Starting Nmap 5.00 ( http://nmap.org ) at 2012-08-25 13:36 CEST NSE: Loaded 30 scripts for scanning. Initiating Parallel DNS resolution of 1 host. at 13:36 Completed Parallel DNS resolution of 1 host. at 13:36, 1.02s elapsed DNS resolution of 1 IPs took 1.02s. Mode: Async [#: 2, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating Connect Scan at 13:36 Scanning 188.19.182.163 [1000 ports] Discovered open port 49152/tcp on 188.19.182.163 Completed Connect Scan at 13:36, 15.25s elapsed (1000 total ports) Initiating Service scan at 13:36 Scanning 1 service on 188.19.182.163 Completed Service scan at 13:37, 87.51s elapsed (1 service on 1 host) NSE: Script scanning 188.19.182.163. NSE: Starting runlevel 1 scan Initiating NSE at 13:37 Completed NSE at 13:37, 0.31s elapsed NSE: Script Scanning completed. Host 188.19.182.163 is up (0.12s latency). Scanned at 2012-08-25 13:36:07 CEST for 103s Interesting ports on 188.19.182.163: Not shown: 995 filtered ports PORT STATE SERVICE VERSION 80/tcp closed http 6667/tcp closed irc 6668/tcp closed irc 6669/tcp closed irc 49152/tcp open unknown 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : SF-Port49152-TCP:V=5.00%I=7%D=8/25%Time=5038B8BD%P=x86_64-unknown-linux-gnu%r(FourOhFourRequest,CC,"HTTP/1\.1\x20404\x20Not\x20found\r\nConnection:\x SF:20close\r\nContent-type:\x20text/html\r\n\r\n404\x20 SF:Not\x20Found

Not\x20Found

The\x20requested\ SF:x20URL\x20was\x20not\x20found\x20on\x20this\x20server\.\r SF:\n")%r(GenericLines,E1,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nConne SF:ction:\x20close\r\nContent-type:\x20text/html\r\n\r\n501\x20Not\x20Implemented

Not\x20ImplementedThe\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\x20s SF:erver\.\r\n")%r(GetRequest,CC,"HTTP/1\.1\x20404\x20Not\x2 SF:0found\r\nConnection:\x20close\r\nContent-type:\x20text/html\r\n\r\n404\x20Not\x20Found

Not\x20Foun SF:d

The\x20requested\x20URL\x20was\x20not\x20found\x20on\x20this\x20s SF:erver\.\r\n")%r(HTTPOptions,E1,"HTTP/1\.1\x20501\x20Not\x SF:20Implemented\r\nConnection:\x20close\r\nContent-type:\x20text/html\r\n SF:\r\n501\x20Not\x20ImplementedNot\x20Implemented

The\x20HTTP\x20Method\x20is\x20not\x20implemen SF:ted\x20by\x20this\x20server\.\r\n")%r(RTSPRequest,E1,"HTT SF:P/1\.1\x20501\x20Not\x20Implemented\r\nConnection:\x20close\r\nContent- SF:type:\x20text/html\r\n\r\n501\x20Not\x20Implemented< SF:/TITLE></HEAD><BODY><H1>Not\x20Implemented</H1>The\x20HTTP\x20Method\x2 SF:0is\x20not\x20implemented\x20by\x20this\x20server\.</BODY></HTML>\r\n") SF:%r(SIPOptions,E1,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nConnection: SF:\x20close\r\nContent-type:\x20text/html\r\n\r\n<HTML><HEAD><TITLE>501\x SF:20Not\x20Implemented

Not\x20Implemented

The SF:\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\x20server\ SF:.\r\n"); Read data files from: /usr/share/nmap Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 104.44 seconds