Starting Nmap 6.40 (
http://nmap.org ) at 2013-10-17 11:13 Mitteleuropäische Sommerzeit
NSE: Loaded 110 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 11:13
Scanning 5.9.34.14 [4 ports]
Completed Ping Scan at 11:13, 0.59s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 11:14
Completed Parallel DNS resolution of 1 host. at 11:14, 0.06s elapsed
Initiating SYN Stealth Scan at 11:14
Scanning hal9000.redintelligence.net (5.9.34.14) [1000 ports]
Discovered open port 25/tcp on 5.9.34.14
Discovered open port 80/tcp on 5.9.34.14
Discovered open port 443/tcp on 5.9.34.14
Discovered open port 22/tcp on 5.9.34.14
Completed SYN Stealth Scan at 11:14, 46.47s elapsed (1000 total ports)
Initiating Service scan at 11:14
Scanning 4 services on hal9000.redintelligence.net (5.9.34.14)
Completed Service scan at 11:15, 31.25s elapsed (4 services on 1 host)
Initiating OS detection (try #1) against hal9000.redintelligence.net (5.9.34.14)
Initiating Traceroute at 11:15
Completed Traceroute at 11:15, 9.06s elapsed
NSE: Script scanning 5.9.34.14.
Initiating NSE at 11:15
Completed NSE at 11:16, 28.86s elapsed
Nmap scan report for hal9000.redintelligence.net (5.9.34.14)
Host is up (0.20s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.8p1-hpn13v10 (protocol 2.0)
| ssh-hostkey: 1024 a5:5e:45:f0:23:46:b8:02:5a:88:e2:71:63:52:d5:a9 (DSA)
| 2048 b3:b4:87:43:d1:59:ec:28:a5:6b:13:a8:c1:09:4f:51 (RSA)
|_256 50:05:d7:4c:3e:b2:73:30:67:10:17:69:4d:81:06:08 (ECDSA)
25/tcp open smtp
|_smtp-commands: zhbdzmsp-nwas13 says EHLO to 178.199.240.150:16485, SIZE 26214400, AUTH=LOGIN, AUTH LOGIN, PIPELINING, 8BITMIME,
80/tcp open http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
| http-robots.txt: 1 disallowed entry
|_/
|_http-title: Site doesn't have a title (text/html).
443/tcp open ssl/http Apache httpd
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
| http-robots.txt: 1 disallowed entry
|_/
|_http-title: Site doesn't have a title (text/html).
| ssl-cert: Subject: commonName=*.hal9000.redintelligence.net/organizationName=*.hal9000.redintelligence.net
| Issuer: commonName=Go Daddy Secure Certification Authority/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2012-06-22T11:48:16+00:00
| Not valid after: 2014-06-22T11:48:16+00:00
| MD5: 5772 bb75 9976 bc47 4725 5fdb 8af4 8a5e
|_SHA-1: 065a 5fca 2c28 197e 86ca c0e2 dba0 c40b e9ae d975
|_ssl-date: 2013-10-17T09:15:32+00:00; -4s from local time.
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at
http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port25-TCP:V=6.40%I=7%D=10/17%Time=525FAA90%P=i686-pc-windows-windows%r
SF
NULL,4A,"220\x20zhbdzmsp-nwas11\.bluewin\.ch\x20ESMTP\x20Service\x20\(
SF:Swisscom\x20Schweiz\x20AG\)\x20ready\r\n")%r(Hello,6A,"220\x20zhbdzmsp-
SF:nwas11\.bluewin\.ch\x20ESMTP\x20Service\x20\(Swisscom\x20Schweiz\x20AG\
SF
\x20ready\r\n500\x205\.5\.2\x20unrecognized\x20command\r\n")%r(Help,6A
SF:,"220\x20zhbdzmsp-nwas11\.bluewin\.ch\x20ESMTP\x20Service\x20\(Swisscom
SF:\x20Schweiz\x20AG\)\x20ready\r\n500\x205\.5\.2\x20unrecognized\x20comma
SF:nd\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.18 - 2.6.22
Uptime guess: 21.205 days (since Thu Sep 26 06:21:03 2013)
Network Distance: 28 hops
TCP Sequence Prediction: Difficulty=254 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 ... 27
28 158.00 ms hal9000.redintelligence.net (5.9.34.14)
NSE: Script Post-scanning.
Initiating NSE at 11:16
Completed NSE at 11:16, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at
http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 136.89 seconds
Raw packets sent: 3160 (141.656KB) | Rcvd: 176 (8.345KB)