Starting Nmap 6.49BETA4 (
Sie müssen registriert sein, um Links zu sehen.
) at 2016-07-01 18:49 Mitteleuropäische Sommerzeit
NSE: Loaded 122 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 18:49
Completed NSE at 18:49, 0.00s elapsed
Initiating NSE at 18:49
Completed NSE at 18:49, 0.00s elapsed
Initiating ARP Ping Scan at 18:49
Scanning 192.168.46.99 [1 port]
Completed ARP Ping Scan at 18:49, 0.08s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 18:49
Completed Parallel DNS resolution of 1 host. at 18:49, 0.02s elapsed
Initiating SYN Stealth Scan at 18:49
Scanning 192.168.46.99 [65535 ports]
Discovered open port 80/tcp on 192.168.46.99
Discovered open port 22/tcp on 192.168.46.99
Discovered open port 22000/tcp on 192.168.46.99
Discovered open port 12345/tcp on 192.168.46.99
Discovered open port 16002/tcp on 192.168.46.99
Completed SYN Stealth Scan at 18:49, 14.65s elapsed (65535 total ports)
Initiating Service scan at 18:49
Scanning 5 services on 192.168.46.99
Completed Service scan at 18:51, 90.61s elapsed (5 services on 1 host)
Initiating OS detection (try #1) against 192.168.46.99
NSE: Script scanning 192.168.46.99.
Initiating NSE at 18:51
Completed NSE at 18:51, 9.08s elapsed
Initiating NSE at 18:51
Completed NSE at 18:51, 0.01s elapsed
Nmap scan report for 192.168.46.99
Host is up (0.00035s latency).
Not shown: 65530 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh (protocol 2.0)
| ssh-hostkey:
| 1024 b5:ae:35:31:47:f2:e0:79:cb:23:f2:6c:cc:bb:85:a0 (DSA)
| 2048 64:cf:0b:16:bd:c4:39:3b:ef:99:b3:c4:9b:02:2a:af (RSA)
|_ 256 90:27:62:ab:78:34:c5:73:89:f9:66:e6:ab:2c:87:96 (ECDSA)
80/tcp open http Apache httpd 2.4.10 ((Raspbian))
|_http-favicon: Unknown favicon MD5: 532303279B0919C668323290BB056099
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-server-header: Apache/2.4.10 (Raspbian)
|_http-title: Login
16002/tcp open http OSCam softcam httpd
| http-auth:
| HTTP/1.0 401 Unauthorized
|_ Digest nonce=948e27b34d3d74e3fee5827b15a3b3b5 opaque=fff1a6e3595204d98f4c33e50bb6f2ea algorithm=MD5 realm=Forbidden qop=auth
|_http-methods: No Allow or Public header in OPTIONS response (status code 401)
|_http-title: Site doesn't have a title (text/html).
22000/tcp open unknown
12345/tcp open unknown
3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at
Sie müssen registriert sein, um Links zu sehen.
:
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port22-TCP:V=6.49BETA4%I=7%D=7/1%Time=57769F25%P=i686-pc-windows-window
SF:s%r(NULL,29,"SSH-2\.0-OpenSSH_6\.7p1\x20Raspbian-5\+deb8u2\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port22000-TCP:V=6.49BETA4%I=7%D=7/1%Time=57769F25%P=i686-pc-windows-win
SF:dows%r(NULL,E,":\xf7\]\x13\xf2f\xa2\xcf4\x16\xaf#fn")%r(DNSVersionBindR
SF:eq,E,"\xbb\xa6\x85\x90\xe5\x90\xe5\xd6\xef7\x81T\x16:")%r(DNSStatusRequ
SF:est,E,"M\xca:\xb5\xa8\xf8\xb4\x1a\xc0k\xd9<\xa4\x89")%r(LPDString,E,"\x
SF:07\+\xbf\xd5\x15\xa24\xd4kMb\xfd\xb7\xe5")%r(TerminalServer,E,""cjl\x9
SF:aY\xe7>v\x1f\xf5d\^\xc6")%r(WMSRequest,E,"\xaaI/\)\x1e\xd1\x12\xc2\x8a\
SF:x8d\x81\xbf\x95d")%r(oracle-tns,E,"\xb9\xbcv\x85`'s\x1d\xc4\xbb\*T'\xeb
SF:");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port44333-TCP:V=6.49BETA4%I=7%D=7/1%Time=57769F22%P=i686-pc-windows-win
SF:dows%r(NULL,10,"/\xc5\xf8\xd8\xfb\x9b;\x0e\xea\xc4\x8e\]\x14\$\xc1C")%r
SF
GenericLines,10,"\|\x9f\xc8\xb2\xb86\xc5\xda\x84\x06\xcf\x12\xb8\xdb\\
SF:\x9e")%r(GetRequest,10,"\xbf\x93\xdan!`\x9d\xb1\x99\^!QyQ\x98p")%r(HTTP
SF:Options,10,"B\xb4L\xc0\xa4\x84\xc1\xf6\xcf\x9e\x90\xd3\xb5\xd6\x9d\x89"
SF
%r(RTSPRequest,10,"\xafh\xcc\xafD\x01~{\x91\x90\xbd\xee\x84\xf9\x07\x1
SF:8")%r(DNSVersionBindReq,10,"\x02\xbf\x10P\xfd~\xf3\x81\[\xe5\xe7UZ"\xe
SF:a&")%r(DNSStatusRequest,10,"\x1d\xff\x94I<\x1e\xd8\xb8\[i\xb0\xfc\xb4\x
SF:86\x1c\xfd")%r(Help,10,"\x8b\xaaA\xeb\xb0\x0b\xce:\?\xc0y\x08zu\x88-")%
SF:r(X11Probe,10,"\x14s\x03\x13b\xbc\x9f\xdc\xd0\xb8\xe0%F\xe7\x82\x14")%r
SF
LPDString,10,"R\xd2\xectzH\t\x81\x84\xb17hP\xcb,\]")%r(LDAPBindReq,10,
SF:"\.\xbd'\xe8\x03\x17\xb8\xe2A\x9e\x9f4rr~\xfe")%r(LANDesk-RC,10,"E\xb0\
SF:xb8\xb7\x14\xd8\xb5\x94m\xcd\xf5\xf9\xc6UbD")%r(TerminalServer,10,"\x96
SF:\xea\x99T\xf2\xc9\xc2\x17:\xb9\xa4\x10\xc2l\xff{")%r(NCP,10,"\xab\xf5\x
SF:80\)\x98\xe8}V\xa0\xf6\xbd\xb9\xe3\xd3\xba8")%r(afp,10,"\x81\x10\xdc:\x
SF:9f\xb3\xcfy\xad\xec\xf9\xac\xcd\xaf\xa4_")%r(kumo-server,10,"\xc2m\0\xd
SF:dxU@`\x89"\xe2G\xc3\xe4"\x84");
MAC Address: B8:27:EB:55:FF:91 (
Raspberry Pi Foundation)
Device type: general purpose
Running: Linux 3.X
OS CPE: cpe:/o:linux:linux_kernel:3
OS details: Linux 3.2 - 3.19
Uptime guess: 5.887 days (since Sat Jun 25 21:33:44 2016)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Device: media device
TRACEROUTE
HOP RTT ADDRESS
1 0.35 ms 192.168.46.99
NSE: Script Post-scanning.
Initiating NSE at 18:51
Completed NSE at 18:51, 0.00s elapsed
Initiating NSE at 18:51
Completed NSE at 18:51, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at
Sie müssen registriert sein, um Links zu sehen.
.
Nmap done: 1 IP address (1 host up) scanned in 118.78 seconds
Raw packets sent: 65558 (2.885MB) | Rcvd: 65619 (2.632MB)