Permalink
Cannot retrieve contributors at this time
web-hack-mirror/mirror/2000/10/22/www.no-limits-gmbh.de/www.no-limits-gmbh.de-nmap_results
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
28 lines (22 sloc)
1.26 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Starting nmap V. 2.54BETA3 ( www.insecure.org/nmap/ ) | |
| Interesting ports on www.no-limits-gmbh.de (212.114.141.6): | |
| (The 4 ports scanned but not shown below are in state: closed) | |
| Port State Service | |
| 80/tcp open http | |
| TCP Sequence Prediction: Class=trivial time dependency | |
| Difficulty=49 (Easy) | |
| Aggressive OS guesses: Windows NT4 / Win95 / Win98 (94%), Windows NT 4 SP3 (92%), Microsoft NT 4.0 Server SP5 + 2047 Hotfixes (90%), Windows NT 5 Beta2 or Beta3 (90%), Windows 2000 Professional, Build 2128 (90%), NetBSD 1.3I (after 19990119) to 1.4 x86 (88%), Cisco IOS 12.0(3.3)S (perhaps a 7200) (87%), FreeBSD 3.2-STABLE (87%) | |
| No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). | |
| TCP/IP fingerprint: | |
| TSeq(Class=TD%gcd=1%SI=35) | |
| TSeq(Class=TD%gcd=1%SI=45) | |
| TSeq(Class=TD%gcd=2%SI=31) | |
| T1(Resp=Y%DF=Y%W=4470%ACK=S++%Flags=AS%Ops=M) | |
| T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) | |
| T3(Resp=Y%DF=Y%W=4470%ACK=S++%Flags=AS%Ops=M) | |
| T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) | |
| T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) | |
| T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) | |
| T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) | |
| PU(Resp=N) | |
| Nmap run completed -- 1 IP address (1 host up) scanned in 13 seconds |