New Paste

 

Recent Pastes

Administrate




Pastebin on paste.luisaranguren.com

PasteID: 5ql
Pasted by Anonymous, 2018-06-11 21:29:10 GMT
Expires Never
Paste size 2.7 Kb
Tools Raw   Download
 
  1. Starting Nmap 7.70 ( https://nmap.org ) at 2018-06-12 07:27 AEST 
  2. Nmap scan report for waf.dog (178.84.33.55) 
  3. Host is up (0.34s latency). 
  4. Other addresses for waf.dog (not scanned): 2001:470:1f14:97e::2 
  5. rDNS record for 178.84.33.55: 178-84-33-55.dynamic.upc.nl 
  6. Not shown: 991 closed ports 
  7. PORT     STATE    SERVICE      VERSION 
  8. 22/tcp   filtered ssh 
  9. 53/tcp   open     domain       dnsmasq 2.78 
  10. | dns-nsid:  
  11. |   id.server: kbwzcnsnl23 
  12. |_  bind.version: dnsmasq-2.78 
  13. 80/tcp   open     http         nginx 1.14.0 
  14. |_http-server-header: nginx/1.14.0 
  15. |_http-title: Site doesn't have a title (text/html). 
  16. 135/tcp  filtered msrpc 
  17. 139/tcp  filtered netbios-ssn 
  18. 443/tcp  open     ssl/http     nginx 1.14.0 
  19. |_http-server-header: nginx/1.14.0 
  20. |_http-title: 400 The plain HTTP request was sent to HTTPS port 
  21. | ssl-cert: Subject: commonName=waf.dog 
  22. | Subject Alternative Name: DNS:waf.dog 
  23. | Not valid before: 2018-05-29T20:01:46 
  24. |_Not valid after:  2018-08-27T20:01:46 
  25. 445/tcp  filtered microsoft-ds 
  26. 554/tcp  filtered rtsp 
  27. 1720/tcp filtered h323q931 
  28. Device type: general purpose|firewall 
  29. Running (JUST GUESSING): Linux 4.X|3.X|2.6.X (88%), WatchGuard Fireware 11.X (85%) 
  30. OS CPE: cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:watchguard:fireware:11.8 
  31. Aggressive OS guesses: Linux 4.4 (88%), Linux 3.10 - 3.12 (87%), Linux 4.9 (87%), Linux 4.0 (86%), Linux 3.11 - 4.1 (85%), Linux 3.16 (85%), Linux 2.6.32 (85%), Linux 2.6.32 or 3.10 (85%), Linux 3.5 (85%), WatchGuard Fireware 11.8 (85%) 
  32. No exact OS matches for host (test conditions non-ideal). 
  33. Network Distance: 16 hops 
  34.  
  35. TRACEROUTE (using port 256/tcp) 
  36. HOP RTT       ADDRESS 
  37. 1   0.15 ms   pfsense.luisaranguren.com (10.10.10.101) 
  38. 2   1.71 ms   mdc208.vic.skymesh.net.au (180.181.208.1) 
  39. 3   1.83 ms   ros1.vic.skymesh.net.au (180.181.192.128) 
  40. 4   2.70 ms   ten-0-7-0-2-177.bdr02.mel11.vic.vocus.net.au (114.31.197.225) 
  41. 5   167.93 ms BE-150.cor02.mel07.vic.VOCUS.net.au (114.31.196.54) 
  42. 6   163.90 ms Hu-0-0-0-1.cor02.syd04.nsw.VOCUS.net.au (114.31.192.114) 
  43. 7   168.10 ms bundle-200.cor01.sjc01.ca.vocus.net (49.255.255.10) 
  44. 8   163.70 ms bundle-100.bdr01.sjc01.ca.vocus.net (49.255.255.19) 
  45. 9   168.71 ms sjo-b21-link.telia.net (62.115.154.12) 
  46. 10  233.25 ms ash-bb4-link.telia.net (80.91.248.189) 
  47. 11  237.22 ms ash-b1-link.telia.net (80.91.248.157) 
  48. 12  218.85 ms upc-ic-324488-ash-b1.c.telia.net (62.115.41.10) 
  49. 13  333.80 ms us-was02a-rd2-ae10-0.aorta.net (84.116.130.173) 
  50. 14  ... 
  51. 15  322.35 ms asd-rc0001-cr101-bundle-ether61-1.aorta.net (84.116.245.138) 
  52. 16  348.08 ms 178-84-33-55.dynamic.upc.nl (178.84.33.55) 
  53.  
  54. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . 
  55. Nmap done: 1 IP address (1 host up) scanned in 91.35 seconds 
  56.  
 
 
 
 
Written by Xan Manning, 2010.