Starting Nmap 5.35DC1 ( http://nmap.org ) at 2010-11-24 13:14 CET NSE: Loaded 49 scripts for scanning. Initiating Ping Scan at 13:14 Scanning 255 hosts [8 ports/host] Completed Ping Scan at 13:15, 19.43s elapsed (255 total hosts) Initiating Parallel DNS resolution of 255 hosts. at 13:15 Completed Parallel DNS resolution of 255 hosts. at 13:15, 0.32s elapsed Nmap scan report for 175.45.176.1 [host down] Nmap scan report for 175.45.176.2 [host down] Nmap scan report for 175.45.176.4 [host down] Nmap scan report for 175.45.176.5 [host down] Nmap scan report for 175.45.176.8 [host down] Nmap scan report for 175.45.176.9 [host down] Nmap scan report for 175.45.176.12 [host down] Nmap scan report for 175.45.176.13 [host down] Initiating SYN Stealth Scan at 13:15 Scanning 8 hosts [65535 ports/host] Discovered open port 443/tcp on 175.45.176.14 Discovered open port 443/tcp on 175.45.176.7 Discovered open port 443/tcp on 175.45.176.6 Discovered open port 8080/tcp on 175.45.176.14 Discovered open port 80/tcp on 175.45.176.6 Discovered open port 80/tcp on 175.45.176.7 Discovered open port 80/tcp on 175.45.176.14 Discovered open port 25/tcp on 175.45.176.11 Discovered open port 110/tcp on 175.45.176.14 Discovered open port 25/tcp on 175.45.176.10 SYN Stealth Scan Timing: About 0.47% done SYN Stealth Scan Timing: About 1.43% done; ETC: 14:26 (1:10:03 remaining) SYN Stealth Scan Timing: About 2.84% done; ETC: 14:08 (0:51:58 remaining) SYN Stealth Scan Timing: About 4.19% done; ETC: 14:03 (0:46:10 remaining) SYN Stealth Scan Timing: About 5.67% done; ETC: 13:59 (0:41:52 remaining) SYN Stealth Scan Timing: About 7.15% done; ETC: 13:57 (0:39:12 remaining) SYN Stealth Scan Timing: About 9.36% done; ETC: 13:55 (0:36:57 remaining) SYN Stealth Scan Timing: About 11.71% done; ETC: 13:54 (0:34:48 remaining) SYN Stealth Scan Timing: About 14.63% done; ETC: 13:53 (0:32:46 remaining) SYN Stealth Scan Timing: About 17.99% done; ETC: 13:52 (0:30:50 remaining) SYN Stealth Scan Timing: About 21.80% done; ETC: 13:52 (0:28:56 remaining) SYN Stealth Scan Timing: About 26.01% done; ETC: 13:51 (0:27:04 remaining) SYN Stealth Scan Timing: About 30.42% done; ETC: 13:51 (0:25:12 remaining) SYN Stealth Scan Timing: About 34.97% done; ETC: 13:51 (0:23:22 remaining) SYN Stealth Scan Timing: About 39.67% done; ETC: 13:50 (0:21:32 remaining) SYN Stealth Scan Timing: About 44.53% done; ETC: 13:50 (0:19:42 remaining) SYN Stealth Scan Timing: About 49.48% done; ETC: 13:50 (0:17:53 remaining) SYN Stealth Scan Timing: About 54.47% done; ETC: 13:50 (0:16:04 remaining) SYN Stealth Scan Timing: About 59.52% done; ETC: 13:50 (0:14:18 remaining) SYN Stealth Scan Timing: About 64.52% done; ETC: 13:50 (0:12:30 remaining) SYN Stealth Scan Timing: About 69.54% done; ETC: 13:50 (0:10:43 remaining) SYN Stealth Scan Timing: About 74.51% done; ETC: 13:50 (0:08:57 remaining) SYN Stealth Scan Timing: About 79.70% done; ETC: 13:50 (0:07:09 remaining) SYN Stealth Scan Timing: About 84.68% done; ETC: 13:50 (0:05:23 remaining) SYN Stealth Scan Timing: About 89.71% done; ETC: 13:50 (0:03:37 remaining) SYN Stealth Scan Timing: About 94.74% done; ETC: 13:50 (0:01:51 remaining) Completed SYN Stealth Scan against 175.45.176.6 in 2094.20s (7 hosts left) Completed SYN Stealth Scan against 175.45.176.11 in 2095.70s (6 hosts left) Completed SYN Stealth Scan against 175.45.176.3 in 2101.00s (5 hosts left) Completed SYN Stealth Scan against 175.45.176.10 in 2103.25s (4 hosts left) Completed SYN Stealth Scan against 175.45.176.7 in 2105.36s (3 hosts left) Completed SYN Stealth Scan against 175.45.176.14 in 2107.24s (2 hosts left) Completed SYN Stealth Scan against 175.45.176.16 in 2107.67s (1 host left) Completed SYN Stealth Scan at 13:50, 2109.66s elapsed (524280 total ports) Initiating Service scan at 13:50 Scanning 10 services on 8 hosts Service scan Timing: About 70.00% done; ETC: 13:52 (0:00:48 remaining) Completed Service scan at 13:52, 137.43s elapsed (10 services on 8 hosts) Initiating OS detection (try #1) against 8 hosts Retrying OS detection (try #2) against 5 hosts Initiating Traceroute at 13:52 Completed Traceroute at 13:52, 5.21s elapsed Initiating Parallel DNS resolution of 31 hosts. at 13:52 Completed Parallel DNS resolution of 31 hosts. at 13:52, 0.18s elapsed NSE: Script scanning 8 hosts. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 13:52 Completed NSE at 13:53, 31.51s elapsed Nmap scan report for 175.45.176.3 Host is up (0.39s latency). Not shown: 65527 closed ports PORT STATE SERVICE VERSION 135/tcp filtered msrpc 136/tcp filtered profile 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 4444/tcp filtered krb524 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: firewall|webcam|router|WAP Running: Cisco PIX OS 8.X, D-Link embedded, Linksys embedded, Planet embedded OS details: Cisco ASA 5540 firewall (PIX OS 8.0), Linksys BEFSR41 EtherFast router or D-Link DCS-6620G webcam, Linksys BEFSR41 EtherFast router, Linksys BEFSR41 or RT31P2 router, or WRK54G WAP, Linksys BEFSR81 router, Linksys BEFW11S4 WAP, Linksys WRK54G WAP, Planet WAP-1950 WAP Network Distance: 24 hops TRACEROUTE (using port 1723/tcp) HOP RTT ADDRESS - Hops 1-23 are the same as for 175.45.176.15 24 387.10 ms 175.45.176.3 Nmap scan report for 175.45.176.6 Host is up (0.39s latency). Not shown: 65533 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.2.3 ((Red Hat)) | http-methods: GET HEAD POST OPTIONS TRACE | Potentially risky methods: TRACE |_See http://nmap.org/nsedoc/scripts/http-methods.html |_html-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux 443/tcp open ssl/http Apache httpd 2.2.3 ((Red Hat)) |_html-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux | http-methods: GET HEAD POST OPTIONS TRACE | Potentially risky methods: TRACE |_See http://nmap.org/nsedoc/scripts/http-methods.html Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 2.6.X OS details: Linux 2.6.9 - 2.6.18 Uptime guess: 10.478 days (since Sun Nov 14 02:24:43 2010) Network Distance: 24 hops TCP Sequence Prediction: Difficulty=254 (Good luck!) IP ID Sequence Generation: All zeros TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS - Hops 1-23 are the same as for 175.45.176.15 24 386.42 ms 175.45.176.6 Nmap scan report for 175.45.176.7 Host is up (0.39s latency). Not shown: 65533 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.2.3 ((Red Hat)) |_html-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux | http-methods: GET HEAD POST OPTIONS TRACE | Potentially risky methods: TRACE |_See http://nmap.org/nsedoc/scripts/http-methods.html 443/tcp open ssl/http Apache httpd 2.2.3 ((Red Hat)) | http-methods: GET HEAD POST OPTIONS TRACE | Potentially risky methods: TRACE |_See http://nmap.org/nsedoc/scripts/http-methods.html |_html-title: Test Page for the Apache HTTP Server on Red Hat Enterprise Linux Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 2.6.X OS details: Linux 2.6.9 - 2.6.18 Uptime guess: 10.478 days (since Sun Nov 14 02:24:27 2010) Network Distance: 24 hops TCP Sequence Prediction: Difficulty=259 (Good luck!) IP ID Sequence Generation: All zeros TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS - Hops 1-23 are the same as for 175.45.176.15 24 384.88 ms 175.45.176.7 Nmap scan report for 175.45.176.10 Host is up (0.39s latency). Not shown: 65534 filtered ports PORT STATE SERVICE VERSION 25/tcp open smtp? Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: phone|firewall|general purpose Running (JUST GUESSING) : Nokia Symbian OS (89%), Juniper embedded (89%), FreeBSD 6.X (88%) Aggressive OS guesses: Nokia N81 mobile phone (Symbian OS) (89%), Juniper Networks SSG 20 firewall (89%), FreeBSD 6.2-RELEASE (88%), FreeBSD 6.3-RELEASE (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 24 hops TCP Sequence Prediction: Difficulty=259 (Good luck!) IP ID Sequence Generation: Incremental TRACEROUTE (using port 25/tcp) HOP RTT ADDRESS - Hops 1-23 are the same as for 175.45.176.15 24 386.03 ms 175.45.176.10 Nmap scan report for 175.45.176.11 Host is up (0.39s latency). Not shown: 65534 filtered ports PORT STATE SERVICE VERSION 25/tcp open smtp? Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: phone|firewall|general purpose Running (JUST GUESSING) : Nokia Symbian OS (89%), Juniper embedded (89%), FreeBSD 6.X (88%) Aggressive OS guesses: Nokia N81 mobile phone (Symbian OS) (89%), Juniper Networks SSG 20 firewall (89%), FreeBSD 6.2-RELEASE (88%), FreeBSD 6.3-RELEASE (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 24 hops TCP Sequence Prediction: Difficulty=264 (Good luck!) IP ID Sequence Generation: Incremental TRACEROUTE (using port 25/tcp) HOP RTT ADDRESS - Hops 1-23 are the same as for 175.45.176.15 24 385.58 ms 175.45.176.11 Nmap scan report for 175.45.176.14 Host is up (0.39s latency). Not shown: 65531 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.2.10 ((Unix) mod_ssl/2.2.10 OpenSSL/0.9.8g PHP/5.2.8) | html-title: "Naenara" |_Requested resource was http://175.45.176.14/en/ |_http-favicon: Unknown favicon MD5: 428881784FA088797E46E966BB5B0A54 |_http-methods: No Allow or Public header in OPTIONS response (status code 302) 110/tcp open pop3? 443/tcp open ssl/http Apache httpd 2.2.10 ((Unix) mod_ssl/2.2.10 OpenSSL/0.9.8g PHP/5.2.8) |_sslv2: server still supports SSLv2 |_http-methods: No Allow or Public header in OPTIONS response (status code 302) | html-title: "Naenara" |_Requested resource was http://175.45.176.14/en/ |_http-favicon: Unknown favicon MD5: 428881784FA088797E46E966BB5B0A54 8080/tcp open http-proxy? 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : SF-Port8080-TCP:V=5.35DC1%I=7%D=11/24%Time=4CED0A0E%P=i686-redhat-linux-gnu%r(GetRequest,5A,"HTTP/1\.0\x20404\x20File\x20Not\x20Found\r\nContent-Type SF::\x20text/html\r\n\r\nCould\x20not\x20parse\x20XSLT\x20file\r\n" SF:)%r(FourOhFourRequest,6A,"HTTP/1\.0\x20404\x20File\x20Not\x20Found\r\nC SF:ontent-Type:\x20text/html\r\n\r\nThe\x20file\x20you\x20requested\x20 SF:could\x20not\x20be\x20found\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|remote management|broadband router|phone|VoIP phone Running (JUST GUESSING) : Linux 2.6.X (87%), HP embedded (86%), Linksys embedded (86%), Nokia Symbian OS (86%), Thomson embedded (86%) Aggressive OS guesses: Linux 2.6.23 (87%), Linux 2.6.22 (Debian 4.0) (86%), Linux 2.6.24 (Debian) (86%), Linux 2.6.26 (86%), HP Onboard Administrator management console (86%), HP Onboard Administrator remote management for BladeSystem server enclosures (86%), Linksys WRV200 wireless broadband router (86%), Linux 2.6.15 (Ubuntu) (86%), Linux 2.6.15 - 2.6.26 (86%), Linux 2.6.24 (Ubuntu 8.04) (86%) No exact OS matches for host (test conditions non-ideal). Uptime guess: 29.331 days (since Tue Oct 26 06:56:12 2010) Network Distance: 25 hops TCP Sequence Prediction: Difficulty=260 (Good luck!) IP ID Sequence Generation: All zeros TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS - Hops 1-23 are the same as for 175.45.176.15 24 ... 25 386.05 ms 175.45.176.14 Nmap scan report for 175.45.176.15 Host is up (0.39s latency). All 65535 scanned ports on 175.45.176.15 are filtered Too many fingerprints match this host to give specific OS details Network Distance: 24 hops TRACEROUTE (using proto 1/icmp) HOP RTT ADDRESS 1 1.07 ms 10.255.255.253 2 0.29 ms vl-1998.gw-distp-a.bs.ka.oneandone.net (195.20.247.130) 3 0.20 ms te-1-2.bb-c.bs.kae.de.oneandone.net (212.227.121.205) 4 2.56 ms te-1-1.bb-c.act.fra.de.oneandone.net (212.227.120.54) 5 9.01 ms te-1-1.bb-c.nkf.ams.nl.oneandone.net (212.227.120.129) 6 9.63 ms xe-10-1-0.edge3.Amsterdam1.Level3.net (212.72.40.29) 7 9.61 ms ae-34-52.ebr2.Amsterdam1.Level3.net (4.69.139.161) 8 16.95 ms ae-48-48.ebr2.London1.Level3.net (4.69.143.82) 9 86.10 ms ae-44-44.ebr1.NewYork1.Level3.net (4.69.137.78) 10 94.29 ms ae-71-71.csw2.NewYork1.Level3.net (4.69.134.70) 11 85.95 ms ae-2-79.edge3.NewYork1.Level3.net (4.68.16.81) 12 86.33 ms 192.205.37.69 13 163.76 ms cr1.n54ny.ip.att.net (12.122.131.6) 14 164.90 ms cr2.cgcil.ip.att.net (12.122.1.2) 15 164.06 ms cr1.cgcil.ip.att.net (12.122.2.53) 16 162.22 ms cr2.dvmco.ip.att.net (12.122.31.85) 17 162.45 ms cr1.slkut.ip.att.net (12.122.30.25) 18 163.95 ms cr2.la2ca.ip.att.net (12.122.30.30) 19 164.32 ms cr84.la2ca.ip.att.net (12.123.30.249) 20 162.66 ms gar1.lsrca.ip.att.net (12.122.129.121) 21 328.08 ms 12.119.9.50 22 385.01 ms 219.158.32.174 23 386.50 ms 175.45.177.194 24 386.42 ms 175.45.176.15 Nmap scan report for 175.45.176.16 Host is up (0.39s latency). All 65535 scanned ports on 175.45.176.16 are filtered Too many fingerprints match this host to give specific OS details Network Distance: 24 hops TRACEROUTE (using proto 1/icmp) HOP RTT ADDRESS - Hops 1-23 are the same as for 175.45.176.15 24 386.55 ms 175.45.176.16 Nmap scan report for 175.45.176.17 [host down] Nmap scan report for 175.45.176.18 [host down] Nmap scan report for 175.45.176.19 [host down] Nmap scan report for 175.45.176.20 [host down] Nmap scan report for 175.45.176.21 [host down] Nmap scan report for 175.45.176.22 [host down] Nmap scan report for 175.45.176.23 [host down] Nmap scan report for 175.45.176.24 [host down] Nmap scan report for 175.45.176.25 [host down] Nmap scan report for 175.45.176.26 [host down] Nmap scan report for 175.45.176.27 [host down] Nmap scan report for 175.45.176.28 [host down] Nmap scan report for 175.45.176.29 [host down] Nmap scan report for 175.45.176.30 [host down] Nmap scan report for 175.45.176.31 [host down] Nmap scan report for 175.45.176.32 [host down] Nmap scan report for 175.45.176.33 [host down] Nmap scan report for 175.45.176.34 [host down] Nmap scan report for 175.45.176.35 [host down] Nmap scan report for 175.45.176.36 [host down] Nmap scan report for 175.45.176.37 [host down] Nmap scan report for 175.45.176.38 [host down] Nmap scan report for 175.45.176.39 [host down] Nmap scan report for 175.45.176.40 [host down] Nmap scan report for 175.45.176.41 [host down] Nmap scan report for 175.45.176.42 [host down] Nmap scan report for 175.45.176.43 [host down] Nmap scan report for 175.45.176.44 [host down] Nmap scan report for 175.45.176.45 [host down] Nmap scan report for 175.45.176.46 [host down] Nmap scan report for 175.45.176.47 [host down] Nmap scan report for 175.45.176.48 [host down] Nmap scan report for 175.45.176.49 [host down] Nmap scan report for 175.45.176.50 [host down] Nmap scan report for 175.45.176.51 [host down] Nmap scan report for 175.45.176.52 [host down] Nmap scan report for 175.45.176.53 [host down] Nmap scan report for 175.45.176.54 [host down] Nmap scan report for 175.45.176.55 [host down] Nmap scan report for 175.45.176.56 [host down] Nmap scan report for 175.45.176.57 [host down] Nmap scan report for 175.45.176.58 [host down] Nmap scan report for 175.45.176.59 [host down] Nmap scan report for 175.45.176.60 [host down] Nmap scan report for 175.45.176.62 [host down] Nmap scan report for 175.45.176.63 [host down] Nmap scan report for 175.45.176.64 [host down] Nmap scan report for 175.45.176.65 [host down] Nmap scan report for 175.45.176.66 [host down] Nmap scan report for 175.45.176.67 [host down] Nmap scan report for 175.45.176.68 [host down] Nmap scan report for 175.45.176.69 [host down] Nmap scan report for 175.45.176.70 [host down] Nmap scan report for 175.45.176.71 [host down] Nmap scan report for 175.45.176.72 [host down] Nmap scan report for 175.45.176.73 [host down] Nmap scan report for 175.45.176.74 [host down] Nmap scan report for 175.45.176.75 [host down] Nmap scan report for 175.45.176.76 [host down] Nmap scan report for 175.45.176.77 [host down] Nmap scan report for 175.45.176.78 [host down] Nmap scan report for 175.45.176.79 [host down] Nmap scan report for 175.45.176.80 [host down] Nmap scan report for 175.45.176.81 [host down] Nmap scan report for 175.45.176.82 [host down] Nmap scan report for 175.45.176.83 [host down] Nmap scan report for 175.45.176.84 [host down] Nmap scan report for 175.45.176.85 [host down] Nmap scan report for 175.45.176.86 [host down] Nmap scan report for 175.45.176.87 [host down] Nmap scan report for 175.45.176.88 [host down] Nmap scan report for 175.45.176.89 [host down] Nmap scan report for 175.45.176.90 [host down] Nmap scan report for 175.45.176.91 [host down] Nmap scan report for 175.45.176.92 [host down] Nmap scan report for 175.45.176.93 [host down] Nmap scan report for 175.45.176.94 [host down] Nmap scan report for 175.45.176.95 [host down] Nmap scan report for 175.45.176.96 [host down] Nmap scan report for 175.45.176.97 [host down] Nmap scan report for 175.45.176.98 [host down] Nmap scan report for 175.45.176.99 [host down] Nmap scan report for 175.45.176.100 [host down] Nmap scan report for 175.45.176.101 [host down] Nmap scan report for 175.45.176.102 [host down] Nmap scan report for 175.45.176.103 [host down] Nmap scan report for 175.45.176.104 [host down] Nmap scan report for 175.45.176.105 [host down] Nmap scan report for 175.45.176.106 [host down] Nmap scan report for 175.45.176.107 [host down] Nmap scan report for 175.45.176.108 [host down] Nmap scan report for 175.45.176.109 [host down] Nmap scan report for 175.45.176.110 [host down] Nmap scan report for 175.45.176.111 [host down] Nmap scan report for 175.45.176.112 [host down] Nmap scan report for 175.45.176.113 [host down] Nmap scan report for 175.45.176.114 [host down] Nmap scan report for 175.45.176.115 [host down] Nmap scan report for 175.45.176.116 [host down] Nmap scan report for 175.45.176.117 [host down] Nmap scan report for 175.45.176.118 [host down] Nmap scan report for 175.45.176.119 [host down] Nmap scan report for 175.45.176.120 [host down] Nmap scan report for 175.45.176.121 [host down] Nmap scan report for 175.45.176.122 [host down] Nmap scan report for 175.45.176.123 [host down] Nmap scan report for 175.45.176.124 [host down] Nmap scan report for 175.45.176.125 [host down] Nmap scan report for 175.45.176.126 [host down] Nmap scan report for 175.45.176.127 [host down] Nmap scan report for 175.45.176.128 [host down] Nmap scan report for 175.45.176.130 [host down] Nmap scan report for 175.45.176.132 [host down] Nmap scan report for 175.45.176.133 [host down] Nmap scan report for 175.45.176.134 [host down] Nmap scan report for 175.45.176.135 [host down] Nmap scan report for 175.45.176.136 [host down] Nmap scan report for 175.45.176.137 [host down] Nmap scan report for 175.45.176.138 [host down] Nmap scan report for 175.45.176.139 [host down] Nmap scan report for 175.45.176.140 [host down] Nmap scan report for 175.45.176.141 [host down] Nmap scan report for 175.45.176.142 [host down] Nmap scan report for 175.45.176.143 [host down] Nmap scan report for 175.45.176.144 [host down] Nmap scan report for 175.45.176.145 [host down] Nmap scan report for 175.45.176.146 [host down] Nmap scan report for 175.45.176.147 [host down] Nmap scan report for 175.45.176.148 [host down] Nmap scan report for 175.45.176.149 [host down] Nmap scan report for 175.45.176.150 [host down] Nmap scan report for 175.45.176.151 [host down] Nmap scan report for 175.45.176.152 [host down] Nmap scan report for 175.45.176.153 [host down] Nmap scan report for 175.45.176.154 [host down] Nmap scan report for 175.45.176.155 [host down] Nmap scan report for 175.45.176.156 [host down] Nmap scan report for 175.45.176.157 [host down] Nmap scan report for 175.45.176.158 [host down] Nmap scan report for 175.45.176.159 [host down] Nmap scan report for 175.45.176.160 [host down] Nmap scan report for 175.45.176.161 [host down] Nmap scan report for 175.45.176.162 [host down] Nmap scan report for 175.45.176.163 [host down] Nmap scan report for 175.45.176.164 [host down] Nmap scan report for 175.45.176.165 [host down] Nmap scan report for 175.45.176.166 [host down] Nmap scan report for 175.45.176.167 [host down] Nmap scan report for 175.45.176.168 [host down] Nmap scan report for 175.45.176.169 [host down] Nmap scan report for 175.45.176.170 [host down] Nmap scan report for 175.45.176.171 [host down] Nmap scan report for 175.45.176.172 [host down] Nmap scan report for 175.45.176.173 [host down] Nmap scan report for 175.45.176.174 [host down] Nmap scan report for 175.45.176.175 [host down] Nmap scan report for 175.45.176.176 [host down] Nmap scan report for 175.45.176.177 [host down] Nmap scan report for 175.45.176.178 [host down] Nmap scan report for 175.45.176.179 [host down] Nmap scan report for 175.45.176.180 [host down] Nmap scan report for 175.45.176.181 [host down] Nmap scan report for 175.45.176.182 [host down] Nmap scan report for 175.45.176.183 [host down] Nmap scan report for 175.45.176.184 [host down] Nmap scan report for 175.45.176.185 [host down] Nmap scan report for 175.45.176.186 [host down] Nmap scan report for 175.45.176.187 [host down] Nmap scan report for 175.45.176.188 [host down] Nmap scan report for 175.45.176.189 [host down] Nmap scan report for 175.45.176.190 [host down] Nmap scan report for 175.45.176.191 [host down] Nmap scan report for 175.45.176.192 [host down] Nmap scan report for 175.45.176.193 [host down] Nmap scan report for 175.45.176.194 [host down] Nmap scan report for 175.45.176.195 [host down] Nmap scan report for 175.45.176.196 [host down] Nmap scan report for 175.45.176.197 [host down] Nmap scan report for 175.45.176.198 [host down] Nmap scan report for 175.45.176.199 [host down] Nmap scan report for 175.45.176.200 [host down] Nmap scan report for 175.45.176.201 [host down] Nmap scan report for 175.45.176.202 [host down] Nmap scan report for 175.45.176.203 [host down] Nmap scan report for 175.45.176.204 [host down] Nmap scan report for 175.45.176.205 [host down] Nmap scan report for 175.45.176.206 [host down] Nmap scan report for 175.45.176.207 [host down] Nmap scan report for 175.45.176.208 [host down] Nmap scan report for 175.45.176.209 [host down] Nmap scan report for 175.45.176.210 [host down] Nmap scan report for 175.45.176.211 [host down] Nmap scan report for 175.45.176.212 [host down] Nmap scan report for 175.45.176.213 [host down] Nmap scan report for 175.45.176.214 [host down] Nmap scan report for 175.45.176.215 [host down] Nmap scan report for 175.45.176.216 [host down] Nmap scan report for 175.45.176.217 [host down] Nmap scan report for 175.45.176.218 [host down] Nmap scan report for 175.45.176.219 [host down] Nmap scan report for 175.45.176.220 [host down] Nmap scan report for 175.45.176.221 [host down] Nmap scan report for 175.45.176.222 [host down] Nmap scan report for 175.45.176.223 [host down] Nmap scan report for 175.45.176.224 [host down] Nmap scan report for 175.45.176.225 [host down] Nmap scan report for 175.45.176.226 [host down] Nmap scan report for 175.45.176.227 [host down] Nmap scan report for 175.45.176.228 [host down] Nmap scan report for 175.45.176.229 [host down] Nmap scan report for 175.45.176.230 [host down] Nmap scan report for 175.45.176.231 [host down] Nmap scan report for 175.45.176.232 [host down] Nmap scan report for 175.45.176.233 [host down] Nmap scan report for 175.45.176.234 [host down] Nmap scan report for 175.45.176.235 [host down] Nmap scan report for 175.45.176.236 [host down] Nmap scan report for 175.45.176.237 [host down] Nmap scan report for 175.45.176.238 [host down] Nmap scan report for 175.45.176.239 [host down] Nmap scan report for 175.45.176.240 [host down] Nmap scan report for 175.45.176.241 [host down] Nmap scan report for 175.45.176.242 [host down] Nmap scan report for 175.45.176.243 [host down] Nmap scan report for 175.45.176.244 [host down] Nmap scan report for 175.45.176.245 [host down] Nmap scan report for 175.45.176.246 [host down] Nmap scan report for 175.45.176.247 [host down] Nmap scan report for 175.45.176.248 [host down] Nmap scan report for 175.45.176.249 [host down] Nmap scan report for 175.45.176.250 [host down] Nmap scan report for 175.45.176.251 [host down] Nmap scan report for 175.45.176.252 [host down] Nmap scan report for 175.45.176.253 [host down] Nmap scan report for 175.45.176.254 [host down] Nmap scan report for 175.45.176.255 [host down] Initiating SYN Stealth Scan at 13:53 Scanning 3 hosts [65535 ports/host] Discovered open port 25/tcp on 175.45.176.61 SYN Stealth Scan Timing: About 2.08% done; ETC: 14:18 (0:24:23 remaining) SYN Stealth Scan Timing: About 5.61% done; ETC: 14:11 (0:17:06 remaining) SYN Stealth Scan Timing: About 10.64% done; ETC: 14:07 (0:12:44 remaining) SYN Stealth Scan Timing: About 15.05% done; ETC: 14:06 (0:11:23 remaining) SYN Stealth Scan Timing: About 20.38% done; ETC: 14:05 (0:09:50 remaining) SYN Stealth Scan Timing: About 28.03% done; ETC: 14:06 (0:09:09 remaining) SYN Stealth Scan Timing: About 33.33% done; ETC: 14:05 (0:08:08 remaining) SYN Stealth Scan Timing: About 38.28% done; ETC: 14:05 (0:07:22 remaining) SYN Stealth Scan Timing: About 45.05% done; ETC: 14:05 (0:06:44 remaining) SYN Stealth Scan Timing: About 49.79% done; ETC: 14:05 (0:06:04 remaining) SYN Stealth Scan Timing: About 55.15% done; ETC: 14:05 (0:05:28 remaining) SYN Stealth Scan Timing: About 61.09% done; ETC: 14:05 (0:04:47 remaining) SYN Stealth Scan Timing: About 66.76% done; ETC: 14:05 (0:04:00 remaining) SYN Stealth Scan Timing: About 71.90% done; ETC: 14:05 (0:03:21 remaining) SYN Stealth Scan Timing: About 78.24% done; ETC: 14:05 (0:02:31 remaining) SYN Stealth Scan Timing: About 85.01% done; ETC: 14:04 (0:01:41 remaining) SYN Stealth Scan Timing: About 91.33% done; ETC: 14:04 (0:00:57 remaining) Completed SYN Stealth Scan against 175.45.176.61 in 652.75s (2 hosts left) Completed SYN Stealth Scan against 175.45.176.129 in 653.58s (1 host left) Completed SYN Stealth Scan at 14:04, 663.15s elapsed (196605 total ports) Initiating Service scan at 14:04 Scanning 1 service on 3 hosts Completed Service scan at 14:06, 137.45s elapsed (1 service on 3 hosts) Initiating OS detection (try #1) against 3 hosts Retrying OS detection (try #2) against 2 hosts Initiating Traceroute at 14:06 Completed Traceroute at 14:06, 0.78s elapsed Initiating Parallel DNS resolution of 26 hosts. at 14:06 Completed Parallel DNS resolution of 26 hosts. at 14:06, 0.11s elapsed NSE: Script scanning 3 hosts. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 14:06 Completed NSE at 14:07, 30.40s elapsed Nmap scan report for 175.45.176.61 Host is up (0.39s latency). Not shown: 65534 filtered ports PORT STATE SERVICE VERSION 25/tcp open smtp? |_smtp-commands: Couldn't establish connection on port 25 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: phone|firewall|general purpose Running (JUST GUESSING) : Nokia Symbian OS (89%), Juniper embedded (89%), FreeBSD 6.X (88%) Aggressive OS guesses: Nokia N81 mobile phone (Symbian OS) (89%), Juniper Networks SSG 20 firewall (89%), FreeBSD 6.2-RELEASE (88%), FreeBSD 6.3-RELEASE (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 24 hops TCP Sequence Prediction: Difficulty=262 (Good luck!) IP ID Sequence Generation: Incremental TRACEROUTE (using port 25/tcp) HOP RTT ADDRESS - Hops 1-23 are the same as for 175.45.176.15 24 385.89 ms 175.45.176.61 Nmap scan report for 175.45.176.129 Host is up (0.39s latency). Not shown: 65527 closed ports PORT STATE SERVICE VERSION 135/tcp filtered msrpc 136/tcp filtered profile 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 4444/tcp filtered krb524 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: firewall|webcam|router|WAP Running: Cisco PIX OS 8.X, D-Link embedded, Linksys embedded, Planet embedded OS details: Cisco ASA 5540 firewall (PIX OS 8.0), Linksys BEFSR41 EtherFast router or D-Link DCS-6620G webcam, Linksys BEFSR41 EtherFast router, Linksys BEFSR41 or RT31P2 router, or WRK54G WAP, Linksys BEFSR81 router, Linksys BEFW11S4 WAP, Linksys WRK54G WAP, Planet WAP-1950 WAP Network Distance: 24 hops TRACEROUTE (using port 1720/tcp) HOP RTT ADDRESS - Hops 1-23 are the same as for 175.45.176.15 24 385.62 ms 175.45.176.129 Nmap scan report for 175.45.176.131 Host is up (0.39s latency). Not shown: 65527 closed ports PORT STATE SERVICE VERSION 135/tcp filtered msrpc 136/tcp filtered profile 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 4444/tcp filtered krb524 Too many fingerprints match this host to give specific OS details Network Distance: 23 hops TRACEROUTE (using port 1723/tcp) HOP RTT ADDRESS - Hops 1-22 are the same as for 175.45.176.15 23 385.51 ms 175.45.176.131 Read data files from: /usr/share/nmap OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 255 IP addresses (11 hosts up) scanned in 3167.77 seconds Raw packets sent: 1256020 (55.292MB) | Rcvd: 204816 (8.239MB)