Buena esa........
Saludos!!!!!!
El sáb., 17 abr. 2021 1:57 p. m., Juan J. Fernandez <
dmarc-noreply@xxxxxxxxxxxxx> escribió:
Coje tu comando NMAP aqui pero no al estilo linuxero michi michi jejeje
de aquellos que con el primer pichón eagle basado en el Solaris de ORACLE
obviamente ante la curiosidad se lanzaron a escanear mi ip publica desde
cuba a ver que puertos estaban abiertos por ejemplo.
Claro , en Linux es el mismo NMAP , y ademas en entornos desktop Linux por
supuesto tambien hay una herramienta grafica nmap similar , no hay que
fajarse con el commando nmap en la consola o shel Linux , y por supuesto el
usuarios puede hacer escaneos mas o menos profundos usando para ello las
diferentes opciones o flags del commando. Al final todo eso es el mismo
commando ya sea ejecutado o presentado en forma grafica o directamente a
puro texto en el shell Linux por ejemplo.
El objetivo no es asustarlos a que no usen wifi , sino mostrarles que un
usuarios maliciosos realmente puede tener mucho acceso a mucha info privada
relativamente facilmente y por eso lso expertos en seguridad de redes si se
asustan por muchas cosas pues saben los peligros reales. De hecho yo no
deberia publicar en esta lista esta salida del nmap but I don’t care !!!
jejejeje
Comandos de redes son muchos , los mas usados o conocidos son los clasicos
ping, traceroute, ifconfig, route, arp, netcat, nmap y otros y todo eso es
lo mism oque usar por ejemplo el Famoso paquetes o app WireShark de los
hackers que esencialmente ya sea graficamente o por commando texto en el
shell Linux esencialmente esta ejecutando estos otros comandos para hacer
el mismo trabajo u obtener la misma informacion.
Al final , todo se reduce a best practices y no Andar despreocupado
publicando las IP o los SSID o poniendo contraseñas cortas o faciles como
yo por ejemplo que realmente vuelvo y repito ya me importa un comino nada !
jejejeje
Para los que no hayan visto NMAP en windows les pongo una foto del
interfaz grafico via el app ZENMAP le llaman los developres de nmap para
windows y despues veran la salida complete inmensa del commando nmap que en
este windows y en mi red de solo 256 posibles hosts (Bueno realmente la IP
terminado en 0 nadie la usa pues representa la red , la terminado en 255 es
para broadcast por ende nadie la usa y usualmente la 1.1 la gente la usa
para el router asi que serian potencialmente 253 hosts mas el router
Starting Nmap 7.91 ( https://nmap.org ;) at 2021-04-17 13:10 Eastern
Daylight Time
NSE: Loaded 153 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 13:10
Completed NSE at 13:10, 0.00s elapsed
Initiating NSE at 13:10
Completed NSE at 13:10, 0.00s elapsed
Initiating NSE at 13:10
Completed NSE at 13:10, 0.00s elapsed
Initiating ARP Ping Scan at 13:10
Scanning 255 hosts [1 port/host]
Completed ARP Ping Scan at 13:10, 2.29s elapsed (255 total hosts)
Initiating Parallel DNS resolution of 3 hosts. at 13:10
Completed Parallel DNS resolution of 3 hosts. at 13:10, 0.02s elapsed
Nmap scan report for 192.168.1.0 [host down]
Nmap scan report for 192.168.1.2 [host down]
Nmap scan report for 192.168.1.3 [host down]
Nmap scan report for 192.168.1.4 [host down]
Nmap scan report for 192.168.1.5 [host down]
Nmap scan report for 192.168.1.6 [host down]
Nmap scan report for 192.168.1.7 [host down]
Nmap scan report for 192.168.1.8 [host down]
Nmap scan report for 192.168.1.9 [host down]
Nmap scan report for 192.168.1.12 [host down]
Nmap scan report for 192.168.1.13 [host down]
Nmap scan report for 192.168.1.14 [host down]
Nmap scan report for 192.168.1.16 [host down]
Nmap scan report for 192.168.1.17 [host down]
Nmap scan report for 192.168.1.19 [host down]
Nmap scan report for 192.168.1.21 [host down]
Nmap scan report for 192.168.1.22 [host down]
Nmap scan report for 192.168.1.23 [host down]
Nmap scan report for 192.168.1.24 [host down]
Nmap scan report for 192.168.1.25 [host down]
Nmap scan report for 192.168.1.26 [host down]
Nmap scan report for 192.168.1.27 [host down]
Nmap scan report for 192.168.1.28 [host down]
Nmap scan report for 192.168.1.29 [host down]
Nmap scan report for 192.168.1.30 [host down]
Nmap scan report for 192.168.1.31 [host down]
Nmap scan report for 192.168.1.32 [host down]
Nmap scan report for 192.168.1.33 [host down]
Nmap scan report for 192.168.1.34 [host down]
Nmap scan report for 192.168.1.35 [host down]
Nmap scan report for 192.168.1.36 [host down]
Nmap scan report for 192.168.1.37 [host down]
Nmap scan report for 192.168.1.38 [host down]
Nmap scan report for 192.168.1.39 [host down]
Nmap scan report for 192.168.1.40 [host down]
Nmap scan report for 192.168.1.41 [host down]
Nmap scan report for 192.168.1.42 [host down]
Nmap scan report for 192.168.1.43 [host down]
Nmap scan report for 192.168.1.44 [host down]
Nmap scan report for 192.168.1.45 [host down]
Nmap scan report for 192.168.1.46 [host down]
Nmap scan report for 192.168.1.47 [host down]
Nmap scan report for 192.168.1.48 [host down]
Nmap scan report for 192.168.1.49 [host down]
Nmap scan report for 192.168.1.50 [host down]
Nmap scan report for 192.168.1.51 [host down]
Nmap scan report for 192.168.1.52 [host down]
Nmap scan report for 192.168.1.53 [host down]
Nmap scan report for 192.168.1.54 [host down]
Nmap scan report for 192.168.1.55 [host down]
Nmap scan report for 192.168.1.56 [host down]
Nmap scan report for 192.168.1.57 [host down]
Nmap scan report for 192.168.1.58 [host down]
Nmap scan report for 192.168.1.59 [host down]
Nmap scan report for 192.168.1.60 [host down]
Nmap scan report for 192.168.1.61 [host down]
Nmap scan report for 192.168.1.62 [host down]
Nmap scan report for 192.168.1.63 [host down]
Nmap scan report for 192.168.1.64 [host down]
Nmap scan report for 192.168.1.65 [host down]
Nmap scan report for 192.168.1.66 [host down]
Nmap scan report for 192.168.1.67 [host down]
Nmap scan report for 192.168.1.68 [host down]
Nmap scan report for 192.168.1.69 [host down]
Nmap scan report for 192.168.1.70 [host down]
Nmap scan report for 192.168.1.71 [host down]
Nmap scan report for 192.168.1.72 [host down]
Nmap scan report for 192.168.1.73 [host down]
Nmap scan report for 192.168.1.74 [host down]
Nmap scan report for 192.168.1.75 [host down]
Nmap scan report for 192.168.1.76 [host down]
Nmap scan report for 192.168.1.77 [host down]
Nmap scan report for 192.168.1.78 [host down]
Nmap scan report for 192.168.1.79 [host down]
Nmap scan report for 192.168.1.80 [host down]
Nmap scan report for 192.168.1.81 [host down]
Nmap scan report for 192.168.1.82 [host down]
Nmap scan report for 192.168.1.83 [host down]
Nmap scan report for 192.168.1.84 [host down]
Nmap scan report for 192.168.1.85 [host down]
Nmap scan report for 192.168.1.86 [host down]
Nmap scan report for 192.168.1.87 [host down]
Nmap scan report for 192.168.1.88 [host down]
Nmap scan report for 192.168.1.89 [host down]
Nmap scan report for 192.168.1.90 [host down]
Nmap scan report for 192.168.1.91 [host down]
Nmap scan report for 192.168.1.92 [host down]
Nmap scan report for 192.168.1.93 [host down]
Nmap scan report for 192.168.1.94 [host down]
Nmap scan report for 192.168.1.95 [host down]
Nmap scan report for 192.168.1.96 [host down]
Nmap scan report for 192.168.1.97 [host down]
Nmap scan report for 192.168.1.98 [host down]
Nmap scan report for 192.168.1.99 [host down]
Nmap scan report for 192.168.1.102 [host down]
Nmap scan report for 192.168.1.103 [host down]
Nmap scan report for 192.168.1.104 [host down]
Nmap scan report for 192.168.1.105 [host down]
Nmap scan report for 192.168.1.106 [host down]
Nmap scan report for 192.168.1.107 [host down]
Nmap scan report for 192.168.1.108 [host down]
Nmap scan report for 192.168.1.109 [host down]
Nmap scan report for 192.168.1.110 [host down]
Nmap scan report for 192.168.1.111 [host down]
Nmap scan report for 192.168.1.112 [host down]
Nmap scan report for 192.168.1.113 [host down]
Nmap scan report for 192.168.1.114 [host down]
Nmap scan report for 192.168.1.115 [host down]
Nmap scan report for 192.168.1.116 [host down]
Nmap scan report for 192.168.1.117 [host down]
Nmap scan report for 192.168.1.118 [host down]
Nmap scan report for 192.168.1.119 [host down]
Nmap scan report for 192.168.1.120 [host down]
Nmap scan report for 192.168.1.121 [host down]
Nmap scan report for 192.168.1.122 [host down]
Nmap scan report for 192.168.1.123 [host down]
Nmap scan report for 192.168.1.124 [host down]
Nmap scan report for 192.168.1.125 [host down]
Nmap scan report for 192.168.1.126 [host down]
Nmap scan report for 192.168.1.127 [host down]
Nmap scan report for 192.168.1.128 [host down]
Nmap scan report for 192.168.1.129 [host down]
Nmap scan report for 192.168.1.130 [host down]
Nmap scan report for 192.168.1.131 [host down]
Nmap scan report for 192.168.1.132 [host down]
Nmap scan report for 192.168.1.133 [host down]
Nmap scan report for 192.168.1.134 [host down]
Nmap scan report for 192.168.1.135 [host down]
Nmap scan report for 192.168.1.136 [host down]
Nmap scan report for 192.168.1.137 [host down]
Nmap scan report for 192.168.1.138 [host down]
Nmap scan report for 192.168.1.139 [host down]
Nmap scan report for 192.168.1.140 [host down]
Nmap scan report for 192.168.1.141 [host down]
Nmap scan report for 192.168.1.142 [host down]
Nmap scan report for 192.168.1.143 [host down]
Nmap scan report for 192.168.1.144 [host down]
Nmap scan report for 192.168.1.145 [host down]
Nmap scan report for 192.168.1.146 [host down]
Nmap scan report for 192.168.1.147 [host down]
Nmap scan report for 192.168.1.148 [host down]
Nmap scan report for 192.168.1.149 [host down]
Nmap scan report for 192.168.1.150 [host down]
Nmap scan report for 192.168.1.151 [host down]
Nmap scan report for 192.168.1.152 [host down]
Nmap scan report for 192.168.1.153 [host down]
Nmap scan report for 192.168.1.154 [host down]
Nmap scan report for 192.168.1.155 [host down]
Nmap scan report for 192.168.1.156 [host down]
Nmap scan report for 192.168.1.157 [host down]
Nmap scan report for 192.168.1.158 [host down]
Nmap scan report for 192.168.1.159 [host down]
Nmap scan report for 192.168.1.160 [host down]
Nmap scan report for 192.168.1.161 [host down]
Nmap scan report for 192.168.1.162 [host down]
Nmap scan report for 192.168.1.163 [host down]
Nmap scan report for 192.168.1.164 [host down]
Nmap scan report for 192.168.1.165 [host down]
Nmap scan report for 192.168.1.166 [host down]
Nmap scan report for 192.168.1.167 [host down]
Nmap scan report for 192.168.1.168 [host down]
Nmap scan report for 192.168.1.169 [host down]
Nmap scan report for 192.168.1.170 [host down]
Nmap scan report for 192.168.1.171 [host down]
Nmap scan report for 192.168.1.172 [host down]
Nmap scan report for 192.168.1.173 [host down]
Nmap scan report for 192.168.1.174 [host down]
Nmap scan report for 192.168.1.175 [host down]
Nmap scan report for 192.168.1.176 [host down]
Nmap scan report for 192.168.1.177 [host down]
Nmap scan report for 192.168.1.178 [host down]
Nmap scan report for 192.168.1.179 [host down]
Nmap scan report for 192.168.1.180 [host down]
Nmap scan report for 192.168.1.181 [host down]
Nmap scan report for 192.168.1.182 [host down]
Nmap scan report for 192.168.1.183 [host down]
Nmap scan report for 192.168.1.184 [host down]
Nmap scan report for 192.168.1.185 [host down]
Nmap scan report for 192.168.1.186 [host down]
Nmap scan report for 192.168.1.187 [host down]
Nmap scan report for 192.168.1.188 [host down]
Nmap scan report for 192.168.1.189 [host down]
Nmap scan report for 192.168.1.190 [host down]
Nmap scan report for 192.168.1.191 [host down]
Nmap scan report for 192.168.1.192 [host down]
Nmap scan report for 192.168.1.193 [host down]
Nmap scan report for 192.168.1.194 [host down]
Nmap scan report for 192.168.1.195 [host down]
Nmap scan report for 192.168.1.196 [host down]
Nmap scan report for 192.168.1.197 [host down]
Nmap scan report for 192.168.1.198 [host down]
Nmap scan report for 192.168.1.199 [host down]
Nmap scan report for 192.168.1.200 [host down]
Nmap scan report for 192.168.1.201 [host down]
Nmap scan report for 192.168.1.202 [host down]
Nmap scan report for 192.168.1.203 [host down]
Nmap scan report for 192.168.1.204 [host down]
Nmap scan report for 192.168.1.205 [host down]
Nmap scan report for 192.168.1.206 [host down]
Nmap scan report for 192.168.1.207 [host down]
Nmap scan report for 192.168.1.208 [host down]
Nmap scan report for 192.168.1.209 [host down]
Nmap scan report for 192.168.1.210 [host down]
Nmap scan report for 192.168.1.211 [host down]
Nmap scan report for 192.168.1.212 [host down]
Nmap scan report for 192.168.1.213 [host down]
Nmap scan report for 192.168.1.214 [host down]
Nmap scan report for 192.168.1.215 [host down]
Nmap scan report for 192.168.1.216 [host down]
Nmap scan report for 192.168.1.217 [host down]
Nmap scan report for 192.168.1.218 [host down]
Nmap scan report for 192.168.1.219 [host down]
Nmap scan report for 192.168.1.220 [host down]
Nmap scan report for 192.168.1.221 [host down]
Nmap scan report for 192.168.1.222 [host down]
Nmap scan report for 192.168.1.223 [host down]
Nmap scan report for 192.168.1.224 [host down]
Nmap scan report for 192.168.1.225 [host down]
Nmap scan report for 192.168.1.226 [host down]
Nmap scan report for 192.168.1.227 [host down]
Nmap scan report for 192.168.1.228 [host down]
Nmap scan report for 192.168.1.229 [host down]
Nmap scan report for 192.168.1.230 [host down]
Nmap scan report for 192.168.1.231 [host down]
Nmap scan report for 192.168.1.232 [host down]
Nmap scan report for 192.168.1.233 [host down]
Nmap scan report for 192.168.1.234 [host down]
Nmap scan report for 192.168.1.235 [host down]
Nmap scan report for 192.168.1.236 [host down]
Nmap scan report for 192.168.1.237 [host down]
Nmap scan report for 192.168.1.238 [host down]
Nmap scan report for 192.168.1.239 [host down]
Nmap scan report for 192.168.1.240 [host down]
Nmap scan report for 192.168.1.241 [host down]
Nmap scan report for 192.168.1.242 [host down]
Nmap scan report for 192.168.1.243 [host down]
Nmap scan report for 192.168.1.244 [host down]
Nmap scan report for 192.168.1.245 [host down]
Nmap scan report for 192.168.1.246 [host down]
Nmap scan report for 192.168.1.247 [host down]
Nmap scan report for 192.168.1.248 [host down]
Nmap scan report for 192.168.1.249 [host down]
Nmap scan report for 192.168.1.250 [host down]
Nmap scan report for 192.168.1.251 [host down]
Nmap scan report for 192.168.1.252 [host down]
Nmap scan report for 192.168.1.255 [host down]
Initiating SYN Stealth Scan at 13:10
Scanning 9 hosts [1000 ports/host]
Discovered open port 22/tcp on 192.168.1.10
Discovered open port 22/tcp on 192.168.1.18
Discovered open port 22/tcp on 192.168.1.20
Discovered open port 22/tcp on 192.168.1.253
Discovered open port 22/tcp on 192.168.1.254
Discovered open port 22/tcp on 192.168.1.15
Discovered open port 443/tcp on 192.168.1.1
Discovered open port 25/tcp on 192.168.1.20
Discovered open port 25/tcp on 192.168.1.11
Discovered open port 25/tcp on 192.168.1.18
Discovered open port 443/tcp on 192.168.1.15
Discovered open port 25/tcp on 192.168.1.253
Discovered open port 110/tcp on 192.168.1.11
Discovered open port 143/tcp on 192.168.1.11
Discovered open port 53/tcp on 192.168.1.20
Discovered open port 53/tcp on 192.168.1.1
Discovered open port 53/tcp on 192.168.1.11
Discovered open port 995/tcp on 192.168.1.11
Discovered open port 80/tcp on 192.168.1.1
Discovered open port 80/tcp on 192.168.1.11
Discovered open port 80/tcp on 192.168.1.15
Discovered open port 80/tcp on 192.168.1.101
Discovered open port 993/tcp on 192.168.1.11
Discovered open port 111/tcp on 192.168.1.10
Discovered open port 111/tcp on 192.168.1.254
Discovered open port 8007/tcp on 192.168.1.254
Discovered open port 26/tcp on 192.168.1.253
Discovered open port 3128/tcp on 192.168.1.10
Completed SYN Stealth Scan against 192.168.1.254 in 3.34s (8 hosts left)
Completed SYN Stealth Scan against 192.168.1.11 in 3.37s (7 hosts left)
Completed SYN Stealth Scan against 192.168.1.15 in 3.37s (6 hosts left)
Completed SYN Stealth Scan against 192.168.1.253 in 3.37s (5 hosts left)
Completed SYN Stealth Scan against 192.168.1.1 in 3.43s (4 hosts left)
Completed SYN Stealth Scan against 192.168.1.10 in 3.43s (3 hosts left)
Completed SYN Stealth Scan against 192.168.1.18 in 3.43s (2 hosts left)
Completed SYN Stealth Scan against 192.168.1.20 in 3.43s (1 host left)
Completed SYN Stealth Scan at 13:10, 3.76s elapsed (9000 total ports)
Initiating Service scan at 13:10
Scanning 28 services on 9 hosts
Completed Service scan at 13:11, 71.88s elapsed (28 services on 9 hosts)
Initiating OS detection (try #1) against 9 hosts
Retrying OS detection (try #2) against 2 hosts
Retrying OS detection (try #3) against 2 hosts
Retrying OS detection (try #4) against 2 hosts
Retrying OS detection (try #5) against 2 hosts
NSE: Script scanning 9 hosts.
Initiating NSE at 13:12
Completed NSE at 13:14, 122.22s elapsed
Initiating NSE at 13:14
Completed NSE at 13:14, 6.92s elapsed
Initiating NSE at 13:14
Completed NSE at 13:14, 0.01s elapsed
Nmap scan report for gw1.abroadtelecom.net (192.168.1.1)
Host is up (0.0014s latency).
Not shown: 993 closed ports
PORT STATE SERVICE VERSION
53/tcp open domain dnsmasq 2.80
| dns-nsid:
|_ bind.version: dnsmasq-2.80
80/tcp open http nginx 1.16.1
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: nginx/1.16.1
|_http-title: Did not follow redirect to https://gw1.abroadtelecom.net/
443/tcp open ssl/http nginx 1.16.1
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: nginx/1.16.1
|_http-title: Router
| ssl-cert: Subject: commonName=gw1.abroadtelecom.net
| Subject Alternative Name: DNS:gw1.abroadtelecom.net
| Issuer: commonName=R3/organizationName=Let's Encrypt/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2020-12-15T01:36:02
| Not valid after: 2021-03-15T01:36:02
| MD5: 41d8 6e55 5081 c783 0eb1 d049 9355 c6cd
|_SHA-1: 82e5 8610 14aa 63e5 f506 8b96 b44c 8d82 d072 2a80
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
8000/tcp filtered http-alt
8007/tcp filtered ajp12
8008/tcp filtered http
8443/tcp filtered https-alt
MAC Address: 6C:B2:AE:A8:AE:8C (Cisco Systems)
No exact OS matches for host (If you know what OS is running on it, see
https://nmap.org/submit/ ;).
TCP/IP fingerprint:
OS:SCAN(V=7.91%E=4%D=4/17%OT=53%CT=1%CU=44683%PV=Y%DS=1%DC=D%G=Y%M=6CB2AE%T
OS:M=607B1761%P=i686-pc-windows-windows)SEQ(SP=C4%GCD=1%ISR=CD%TI=Z%II=I%TS
OS:=7)SEQ(II=I)ECN(R=Y%DF=Y%T=40%W=16D0%O=M5B4NNSNW4%CC=Y%Q=)T1(R=Y%DF=Y%T=
OS:40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=N)T5(R=N)T6(R=N)T7(R=N)U1(R=
OS:Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%
OS:T=40%CD=S)
Network Distance: 1 hop
TRACEROUTE
HOP RTT ADDRESS
1 1.40 ms gw1.abroadtelecom.net (192.168.1.1)
Nmap scan report for 192.168.1.10
Host is up (0.0045s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 8c:54:3e:03:ac:a8:ab:3a:3b:43:c7:55:09:5d:c5:2e (RSA)
| 256 1a:1f:82:51:62:1c:9e:fe:db:b1:a4:b7:7f:91:d7:e2 (ECDSA)
|_ 256 11:12:c5:59:33:da:3c:d4:19:f3:7d:02:a2:99:14:c8 (ED25519)
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
|_ 100000 3,4 111/udp6 rpcbind
3128/tcp open http Proxmox Virtual Environment REST API 3.0
|_http-server-header: pve-api-daemon/3.0
|_http-title: Site doesn't have a title.
MAC Address: 00:21:9B:A2:B8:F7 (Dell)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.6
Uptime guess: 33.560 days (since Sun Mar 14 23:47:13 2021)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=256 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT ADDRESS
1 4.46 ms 192.168.1.10
Nmap scan report for eagle.abroadtelecom.net (192.168.1.11)
Host is up (0.0043s latency).
Not shown: 993 closed ports
PORT STATE SERVICE VERSION
25/tcp open smtp Exim smtpd 4.92
| smtp-commands: eagle.192.168.1.11 Hello eagle.abroadtelecom.net
[192.168.1.100], SIZE 52428800, 8BITMIME, PIPELINING, CHUNKING, PRDR, HELP,
|_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET
HELP
53/tcp open domain ISC BIND 9.11.5-P4-5.1+deb10u3 (Debian Linux)
| dns-nsid:
|_ bind.version: 9.11.5-P4-5.1+deb10u3-Debian
80/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 68:81:51:70:e7:e6:ed:17:29:74:59:e5:f5:dc:41:ff (RSA)
| 256 f8:23:90:61:ba:52:47:98:fe:51:8c:44:0e:14:fe:01 (ECDSA)
|_ 256 c0:cd:6c:41:31:8e:5c:1c:12:07:e3:b8:90:90:20:7a (ED25519)
110/tcp open pop3 Dovecot pop3d
|_pop3-capabilities: RESP-CODES AUTH-RESP-CODE SASL CAPA STLS PIPELINING
UIDL TOP
| ssl-cert: Subject: commonName=localhost
| Subject Alternative Name: DNS:localhost
| Issuer: commonName=localhost
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2020-12-11T08:03:36
| Not valid after: 2030-12-09T08:03:36
| MD5: 5a42 b4c4 a2e0 6d87 d1fb c64f 5d97 ce5b
|_SHA-1: 9713 2ffe 5cf6 04ac ed41 6d7a 33bd 9197 9da3 72c2
|_ssl-date: TLS randomness does not represent time
143/tcp open imap Dovecot imapd
|_imap-capabilities: OK LITERAL+ have IMAP4rev1 LOGINDISABLEDA0001 ID
listed capabilities post-login more IDLE Pre-login ENABLE SASL-IR
LOGIN-REFERRALS STARTTLS
| ssl-cert: Subject: commonName=localhost
| Subject Alternative Name: DNS:localhost
| Issuer: commonName=localhost
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2020-12-11T08:03:36
| Not valid after: 2030-12-09T08:03:36
| MD5: 5a42 b4c4 a2e0 6d87 d1fb c64f 5d97 ce5b
|_SHA-1: 9713 2ffe 5cf6 04ac ed41 6d7a 33bd 9197 9da3 72c2
|_ssl-date: TLS randomness does not represent time
993/tcp open ssl/imap Dovecot imapd
|_imap-capabilities: ID AUTH=PLAINA0001 IDLE LITERAL+ have capabilities
listed post-login more IMAP4rev1 Pre-login ENABLE SASL-IR LOGIN-REFERRALS OK
| ssl-cert: Subject: commonName=localhost
| Subject Alternative Name: DNS:localhost
| Issuer: commonName=localhost
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2020-12-11T08:03:36
| Not valid after: 2030-12-09T08:03:36
| MD5: 5a42 b4c4 a2e0 6d87 d1fb c64f 5d97 ce5b
|_SHA-1: 9713 2ffe 5cf6 04ac ed41 6d7a 33bd 9197 9da3 72c2
|_ssl-date: TLS randomness does not represent time
995/tcp open ssl/pop3 Dovecot pop3d
|_pop3-capabilities: RESP-CODES AUTH-RESP-CODE SASL(PLAIN) CAPA USER
PIPELINING UIDL TOP
| ssl-cert: Subject: commonName=localhost
| Subject Alternative Name: DNS:localhost
| Issuer: commonName=localhost
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2020-12-11T08:03:36
| Not valid after: 2030-12-09T08:03:36
| MD5: 5a42 b4c4 a2e0 6d87 d1fb c64f 5d97 ce5b
|_SHA-1: 9713 2ffe 5cf6 04ac ed41 6d7a 33bd 9197 9da3 72c2
|_ssl-date: TLS randomness does not represent time
MAC Address: 86:6B:AC:85:82:98 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.6
Uptime guess: 14.472 days (since Sat Apr 03 01:54:11 2021)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=259 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: eagle.192.168.1.11; OS: Linux; CPE:
cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT ADDRESS
1 4.27 ms eagle.abroadtelecom.net (192.168.1.11)
Nmap scan report for eagle.abroadtelecom.net (192.168.1.15)
Host is up (0.0039s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey:
|_ 256 16:d0:90:6f:45:c3:73:34:40:91:bf:1e:37:bf:40:91 (ED25519)
80/tcp open http Mbedthis-Appweb 2.4.2 (Dell iDRAC6 http config)
|_http-server-header: Mbedthis-Appweb/2.4.2
443/tcp open ssl/http Mbedthis-Appweb 2.4.2
| ssl-cert: Subject: commonName=idrac.abroadtelecom.net
| Subject Alternative Name: DNS:idrac.abroadtelecom.net
| Issuer: commonName=R3/organizationName=Let's Encrypt/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2020-12-14T02:55:39
| Not valid after: 2021-03-14T02:55:39
| MD5: b2ff c5a8 adcc 0d39 1e37 c780 fb6b 4d61
|_SHA-1: 80f7 98bf 52dc 0563 49c9 6315 b3b3 0ebe 2f96 fa34
|_ssl-date: TLS randomness does not represent time
MAC Address: 00:21:9B:A2:B8:FF (Dell)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 - 2.6.33
Uptime guess: 31.066 days (since Wed Mar 17 11:39:22 2021)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=196 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Device: remote management; CPE: cpe:/h:dell:idrac6
TRACEROUTE
HOP RTT ADDRESS
1 3.89 ms eagle.abroadtelecom.net (192.168.1.15)
Nmap scan report for condor.abroadtelecom.net (192.168.1.18)
Host is up (0.0039s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 e9:fa:c0:88:11:ef:69:c8:b3:f5:0f:b6:0e:be:b6:d1 (RSA)
| 256 c4:ce:3b:35:08:7d:1c:01:3e:34:bc:9d:c7:47:38:0e (ECDSA)
|_ 256 a3:84:77:fa:e1:df:81:69:14:82:5a:44:ae:51:b8:d3 (ED25519)
25/tcp open smtp Exim smtpd 4.92
| smtp-commands: condor.192.168.1.18 Hello condor.abroadtelecom.net
[192.168.1.100], SIZE 52428800, 8BITMIME, PIPELINING, CHUNKING, PRDR, HELP,
|_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET
HELP
MAC Address: 92:A8:53:E6:64:6F (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.6
Uptime guess: 9.337 days (since Thu Apr 08 05:09:05 2021)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=253 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: condor.192.168.1.18; OS: Linux; CPE:
cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT ADDRESS
1 3.90 ms condor.abroadtelecom.net (192.168.1.18)
Nmap scan report for penguin.abroadtelecom.net (192.168.1.20)
Host is up (0.0033s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 45:fa:bc:4c:b3:b5:e4:0e:1f:e4:4c:f1:91:1a:63:52 (RSA)
| 256 0c:28:3f:74:56:cb:4c:3e:b0:7c:c7:58:2c:04:43:a7 (ECDSA)
|_ 256 65:7d:8d:86:88:7d:aa:ab:70:11:b3:a1:63:d6:a9:46 (ED25519)
25/tcp open smtp Exim smtpd 4.92
| smtp-commands: penguin.192.168.1.20 Hello penguin.abroadtelecom.net
[192.168.1.100], SIZE 52428800, 8BITMIME, PIPELINING, CHUNKING, PRDR, HELP,
|_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET
HELP
53/tcp open domain ISC BIND 9.11.5-P4-5.1+deb10u3 (Debian Linux)
| dns-nsid:
|_ bind.version: 9.11.5-P4-5.1+deb10u3-Debian
MAC Address: E6:A7:92:9E:95:2E (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.6
Uptime guess: 12.031 days (since Mon Apr 05 12:29:55 2021)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: penguin.192.168.1.20; OS: Linux; CPE:
cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT ADDRESS
1 3.34 ms penguin.abroadtelecom.net (192.168.1.20)
Nmap scan report for toshiba.abroadtelecom.net (192.168.1.101)
Host is up (0.018s latency).
Not shown: 999 closed ports
PORT STATE SERVICE VERSION
80/tcp open http
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 404 Not Found
| Content-Type: text/html
| Content-Length: 11321
| <html>
| <head>
| <script language="Javascript" src="lang/language_en.js"></script>
| <script> var strHtml='<title>'+ 'GPE1003 ' + WebConfiguration + ' -
' + err404 +'</title>'; dw(strHtml); </script>
| <meta http-equiv="Pragma" content="no-cache">
| <meta http-equiv="Cache-Control" content="no-cache">
| <meta http-equiv="Expires" content="Mon, 06 Jan 1990 00:00:01 GMT">
| </head>
| <body bgcolor="white">
| <table>
| border ="0">
| <td>
| <div style="padding:10px;font-size:18px">
| <p><b><script>dw(notFound);</script></b></p>
| <font size=-1>
| <p><script>dw(urlNotFound);</script><BR>
| <script language="JavaScript">
| document.write(location.href);
| </script>
| </p>
| </font>
| <br><hr>
| <p><b><script>dw(err404);</script></b></p>
| <font size=-1>
| <p><script>dw(waitforredirect);</script> <a href="http://192.1
| GetRequest:
| HTTP/1.1 200 OK
| Content-Type: text/html
| Content-Length: 28943
| <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
| "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd";>
| <html>
| <head>
| <META HTTP-EQUIV="PRAGMA" CONTENT="NO-CACHE">
| <META HTTP-EQUIV="EXPIRES" CONTENT="0">
| <META HTTP-EQUIV="CACHE-CONTROL" CONTENT="NO-CACHE">
| <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
| <!-- Temp disable <meta name="viewport"
content="width=device-width"> -->
| <script type="text/javascript">
| ORG_SERIAL_NUMBER = "M91614SA2857"; // "M91614SA2857"
"00000000000000A_R.123456_"
| PTS_SERIAL_NUMBER = ORG_SERIAL_NUMBER.split('_');
| ARR_SERIAL_NUMBER = PTS_SERIAL_NUMBER[0];
| SER_SERIAL_NUMBER = PTS_SERIAL_NUMBER[1];
| CTRY = PTS_SERIAL_NUMBER[2]; // "US"
| LANG = "en"; // "en" "en"
| if(LANG == "") {
| if(CTRY == "") {
| LANG =
| HTTPOptions:
| HTTP/1.1 405 Method Not Allowed
| Connection: close
| Content-Type: text/html
| Content-Length: 173
| <html><head><title>405 Method Not
Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested URL
cannot be accessed with the requested method.</p></body></html>
| RTSPRequest:
| HTTP/1.1 505 HTTP Version Not Supported
| Connection: close
| Content-Type: text/html
| Content-Length: 166
|_ <html><head><title>505 HTTP Version Not
Supported</title></head><body><h1>HTTP Version Not Supported</h1><p>HTTP
versions 1.0 and 1.1 are supported.</p></body></html>
1 service unrecognized despite returning data. If you know the
service/version, please submit the following fingerprint at
https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.91%I=7%D=4/17%Time=607B1689%P=i686-pc-windows-windows%r(
SF:GetRequest,2DA0,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20text/html\r
SF:\nContent-Length:\x2028943\r\n\r\n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W
SF:3C//DTD\x20XHTML\x201\.0\x20Transitional//EN\"\r\n\x20\x20\x20\x20\x20\
SF:x20\x20\x20\"http://www\.w3\.org/TR/xhtml1/DTD/xhtml1-transitional\.dtd
SF:\">\r\n<html>\r\n<head>\r\n<META\x20HTTP-EQUIV=\"PRAGMA\"\x20CONTENT=\"
SF:NO-CACHE\">\r\n<META\x20HTTP-EQUIV=\"EXPIRES\"\x20CONTENT=\"0\">\r\n<ME
SF:TA\x20HTTP-EQUIV=\"CACHE-CONTROL\"\x20CONTENT=\"NO-CACHE\">\r\n<meta\x2
SF:0http-equiv=\"Content-Type\"\x20content=\"text/html;\x20charset=utf-8\"
SF:>\r\n<!--\x20Temp\x20disable\x20<meta\x20name=\"viewport\"\x20content=\
SF:"width=device-width\">\x20-->\r\n<script\x20type=\"text/javascript\">\r
SF:\nvar\x20ORG_SERIAL_NUMBER\x20=\x20\"M91614SA2857\";\x20\x20\x20//\x20\
SF:"M91614SA2857\"\x20\x20\x20\"00000000000000A_R\.123456_\"\r\nvar\x20PTS
SF:_SERIAL_NUMBER\x20=\x20ORG_SERIAL_NUMBER\.split\('_'\);\r\nvar\x20ARR_S
SF:ERIAL_NUMBER\x20=\x20PTS_SERIAL_NUMBER\[0\];\r\nvar\x20SER_SERIAL_NUMBE
SF:R\x20=\x20PTS_SERIAL_NUMBER\[1\];\r\nvar\x20CTRY\x20=\x20PTS_SERIAL_NUM
SF:BER\[2\];\x20\x20\x20//\x20\"US\"\r\nvar\x20LANG\x20=\x20\"en\";\x20\x2
SF:0\x20\x20\x20//\x20\"en\"\x20\x20\x20\"en\"\r\nif\(LANG\x20==\x20\"\"\)
SF:\x20{\r\n\tif\(CTRY\x20==\x20\"\"\)\x20{\r\n\t\tLANG\x20=")%r(HTTPOptio
SF:ns,111,"HTTP/1\.1\x20405\x20Method\x20Not\x20Allowed\r\nConnection:\x20
SF:close\r\nContent-Type:\x20text/html\r\nContent-Length:\x20173\r\n\r\n<h
SF:tml><head><title>405\x20Method\x20Not\x20Allowed</title></head><body><h
SF:1>Method\x20Not\x20Allowed</h1><p>The\x20requested\x20URL\x20cannot\x20
SF:be\x20accessed\x20with\x20the\x20requested\x20method\.</p></body></html
SF:>")%r(RTSPRequest,112,"HTTP/1\.1\x20505\x20HTTP\x20Version\x20Not\x20Su
SF:pported\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nConten
SF:t-Length:\x20166\r\n\r\n<html><head><title>505\x20HTTP\x20Version\x20No
SF:t\x20Supported</title></head><body><h1>HTTP\x20Version\x20Not\x20Suppor
SF:ted</h1><p>HTTP\x20versions\x201\.0\x20and\x201\.1\x20are\x20supported\
SF:.</p></body></html>")%r(FourOhFourRequest,171A,"HTTP/1\.1\x20404\x20Not
SF:\x20Found\r\nContent-Type:\x20text/html\r\nContent-Length:\x2011321\r\n
SF:\r\n<html>\r\n<head>\r\n<script\x20language=\"Javascript\"\x20src=\"lan
SF:g/language_en\.js\"></script>\r\n<script>\x20var\x20strHtml='<title>'\+
SF:\x20'GPE1003\x20'\x20\+\x20WebConfiguration\x20\+\x20'\x20-\x20'\x20\+\
SF:x20err404\x20\+'</title>';\x20dw\(strHtml\);\x20</script>\r\n<meta\x20h
SF:ttp-equiv=\"Pragma\"\x20content=\"no-cache\">\r\n<meta\x20http-equiv=\"
SF:Cache-Control\"\x20content=\"no-cache\">\r\n<meta\x20http-equiv=\"Expir
SF:es\"\x20content=\"Mon,\x2006\x20Jan\x201990\x2000:00:01\x20GMT\">\r\n</
SF:head>\r\n<body\x20bgcolor=\"white\">\r\n<table>\r\n<tr\x20border\x20=\"
SF:0\">\r\n<td>\r\n<div\x20style=\"padding:10px;font-size:18px\">\r\n\x20\
SF:x20<p><b><script>dw\(notFound\);</script></b></p>\r\n\x20\x20<font\x20s
SF:ize=-1>\r\n\x20\x20<p><script>dw\(urlNotFound\);</script><BR>\r\n\x20\x
SF:20<script\x20language=\"JavaScript\">\r\ndocument\.write\(location\.hre
SF:f\);\r\n\x20\x20</script>\r\n\x20\x20</p>\r\n\x20\x20</font>\r\n\x20\x2
SF:0<br><hr>\r\n\x20\x20<p><b><script>dw\(err404\);</script></b></p>\r\n\x
SF:20\x20<font\x20size=-1>\r\n\x20\x20<p><script>dw\(waitforredirect\);</s
SF:cript>\x20<a\x20href=\"http://192\.1";);
MAC Address: 04:4E:5A:1A:88:AD (Arris Group)
No exact OS matches for host (If you know what OS is running on it, see
https://nmap.org/submit/ ;).
TCP/IP fingerprint:
OS:SCAN(V=7.91%E=4%D=4/17%OT=80%CT=1%CU=35665%PV=Y%DS=1%DC=D%G=Y%M=044E5A%T
OS:M=607B1761%P=i686-pc-windows-windows)SEQ(SP=D2%GCD=1%ISR=D8%TI=I%CI=I%II
OS:=I%SS=S%TS=U)SEQ(CI=I%II=I)ECN(R=N)T1(R=Y%DF=N%T=135%S=O%A=S+%F=AS%RD=0%
OS:Q=)T2(R=N)T3(R=N)T4(R=Y%DF=N%T=135%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=
OS:N%T=72%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=N%T=72%W=0%S=A%A=Z%F=R%O=%
OS:RD=0%Q=)T7(R=Y%DF=N%T=72%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=72%I
OS:PL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=855F%RUD=G)IE(R=Y%DFI=N%T=72%CD=Z)
Network Distance: 1 hop
TRACEROUTE
HOP RTT ADDRESS
1 17.66 ms toshiba.abroadtelecom.net (192.168.1.101)
Nmap scan report for 192.168.1.253
Host is up (0.0026s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 1b:36:98:55:ee:8c:8a:fd:de:2d:97:e9:1b:e3:b4:c2 (RSA)
| 256 27:2b:bf:9b:29:84:27:90:2c:aa:60:ac:0f:f4:76:fe (ECDSA)
|_ 256 42:ea:09:59:d7:0e:94:4f:68:db:a1:d3:a9:97:37:aa (ED25519)
25/tcp open smtp Postfix smtpd
|_smtp-commands: mail.abroadtelecom.net, PIPELINING, SIZE 10485760, VRFY,
ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, SMTPUTF8, CHUNKING,
| ssl-cert: Subject: commonName=*.
abroadtelecom.net/organizationName=abroadtelecom.net
| Issuer: commonName=*.
abroadtelecom.net/organizationName=abroadtelecom.net
| Public Key type: rsa
| Public Key bits: 4096
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2020-12-16T19:40:41
| Not valid after: 2030-12-14T19:40:41
| MD5: c214 598f fa9b b5fe 9061 df1e f7c8 afea
|_SHA-1: 9922 80d8 4100 6a23 545f bb2b bc00 09bc 7b42 fe37
|_ssl-date: TLS randomness does not represent time
26/tcp open smtp Postfix smtpd
|_smtp-commands: mail.abroadtelecom.net, PIPELINING, SIZE 10485760, VRFY,
ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING,
| ssl-cert: Subject: commonName=*.
abroadtelecom.net/organizationName=abroadtelecom.net
| Issuer: commonName=*.
abroadtelecom.net/organizationName=abroadtelecom.net
| Public Key type: rsa
| Public Key bits: 4096
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2020-12-16T19:40:41
| Not valid after: 2030-12-14T19:40:41
| MD5: c214 598f fa9b b5fe 9061 df1e f7c8 afea
|_SHA-1: 9922 80d8 4100 6a23 545f bb2b bc00 09bc 7b42 fe37
|_ssl-date: TLS randomness does not represent time
MAC Address: 2A:E1:86:69:24:00 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.6
Uptime guess: 47.454 days (since Mon Mar 01 01:20:58 2021)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: mail.abroadtelecom.net; OS: Linux; CPE:
cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT ADDRESS
1 2.64 ms 192.168.1.253
Nmap scan report for 192.168.1.254
Host is up (0.0028s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
| ssh-hostkey:
| 2048 ed:1f:9d:60:63:d5:2b:dc:99:4d:a3:8e:87:e3:e6:cc (RSA)
| 256 77:33:c4:9b:5c:64:5c:c9:ca:66:22:91:c7:11:d7:c3 (ECDSA)
|_ 256 88:52:78:d6:c2:31:bd:5c:95:d6:9f:d9:78:79:a9:32 (ED25519)
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
|_ 100000 3,4 111/udp6 rpcbind
8007/tcp open ssl/ajp12?
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, RTSPRequest:
| HTTP/1.1 400 Bad Request
| content-length: 0
| date: Sat, 17 Apr 2021 17:10:48 GMT
| GetRequest:
| HTTP/1.0 200 OK
| content-type: text/html
| content-length: 1979
| date: Sat, 17 Apr 2021 17:10:48 GMT
| <!DOCTYPE html>
| <html>
| <head>
| <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
| <meta http-equiv="X-UA-Compatible" content="IE=edge">
| <meta name="viewport" content="width=device-width, initial-scale=1,
maximum-scale=1, user-scalable=no">
| <title>backup - Proxmox Backup Server</title>
| <link rel="icon" sizes="128x128" href="/images/logo-128.png" />
|