not shown: 996 filtered ports
PORT     STATE SERVICE
22/tcp   open  ssh
443/tcp  open  https
444/tcp  open  snpp
4443/tcp open  pharos

Nmap scan report for 185.146.127.4
Host is up (0.20s latency).
Not shown: 998 filtered ports
PORT      STATE  SERVICE
22/tcp    open   ssh
33899/tcp closed unknown

Nmap done: 8 IP addresses (3 hosts up) scanned in 26.05 seconds

Source: http://pastebin.com/raw.php?i=JgyigNCB

Nmap Scan Report

0 votedvote

Detected 1 occurrence(s) of ‘Nmap scan report for’:

$ nmap -6 -Pn 2600:1:c210:7a30:4c93:64a5:2ed9:2548

Starting Nmap 6.40 ( http://nmap.org ) at 2016-10-30 18:17 EDT
Nmap scan report for 2600:1:c210:7a30:4c93:64a5:2ed9:2548
Host is up (0.055s latency).
All 1000 scanned ports on 2600:1:c210:7a30:4c93:64a5:2ed9:2548 are filtered

Nmap done: 1 IP address (1 host up) scanned in 39.54 seconds

Source: http://pastebin.com/raw.php?i=hfC3JdSg

Nmap Scan Report

0 votedvote

Detected 1 occurrence(s) of ‘Nmap scan report for’:

misaki@poseidon:~$ nmap 87.237.38.200

Starting Nmap 7.01 ( https://nmap.org ) at 2016-10-29 13:00 CST
Nmap scan report for srv200-g.ccp.cc (87.237.38.200)
Host is up (0.044s latency).
PORT      STATE SERVICE
1/tcp     open  tcpmux
3/tcp     open  compressnet
4/tcp     open  unknown
6/tcp     open  unknown
7/tcp     open  echo
9/tcp     open  discard
13/tcp    open  d

Source: http://pastebin.com/raw.php?i=4vuzm9A5

Nmap Scan Report

0 votedvote

Detected 1 occurrence(s) of ‘Nmap scan report for’:

39 (1:28:42 remaining)
NSE Timing: About 58.50% done; ETC: 22:54 (0:43:16 remaining)
NSE Timing: About 83.92% done; ETC: 22:23 (0:11:47 remaining)
Completed NSE at 22:12, 3724.72s elapsed
Initiating NSE at 22:12
Completed NSE at 22:12, 0.00s elapsed
Nmap scan report for ns519821.ip-158-69-55.net (158.69.55.81)
Host is up (0.00039s latency).
Not shown: 986 filtered ports, 957 closed ports, 44 open|filtered ports
PORT     STATE SERVICE  VERSION
21/tcp   open  ftp      vsftpd 2.2.2
| ftp-brute:
|   Accounts
|     No 

Detected 16 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

ceive data: connection closed
| smtp-vuln-cve2010-4344:
|   Exim version: 4.72
|   Exim heap overflow vulnerability (CVE-2010-4344):
|     Exim (CVE-2010-4344): NOT VULNERABLE
|   Exim privileges escalation vulnerability (CVE-2010-4345):
|     Exim (CVE-2010-4345): LIKELY VULNERABLE
|_  To confirm and exploit the vulnerabilities, run with --script-args='smtp-vuln-cve2010-4344.exploit'
8083/tcp open  http     nginx
| http-brute:
|_  Path "/" does not require authentication
|_http-chrono: Request times for /; a

Source: http://pastebin.com/raw.php?i=APbHaW9P