Zenmap Scan Tools Profile Help Target: scanme.nmap.org Command: nmap -T4 -A -v scanme.nmap.org Hosts Services Nmap Output Ports/Hosts Topology Host Details Scans OS Host scanme.nmap.or nmap - T4-A -v scanme.nmap.org Host is up (0.10s latency). Not shown: 996 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh | ssh-hostkey: | VERSION OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0) 1024 ac:00:a0:1a:82:ff:cc:55:99:dc:67:2b:34:97:6b:75 (DSA) 2048 20:3d:2d: 44:62:2a:b0:5a: 9d: b5:b3:05:14:c2:a6:b2 (RSA) 256 96:02:bb:5e:57:54:1c:4e:45:2f:56:4c:4a:24:b2:57 (ECDSA) 256 33:fa:91:0f:e0:el:7b:lf: 6d:05:a2:b0:f1:54:41:56 (ED25519) 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) |_http-favicon: Nmap Project | http-title: Go ahead and ScanMe! |_http-server-header: Apache/2.4.7 (Ubuntu) http-methods: Supported Methods: GET HEAD POST OPTIONS 9929/tcp open nping-echo Nping echo 31337/tcp open tcpwrapped Device type: general purpose Running: Linux 5.X OS CPE: cpe:/o: linux: linux_kernel:5 OS details: Linux 5.0 - 5.4 Uptime quess: 13.060 days (since Wed Mar 6 21:26:10 2024) Network Distance: 18 hops TCP Sequence Prediction: Difficulty=249 (Good luck!) IP ID Sequence Generation: All zeros Service Info: 05: Linux; CPE: cpe:/o:linux: linux_kernel TRACEROUTE (using port 1723/tcp) HOP RTT 1 2.00 ms 2 14.00 ms 3 16.00 ms 4 16.00 ms 5 19.00 ms 6 20.00 ms 7 83.00 ms 8 86.00 ms 9 85.00 ms 10 11 86.00 ms 12 82.00 ms 13 14 15 ... 17 18 ADDRESS Linksys02559 (192.168.1.1)|| 072-031-129-145.res.spectrum.com (72.31.129.145) int-0-7-1-6.tamp04-serl.netops.charter.com (71.46.8.55) lag-23.tamp04-carl.netops.charter.com (72.31.117.12) lag-10.tamp20-carl.netops.charter.com (72.31.7.128) lag-15-10.tamsflde20w-bcr00.netops.charter.com (66.109.6.96) lag-17.hstqtx0209w-bcr00.netops.charter.com (66.109.1.70) lag-412.dllstx976iw-bcr00.netops.charter.com (66.109.6.90) lag-12.tustca4200w-bcr00.netops.charter.com (66.109.6.0) 579.00 ms lag-14.1sancarc0yw-bcr00.netops.charter.com (66.109.6.4) lag-12.snjucac167w-bcr00.netops.charter.com (66.109.6.6) lag-0.pr1.sjc10.netops.charter.com (66.109.5.133) 78.00 ms 024-030-201-057.inf.spectrum.com (24.30.201.57) 121.00 ms a23-203-158-51.deploy.static.akamaitechnologies.com (23.203.158.51) 77.00 ms scanme.nmap.org (45.33.32.156) NSE: Script Post-scanning. Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Read data files from: C:\Program Files (x86)\Nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ Nmap done: 1 IP address (1 host up) scanned in 21.48 seconds Raw packets sent: 1057 (48.028KB) | Rcvd: 4264 (210.835KB) Profile: Intense scan
Zenmap Scan Tools Profile Help Target: scanme.nmap.org Command: nmap -T4 -A -v scanme.nmap.org Hosts Services Nmap Output Ports/Hosts Topology Host Details Scans OS Host scanme.nmap.or nmap - T4-A -v scanme.nmap.org Host is up (0.10s latency). Not shown: 996 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh | ssh-hostkey: | VERSION OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0) 1024 ac:00:a0:1a:82:ff:cc:55:99:dc:67:2b:34:97:6b:75 (DSA) 2048 20:3d:2d: 44:62:2a:b0:5a: 9d: b5:b3:05:14:c2:a6:b2 (RSA) 256 96:02:bb:5e:57:54:1c:4e:45:2f:56:4c:4a:24:b2:57 (ECDSA) 256 33:fa:91:0f:e0:el:7b:lf: 6d:05:a2:b0:f1:54:41:56 (ED25519) 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) |_http-favicon: Nmap Project | http-title: Go ahead and ScanMe! |_http-server-header: Apache/2.4.7 (Ubuntu) http-methods: Supported Methods: GET HEAD POST OPTIONS 9929/tcp open nping-echo Nping echo 31337/tcp open tcpwrapped Device type: general purpose Running: Linux 5.X OS CPE: cpe:/o: linux: linux_kernel:5 OS details: Linux 5.0 - 5.4 Uptime quess: 13.060 days (since Wed Mar 6 21:26:10 2024) Network Distance: 18 hops TCP Sequence Prediction: Difficulty=249 (Good luck!) IP ID Sequence Generation: All zeros Service Info: 05: Linux; CPE: cpe:/o:linux: linux_kernel TRACEROUTE (using port 1723/tcp) HOP RTT 1 2.00 ms 2 14.00 ms 3 16.00 ms 4 16.00 ms 5 19.00 ms 6 20.00 ms 7 83.00 ms 8 86.00 ms 9 85.00 ms 10 11 86.00 ms 12 82.00 ms 13 14 15 ... 17 18 ADDRESS Linksys02559 (192.168.1.1)|| 072-031-129-145.res.spectrum.com (72.31.129.145) int-0-7-1-6.tamp04-serl.netops.charter.com (71.46.8.55) lag-23.tamp04-carl.netops.charter.com (72.31.117.12) lag-10.tamp20-carl.netops.charter.com (72.31.7.128) lag-15-10.tamsflde20w-bcr00.netops.charter.com (66.109.6.96) lag-17.hstqtx0209w-bcr00.netops.charter.com (66.109.1.70) lag-412.dllstx976iw-bcr00.netops.charter.com (66.109.6.90) lag-12.tustca4200w-bcr00.netops.charter.com (66.109.6.0) 579.00 ms lag-14.1sancarc0yw-bcr00.netops.charter.com (66.109.6.4) lag-12.snjucac167w-bcr00.netops.charter.com (66.109.6.6) lag-0.pr1.sjc10.netops.charter.com (66.109.5.133) 78.00 ms 024-030-201-057.inf.spectrum.com (24.30.201.57) 121.00 ms a23-203-158-51.deploy.static.akamaitechnologies.com (23.203.158.51) 77.00 ms scanme.nmap.org (45.33.32.156) NSE: Script Post-scanning. Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Read data files from: C:\Program Files (x86)\Nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ Nmap done: 1 IP address (1 host up) scanned in 21.48 seconds Raw packets sent: 1057 (48.028KB) | Rcvd: 4264 (210.835KB) Profile: Intense scan
Related questions
Question
What do these ports represent, what is their function? Are there ports open that could be closed (specify and explain your answer)?
AI-Generated Solution
AI-generated content may present inaccurate or offensive content that does not represent bartleby’s views.
Unlock instant AI solutions
Tap the button
to generate a solution