Zenmap para 192.168.47.1 :
Starting Nmap 7.40 (
https://nmap.org ) at 2017-06-08 13:42 Hora Padrão de Buenos Aires
NSE: Loaded 143 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 13:42
Completed NSE at 13:42, 0.00s elapsed
Initiating NSE at 13:42
Completed NSE at 13:42, 0.00s elapsed
Initiating Ping Scan at 13:42
Scanning 192.168.47.1 [4 ports]
Completed Ping Scan at 13:42, 0.60s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 13:42
Completed Parallel DNS resolution of 1 host. at 13:42, 16.50s elapsed
Initiating SYN Stealth Scan at 13:42
Scanning 192.168.47.1 [1000 ports]
Discovered open port 1723/tcp on 192.168.47.1
Discovered open port 8081/tcp on 192.168.47.1
Discovered open port 8291/tcp on 192.168.47.1
Discovered open port 2000/tcp on 192.168.47.1
Completed SYN Stealth Scan at 13:42, 0.38s elapsed (1000 total ports)
Initiating Service scan at 13:42
Scanning 4 services on 192.168.47.1
Completed Service scan at 13:44, 126.05s elapsed (4 services on 1 host)
Initiating OS detection (try #1) against 192.168.47.1
Retrying OS detection (try #2) against 192.168.47.1
Initiating Traceroute at 13:44
Completed Traceroute at 13:44, 0.02s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 13:44
Completed Parallel DNS resolution of 2 hosts. at 13:45, 16.51s elapsed
NSE: Script scanning 192.168.47.1.
Initiating NSE at 13:45
Completed NSE at 13:45, 0.17s elapsed
Initiating NSE at 13:45
Completed NSE at 13:45, 0.00s elapsed
Nmap scan report for 192.168.47.1
Host is up (0.0033s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
1723/tcp open pptp MikroTik (Firmware: 1)
2000/tcp open bandwidth-test MikroTik bandwidth-test server
8081/tcp open http MikroTik router config httpd
| http-methods:
|_ Supported Methods: GET HEAD
| http-robots.txt: 1 disallowed entry
|_/
|_http-title: RouterOS router configuration page
8291/tcp open winbox MikroTik WinBox
Device type: general purpose|firewall|media device|broadband router
Running (JUST GUESSING): Linux 2.6.X|3.X (88%), IPCop 2.X|1.X (88%), Tiandy embedded (87%), D-Link embedded (85%), IPFire 2.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:ipcop:ipcop:2.0 cpe:/o:linux:linux_kernel:3.2 cpe:/h:dlink:dsl-2890al cpe:/o:linux:linux_kernel:2.6.25.20 cpe:/o:ipcop:ipcop:1.9.19 cpe:/o:ipfire:ipfire:2.9
Aggressive OS guesses: IPCop 2.0 (Linux 2.6.32) (88%), Linux 2.6.32 (88%), Linux 3.2 (88%), Tiandy NVR (87%), D-Link DSL-2890AL ADSL router (85%), OpenWrt Kamikaze 8.09 (Linux 2.6.25.20) (85%), IPCop 1.9.19 or IPFire 2.9 firewall (Linux 2.6.32) (85%), Linux 2.6.36 (85%), Linux 3.2.1 (85%), Linux 3.18 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=258 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: 10097-T1_1; OS: RouterOS; Device: router; CPE: cpe:/o:mikrotik:routeros
TRACEROUTE (using port 23/tcp)
HOP RTT ADDRESS
1 1.00 ms 192.168.1.1
2 1.00 ms 192.168.47.1
NSE: Script Post-scanning.
Initiating NSE at 13:45
Completed NSE at 13:45, 0.00s elapsed
Initiating NSE at 13:45
Completed NSE at 13:45, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 168.46 seconds
Raw packets sent: 1081 (51.144KB) | Rcvd: 1051 (45.504KB)
Zenmap para 192.168.100.245
Starting Nmap 7.40 (
https://nmap.org ) at 2017-06-08 13:47 Hora Padrão de Buenos Aires
NSE: Loaded 143 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 13:47
Completed NSE at 13:47, 0.00s elapsed
Initiating NSE at 13:47
Completed NSE at 13:47, 0.00s elapsed
Initiating Ping Scan at 13:47
Scanning 192.168.100.245 [4 ports]
Completed Ping Scan at 13:47, 0.55s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 13:47
Completed Parallel DNS resolution of 1 host. at 13:47, 16.50s elapsed
Initiating SYN Stealth Scan at 13:47
Scanning 192.168.100.245 [1000 ports]
Completed SYN Stealth Scan at 13:47, 21.45s elapsed (1000 total ports)
Initiating Service scan at 13:47
Initiating OS detection (try #1) against 192.168.100.245
Retrying OS detection (try #2) against 192.168.100.245
Initiating Traceroute at 13:47
Completed Traceroute at 13:47, 0.02s elapsed
Initiating Parallel DNS resolution of 1 host. at 13:47
Completed Parallel DNS resolution of 1 host. at 13:48, 16.50s elapsed
NSE: Script scanning 192.168.100.245.
Initiating NSE at 13:48
Completed NSE at 13:48, 0.00s elapsed
Initiating NSE at 13:48
Completed NSE at 13:48, 0.00s elapsed
Nmap scan report for 192.168.100.245
Host is up (0.0024s latency).
All 1000 scanned ports on 192.168.100.245 are filtered
Too many fingerprints match this host to give specific OS details
Network Distance: 1 hop
TRACEROUTE (using proto 1/icmp)
HOP RTT ADDRESS
1 0.00 ms 192.168.100.245
NSE: Script Post-scanning.
Initiating NSE at 13:48
Completed NSE at 13:48, 0.00s elapsed
Initiating NSE at 13:48
Completed NSE at 13:48, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 61.21 seconds
Raw packets sent: 2047 (93.024KB) | Rcvd: 16 (1.083KB)