10 2 3 0 scan std


Starting Nmap 6.47 ( http://nmap.org )
NSE: Loaded 118 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 07:55
Scanning 254 hosts [2 ports/host]
Completed Ping Scan at 07:55, 1.28s elapsed (254 total hosts)
Initiating Parallel DNS resolution of 254 hosts. at 07:55
Completed Parallel DNS resolution of 254 hosts. at 07:55, 0.35s elapsed
Initiating Connect Scan at 07:55
Scanning 64 hosts [1000 ports/host]
Discovered open port 21/tcp on 10.2.3.67
Discovered open port 21/tcp on 10.2.3.28
Discovered open port 21/tcp on 10.2.3.29
Discovered open port 21/tcp on 10.2.3.66
Discovered open port 21/tcp on 10.2.3.104
Discovered open port 21/tcp on 10.2.3.108
Discovered open port 21/tcp on 10.2.3.112
Discovered open port 21/tcp on 10.2.3.116
Discovered open port 21/tcp on 10.2.3.130
Discovered open port 3306/tcp on 10.2.3.108
Discovered open port 3306/tcp on 10.2.3.104
Discovered open port 443/tcp on 10.2.3.66
Discovered open port 443/tcp on 10.2.3.67
Discovered open port 443/tcp on 10.2.3.130
Discovered open port 443/tcp on 10.2.3.98
Discovered open port 22/tcp on 10.2.3.66
Discovered open port 22/tcp on 10.2.3.67
Discovered open port 443/tcp on 10.2.3.28
Discovered open port 443/tcp on 10.2.3.29
Discovered open port 22/tcp on 10.2.3.130
Discovered open port 22/tcp on 10.2.3.98
Discovered open port 80/tcp on 10.2.3.98
Discovered open port 22/tcp on 10.2.3.28
Discovered open port 22/tcp on 10.2.3.29
Discovered open port 443/tcp on 10.2.3.96
Discovered open port 443/tcp on 10.2.3.116
Discovered open port 443/tcp on 10.2.3.112
Discovered open port 22/tcp on 10.2.3.21
Discovered open port 22/tcp on 10.2.3.22
Discovered open port 22/tcp on 10.2.3.18
Discovered open port 22/tcp on 10.2.3.17
Discovered open port 22/tcp on 10.2.3.19
Discovered open port 22/tcp on 10.2.3.20
Discovered open port 80/tcp on 10.2.3.21
Discovered open port 80/tcp on 10.2.3.22
Discovered open port 22/tcp on 10.2.3.116
Discovered open port 80/tcp on 10.2.3.96
Discovered open port 22/tcp on 10.2.3.112
Discovered open port 80/tcp on 10.2.3.17
Discovered open port 80/tcp on 10.2.3.18
Discovered open port 80/tcp on 10.2.3.20
Discovered open port 22/tcp on 10.2.3.104
Discovered open port 22/tcp on 10.2.3.108
Discovered open port 80/tcp on 10.2.3.116
Discovered open port 80/tcp on 10.2.3.19
Discovered open port 80/tcp on 10.2.3.112
Discovered open port 23/tcp on 10.2.3.67
Discovered open port 23/tcp on 10.2.3.66
Discovered open port 80/tcp on 10.2.3.104
Discovered open port 80/tcp on 10.2.3.108
Discovered open port 23/tcp on 10.2.3.130
Discovered open port 23/tcp on 10.2.3.28
Discovered open port 23/tcp on 10.2.3.29

Discovered open port 81/tcp on 10.2.3.21
Discovered open port 81/tcp on 10.2.3.22
Discovered open port 81/tcp on 10.2.3.18
Discovered open port 81/tcp on 10.2.3.20
Discovered open port 7002/tcp on 10.2.3.98
Discovered open port 81/tcp on 10.2.3.17
Discovered open port 81/tcp on 10.2.3.19
Completed Connect Scan against 10.2.3.14 in 17.45s (63 hosts left)
Completed Connect Scan against 10.2.3.60 in 17.45s (62 hosts left)
Completed Connect Scan against 10.2.3.98 in 17.56s (61 hosts left)
Completed Connect Scan against 10.2.3.59 in 17.57s (60 hosts left)
Warning: 10.2.3.29 giving up on port because retransmission cap hit (2).
Warning: 10.2.3.28 giving up on port because retransmission cap hit (2).
Discovered open port 7002/tcp on 10.2.3.17
Completed Connect Scan against 10.2.3.57 in 17.75s (59 hosts left)
Discovered open port 7002/tcp on 10.2.3.22
Completed Connect Scan against 10.2.3.66 in 17.94s (58 hosts left)
Discovered open port 7002/tcp on 10.2.3.20
Discovered open port 7002/tcp on 10.2.3.18
Completed Connect Scan against 10.2.3.62 in 19.25s (57 hosts left)
Completed Connect Scan against 10.2.3.61 in 19.38s (56 hosts left)
Completed Connect Scan against 10.2.3.2 in 19.49s (55 hosts left)
Completed Connect Scan against 10.2.3.1 in 19.50s (54 hosts left)
Completed Connect Scan against 10.2.3.32 in 19.54s (53 hosts left)
Completed Connect Scan against 10.2.3.44 in 19.54s (52 hosts left)
Completed Connect Scan against 10.2.3.58 in 19.55s (51 hosts left)
Discovered open port 7002/tcp on 10.2.3.21
Completed Connect Scan against 10.2.3.11 in 19.74s (50 hosts left)
Completed Connect Scan against 10.2.3.13 in 19.76s (49 hosts left)
Discovered open port 7002/tcp on 10.2.3.19
Completed Connect Scan against 10.2.3.48 in 19.82s (48 hosts left)
Completed Connect Scan against 10.2.3.53 in 19.83s (47 hosts left)
Completed Connect Scan against 10.2.3.3 in 19.83s (46 hosts left)
Completed Connect Scan against 10.2.3.5 in 19.84s (45 hosts left)
Completed Connect Scan against 10.2.3.6 in 19.86s (44 hosts left)
Completed Connect Scan against 10.2.3.7 in 19.86s (43 hosts left)
Completed Connect Scan against 10.2.3.37 in 19.91s (42 hosts left)
Completed Connect Scan against 10.2.3.17 in 19.91s (41 hosts left)
Completed Connect Scan against 10.2.3.33 in 19.95s (40 hosts left)
Completed Connect Scan against 10.2.3.45 in 19.95s (39 hosts left)
Completed Connect Scan against 10.2.3.34 in 19.96s (38 hosts left)
Completed Connect Scan against 10.2.3.39 in 19.98s (37 hosts left)
Completed Connect Scan against 10.2.3.12 in 20.10s (36 hosts left)
Completed Connect Scan against 10.2.3.49 in 20.13s (35 hosts left)
Completed Connect Scan against 10.2.3.43 in 20.17s (34 hosts left)
Completed Connect Scan against 10.2.3.130 in 20.22s (33 hosts left)
Completed Connect Scan against 10.2.3.67 in 20.22s (32 hosts left)
Completed Connect Scan against 10.2.3.15 in 20.23s (31 hosts left)
Completed Connect Scan against 10.2.3.54 in 20.24s (30 hosts left)
Completed Connect Scan against 10.2.3.42 in 20.26s (29 hosts left)
Completed Connect Scan against 10.2.3.22 in 20.28s (28 hosts left)
Completed Connect Scan against 10.2.3.112 in 20.28s (27 hosts left)
Completed Connect Scan against 10.2.3.116 in 20.28s (26 hosts left)
Completed Connect Scan against 10.2.3.108 in 20.31s (25 hosts left)
Completed Connect Scan against 10.2.3.20 in 20.34s (24 hosts left)
Completed Connect Scan against 10.2.3.104 in 20.35s (23 hosts left)
Completed Connect Scan against 10.2.3.63 in 20.38s (22 hosts left)
Completed Connect Scan against 10.2.3.35 in 20.38s (21 hosts left)
Completed Connect Scan against 10.2.3.18 in 20.42s (20 hosts left)
Completed Connect Scan against 10.2.3.10 in 20.45s (19 hosts left)
Completed Connect Scan against 10.2.3.38 in 20.45s (18 hosts left)
Completed Connect Scan against 10.2.3.4 in 20.46s (17 hosts left)
Completed Connect Scan against 10.2.3.36 in 20.46s (16 hosts left)
Completed Connect Scan against 10.2.3.52 in 20.46s (15 hosts left)
Completed Connect Scan against 10.2.3.8 in 20.47s (14 hosts left)
Completed Connect Scan against 10.2.3.9 in 20.47s (13 hosts left)
Completed Connect Scan against 10.2.3.40 in 20.47s (12 hosts left)
Completed Connect Scan against 10.2.3.51 in 20.49s (11 hosts left)
Completed Connect Scan against 10.2.3.55 in 20.49s (10 hosts left)
Completed Connect Scan against 10.2.3.56 in 20.49s (9 hosts left)
Completed Connect Scan against 10.2.3.41 in 20.49s (8 hosts left)
Completed Connect Scan against 10.2.3.47 in 20.49s (7 hosts left)
Completed Connect Scan against 10.2.3.46 in 20.49s (6 hosts left)
Completed Connect Scan against 10.2.3.50 in 20.49s (5 hosts left)
Completed Connect Scan against 10.2.3.19 in 20.53s (4 hosts left)
Completed Connect Scan against 10.2.3.21 in 20.53s (3 hosts left)
Completed Connect Scan against 10.2.3.96 in 20.54s (2 hosts left)
Completed Connect Scan against 10.2.3.28 in 20.61s (1 host left)
Completed Connect Scan at 07:55, 20.73s elapsed (64000 total ports)
Initiating Service scan at 07:55
Scanning 66 services on 64 hosts

Completed Service scan at 07:56, 13.05s elapsed (66 services on 64 hosts)
NSE: Script scanning 64 hosts.
Initiating NSE at 07:56
Completed NSE at 07:56, 14.00s elapsed
Nmap scan report for 10.2.3.17
Host is up (0.019s latency).
Not shown: 995 filtered ports, 1 closed port
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 5a:f2:22:5d:35:d3:d2:49:8f:df:51:80:de:42:7d:c4 (DSA)
|_ 2048 77:6a:ee:46:4e:b9:ec:1b:08:55:8f:40:ff:fa:e7:ee (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: GPW.pl - Strona g\xC5\x82\xC3\xB3wna - GPW
81/tcp open http Apache httpd 2.2.15 ((Red Hat))
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: 404 Not Found
7002/tcp open tcpwrapped

Nmap scan report for 10.2.3.18
Host is up (0.017s latency).
Not shown: 995 filtered ports, 1 closed port
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 de:81:cc:f2:02:64:27:f7:59:68:29:7b:2f:00:25:ad (DSA)
|_ 2048 62:60:2e:cf:5c:87:43:18:fe:f5:26:47:53:de:02:8f (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: GPW.pl - Strona g\xC5\x82\xC3\xB3wna - GPW
81/tcp open http Apache httpd 2.2.15 ((Red Hat))
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: 404 Not Found
7002/tcp open tcpwrapped

Nmap scan report for 10.2.3.19
Host is up (0.013s latency).
Not shown: 995 filtered ports, 1 closed port
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 6d:bb:dc:2e:a1:09:0a:44:ce:b5:07:1f:ec:f5:30:13 (DSA)
|_ 2048 91:45:18:51:cc:6c:8c:f3:53:58:bb:6a:27:c2:3d:ec (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: GPW.pl - Strona g\xC5\x82\xC3\xB3wna - GPW
81/tcp open http Apache httpd 2.2.15 ((Red Hat))
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: 404 Not Found
7002/tcp open tcpwrapped

Nmap scan report for 10.2.3.20
Host is up (0.013s latency).
Not shown: 994 filtered ports, 2 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 e9:a5:15:e1:26:9c:87:07:0d:44:63:a4:4f:84:1d:f1 (DSA)
|_ 2048 aa:f6:88:60:71:8f:71:a8:98:9d:61:cf:63:32:d3:34 (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: GPW.pl - Strona g\xC5\x82\xC3\xB3wna - GPW
81/tcp open http Apache httpd 2.2.15 ((Red Hat))
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: 404 Not Found
7002/tcp open tcpwrapped

Nmap scan report for 10.2.3.21
Host is up (0.016s latency).
Not shown: 994 filtered ports, 2 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 2c:80:fb:e8:51:b0:f5:cc:e0:94:a1:7f:4b:d1:d3:f4 (DSA)
|_ 2048 fa:de:98:15:0e:da:26:9f:61:33:00:62:e0:4d:78:f7 (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: GPW.pl - Strona g\xC5\x82\xC3\xB3wna - GPW
81/tcp open http Apache httpd 2.2.15 ((Red Hat))
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: 404 Not Found
7002/tcp open tcpwrapped

Nmap scan report for 10.2.3.22
Host is up (0.020s latency).
Not shown: 994 filtered ports, 2 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 22:16:ee:de:5d:86:0d:b7:cd:5a:bc:70:0a:de:ae:ae (DSA)
|_ 2048 7d:f7:c6:35:e1:5a:41:ef:f4:e9:bf:97:1d:37:4c:43 (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: GPW.pl - Strona g\xC5\x82\xC3\xB3wna - GPW
81/tcp open http Apache httpd 2.2.15 ((Red Hat))
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: 404 Not Found
7002/tcp open tcpwrapped

Nmap scan report for 10.2.3.28
Host is up (0.0069s latency).
Not shown: 947 closed ports, 49 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp Cisco ftpd 5.3.1
22/tcp open ssh OpenSSH 3.0.2p1 (protocol 2.0)
| ssh-hostkey:
|_ 1024 9c:ac:f1:81:3b:f5:99:de:fd:d5:63:3c:3c:7a:b2:8d (DSA)
23/tcp open telnet Cisco PIX 500 series telnetd
443/tcp open ssl/http Virata-EmWeb 5.3.0
| http-auth:
| HTTP/1.1 401 Unauthorized
|_ Basic realm=level 15 access
| http-title: Site doesn't have a title.
|_Requested resource was /flash/home.html
| ssl-cert: Subject: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Issuer: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2005-12-21T19:20:27+00:00
| Not valid after: 2015-12-19T19:20:27+00:00
| MD5: 6fd1 64b4 beb4 9f9b ba0a cb20 d271 ddc3
|_SHA-1: 10e0 dfc6 8676 797a afb5 5b75 8c2e 1ca1 9059 cf5f
|_ssl-date: 1970-06-13T17:06:37+00:00; -44y72d18h49m36s from local time.
Service Info: OS: IOS; Device: firewall; CPE: cpe:/o:cisco:ios

Nmap scan report for 10.2.3.29
Host is up (0.0063s latency).
Not shown: 968 closed ports, 28 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp Cisco ftpd 5.3.1
22/tcp open ssh OpenSSH 3.0.2p1 (protocol 2.0)
| ssh-hostkey:
|_ 1024 bf:cc:5b:bd:15:2f:12:f5:84:60:30:ca:5c:62:ac:ef (DSA)
23/tcp open telnet Cisco PIX 500 series telnetd
443/tcp open ssl/http Virata-EmWeb 5.3.0
| http-auth:
| HTTP/1.1 401 Unauthorized
|_ Basic realm=level 15 access
| http-title: Site doesn't have a title.
|_Requested resource was /flash/home.html
| ssl-cert: Subject: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Issuer: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2005-12-21T19:20:27+00:00
| Not valid after: 2015-12-19T19:20:27+00:00
| MD5: 6fd1 64b4 beb4 9f9b ba0a cb20 d271 ddc3
|_SHA-1: 10e0 dfc6 8676 797a afb5 5b75 8c2e 1ca1 9059 cf5f
|_ssl-date: 1970-06-17T17:47:54+00:00; -44y68d18h08m27s from local time.
Service Info: OS: IOS; Device: firewall; CPE: cpe:/o:cisco:ios

Nmap scan report for 10.2.3.66
Host is up (0.0027s latency).
Not shown: 995 closed ports, 1 filtered port
PORT STATE SERVICE VERSION
21/tcp open ftp Cisco ftpd 5.3.1
22/tcp open ssh OpenSSH 3.0.2p1 (protocol 2.0)
| ssh-hostkey:
|_ 1024 9c:ac:f1:81:3b:f5:99:de:fd:d5:63:3c:3c:7a:b2:8d (DSA)
23/tcp open telnet Cisco PIX 500 series telnetd
443/tcp open ssl/http Virata-EmWeb 5.3.0
| http-auth:
| HTTP/1.1 401 Unauthorized
|_ Basic realm=level 15 access
| http-title: Site doesn't have a title.
|_Requested resource was /flash/home.html
| ssl-cert: Subject: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Issuer: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2005-12-21T19:20:27+00:00
| Not valid after: 2015-12-19T19:20:27+00:00
| MD5: 6fd1 64b4 beb4 9f9b ba0a cb20 d271 ddc3
|_SHA-1: 10e0 dfc6 8676 797a afb5 5b75 8c2e 1ca1 9059 cf5f
|_ssl-date: 1970-06-13T17:06:46+00:00; -44y72d18h49m36s from local time.
Service Info: OS: IOS; Device: firewall; CPE: cpe:/o:cisco:ios

Nmap scan report for 10.2.3.67
Host is up (0.0022s latency).
Not shown: 995 closed ports, 1 filtered port
PORT STATE SERVICE VERSION
21/tcp open ftp Cisco ftpd 5.3.1
22/tcp open ssh OpenSSH 3.0.2p1 (protocol 2.0)
| ssh-hostkey:
|_ 1024 bf:cc:5b:bd:15:2f:12:f5:84:60:30:ca:5c:62:ac:ef (DSA)
23/tcp open telnet Cisco PIX 500 series telnetd
443/tcp open ssl/http Virata-EmWeb 5.3.0
| http-auth:
| HTTP/1.1 401 Unauthorized
|_ Basic realm=level 15 access
| http-title: Site doesn't have a title.
|_Requested resource was /flash/home.html
| ssl-cert: Subject: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Issuer: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2005-12-21T19:20:27+00:00
| Not valid after: 2015-12-19T19:20:27+00:00
| MD5: 6fd1 64b4 beb4 9f9b ba0a cb20 d271 ddc3
|_SHA-1: 10e0 dfc6 8676 797a afb5 5b75 8c2e 1ca1 9059 cf5f
|_ssl-date: 1970-06-17T17:47:47+00:00; -44y68d18h08m26s from local time.
Service Info: OS: IOS; Device: firewall; CPE: cpe:/o:cisco:ios

Nmap scan report for 10.2.3.96
Host is up (0.0022s latency).
Not shown: 995 filtered ports, 3 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.2.3 ((Red Hat))
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: Serwisy Gie\xB3dowe GPW
443/tcp open ssl/http Apache httpd 2.2.3 ((Red Hat))
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: Serwisy Gie\xB3dowe GPW
| ssl-cert: Subject: commonName=*.gpw.com.pl
| Issuer: commonName=DOMENY.PL DV Certification Authority/organizationName=DOMENY.PL Ltd./countryName=PL
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2013-12-30T00:00:00+00:00
| Not valid after: 2016-12-29T23:59:59+00:00
| MD5: 26ec 1809 ea90 a7d9 3a1a 2a03 2154 20d0
|_SHA-1: f427 5d02 1820 22f7 b9c1 2e76 303c af52 35d7 f04b
|_ssl-date: 2014-08-25T11:56:15+00:00; 0s from local time.

Nmap scan report for 10.2.3.98
Host is up (0.00066s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 69:51:32:60:20:00:b2:00:80:5e:b6:51:dc:56:87:be (DSA)
|_ 2048 ef:25:48:cc:f0:6e:91:25:2a:80:36:a0:50:43:2b:72 (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: GPWtr@der
443/tcp open ssl/http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 302)
| http-title: Site doesn't have a title (text/html; charset=UTF-8).
|_Requested resource was index2.php
| ssl-cert: Subject: commonName=www.konkurs.mdm.gpw.pl
| Issuer: commonName=DOMENY.PL DV Certification Authority/organizationName=DOMENY.PL Ltd./countryName=PL
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2014-05-18T23:00:00+00:00
| Not valid after: 2015-05-19T22:59:59+00:00
| MD5: 803a 5ac9 a1f8 0dbd 73ef 8fca 7a1a d0f6
|_SHA-1: 4031 f8d4 03be 2e18 a5b2 770a 4f93 b8b9 ef3d 5ae4
|_ssl-date: 2014-08-25T11:56:15+00:00; 0s from local time.
7002/tcp open tcpwrapped

Nmap scan report for 10.2.3.104
Host is up (0.0020s latency).
Not shown: 994 filtered ports, 2 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.0.8 or later
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 5f:1c:28:b1:bf:a1:d8:07:fa:b8:55:56:ba:89:d7:5d (DSA)
|_ 2048 1b:ab:02:97:1d:fc:d1:be:0b:be:dd:f8:4c:57:ba:5c (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: Site doesn't have a title (text/html).
3306/tcp open mysql MySQL 5.1.73-log
| mysql-info:
| Protocol: 53
| Version: .1.73-log
| Thread ID: 34197461
| Capabilities flags: 63487
| Some Capabilities: Support41Auth, Speaks41ProtocolOld, LongColumnFlag, Speaks41ProtocolNew, ODBCClient, IgnoreSigpipes, SupportsTransactions, InteractiveClient, FoundRows, IgnoreSpaceBeforeParenthesis, LongPassword, ConnectWithDatabase, SupportsCompression, DontAllowDatabaseTableColumn, SupportsLoadDataLocal
| Status: Autocommit
|_ Salt: ?=Qaq9cg^"-XU#J/JfEf

Nmap scan report for 10.2.3.108
Host is up (0.0044s latency).
Not shown: 994 filtered ports, 2 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.0.8 or later
22/tcp open ssh OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey:
| 1024 af:5b:84:ba:52:db:18:92:b2:12:2e:46:69:13:99:9b (DSA)
|_ 2048 43:14:28:b2:72:77:b5:6d:e5:1b:e1:85:f2:c6:e5:88 (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 404)
|_http-title: Site doesn't have a title (text/html).
3306/tcp open mysql MySQL 5.1.73
| mysql-info:
| Protocol: 53
| Version: .1.73
| Thread ID: 4487296
| Capabilities flags: 63487
| Some Capabilities: Support41Auth, Speaks41ProtocolOld, LongColumnFlag, Speaks41ProtocolNew, ODBCClient, IgnoreSigpipes, SupportsTransactions, InteractiveClient, FoundRows, IgnoreSpaceBeforeParenthesis, LongPassword, ConnectWithDatabase, SupportsCompression, DontAllowDatabaseTableColumn, SupportsLoadDataLocal
| Status: Autocommit
|_ Salt: &J!cSU0.5^\1!MA@]3'h

Nmap scan report for 10.2.3.112
Host is up (0.0022s latency).
Not shown: 993 filtered ports, 3 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd (before 2.0.8) or WU-FTPD
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
| ssh-hostkey:
| 1024 4b:68:50:1f:8f:7b:18:8b:ac:bd:79:92:ce:82:e5:74 (DSA)
|_ 2048 13:fb:34:bf:29:8a:24:58:86:ee:b0:b8:df:ba:a0:a2 (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: Obligacje - rynek obligacji GPW Catalyst
443/tcp open ssl/http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: Obligacje - rynek obligacji GPW Catalyst
| ssl-cert: Subject: commonName=gpwcatalyst.pl
| Issuer: commonName=DOMENY.PL DV Certification Authority/organizationName=DOMENY.PL Ltd./countryName=PL
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2014-02-12T00:00:00+00:00
| Not valid after: 2017-02-11T23:59:59+00:00
| MD5: 5deb 4050 cb7d abe4 c23c 436b ef8c 07a5
|_SHA-1: b594 d6a4 b6d3 7ed3 6591 2530 b1cb 9552 d438 6d95
|_ssl-date: 2014-08-25T11:56:21+00:00; 0s from local time.

Nmap scan report for 10.2.3.116
Host is up (0.0023s latency).
Not shown: 993 filtered ports, 3 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd (before 2.0.8) or WU-FTPD
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
| ssh-hostkey:
| 1024 c8:5b:2b:ad:1f:e4:22:59:cc:e4:6c:f1:56:15:bc:41 (DSA)
|_ 2048 08:97:86:be:73:6a:6b:73:ff:07:dc:ac:91:28:11:98 (RSA)
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: Site doesn't have a title (text/html).
443/tcp open ssl/http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: Site doesn't have a title (text/html).
| ssl-cert: Subject: commonName=gpwcatalyst.pl
| Issuer: commonName=DOMENY.PL DV Certification Authority/organizationName=DOMENY.PL Ltd./countryName=PL
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2014-02-12T00:00:00+00:00
| Not valid after: 2017-02-11T23:59:59+00:00
| MD5: 5deb 4050 cb7d abe4 c23c 436b ef8c 07a5
|_SHA-1: b594 d6a4 b6d3 7ed3 6591 2530 b1cb 9552 d438 6d95
|_ssl-date: 2014-08-25T11:56:12+00:00; -1s from local time.

Nmap scan report for 10.2.3.130
Host is up (0.0080s latency).
Not shown: 968 closed ports, 28 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp Cisco ftpd 5.3.1
22/tcp open ssh OpenSSH 3.0.2p1 (protocol 2.0)
| ssh-hostkey:
|_ 1024 9c:ac:f1:81:3b:f5:99:de:fd:d5:63:3c:3c:7a:b2:8d (DSA)
23/tcp open tcpwrapped
443/tcp open ssl/http Virata-EmWeb 5.3.0
| http-auth:
| HTTP/1.1 401 Unauthorized
|_ Basic realm=level 15 access
| http-title: Site doesn't have a title.
|_Requested resource was /flash/home.html
| ssl-cert: Subject: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Issuer: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2005-12-21T19:20:27+00:00
| Not valid after: 2015-12-19T19:20:27+00:00
| MD5: 6fd1 64b4 beb4 9f9b ba0a cb20 d271 ddc3
|_SHA-1: 10e0 dfc6 8676 797a afb5 5b75 8c2e 1ca1 9059 cf5f
|_ssl-date: 1970-06-13T17:06:37+00:00; -44y72d18h49m36s from local time.
Service Info: OS: IOS; CPE: cpe:/o:cisco:ios

Initiating Connect Scan at 07:56
Scanning 64 hosts [1000 ports/host]
Discovered open port 21/tcp on 10.2.3.146
Discovered open port 21/tcp on 10.2.3.147
Discovered open port 21/tcp on 10.2.3.131
Discovered open port 135/tcp on 10.2.3.148
Discovered open port 135/tcp on 10.2.3.149
Discovered open port 135/tcp on 10.2.3.151
Discovered open port 3389/tcp on 10.2.3.148
Discovered open port 3389/tcp on 10.2.3.149
Discovered open port 443/tcp on 10.2.3.131
Discovered open port 443/tcp on 10.2.3.146
Discovered open port 443/tcp on 10.2.3.147
Discovered open port 3389/tcp on 10.2.3.151
Discovered open port 22/tcp on 10.2.3.147
Discovered open port 22/tcp on 10.2.3.131
Discovered open port 22/tcp on 10.2.3.146
Discovered open port 80/tcp on 10.2.3.148
Discovered open port 80/tcp on 10.2.3.149
Discovered open port 445/tcp on 10.2.3.148
Discovered open port 445/tcp on 10.2.3.149
Discovered open port 80/tcp on 10.2.3.151
Discovered open port 445/tcp on 10.2.3.151
Discovered open port 139/tcp on 10.2.3.148
Discovered open port 139/tcp on 10.2.3.149
Discovered open port 139/tcp on 10.2.3.151
Discovered open port 23/tcp on 10.2.3.131
Discovered open port 23/tcp on 10.2.3.146
Discovered open port 23/tcp on 10.2.3.147
Discovered open port 7778/tcp on 10.2.3.149
Discovered open port 7778/tcp on 10.2.3.151
Discovered open port 83/tcp on 10.2.3.149
Discovered open port 83/tcp on 10.2.3.148
Discovered open port 83/tcp on 10.2.3.151
Discovered open port 82/tcp on 10.2.3.149
Discovered open port 90/tcp on 10.2.3.149
Discovered open port 49154/tcp on 10.2.3.149
Discovered open port 49154/tcp on 10.2.3.148
Discovered open port 49154/tcp on 10.2.3.151
Discovered open port 49153/tcp on 10.2.3.151
Discovered open port 81/tcp on 10.2.3.151
Discovered open port 49153/tcp on 10.2.3.148
Discovered open port 49153/tcp on 10.2.3.149
Discovered open port 49152/tcp on 10.2.3.151
Discovered open port 81/tcp on 10.2.3.149
Discovered open port 81/tcp on 10.2.3.148
Completed Connect Scan against 10.2.3.151 in 14.41s (63 hosts left)
Completed Connect Scan against 10.2.3.163 in 14.46s (62 hosts left)
Completed Connect Scan against 10.2.3.192 in 14.60s (61 hosts left)
Discovered open port 49152/tcp on 10.2.3.149
Discovered open port 49152/tcp on 10.2.3.148
Completed Connect Scan against 10.2.3.198 in 15.54s (60 hosts left)
Completed Connect Scan against 10.2.3.195 in 15.59s (59 hosts left)
Completed Connect Scan against 10.2.3.147 in 15.63s (58 hosts left)
Completed Connect Scan against 10.2.3.183 in 15.67s (57 hosts left)
Completed Connect Scan against 10.2.3.176 in 15.68s (56 hosts left)
Completed Connect Scan against 10.2.3.178 in 15.76s (55 hosts left)
Completed Connect Scan against 10.2.3.160 in 15.80s (54 hosts left)
Completed Connect Scan against 10.2.3.164 in 15.88s (53 hosts left)
Completed Connect Scan against 10.2.3.179 in 15.91s (52 hosts left)
Completed Connect Scan against 10.2.3.215 in 16.05s (51 hosts left)
Completed Connect Scan against 10.2.3.180 in 16.08s (50 hosts left)
Completed Connect Scan against 10.2.3.200 in 16.12s (49 hosts left)
Completed Connect Scan against 10.2.3.204 in 16.28s (48 hosts left)
Completed Connect Scan against 10.2.3.188 in 16.30s (47 hosts left)
Completed Connect Scan against 10.2.3.189 in 16.61s (46 hosts left)
Completed Connect Scan against 10.2.3.206 in 16.69s (45 hosts left)
Completed Connect Scan against 10.2.3.209 in 16.69s (44 hosts left)
Completed Connect Scan against 10.2.3.174 in 16.71s (43 hosts left)
Completed Connect Scan against 10.2.3.210 in 16.72s (42 hosts left)
Completed Connect Scan against 10.2.3.161 in 16.74s (41 hosts left)
Completed Connect Scan against 10.2.3.182 in 16.74s (40 hosts left)
Completed Connect Scan against 10.2.3.190 in 16.74s (39 hosts left)
Completed Connect Scan against 10.2.3.146 in 16.75s (38 hosts left)
Completed Connect Scan against 10.2.3.181 in 16.75s (37 hosts left)
Completed Connect Scan against 10.2.3.149 in 16.76s (36 hosts left)
Completed Connect Scan against 10.2.3.173 in 16.76s (35 hosts left)
Completed Connect Scan against 10.2.3.202 in 16.76s (34 hosts left)
Completed Connect Scan against 10.2.3.162 in 16.77s (33 hosts left)
Completed Connect Scan against 10.2.3.170 in 16.77s (32 hosts left)
Completed Connect Scan against 10.2.3.171 in 16.77s (31 hosts left)
Completed Connect Scan against 10.2.3.185 in 16.77s (30 hosts left)
Completed Connect Scan against 10.2.3.187 in 16.77s (29 hosts left)
Completed Connect Scan against 10.2.3.205 in 16.77s (28 hosts left)
Completed Connect Scan against 10.2.3.212 in 16.77s (27 hosts left)
Completed Connect Scan against 10.2.3.184 in 16.78s (26 hosts left)
Completed Connect Scan against 10.2.3.199 in 16.78s (25 hosts left)
Completed Connect Scan against 10.2.3.207 in 16.78s (24 hosts left)
Completed Connect Scan against 10.2.3.213 in 16.78s (23 hosts left)
Completed Connect Scan against 10.2.3.214 in 16.78s (22 hosts left)
Completed Connect Scan against 10.2.3.148 in 16.79s (21 hosts left)
Completed Connect Scan against 10.2.3.169 in 16.79s (20 hosts left)
Completed Connect Scan against 10.2.3.172 in 16.79s (19 hosts left)
Completed Connect Scan against 10.2.3.208 in 16.79s (18 hosts left)
Completed Connect Scan against 10.2.3.168 in 16.80s (17 hosts left)
Completed Connect Scan against 10.2.3.197 in 16.80s (16 hosts left)
Completed Connect Scan against 10.2.3.211 in 16.80s (15 hosts left)
Completed Connect Scan against 10.2.3.216 in 16.80s (14 hosts left)
Completed Connect Scan against 10.2.3.217 in 16.80s (13 hosts left)
Completed Connect Scan against 10.2.3.175 in 16.81s (12 hosts left)
Completed Connect Scan against 10.2.3.201 in 16.81s (11 hosts left)
Completed Connect Scan against 10.2.3.167 in 16.82s (10 hosts left)
Completed Connect Scan against 10.2.3.186 in 16.82s (9 hosts left)
Completed Connect Scan against 10.2.3.165 in 16.82s (8 hosts left)
Completed Connect Scan against 10.2.3.191 in 16.82s (7 hosts left)
Completed Connect Scan against 10.2.3.166 in 16.83s (6 hosts left)
Completed Connect Scan against 10.2.3.196 in 16.83s (5 hosts left)
Completed Connect Scan against 10.2.3.203 in 16.83s (4 hosts left)
Completed Connect Scan against 10.2.3.193 in 16.83s (3 hosts left)
Completed Connect Scan against 10.2.3.177 in 16.83s (2 hosts left)
Completed Connect Scan against 10.2.3.194 in 16.83s (1 host left)
Completed Connect Scan at 07:56, 16.94s elapsed (64000 total ports)
Initiating Service scan at 07:56
Scanning 46 services on 64 hosts

Completed Service scan at 07:57, 53.59s elapsed (46 services on 64 hosts)
NSE: Script scanning 64 hosts.
Initiating NSE at 07:57

Completed NSE at 07:59, 95.64s elapsed
Nmap scan report for 10.2.3.131
Host is up (0.014s latency).
Not shown: 968 closed ports, 28 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp Cisco ftpd 5.3.1
22/tcp open ssh OpenSSH 3.0.2p1 (protocol 2.0)
|_ssh-hostkey:
23/tcp open telnet Cisco PIX 500 series telnetd
443/tcp open ssl/http Virata-EmWeb 5.3.0
| http-auth:
| HTTP/1.1 401 Unauthorized
|_ Basic realm=level 15 access
| http-title: Site doesn't have a title.
|_Requested resource was /flash/home.html
| ssl-cert: Subject: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Issuer: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2005-12-21T19:20:27+00:00
| Not valid after: 2015-12-19T19:20:27+00:00
| MD5: 6fd1 64b4 beb4 9f9b ba0a cb20 d271 ddc3
|_SHA-1: 10e0 dfc6 8676 797a afb5 5b75 8c2e 1ca1 9059 cf5f
|_ssl-date: 1970-06-17T17:49:12+00:00; -44y68d18h08m26s from local time.
Service Info: OS: IOS; Device: firewall; CPE: cpe:/o:cisco:ios

Nmap scan report for 10.2.3.146
Host is up (0.069s latency).
Not shown: 968 closed ports, 28 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp Cisco ftpd 5.3.1
22/tcp open ssh OpenSSH 3.0.2p1 (protocol 2.0)
| ssh-hostkey:
|_ 1024 9c:ac:f1:81:3b:f5:99:de:fd:d5:63:3c:3c:7a:b2:8d (DSA)
23/tcp open telnet Cisco PIX 500 series telnetd
443/tcp open ssl/http Virata-EmWeb 5.3.0
| http-auth:
| HTTP/1.1 401 Unauthorized
|_ Basic realm=level 15 access
| http-title: Site doesn't have a title.
|_Requested resource was /flash/home.html
| ssl-cert: Subject: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Issuer: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2005-12-21T19:20:27+00:00
| Not valid after: 2015-12-19T19:20:27+00:00
| MD5: 6fd1 64b4 beb4 9f9b ba0a cb20 d271 ddc3
|_SHA-1: 10e0 dfc6 8676 797a afb5 5b75 8c2e 1ca1 9059 cf5f
|_ssl-date: 1970-06-13T17:08:07+00:00; -44y72d18h49m35s from local time.
Service Info: OS: IOS; Device: firewall; CPE: cpe:/o:cisco:ios

Nmap scan report for 10.2.3.147
Host is up (0.064s latency).
Not shown: 968 closed ports, 28 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp Cisco ftpd 5.3.1
22/tcp open ssh OpenSSH 3.0.2p1 (protocol 2.0)
| ssh-hostkey:
|_ 1024 bf:cc:5b:bd:15:2f:12:f5:84:60:30:ca:5c:62:ac:ef (DSA)
23/tcp open telnet Cisco PIX 500 series telnetd
443/tcp open ssl/http Virata-EmWeb 5.3.0
| http-auth:
| HTTP/1.1 401 Unauthorized
|_ Basic realm=level 15 access
| http-title: Site doesn't have a title.
|_Requested resource was /flash/home.html
| ssl-cert: Subject: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Issuer: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2005-12-21T19:20:27+00:00
| Not valid after: 2015-12-19T19:20:27+00:00
| MD5: 6fd1 64b4 beb4 9f9b ba0a cb20 d271 ddc3
|_SHA-1: 10e0 dfc6 8676 797a afb5 5b75 8c2e 1ca1 9059 cf5f
|_ssl-date: 1970-06-17T17:49:13+00:00; -44y68d18h08m27s from local time.
Service Info: OS: IOS; Device: firewall; CPE: cpe:/o:cisco:ios

Nmap scan report for 10.2.3.148
Host is up (0.059s latency).
Not shown: 990 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 7.5
| http-methods: OPTIONS TRACE GET HEAD POST
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: IIS7
81/tcp open http Microsoft IIS httpd 7.5
| http-methods: OPTIONS TRACE GET HEAD POST
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: Atmosfera
83/tcp open http Microsoft IIS httpd 7.5
| http-methods: OPTIONS TRACE GET HEAD POST
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: Atmosfera
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
445/tcp open netbios-ssn
3389/tcp open ms-wbt-server Microsoft Terminal Service
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| nbstat: NetBIOS name: ATM01CG, NetBIOS user: , NetBIOS MAC: 00:15:5d:0a:18:09 (Microsoft)
| Names:
| ATM01CG<00> Flags:
| GPW<00> Flags:
|_ ATM01CG<20> Flags:
| smb-os-discovery:
| OS: Windows Server 2008 R2 Standard 7601 Service Pack 1 (Windows Server 2008 R2 Standard 6.1)
| OS CPE: cpe:/o:microsoft:windows_server_2008::sp1
| Computer name: ATM01CG
| NetBIOS computer name: ATM01CG
| Domain name: gpw.in
| Forest name: gpw.in
| FQDN: ATM01CG.gpw.in
|_ System time: 2014-08-25T13:57:38+02:00
| smb-security-mode:
| Account that was used for smb scripts: guest
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol

Nmap scan report for 10.2.3.149
Host is up (0.063s latency).
Not shown: 987 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 7.5
| http-methods: OPTIONS TRACE GET HEAD POST
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: IIS7
81/tcp open http Microsoft IIS httpd 7.5
| http-methods: OPTIONS TRACE GET HEAD POST
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: Atmosfera
82/tcp open http Microsoft IIS httpd 7.5
| http-auth:
| HTTP/1.1 401 Unauthorized
| Negotiate
|_ NTLM
| http-methods: OPTIONS TRACE GET HEAD POST
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
| http-ntlm-info:
| Target_Name: GPW
| NetBIOS_Domain_Name: GPW
| NetBIOS_Computer_Name: ATM02OZ
| DNS_Domain_Name: gpw.in
| DNS_Computer_Name: ATM02OZ.gpw.in
| DNS_Tree_Name: gpw.in
|_ Product_Version: 6.1 (Build 7601)
|_http-title: 401 - Unauthorized: Access is denied due to invalid credentials.
83/tcp open http Microsoft IIS httpd 7.5
| http-methods: OPTIONS TRACE GET HEAD POST
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
| http-title: \xC2\xA0
|_Requested resource was /unauthorized.aspx
90/tcp open http Microsoft IIS httpd 7.5
|_http-methods: No Allow or Public header in OPTIONS response (status code 500)
|_http-title: 500 - Internal server error.
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
445/tcp open netbios-ssn
3389/tcp open ms-wbt-server Microsoft Terminal Service
7778/tcp open remoting MS .NET Remoting services
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| nbstat: NetBIOS name: ATM02OZ, NetBIOS user: , NetBIOS MAC: 00:15:5d:8a:81:09 (Microsoft)
| Names:
| ATM02OZ<00> Flags:
| GPW<00> Flags:
|_ ATM02OZ<20> Flags:
| smb-os-discovery:
| OS: Windows Server 2008 R2 Standard 7601 Service Pack 1 (Windows Server 2008 R2 Standard 6.1)
| OS CPE: cpe:/o:microsoft:windows_server_2008::sp1
| Computer name: ATM02OZ
| NetBIOS computer name: ATM02OZ
| Domain name: gpw.in
| Forest name: gpw.in
| FQDN: ATM02OZ.gpw.in
|_ System time: 2014-08-25T13:57:41+02:00
| smb-security-mode:
| Account that was used for smb scripts: guest
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol

Nmap scan report for 10.2.3.151
Host is up (0.039s latency).
Not shown: 989 closed ports
PORT STATE SERVICE VERSION
80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-methods: No Allow or Public header in OPTIONS response (status code 404)
|_http-title: Not Found
81/tcp open http Microsoft IIS httpd 7.5
| http-methods: OPTIONS TRACE GET HEAD POST
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
| http-ntlm-info:
| Target_Name: GPW
| NetBIOS_Domain_Name: GPW
| NetBIOS_Computer_Name: ATM01OZ
| DNS_Domain_Name: gpw.in
| DNS_Computer_Name: ATM01OZ.gpw.in
| DNS_Tree_Name: gpw.in
|_ Product_Version: 6.1 (Build 7601)
|_http-title: Atmosfera
83/tcp open http Microsoft IIS httpd 7.5
| http-methods: OPTIONS TRACE GET HEAD POST
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
| http-title: \xC2\xA0
|_Requested resource was /unauthorized.aspx
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
445/tcp open netbios-ssn
3389/tcp open ms-wbt-server Microsoft Terminal Service
7778/tcp open remoting MS .NET Remoting services
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| nbstat: NetBIOS name: ATM01OZ, NetBIOS user: , NetBIOS MAC: 00:15:5d:8a:81:00 (Microsoft)
| Names:
| ATM01OZ<00> Flags:
| GPW<00> Flags:
|_ ATM01OZ<20> Flags:
| smb-os-discovery:
| OS: Windows Server 2008 R2 Standard 7601 Service Pack 1 (Windows Server 2008 R2 Standard 6.1)
| OS CPE: cpe:/o:microsoft:windows_server_2008::sp1
| Computer name: ATM01OZ
| NetBIOS computer name: ATM01OZ
| Domain name: gpw.in
| Forest name: gpw.in
| FQDN: ATM01OZ.gpw.in
|_ System time: 2014-08-25T13:57:40+02:00
| smb-security-mode:
| Account that was used for smb scripts: guest
| User-level authentication
| SMB Security: Challenge/response passwords supported
|_ Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol

Initiating Connect Scan at 07:59
Scanning 34 hosts [1000 ports/host]
Discovered open port 21/tcp on 10.2.3.250
Discovered open port 21/tcp on 10.2.3.251
Discovered open port 443/tcp on 10.2.3.251
Discovered open port 443/tcp on 10.2.3.250
Discovered open port 22/tcp on 10.2.3.251
Discovered open port 22/tcp on 10.2.3.250
Discovered open port 23/tcp on 10.2.3.251
Discovered open port 23/tcp on 10.2.3.250
Discovered open port 443/tcp on 10.2.3.252
Discovered open port 443/tcp on 10.2.3.253
Warning: 10.2.3.250 giving up on port because retransmission cap hit (2).
Discovered open port 444/tcp on 10.2.3.252
Discovered open port 444/tcp on 10.2.3.253
Completed Connect Scan against 10.2.3.227 in 10.26s (33 hosts left)
Completed Connect Scan against 10.2.3.229 in 10.29s (32 hosts left)
Completed Connect Scan against 10.2.3.218 in 10.31s (31 hosts left)
Completed Connect Scan against 10.2.3.228 in 10.31s (30 hosts left)
Completed Connect Scan against 10.2.3.240 in 10.31s (29 hosts left)
Completed Connect Scan against 10.2.3.220 in 10.34s (28 hosts left)
Completed Connect Scan against 10.2.3.226 in 10.34s (27 hosts left)
Completed Connect Scan against 10.2.3.223 in 10.43s (26 hosts left)
Completed Connect Scan against 10.2.3.231 in 10.43s (25 hosts left)
Completed Connect Scan against 10.2.3.222 in 10.45s (24 hosts left)
Completed Connect Scan against 10.2.3.234 in 10.47s (23 hosts left)
Completed Connect Scan against 10.2.3.225 in 10.48s (22 hosts left)
Completed Connect Scan against 10.2.3.235 in 10.52s (21 hosts left)
Completed Connect Scan against 10.2.3.232 in 10.55s (20 hosts left)
Completed Connect Scan against 10.2.3.233 in 10.55s (19 hosts left)
Completed Connect Scan against 10.2.3.236 in 10.61s (18 hosts left)
Completed Connect Scan against 10.2.3.247 in 10.93s (17 hosts left)
Completed Connect Scan against 10.2.3.230 in 10.96s (16 hosts left)
Completed Connect Scan against 10.2.3.243 in 11.04s (15 hosts left)
Completed Connect Scan against 10.2.3.224 in 11.05s (14 hosts left)
Completed Connect Scan against 10.2.3.241 in 11.05s (13 hosts left)
Completed Connect Scan against 10.2.3.251 in 11.05s (12 hosts left)
Completed Connect Scan against 10.2.3.219 in 11.06s (11 hosts left)
Completed Connect Scan against 10.2.3.242 in 11.07s (10 hosts left)
Completed Connect Scan against 10.2.3.238 in 11.08s (9 hosts left)
Completed Connect Scan against 10.2.3.239 in 11.08s (8 hosts left)
Completed Connect Scan against 10.2.3.244 in 11.10s (7 hosts left)
Completed Connect Scan against 10.2.3.246 in 11.10s (6 hosts left)
Completed Connect Scan against 10.2.3.237 in 11.10s (5 hosts left)
Completed Connect Scan against 10.2.3.245 in 11.10s (4 hosts left)
Completed Connect Scan against 10.2.3.221 in 11.12s (3 hosts left)
Completed Connect Scan against 10.2.3.252 in 11.19s (2 hosts left)
Completed Connect Scan against 10.2.3.250 in 11.26s (1 host left)
Completed Connect Scan at 07:59, 11.28s elapsed (34000 total ports)
Initiating Service scan at 07:59
Scanning 12 services on 34 hosts
Completed Service scan at 07:59, 17.26s elapsed (12 services on 34 hosts)
NSE: Script scanning 34 hosts.
Initiating NSE at 07:59
Completed NSE at 07:59, 10.89s elapsed
Nmap scan report for 10.2.3.250
Host is up (0.0090s latency).
Not shown: 968 closed ports, 28 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp Cisco ftpd 5.3.1
22/tcp open ssh OpenSSH 3.0.2p1 (protocol 2.0)
| ssh-hostkey:
|_ 1024 9c:ac:f1:81:3b:f5:99:de:fd:d5:63:3c:3c:7a:b2:8d (DSA)
23/tcp open telnet Cisco PIX 500 series telnetd
443/tcp open ssl/http Virata-EmWeb 5.3.0
| http-auth:
| HTTP/1.1 401 Unauthorized
|_ Basic realm=level 15 access
| http-title: Site doesn't have a title.
|_Requested resource was /flash/home.html
| ssl-cert: Subject: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Issuer: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2005-12-21T19:20:27+00:00
| Not valid after: 2015-12-19T19:20:27+00:00
| MD5: 6fd1 64b4 beb4 9f9b ba0a cb20 d271 ddc3
|_SHA-1: 10e0 dfc6 8676 797a afb5 5b75 8c2e 1ca1 9059 cf5f
|_ssl-date: 1970-06-13T17:10:08+00:00; -44y72d18h49m35s from local time.
Service Info: OS: IOS; Device: firewall; CPE: cpe:/o:cisco:ios

Nmap scan report for 10.2.3.251
Host is up (0.039s latency).
Not shown: 968 closed ports, 28 filtered ports
PORT STATE SERVICE VERSION
21/tcp open ftp Cisco ftpd 5.3.1
22/tcp open ssh OpenSSH 3.0.2p1 (protocol 2.0)
| ssh-hostkey:
|_ 1024 bf:cc:5b:bd:15:2f:12:f5:84:60:30:ca:5c:62:ac:ef (DSA)
23/tcp open telnet Cisco PIX 500 series telnetd
443/tcp open ssl/http Virata-EmWeb 5.3.0
| http-auth:
| HTTP/1.1 401 Unauthorized
|_ Basic realm=level 15 access
| http-title: Site doesn't have a title.
|_Requested resource was /flash/home.html
| ssl-cert: Subject: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Issuer: commonName=www.cisco.com/organizationName=Cisco Systems, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2005-12-21T19:20:27+00:00
| Not valid after: 2015-12-19T19:20:27+00:00
| MD5: 6fd1 64b4 beb4 9f9b ba0a cb20 d271 ddc3
|_SHA-1: 10e0 dfc6 8676 797a afb5 5b75 8c2e 1ca1 9059 cf5f
|_ssl-date: 1970-06-17T17:51:16+00:00; -44y68d18h08m26s from local time.
Service Info: OS: IOS; Device: firewall; CPE: cpe:/o:cisco:ios

Nmap scan report for 10.2.3.252
Host is up (0.023s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
443/tcp open ssl/http Microsoft IIS
|_http-methods: No Allow or Public header in OPTIONS response (status code 403)
|_http-title: The page cannot be displayed
| ssl-cert: Subject: commonName=*.gpw.pl
| Issuer: commonName=DOMENY.PL DV Certification Authority/organizationName=DOMENY.PL Ltd./countryName=PL
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2013-10-13T23:00:00+00:00
| Not valid after: 2016-10-13T22:59:59+00:00
| MD5: 7ff8 328a 1201 23b4 76ce 8f86 94fa 923a
|_SHA-1: 10e2 86b0 e886 7267 eade e8d4 81b1 d995 426a 41cc
|_ssl-date: 2014-08-25T11:59:42+00:00; -1s from local time.
| sslv2:
| SSLv2 supported
| ciphers:
| SSL2_RC4_128_WITH_MD5
| SSL2_DES_192_EDE3_CBC_WITH_MD5
| SSL2_RC2_CBC_128_CBC_WITH_MD5
| SSL2_DES_64_CBC_WITH_MD5
| SSL2_RC4_128_EXPORT40_WITH_MD5
|_ SSL2_RC2_CBC_128_CBC_WITH_MD5
444/tcp open ssl/http Microsoft ISA httpd
| http-auth:
| HTTP/1.1 401 Unauthorized ( The server requires authorization to fulfill the request. Access to the Web server is denied. Contact the server administrator. )
| Negotiate
| Kerberos
|_ NTLM
|_http-methods: No Allow or Public header in OPTIONS response (status code 401)
| http-ntlm-info:
| Target_Name: GPW
| NetBIOS_Domain_Name: GPW
| NetBIOS_Computer_Name: ISA01CG
| DNS_Domain_Name: gpw.in
| DNS_Computer_Name: ISA01CG.gpw.in
| DNS_Tree_Name: gpw.in
|_ Product_Version: 5.2 (Build 3790)
|_http-title: The page cannot be displayed
| ssl-cert: Subject: commonName=*.gpw.pl
| Issuer: commonName=DOMENY.PL DV Certification Authority/organizationName=DOMENY.PL Ltd./countryName=PL
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2013-10-13T23:00:00+00:00
| Not valid after: 2016-10-13T22:59:59+00:00
| MD5: 7ff8 328a 1201 23b4 76ce 8f86 94fa 923a
|_SHA-1: 10e2 86b0 e886 7267 eade e8d4 81b1 d995 426a 41cc
|_ssl-date: 2014-08-25T11:59:42+00:00; 0s from local time.
| sslv2:
| SSLv2 supported
| ciphers:
| SSL2_RC4_128_WITH_MD5
| SSL2_DES_192_EDE3_CBC_WITH_MD5
| SSL2_RC2_CBC_128_CBC_WITH_MD5
| SSL2_DES_64_CBC_WITH_MD5
| SSL2_RC4_128_EXPORT40_WITH_MD5
|_ SSL2_RC2_CBC_128_CBC_WITH_MD5
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Nmap scan report for 10.2.3.253
Host is up (0.021s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
443/tcp open ssl/http Microsoft IIS
|_http-methods: No Allow or Public header in OPTIONS response (status code 403)
|_http-title: The page cannot be displayed
| ssl-cert: Subject: commonName=*.gpw.pl
| Issuer: commonName=DOMENY.PL DV Certification Authority/organizationName=DOMENY.PL Ltd./countryName=PL
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2013-10-13T23:00:00+00:00
| Not valid after: 2016-10-13T22:59:59+00:00
| MD5: 7ff8 328a 1201 23b4 76ce 8f86 94fa 923a
|_SHA-1: 10e2 86b0 e886 7267 eade e8d4 81b1 d995 426a 41cc
|_ssl-date: 2014-08-25T11:59:43+00:00; 0s from local time.
| sslv2:
| SSLv2 supported
| ciphers:
| SSL2_RC4_128_WITH_MD5
| SSL2_DES_192_EDE3_CBC_WITH_MD5
| SSL2_RC2_CBC_128_CBC_WITH_MD5
| SSL2_DES_64_CBC_WITH_MD5
| SSL2_RC4_128_EXPORT40_WITH_MD5
|_ SSL2_RC2_CBC_128_CBC_WITH_MD5
444/tcp open ssl/http Microsoft ISA httpd
| http-auth:
| HTTP/1.1 401 Unauthorized ( The server requires authorization to fulfill the request. Access to the Web server is denied. Contact the server administrator. )
| Negotiate
| Kerberos
|_ NTLM
|_http-methods: No Allow or Public header in OPTIONS response (status code 401)
| http-ntlm-info:
| Target_Name: GPW
| NetBIOS_Domain_Name: GPW
| NetBIOS_Computer_Name: ISA01OZ
| DNS_Domain_Name: gpw.in
| DNS_Computer_Name: ISA01OZ.gpw.in
| DNS_Tree_Name: gpw.in
|_ Product_Version: 5.2 (Build 3790)
|_http-title: The page cannot be displayed
| ssl-cert: Subject: commonName=*.gpw.pl
| Issuer: commonName=DOMENY.PL DV Certification Authority/organizationName=DOMENY.PL Ltd./countryName=PL
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2013-10-13T23:00:00+00:00
| Not valid after: 2016-10-13T22:59:59+00:00
| MD5: 7ff8 328a 1201 23b4 76ce 8f86 94fa 923a
|_SHA-1: 10e2 86b0 e886 7267 eade e8d4 81b1 d995 426a 41cc
|_ssl-date: 2014-08-25T11:59:42+00:00; 0s from local time.
| sslv2:
| SSLv2 supported
| ciphers:
| SSL2_RC4_128_WITH_MD5
| SSL2_DES_192_EDE3_CBC_WITH_MD5
| SSL2_RC2_CBC_128_CBC_WITH_MD5
| SSL2_DES_64_CBC_WITH_MD5
| SSL2_RC4_128_EXPORT40_WITH_MD5
|_ SSL2_RC2_CBC_128_CBC_WITH_MD5
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows


Wyszukiwarka

Podobne podstrony:
10 2 2 0scan std
scan std
scan 10
WSM 10 52 pl(1)
scan 36
VA US Top 40 Singles Chart 2015 10 10 Debuts Top 100
10 35

więcej podobnych podstron