nmap
___
( _ ) _ __ ___ __ _ _ __
/ _ \| '_ ` _ \ / _` | '_ \
| (_) | | | | | | (_| | |_) |
\___/|_| |_| |_|\__,_| .__/
|_|
adot8 <3
[+] Scanning 10.10.10.180 [65535 TCP ports]
[+] Enumerating 10.10.10.180 [21,80,111,135,139,445,2049,5985,47001,49664,49665,49666,49667,49678,49679,49680]
Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-24 05:13 CST
Nmap scan report for 10.10.10.180
Host is up (0.045s latency).
PORT STATE SERVICE VERSION
21/tcp open ftp Microsoft ftpd
| ftp-syst:
|_ SYST: Windows_NT
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)
80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Home - Acme Widgets
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/tcp6 rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 2,3,4 111/udp6 rpcbind
| 100003 2,3 2049/udp nfs
| 100003 2,3 2049/udp6 nfs
| 100003 2,3,4 2049/tcp nfs
| 100003 2,3,4 2049/tcp6 nfs
| 100005 1,2,3 2049/tcp mountd
| 100005 1,2,3 2049/tcp6 mountd
| 100005 1,2,3 2049/udp mountd
| 100005 1,2,3 2049/udp6 mountd
| 100021 1,2,3,4 2049/tcp nlockmgr
| 100021 1,2,3,4 2049/tcp6 nlockmgr
| 100021 1,2,3,4 2049/udp nlockmgr
| 100021 1,2,3,4 2049/udp6 nlockmgr
| 100024 1 2049/tcp status
| 100024 1 2049/tcp6 status
| 100024 1 2049/udp status
|_ 100024 1 2049/udp6 status
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds?
2049/tcp open nlockmgr 1-4 (RPC #100021)
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
49664/tcp open msrpc Microsoft Windows RPC
49665/tcp open msrpc Microsoft Windows RPC
49666/tcp open msrpc Microsoft Windows RPC
49667/tcp open msrpc Microsoft Windows RPC
49678/tcp open msrpc Microsoft Windows RPC
49679/tcp open msrpc Microsoft Windows RPC
49680/tcp open msrpc Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: 59m59s
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled but not required
| smb2-time:
| date: 2025-02-24T12:14:00
|_ start_date: N/A
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 92.33 seconds
[+] Scanning 10.10.10.180 [1000 UDP ports]
Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-24 05:14 CST
Initiating Ping Scan at 05:14
Scanning 10.10.10.180 [4 ports]
Completed Ping Scan at 05:14, 0.07s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 05:14
Completed Parallel DNS resolution of 1 host. at 05:14, 0.03s elapsed
Initiating UDP Scan at 05:14
Scanning 10.10.10.180 [100 ports]
Increasing send delay for 10.10.10.180 from 0 to 50 due to max_successful_tryno increase to 4
Increasing send delay for 10.10.10.180 from 50 to 100 due to max_successful_tryno increase to 5
Increasing send delay for 10.10.10.180 from 100 to 200 due to max_successful_tryno increase to 6
Increasing send delay for 10.10.10.180 from 200 to 400 due to max_successful_tryno increase to 7
Increasing send delay for 10.10.10.180 from 400 to 800 due to max_successful_tryno increase to 8
UDP Scan Timing: About 26.10% done; ETC: 05:16 (0:01:28 remaining)
Increasing send delay for 10.10.10.180 from 800 to 1000 due to 11 out of 21 dropped probes since last increase.
Discovered open port 111/udp on 10.10.10.180
UDP Scan Timing: About 57.50% done; ETC: 05:17 (0:01:09 remaining)
Discovered open port 2049/udp on 10.10.10.180
Completed UDP Scan at 05:17, 160.94s elapsed (100 total ports)
Nmap scan report for 10.10.10.180
Host is up (0.046s latency).
Not shown: 92 closed udp ports (port-unreach)
PORT STATE SERVICE
111/udp open rpcbind
123/udp open|filtered ntp
137/udp open|filtered netbios-ns
138/udp open|filtered netbios-dgm
500/udp open|filtered isakmp
2049/udp open nfs
4500/udp open|filtered nat-t-ike
5353/udp open|filtered zeroconf
Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 161.19 seconds
Raw packets sent: 332 (22.824KB) | Rcvd: 320 (44.315KB)
[+] Completed!
Last updated
Was this helpful?