Recon

$ nmap -p- --min-rate=1000 -Pn -v 192.168.151.179
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-28 06:02 CDT
Initiating Parallel DNS resolution of 1 host. at 06:02
Completed Parallel DNS resolution of 1 host. at 06:02, 0.02s elapsed
Initiating Connect Scan at 06:02
Scanning 192.168.151.179 [65535 ports]
Discovered open port 445/tcp on 192.168.151.179
Discovered open port 135/tcp on 192.168.151.179
Discovered open port 139/tcp on 192.168.151.179
Discovered open port 8080/tcp on 192.168.151.179
Discovered open port 22/tcp on 192.168.151.179
Increasing send delay for 192.168.151.179 from 0 to 5 due to 11 out of 25 dropped probes since last increase.
Discovered open port 7680/tcp on 192.168.151.179
Discovered open port 49664/tcp on 192.168.151.179
Discovered open port 49668/tcp on 192.168.151.179
Discovered open port 49665/tcp on 192.168.151.179
Discovered open port 49669/tcp on 192.168.151.179
Discovered open port 49667/tcp on 192.168.151.179
Connect Scan Timing: About 46.46% done; ETC: 06:03 (0:00:36 remaining)
Discovered open port 5040/tcp on 192.168.151.179
Discovered open port 49666/tcp on 192.168.151.179
Completed Connect Scan at 06:03, 66.00s elapsed (65535 total ports)
Nmap scan report for 192.168.151.179
Host is up (0.043s latency).
Not shown: 65522 closed tcp ports (conn-refused)
PORT      STATE SERVICE
22/tcp    open  ssh
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
5040/tcp  open  unknown
7680/tcp  open  pando-pub
8080/tcp  open  http-proxy
49664/tcp open  unknown
49665/tcp open  unknown
49666/tcp open  unknown
49667/tcp open  unknown
49668/tcp open  unknown
49669/tcp open  unknown

Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 66.10 seconds

Last updated