188.19.182.163


SUBMITTED BY: Guest

DATE: Aug. 25, 2012, 11:39 a.m.

FORMAT: Text only

SIZE: 3.8 kB

HITS: 1894

  1. Starting Nmap 5.00 ( http://nmap.org ) at 2012-08-25 13:36 CEST
  2. NSE: Loaded 30 scripts for scanning.
  3. Initiating Parallel DNS resolution of 1 host. at 13:36
  4. Completed Parallel DNS resolution of 1 host. at 13:36, 1.02s elapsed
  5. DNS resolution of 1 IPs took 1.02s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
  6. Initiating Connect Scan at 13:36
  7. Scanning 188.19.182.163 [1000 ports]
  8. Discovered open port 49152/tcp on 188.19.182.163
  9. Completed Connect Scan at 13:36, 15.25s elapsed (1000 total ports)
  10. Initiating Service scan at 13:36
  11. Scanning 1 service on 188.19.182.163
  12. Completed Service scan at 13:37, 87.51s elapsed (1 service on 1 host)
  13. NSE: Script scanning 188.19.182.163.
  14. NSE: Starting runlevel 1 scan
  15. Initiating NSE at 13:37
  16. Completed NSE at 13:37, 0.31s elapsed
  17. NSE: Script Scanning completed.
  18. Host 188.19.182.163 is up (0.12s latency).
  19. Scanned at 2012-08-25 13:36:07 CEST for 103s
  20. Interesting ports on 188.19.182.163:
  21. Not shown: 995 filtered ports
  22. PORT STATE SERVICE VERSION
  23. 80/tcp closed http
  24. 6667/tcp closed irc
  25. 6668/tcp closed irc
  26. 6669/tcp closed irc
  27. 49152/tcp open unknown
  28. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
  29. SF-Port49152-TCP:V=5.00%I=7%D=8/25%Time=5038B8BD%P=x86_64-unknown-linux-gnu%r(FourOhFourRequest,CC,"HTTP/1\.1\x20404\x20Not\x20found\r\nConnection:\x
  30. SF:20close\r\nContent-type:\x20text/html\r\n\r\n<HTML><HEAD><TITLE>404\x20
  31. SF:Not\x20Found</TITLE></HEAD><BODY><H1>Not\x20Found</H1>The\x20requested\
  32. SF:x20URL\x20was\x20not\x20found\x20on\x20this\x20server\.</BODY></HTML>\r
  33. SF:\n")%r(GenericLines,E1,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nConne
  34. SF:ction:\x20close\r\nContent-type:\x20text/html\r\n\r\n<HTML><HEAD><TITLE
  35. SF:>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20Implemented</
  36. SF:H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\x20s
  37. SF:erver\.</BODY></HTML>\r\n")%r(GetRequest,CC,"HTTP/1\.1\x20404\x20Not\x2
  38. SF:0found\r\nConnection:\x20close\r\nContent-type:\x20text/html\r\n\r\n<HT
  39. SF:ML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY><H1>Not\x20Foun
  40. SF:d</H1>The\x20requested\x20URL\x20was\x20not\x20found\x20on\x20this\x20s
  41. SF:erver\.</BODY></HTML>\r\n")%r(HTTPOptions,E1,"HTTP/1\.1\x20501\x20Not\x
  42. SF:20Implemented\r\nConnection:\x20close\r\nContent-type:\x20text/html\r\n
  43. SF:\r\n<HTML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H
  44. SF:1>Not\x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemen
  45. SF:ted\x20by\x20this\x20server\.</BODY></HTML>\r\n")%r(RTSPRequest,E1,"HTT
  46. SF:P/1\.1\x20501\x20Not\x20Implemented\r\nConnection:\x20close\r\nContent-
  47. SF:type:\x20text/html\r\n\r\n<HTML><HEAD><TITLE>501\x20Not\x20Implemented<
  48. SF:/TITLE></HEAD><BODY><H1>Not\x20Implemented</H1>The\x20HTTP\x20Method\x2
  49. SF:0is\x20not\x20implemented\x20by\x20this\x20server\.</BODY></HTML>\r\n")
  50. SF:%r(SIPOptions,E1,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nConnection:
  51. SF:\x20close\r\nContent-type:\x20text/html\r\n\r\n<HTML><HEAD><TITLE>501\x
  52. SF:20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20Implemented</H1>The
  53. SF:\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\x20server\
  54. SF:.</BODY></HTML>\r\n");
  55. Read data files from: /usr/share/nmap
  56. Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
  57. Nmap done: 1 IP address (1 host up) scanned in 104.44 seconds

comments powered by Disqus