aboutsummaryrefslogtreecommitdiff
path: root/Overpass2Hacked/nmap/first
diff options
context:
space:
mode:
Diffstat (limited to 'Overpass2Hacked/nmap/first')
-rwxr-xr-xOverpass2Hacked/nmap/first20
1 files changed, 20 insertions, 0 deletions
diff --git a/Overpass2Hacked/nmap/first b/Overpass2Hacked/nmap/first
new file mode 100755
index 0000000..48f87c3
--- /dev/null
+++ b/Overpass2Hacked/nmap/first
@@ -0,0 +1,20 @@
+# Nmap 7.80 scan initiated Fri Feb 25 07:48:08 2022 as: nmap -sC -sV -oN nmap/first 10.10.13.215
+Nmap scan report for 10.10.13.215
+Host is up (0.19s latency).
+Not shown: 997 closed ports
+PORT STATE SERVICE VERSION
+22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
+| ssh-hostkey:
+| 2048 e4:3a:be:ed:ff:a7:02:d2:6a:d6:d0:bb:7f:38:5e:cb (RSA)
+| 256 fc:6f:22:c2:13:4f:9c:62:4f:90:c9:3a:7e:77:d6:d4 (ECDSA)
+|_ 256 15:fd:40:0a:65:59:a9:b5:0e:57:1b:23:0a:96:63:05 (ED25519)
+80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
+|_http-server-header: Apache/2.4.29 (Ubuntu)
+|_http-title: LOL Hacked
+2222/tcp open ssh OpenSSH 8.2p1 Debian 4 (protocol 2.0)
+| ssh-hostkey:
+|_ 2048 a2:a6:d2:18:79:e3:b0:20:a2:4f:aa:b6:ac:2e:6b:f2 (RSA)
+Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
+
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+# Nmap done at Fri Feb 25 07:49:16 2022 -- 1 IP address (1 host up) scanned in 68.23 seconds