Initiating FIN Scan against 66-154-102-99.assertivenetworks.net (66.154.102.99) [1663 ports] at 07:21
Increasing send delay for 66.154.102.99 from 0 to 5 due to 23 out of 75 dropped probes since last increase.
FIN Scan Timing: About 8.18% done; ETC: 07:28 (0:05:43 remaining)
The FIN Scan took 240.19s to scan 1663 total ports.
Initiating service scan against 9 services on 66-154-102-99.assertivenetworks.net (66.154.102.99) at 07:25
Discovered open port 22/tcp on 66.154.102.99
Discovered open port 512/tcp on 66.154.102.99
Discovered open port 513/tcp on 66.154.102.99
Discovered open port 8000/tcp on 66.154.102.99
Discovered open port 514/tcp on 66.154.102.99
The service scan took 103.89s to scan 9 services on 1 host.
For OSScan assuming port 22 is open, 1 is closed, and neither are firewalled
Host 66-154-102-99.assertivenetworks.net (66.154.102.99) appears to be up ... good.
Interesting ports on 66-154-102-99.assertivenetworks.net (66.154.102.99):
(The 1654 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 3.8.1p1 Debian-8.sarge.3 (protocol 2.0)
68/tcp open|filtered dhcpclient
137/tcp open|filtered netbios-ns
138/tcp open|filtered netbios-dgm
139/tcp open|filtered netbios-ssn
512/tcp open exec?
513/tcp open login?
514/tcp open shell?
8000/tcp open http-alt?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at
http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port8000-TCP:V=3.81%D=1/6%Time=43BDFF6D%P=i386-asplinux-linux-gnu%r(Get
SF:Request,88,"HTTP/1\.0\x20403\x20\(Forbidden\)\r\nContent-length:\x2037\
SF:r\nConnection:\x20Close\r\nDate:\x20Fri\x20Jan\ x20\x206\x2005:28:24\x20
SF:2006\r\n\r\n<html><b>Error\x20=\x20Forbidden</b></html>")%r(GenericLine
SF:s,88,"HTTP/1\.0\x20403\x20\(Forbidden\)\r\nContent-length:\x2037\r\nCon
SF:nection:\x20Close\r\nDate:\x20Fri\x20Jan\x20\x2 06\x2005:28:32\x202006\r
SF:\n\r\n<html><b>Error\x20=\x20Forbidden</b></html>")%r(HTTPOptions,88,"H
SF:TTP/1\.0\x20403\x20\(Forbidden\)\r\nContent-length:\x2037\r\nConnection
SF::\x20Close\r\nDate:\x20Fri\x20Jan\x20\x206\x200 5:28:34\x202006\r\n\r\n<
SF:html><b>Error\x20=\x20Forbidden</b></html>")%r(RTSPRequest,88,"HTTP/1\.
SF:0\x20403\x20\(Forbidden\)\r\nContent-length:\x2037\r\nConnection:\x20Cl
SF:ose\r\nDate:\x20Fri\x20Jan\x20\x206\x2005:28:36 \x202006\r\n\r\n<html><b
SF:>Error\x20=\x20Forbidden</b></html>");
Device type: general purpose
Running: Linux 2.4.X|2.5.X
OS details: Linux 2.4.0 - 2.5.20
Uptime 8.023 days (since Thu Dec 29 06:55:07 2005)
TCP Sequence Prediction: Class=random positive increments
Difficulty=3709025 (Good luck!)
IPID Sequence Generation: All zeros
Nmap finished: 1 IP address (1 host up) scanned in 400.670 seconds
Raw packets sent: 1840 (73.9KB) | Rcvd: 1700 (78.8KB)