Tuesday, August 30, 2022

Masscan Targets Fierce Results

 

<!-- masscan v1.0 scan -->
<nmaprun scanner="masscan" start="1661842484" version="1.0-BETA" xmloutputversion="1.03">
<scaninfo type="syn" protocol="tcp"/>
<host endtime="1661842484">
<address addr="23.221.222.251" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="80">
<state state="open" reason="syn-ack" reason_ttl="46"/>
</port>
</ports>
</host>
<host endtime="1661842514">
<address addr="23.221.222.251" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="80">
<state state="open" reason="response" reason_ttl="46"/>
<service name="http" banner="HTTP/1.0 200 OK\x0d\x0aX-Correlation-Id: aaaaaaaa\x0d\x0aDate: Tue, 30 Aug 2022 06:54:46 GMT\x0d\x0aContent-Length: 0\x0d\x0a\x0d"/>
</port>
</ports>
</host>
<host endtime="1661842811">
<address addr="23.221.222.4" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="22">
<state state="open" reason="syn-ack" reason_ttl="48"/>
</port>
</ports>
</host>
<host endtime="1661842817">
<address addr="23.221.222.4" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="22">
<state state="open" reason="response" reason_ttl="48"/>
<service name="ssh" banner="SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.7"/>
</port>
</ports>
</host>
<host endtime="1661843283">
<address addr="23.221.222.253" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="80">
<state state="open" reason="syn-ack" reason_ttl="48"/>
</port>
</ports>
</host>
<host endtime="1661843313">
<address addr="23.221.222.253" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="80">
<state state="open" reason="response" reason_ttl="48"/>
<service name="http" banner="HTTP/1.0 200 OK\x0d\x0aX-Correlation-Id: aaaaaaaa\x0d\x0aDate: Tue, 30 Aug 2022 07:08:06 GMT\x0d\x0aContent-Length: 0\x0d\x0a\x0d"/>
</port>
</ports>
</host>
<host endtime="1661844305">
<address addr="23.221.222.254" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="80">
<state state="open" reason="syn-ack" reason_ttl="48"/>
</port>
</ports>
</host>
<host endtime="1661844336">
<address addr="23.221.222.254" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="80">
<state state="open" reason="response" reason_ttl="48"/>
<service name="http" banner="HTTP/1.0 200 OK\x0d\x0aX-Correlation-Id: aaaaaaaa\x0d\x0aDate: Tue, 30 Aug 2022 07:25:08 GMT\x0d\x0aContent-Length: 0\x0d\x0a\x0d"/>
</port>
</ports>
</host>
<host endtime="1661844495">
<address addr="23.221.222.250" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="80">
<state state="open" reason="syn-ack" reason_ttl="48"/>
</port>
</ports>
</host>
<host endtime="1661844526">
<address addr="23.221.222.250" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="80">
<state state="open" reason="response" reason_ttl="48"/>
<service name="http" banner="HTTP/1.0 200 OK\x0d\x0aX-Correlation-Id: aaaaaaaa\x0d\x0aDate: Tue, 30 Aug 2022 07:28:18 GMT\x0d\x0aContent-Length: 0\x0d\x0a\x0d"/>
</port>
</ports>
</host>
<host endtime="1661844593">
<address addr="23.221.222.5" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="22">
<state state="open" reason="syn-ack" reason_ttl="48"/>
</port>
</ports>
</host>
<host endtime="1661844599">
<address addr="23.221.222.5" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="22">
<state state="open" reason="response" reason_ttl="48"/>
<service name="ssh" banner="SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.7"/>
</port>
</ports>
</host>
<host endtime="1661844787">
<address addr="23.221.222.252" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="80">
<state state="open" reason="syn-ack" reason_ttl="48"/>
</port>
</ports>
</host>
<host endtime="1661844818">
<address addr="23.221.222.252" addrtype="ipv4"/>
<ports>
<port protocol="tcp" portid="80">
<state state="open" reason="response" reason_ttl="48"/>
<service name="http" banner="HTTP/1.0 200 OK\x0d\x0aX-Correlation-Id: aaaaaaaa\x0d\x0aDate: Tue, 30 Aug 2022 07:33:09 GMT\x0d\x0aContent-Length: 0\x0d\x0a\x0d"/>
</port>
</ports>
</host>
<runstats>
<finished time="1661844984" timestr="2022-08-30 02:36:24" elapsed="2578"/>
<hosts up="7" down="0" total="7"/>
</runstats>
</nmaprun>

 

 

 

# Nmap 7.92 scan initiated Tue Aug 30 00:55:28 2022 as: nmap -vv -iR 500 --open -oN /home/g0d/docs/randscan
Nmap scan report for a104-118-174-68.deploy.static.akamaitechnologies.com (104.118.174.68)
Host is up, received echo-reply ttl 49 (0.26s latency).
Scanned at 2022-08-30 00:56:05 CDT for 950s
Not shown: 998 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE REASON
80/tcp  open  http    syn-ack ttl 49
443/tcp open  https   syn-ack ttl 49

Nmap scan report for customer-082-139-072-144.solcon.nl (82.139.72.144)
Host is up, received echo-reply ttl 45 (0.15s latency).
Scanned at 2022-08-30 00:56:05 CDT for 905s
Not shown: 801 filtered tcp ports (admin-prohibited), 194 filtered tcp ports (no-response), 2 closed tcp ports (reset)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE REASON
443/tcp  open  https   syn-ack ttl 45
5060/tcp open  sip     syn-ack ttl 45
8089/tcp open  unknown syn-ack ttl 45

Nmap scan report for p4ff47ef5.dip0.t-ipconnect.de (79.244.126.245)
Host is up, received echo-reply ttl 50 (0.20s latency).
Scanned at 2022-08-30 00:56:05 CDT for 915s
Not shown: 774 filtered tcp ports (admin-prohibited), 222 filtered tcp ports (no-response), 2 closed tcp ports (reset)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE REASON
5060/tcp open  sip     syn-ack ttl 50
8089/tcp open  unknown syn-ack ttl 50

Nmap scan report for 192.229.211.138
Host is up, received echo-reply ttl 56 (0.032s latency).
Scanned at 2022-08-30 00:56:06 CDT for 961s
Not shown: 996 filtered tcp ports (no-response), 2 closed tcp ports (reset)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE REASON
80/tcp  open  http    syn-ack ttl 56
443/tcp open  https   syn-ack ttl 56

Nmap scan report for modemcable179.10-81-70.mc.videotron.ca (70.81.10.179)
Host is up, received syn-ack ttl 47 (0.092s latency).
Scanned at 2022-08-30 00:56:06 CDT for 939s
Not shown: 998 filtered tcp ports (no-response), 1 closed tcp port (reset)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack ttl 47

Nmap scan report for a23-202-74-100.deploy.static.akamaitechnologies.com (23.202.74.100)
Host is up, received echo-reply ttl 53 (0.063s latency).
Scanned at 2022-08-30 00:56:05 CDT for 962s
Not shown: 998 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE REASON
80/tcp  open  http    syn-ack ttl 53
443/tcp open  https   syn-ack ttl 53

Nmap scan report for a72-247-171-81.deploy.static.akamaitechnologies.com (72.247.171.81)
Host is up, received echo-reply ttl 52 (0.064s latency).
Scanned at 2022-08-30 00:56:05 CDT for 955s
Not shown: 998 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE REASON
80/tcp  open  http    syn-ack ttl 52
443/tcp open  https   syn-ack ttl 52

Nmap scan report for dslb-092-077-238-107.092.077.pools.vodafone-ip.de (92.77.238.107)
Host is up, received echo-reply ttl 43 (0.17s latency).
Scanned at 2022-08-30 00:56:05 CDT for 945s
Not shown: 782 filtered tcp ports (admin-prohibited), 215 filtered tcp ports (no-response), 2 closed tcp ports (reset)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE REASON
5060/tcp open  sip     syn-ack ttl 43

Nmap scan report for ip206.ip-51-79-136.net (51.79.136.206)
Host is up, received echo-reply ttl 41 (0.24s latency).
Scanned at 2022-08-30 00:56:05 CDT for 952s
Not shown: 994 closed tcp ports (reset), 4 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE REASON
22/tcp  open  ssh     syn-ack ttl 41
111/tcp open  rpcbind syn-ack ttl 41

Nmap scan report for 88.133.17.165
Host is up, received echo-reply ttl 43 (0.18s latency).
Scanned at 2022-08-30 00:56:05 CDT for 927s
Not shown: 792 filtered tcp ports (admin-prohibited), 203 filtered tcp ports (no-response), 3 closed tcp ports (reset)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE REASON
443/tcp  open  https   syn-ack ttl 43
5060/tcp open  sip     syn-ack ttl 43

Nmap scan report for 183.115.133.147
Host is up, received echo-reply ttl 40 (0.20s latency).
Scanned at 2022-08-30 00:56:05 CDT for 926s
Not shown: 985 closed tcp ports (reset), 14 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE  REASON
1717/tcp open  fj-hdnet syn-ack ttl 39

Nmap scan report for 223-30-0-0.lan.sify.net (223.30.188.76)
Host is up, received syn-ack ttl 236 (0.31s latency).
Scanned at 2022-08-30 00:56:06 CDT for 961s
Not shown: 993 closed tcp ports (reset), 6 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack ttl 236

Nmap scan report for 104.252.169.15
Host is up, received echo-reply ttl 49 (0.071s latency).
Scanned at 2022-08-30 00:56:04 CDT for 959s
Not shown: 856 filtered tcp ports (host-prohibited), 140 filtered tcp ports (no-response), 3 closed tcp ports (reset)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT      STATE SERVICE REASON
20221/tcp open  unknown syn-ack ttl 49

Nmap scan report for ip40.ip-141-94-56.eu (141.94.56.40)
Host is up, received echo-reply ttl 41 (0.15s latency).
Scanned at 2022-08-30 00:56:04 CDT for 958s
Not shown: 993 closed tcp ports (reset), 4 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE   REASON
80/tcp   open  http      syn-ack ttl 41
443/tcp  open  https     syn-ack ttl 41
9100/tcp open  jetdirect syn-ack ttl 41

Read data files from: /usr/bin/../share/nmap
# Nmap done at Tue Aug 30 01:12:10 2022 -- 500 IP addresses (48 hosts up) scanned in 1001.92 seconds

 

23.221.222.1
23.221.222.2
23.221.222.3
23.221.222.4
23.221.222.5
23.221.222.6
23.221.222.7
23.221.222.8
23.221.222.9
23.221.222.10
23.221.222.11
23.221.222.12
23.221.222.13
23.221.222.14
23.221.222.15
23.221.222.16
23.221.222.17
23.221.222.18
23.221.222.19
23.221.222.20
23.221.222.250
23.221.222.251
23.221.222.252
23.221.222.253
23.221.222.254%                                                                                                                                   g0d➜~/docs»      

No comments:

Post a Comment

Current Project

Short History of the CCP Cyber

    Whether this is due to their naivety, thinking the state will cover their activities, or their inability to understand that the Great Fi...