You are on page 1of 2

Starting Nmap 5.35DC1 ( http://nmap.org ) at 2010-08-27 09:47 COT NSE: Loaded 6 scripts for scanning.

Initiating Ping Scan at 09:47 Scanning 64.13.134.52 [4 ports] Completed Ping Scan at 09:47, 0.01s elapsed (1 total hosts) Initiating Connect Scan at 09:47 Scanning 64.13.134.52 [10500 ports] Discovered open port 21/tcp on 64.13.134.52 Discovered open port 80/tcp on 64.13.134.52 Discovered open port 22/tcp on 64.13.134.52 Discovered open port 53/tcp on 64.13.134.52 Discovered open port 1720/tcp on 64.13.134.52 Discovered open port 10021/tcp on 64.13.134.52 Completed Connect Scan at 02:55, 64.81s elapsed (10500 total ports) Initiating Service scan at 02:55 Scanning 6 services on 64.13.134.52 Completed Service scan at 02:55, 5.00s elapsed (6 services on 1 host) Initiating OS detection (try #1) against 64.13.134.52 Retrying OS detection (try #2) against 64.13.134.52 NSE: Script scanning 64.13.134.52. NSE: Starting runlevel 1 (of 1) scan. Initiating NSE at 02:55 Completed NSE at 02:56, 30.00s elapsed Nmap scan report for 64.13.134.52 Host is up (0.040s latency). Scanned at 2010-08-28 09:47:33 COT for 105s Not shown: 10494 filtered ports PORT STATE SERVICE VERSION 21/tcp open ftp? 22/tcp open ssh? 53/tcp open domain? 80/tcp open http? 1720/tcp open H.323/Q.931? 10021/tcp open unknown Warning: OSScan results may be unreliable because we could not find at least 1 o pen and 1 closed port Device type: firewall game console media device Running (JUST GUESSING) : D-Link embedded (91%), Microsoft embedded (87%), Phili ps Linux 2.1.X (86%), Sony Linux 2.1.X (86%) OS fingerprint not ideal because: Missing a closed TCP port so results incomplet e Aggressive OS guesses: D-Link NetDefend firewall (91%), Microsoft Xbox game cons ole (modified, running XboxMediaCenter) (87%), TiVo series 1 (Sony SVR-2000 or P hilips HDR112) (Linux 2.1.24-TiVo-2.5, PowerPC) (86%) No exact OS matches for host (test conditions non-ideal). TCP/IP fingerprint: SCAN(V=5.35DC1%D=8/28%OT=21%CT=%CU=%PV=N%G=N%TM=4C78C122%P=i686-pc-linux-gnu) SEQ(SP=FF%GCD=1%ISR=10E%TI=RD%II=I%TS=U) SEQ(SP=102%GCD=1%ISR=10B%TI=RD%II=I%TS=U) OPS(O1=M5B4%O2=M5B4%O3=M5B4%O4=M5B4%O5=M5B4%O6=M5B4) WIN(W1=5B4%W2=5B4%W3=5B4%W4=5B4%W5=5B4%W6=5B4) ECN(R=Y%DF=N%TG=FF%W=5B4%O=M5B4%CC=N%Q=) T1(R=Y%DF=N%TG=FF%S=O%A=S+%F=AS%RD=0%Q=) T2(R=N) T3(R=N) T4(R=Y%DF=N%TG=FF%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) T4(R=N) U1(R=N) IE(R=Y%DFI=N%TG=40%CD=S)

TCP Sequence Prediction: Difficulty=258 (Good luck!) IP ID Sequence Generation: Randomized Read data files from: /usr/local/share/nmap OS and Service detection performed. Please report any incorrect results at http: //nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 106.19 seconds Raw packets sent: 75 (6.936KB) Rcvd: 20 (1.348KB)