Gumby.net nmap scan

Users who viewed this discussion (Total:0)

Rating - 0%
0   0   0
#1
If you know how to root a server this can come in handy

gumby.net. 86392 IN A 50.6.16.46
gumby.net. 86392 IN NS ns22.ixwebhosting.com.
gumby.net. 86392 IN SOA ns21.ixwebhosting.com. admin.ixwebhosting.com. 2011041210 10800 3600 604800 86400
gumby.net. 86392 IN MX 10 mail1102.ixwebhosting.com.
gumby.net. 86392 IN TXT "google-site-verification=cxRa1SHTgdV7QFUMIIJhr4gLDyhYOhiYgS1ZlsbO9Vc "
Nmap scan report for mail1102.ixwebhosting.com (76.162.254.110)
Host is up (0.0049s latency).
Other addresses for mail1102.ixwebhosting.com (not scanned): 76.162.254.111 76.162.254.109 76.162.254.118 76.162.254.117
rDNS record for 76.162.254.110: ironport-2.opentransfer.com
Scanned at 2014-05-23 01:22:19 EDT for 562s
Not shown: 66509 closed ports
PORT STATE SERVICE VERSION
22/tcp filtered ssh
25/tcp filtered smtp
80/tcp open http IronPort AsyncOS http config (glass 1.0; Python 2.6.1)
|_http-methods: No Allow or Public header in OPTIONS response (status code 501)
|_http-title: Did not follow redirect to https://mail1102.ixwebhosting.com/?
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
199/tcp filtered smux
443/tcp open ssl/http IronPort AsyncOS http config (glass 1.0; Python 2.6.1)
|_http-favicon: Unknown favicon MD5: F7D9DF17CE6758AB0980BDCF3A59127E
|_http-methods: No Allow or Public header in OPTIONS response (status code 501)
| http-title: IronPort X1050 (mail1102.ixwebhosting.com) - Welcome
|_Requested resource was https://mail1102.ixwebhosting.com/login?redirects=3
| ssl-cert: Subject: commonName=Cisco Appliance Demo Certificate/organizationName=Cisco Systems, Inc/stateOrProvinceName=California/countryName=US/localityName=San Jose
| Issuer: commonName=Cisco Appliance Demo Certificate/organizationName=Cisco Systems, Inc/stateOrProvinceName=California/countryName=US/localityName=San Jose
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2009-10-01T23:02:16+00:00
| Not valid after: 2019-10-02T23:02:16+00:00
| MD5: d44b 0478 92fa 4c17 b574 af03 8c2a 49f1
| SHA-1: 62d8 14ee 170d acc3 a391 cdfb 5d78 30e7 5869 fc3d
| -----BEGIN CERTIFICATE-----
| MIIDXDCCAsWgAwIBAgIJAN+l7X0kU8ppMA0GCSqGSIb3DQEBBQUAMH0xCzAJBgNV
| BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMREwDwYDVQQHEwhTYW4gSm9zZTEb
| MBkGA1UEChMSQ2lzY28gU3lzdGVtcywgSW5jMSkwJwYDVQQDEyBDaXNjbyBBcHBs
| aWFuY2UgRGVtbyBDZXJ0aWZpY2F0ZTAeFw0wOTEwMDIwMDAyMTZaFw0xOTEwMDMw
| MDAyMTZaMH0xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMREwDwYD
| VQQHEwhTYW4gSm9zZTEbMBkGA1UEChMSQ2lzY28gU3lzdGVtcywgSW5jMSkwJwYD
| VQQDEyBDaXNjbyBBcHBsaWFuY2UgRGVtbyBDZXJ0aWZpY2F0ZTCBnzANBgkqhkiG
| 9w0BAQEFAAOBjQAwgYkCgYEA8dVMElO8zGT2XC7qDrfBvejZLy2LlzzO2jrm3RrT
| WwgRAKjE6FkYBLETzD2bWy70u460gyRCJXrlzT5qO2gLMsMrz8eDC7OR4AauI+kY
| HDgQQT3k0MR6wKdcufjoPs9YCiXPkJlyfyee+9eZcvu+6em+WVVVJQ/S1Yo9CYMS
| Kz0CAwEAAaOB4zCB4DAdBgNVHQ4EFgQUIi/mMrrlaNKbUZ1YREPzqzCaFj8wgbAG
| A1UdIwSBqDCBpYAUIi/mMrrlaNKbUZ1YREPzqzCaFj+hgYGkfzB9MQswCQYDVQQG
| EwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTERMA8GA1UEBxMIU2FuIEpvc2UxGzAZ
| BgNVBAoTEkNpc2NvIFN5c3RlbXMsIEluYzEpMCcGA1UEAxMgQ2lzY28gQXBwbGlh
| bmNlIERlbW8gQ2VydGlmaWNhdGWCCQDfpe19JFPKaTAMBgNVHRMEBTADAQH/MA0G
| CSqGSIb3DQEBBQUAA4GBAC7bny81IrABFsIAbpBnmufigaS/RTMs9VnEZtwRdsYt
| e4c22buGVlYEZdt+1nchMehTAVTUhOEYXHd6WA4W1objhya2V3raOvfU3GgXjXuf
| L4NbDHo9WIXNrEPT2sEzWh8AkWbNUQf3h7vqYp5v36B2NQmPKUjmHB5zSxnfTizA
|_-----END CERTIFICATE-----
|_ssl-date: 2014-05-23T05:31:08+00:00; -2s from local time.
445/tcp filtered microsoft-ds
2222/tcp open ssh OpenSSH 5.1p1 (FreeBSD 20080801; protocol 2.0)
| ssh-hostkey:
| 1024 79:61:de:62:61:32:2c:ab:bc:e2:c3:1a:b6:96:64:bd (DSA)
| ssh-dss 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
| 2048 d3:43:6e:55:23:e6:9d:f6:44:38:de:f5:15:d8:f8:bd (RSA)
|_ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvcXCV9CQe/6lQxPcnWTAKR3fEEstNkUxGhFmOO84sv3ws4NA+dzN/KcaetvFzKeXMw0MAAcLmX8sXy9any1f0Ccf5InD+poWMAH8rITdVw3JegNphCV9unccjcOXBnvg5CCSaydPpfvQYTLAzSK3bK+AgVsj4tOV9CYQAQQ9bmCqhUz5OJELJk67+2cagQ0raVpLTOUNVFZyCY6QmYTVckVbnckI81JdV/2qLfsjelKQgW53zmWzqxqSmTT/Zb6FQNt6zgj/EvYD4IS60Z23u7LhIVBsCg7ZgXk0vKx29koCuqjglxz2HeEA2kW6a2HzWuz5RRhO/ItkRc/sbkwtDQ==
6881/tcp filtered bittorrent-tracker
31390/tcp filtered unknown
58844/tcp filtered unknown
67/udp open|filtered dhcps
68/udp open|filtered dhcpc
135/udp open|filtered msrpc
136/udp open|filtered profile
137/udp open|filtered netbios-ns
138/udp open|filtered netbios-dgm
139/udp open|filtered netbios-ssn
161/udp open|filtered snmp
|_snmp-hh3c-logins: TIMEOUT
|_snmp-win32-shares: TIMEOUT
445/udp open|filtered microsoft-ds
546/udp open|filtered dhcpv6-client
547/udp open|filtered dhcpv6-server
OS fingerprint not ideal because: Host distance (13 network hops) is greater than five
Aggressive OS guesses: Cisco IronPort C650 email security appliance (AsyncOS 7.0.1) (89%), IronPort C150 email security appliance (AsyncOS 6.5.2) (89%), Bay Networks BayStack 450 switch (software version 4.2.0.16) (86%), Dell PowerConnect 3348 switch (86%), Radware LinkProof load balancer (85%), Redback Networks SmartEdge router (SmartEdge OS 5.0) (85%), IronPort C100 or C650 email security appliance (AsyncOS 6.01 - 6.3) (85%), Packard Bell NetStore 3500 (85%), FreeBSD 6.3-PRERELEASE (85%), Lantronix XPress-DR+ serial-to-Ethernet bridge (84%)
No exact OS matches for host (test conditions non-ideal).
TCP/IP fingerprint:
SCAN(V=6.45%E=4%D=5/23%OT=80%CT=1%CU=1%PV=N%DS=1%DC=T%G=N%TM=537EDD3D%P=i686-pc-linux-gnu)
SEQ(SP=101%GCD=1%ISR=10F%CI=RD%II=I%TS=U)
SEQ(SP=107%GCD=1%ISR=10E%CI=RD%TS=U)
OPS(O1=M5B4SLL%O2=M5B4SLL%O3=M5B4%O4=M5B4SLL%O5=M5B4SLL%O6=M5B4SLL)
WIN(W1=4000%W2=4000%W3=4000%W4=4000%W5=4000%W6=4000)
ECN(R=Y%DF=Y%T=40%W=4000%O=M5B4SLL%CC=N%Q=)
T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)
T2(R=Y%DF=N%T=4C%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)
T3(R=Y%DF=N%T=4C%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T4(R=Y%DF=N%T=4C%W=0%S=A%A=S%F=R%O=%RD=0%Q=)
T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
T6(R=Y%DF=N%T=4C%W=0%S=A%A=S%F=R%O=%RD=0%Q=)
T7(R=Y%DF=N%T=4C%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
U1(R=Y%DF=N%T=40%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)
IE(R=Y%DFI=S%T=40%CD=S)

Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=263 (Good luck!)
IP ID Sequence Generation: Busy server or unknown class
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd

TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.65 ms ironport-2.opentransfer.com (76.162.254.110)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 2) scan.
Initiating NSE at 01:31
Completed NSE at 01:31, 0.00s elapsed
NSE: Starting runlevel 2 (of 2) scan.
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 563.65 seconds
Raw packets sent: 68206 (2.984MB) | Rcvd: 66841 (2.691MB)
 

Top