nmap

  ___                        
 ( _ ) _ __ ___   __ _ _ __  
 / _ \| '_ ` _ \ / _` | '_ \ 
| (_) | | | | | | (_| | |_) |
 \___/|_| |_| |_|\__,_| .__/ 
                      |_|    
          adot8 <3

[+] Scanning 192.168.184.238 [65535 TCP ports]


[+] Enumerating 192.168.184.238 [80,10000,20000]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 01:06 CDT
Nmap scan report for 192.168.184.238
Host is up (0.043s latency).

PORT      STATE SERVICE VERSION
80/tcp    open  http    Apache httpd 2.4.51 ((Debian))
|_http-title: Apache2 Debian Default Page: It works
10000/tcp open  http    MiniServ 1.981 (Webmin httpd)
|_http-title: 200 &mdash; Document follows
20000/tcp open  http    MiniServ 1.830 (Webmin httpd)
|_http-title: 200 &mdash; Document follows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 44.97 seconds

[+] Enumerating 192.168.184.238 for vulnerabilities [80,10000,20000]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 01:07 CDT
Pre-scan script results:
| broadcast-avahi-dos: 
|   Discovered hosts:
|     224.0.0.251
|   After NULL UDP avahi packet DoS (CVE-2011-1002).
|_  Hosts are all up (not vulnerable).
Nmap scan report for 192.168.184.238
Host is up.

PORT      STATE    SERVICE
80/tcp    filtered http
10000/tcp filtered snet-sensor-mgmt
20000/tcp filtered dnp

Nmap done: 1 IP address (1 host up) scanned in 37.99 seconds

[+] Scanning 192.168.184.238 [1000 UDP ports]
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-06-27 01:08 CDT
Initiating Ping Scan at 01:08
Scanning 192.168.184.238 [4 ports]
Completed Ping Scan at 01:08, 2.04s elapsed (1 total hosts)
Nmap scan report for 192.168.184.238 [host down]
Read data files from: /usr/bin/../share/nmap
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 2.11 seconds
           Raw packets sent: 8 (304B) | Rcvd: 0 (0B)

[+] Completed!

Last updated