Starting Nmap 4.53 ( http://insecure.org ) at 2008-01-25 11:50 W. Europe Standard Time
Initiating ARP Ping Scan at 11:50
Scanning 192.168.2.1 [1 port]
Completed ARP Ping Scan at 11:50, 0.03s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 11:50
Completed Parallel DNS resolution of 1 host. at 11:50, 0.01s elapsed
Initiating SYN Stealth Scan at 11:50
Scanning 192.168.2.1 [1714 ports]
Discovered open port 80/tcp on 192.168.2.1
Discovered open port 21/tcp on 192.168.2.1
Discovered open port 8000/tcp on 192.168.2.1
Completed SYN Stealth Scan at 11:50, 0.98s elapsed (1714 total ports)
Initiating Service scan at 11:50
Scanning 3 services on 192.168.2.1
Completed Service scan at 11:51, 19.38s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against 192.168.2.1
SCRIPT ENGINE: Initiating script scanning.
Initiating SCRIPT ENGINE at 11:51
Completed SCRIPT ENGINE at 11:51, 5.89s elapsed
Host 192.168.2.1 appears to be up ... good.
Interesting ports on 192.168.2.1:
Not shown: 1711 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD
80/tcp open http thttpd 2.21b (PHP 20030920)
|_ HTML title: Samsung Router Web Management
8000/tcp open http-alt?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port8000-TCP:V=4.53%I=7%D=1/25%Time=4799BF0F%P=i686-pc-windows-windows%
SF:r(GenericLines,AF,"HTTP/1\.1\x20401\x20Unauthorized\r\nConnection:\x20c
SF:lose\r\nContent-Length:\x200\r\nWWW-Authenticate:\x20Digest\x20realm=Ig
SF:dAuthentication,\x20domain=\"/\",\x20qop=\"auth\",\x20algorithm=MD5,\x2
SF:0nonce=\"jaxfyxnv8\"\r\n\r\n")%r(GetRequest,AF,"HTTP/1\.1\x20401\x20Una
SF:uthorized\r\nConnection:\x20close\r\nContent-Length:\x200\r\nWWW-Authen
SF:ticate:\x20Digest\x20realm=IgdAuthentication,\x20domain=\"/\",\x20qop=\
SF:"auth\",\x20algorithm=MD5,\x20nonce=\"kpbest5xw\"\r\n\r\n")%r(X11Probe,
SF:AF,"HTTP/1\.1\x20401\x20Unauthorized\r\nConnection:\x20close\r\nContent
SF:-Length:\x200\r\nWWW-Authenticate:\x20Digest\x20realm=IgdAuthentication
SF:,\x20domain=\"/\",\x20qop=\"auth\",\x20algorithm=MD5,\x20nonce=\"ftrcbn
SF:kml\"\r\n\r\n")%r(FourOhFourRequest,AF,"HTTP/1\.1\x20401\x20Unauthorize
SF:d\r\nConnection:\x20close\r\nContent-Length:\x200\r\nWWW-Authenticate:\
SF:x20Digest\x20realm=IgdAuthentication,\x20domain=\"/\",\x20qop=\"auth\",
SF:\x20algorithm=MD5,\x20nonce=\"wbk0xmv7r\"\r\n\r\n")%r(Socks5,AF,"HTTP/1
SF:\.1\x20401\x20Unauthorized\r\nConnection:\x20close\r\nContent-Length:\x
SF:200\r\nWWW-Authenticate:\x20Digest\x20realm=IgdAuthentication,\x20domai
SF:n=\"/\",\x20qop=\"auth\",\x20algorithm=MD5,\x20nonce=\"7ws4u5r5o\"\r\n\
SF:r\n")%r(Socks4,AF,"HTTP/1\.1\x20401\x20Unauthorized\r\nConnection:\x20c
SF:lose\r\nContent-Length:\x200\r\nWWW-Authenticate:\x20Digest\x20realm=Ig
SF:dAuthentication,\x20domain=\"/\",\x20qop=\"auth\",\x20algorithm=MD5,\x2
SF:0nonce=\"x3n84u7lk\"\r\n\r\n")%r(HTTPOptions,AF,"HTTP/1\.1\x20401\x20Un
SF:authorized\r\nConnection:\x20close\r\nContent-Length:\x200\r\nWWW-Authe
SF:nticate:\x20Digest\x20realm=IgdAuthentication,\x20domain=\"/\",\x20qop=
SF:\"auth\",\x20algorithm=MD5,\x20nonce=\"dd5ovikan\"\r\n\r\n")%r(RTSPRequ
SF:est,AF,"HTTP/1\.1\x20401\x20Unauthorized\r\nConnection:\x20close\r\nCon
SF:tent-Length:\x200\r\nWWW-Authenticate:\x20Digest\x20realm=IgdAuthentica
SF:tion,\x20domain=\"/\",\x20qop=\"auth\",\x20algorithm=MD5,\x20nonce=\"xp
SF:9eub3c1\"\r\n\r\n")%r(RPCCheck,AF,"HTTP/1\.1\x20401\x20Unauthorized\r\n
SF:Connection:\x20close\r\nContent-Length:\x200\r\nWWW-Authenticate:\x20Di
SF:gest\x20realm=IgdAuthentication,\x20domain=\"/\",\x20qop=\"auth\",\x20a
SF:lgorithm=MD5,\x20nonce=\"ldt1bim4u\"\r\n\r\n");
MAC Address: 00:16:32:89:E2:92 (Samsung Electronics CO.)
Device type: general purpose
Running: Linux 2.4.X
OS details: Linux 2.4.18 - 2.4.32 (likely embedded)
Uptime: 1.072 days (since Thu Jan 24 10:07:11 2008)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=204 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: C:\Program Files\Nmap
OS and Service detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 28.250 seconds
Raw packets sent: 1737 (78.040KB) | Rcvd: 1730 (79.916KB)