Hawk**********

Spread the love

DALL·E-2025-01-16-09.12.19-A-futuristic-cyberpunk-styled-screen-displaying-the-output-of-an-Nmap-network-scan.-The-text-is-styled-in-glowing-vaporwave-colors-like-neon-pink-pu.webp

sudo nmap -p- -v -A hawk**********

Password:

Starting Nmap 7.95 ( https://nmap.org ) at 2025-01-16 09:01 CST

NSE: Loaded 157 scripts for scanning.

NSE: Script Pre-scanning.

Initiating NSE at 09:01

Completed NSE at 09:01, 0.00s elapsed

Initiating NSE at 09:01

Completed NSE at 09:01, 0.00s elapsed

Initiating NSE at 09:01

Completed NSE at 09:01, 0.00s elapsed

Initiating Ping Scan at 09:01

Scanning hawk-brook.com (185.230.63.171) [4 ports]

Completed Ping Scan at 09:01, 0.06s elapsed (1 total hosts)

Initiating Parallel DNS resolution of 1 host. at 09:01

Completed Parallel DNS resolution of 1 host. at 09:01, 0.22s elapsed

Initiating SYN Stealth Scan at 09:01

Scanning hawk-brook.com (185.230.63.171) [65535 ports]

Discovered open port 443/tcp on 185.230.63.171

Discovered open port 445/tcp on 185.230.63.171

Discovered open port 80/tcp on 185.230.63.171

SYN Stealth Scan Timing: About 16.79% done; ETC: 09:04 (0:02:34 remaining)

SYN Stealth Scan Timing: About 25.44% done; ETC: 09:05 (0:02:59 remaining)

SYN Stealth Scan Timing: About 36.54% done; ETC: 09:05 (0:02:38 remaining)

SYN Stealth Scan Timing: About 46.35% done; ETC: 09:05 (0:02:20 remaining)

SYN Stealth Scan Timing: About 57.28% done; ETC: 09:05 (0:01:53 remaining)

Discovered open port 82/tcp on 185.230.63.171

SYN Stealth Scan Timing: About 67.37% done; ETC: 09:05 (0:01:28 remaining)

SYN Stealth Scan Timing: About 76.85% done; ETC: 09:05 (0:01:04 remaining)

SYN Stealth Scan Timing: About 83.47% done; ETC: 09:06 (0:00:49 remaining)

SYN Stealth Scan Timing: About 89.26% done; ETC: 09:06 (0:00:36 remaining)

SYN Stealth Scan Timing: About 90.32% done; ETC: 09:07 (0:00:37 remaining)

adjust_timeouts2: packet supposedly had rtt of 35598464 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of 35598464 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of 11997279 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of 11997279 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of 11991964 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of 11991964 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of 11994515 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of 11994515 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of 11993111 microseconds.  Ignoring time.

adjust_timeouts2: packet supposedly had rtt of 11993111 microseconds.  Ignoring time.

Completed SYN Stealth Scan at 09:07, 363.54s elapsed (65535 total ports)

Initiating Service scan at 09:07

Scanning 4 services on hawk-brook.com (185.230.63.171)

Service scan Timing: About 75.00% done; ETC: 09:10 (0:00:42 remaining)

Completed Service scan at 09:09, 139.11s elapsed (4 services on 1 host)

Initiating OS detection (try #1) against hawk-brook.com (185.230.63.171)

Retrying OS detection (try #2) against hawk-brook.com (185.230.63.171)

NSE: Script scanning 185.230.63.171.

Initiating NSE at 09:09

Completed NSE at 09:10, 16.66s elapsed

Initiating NSE at 09:10

Completed NSE at 09:10, 1.16s elapsed

Initiating NSE at 09:10

Completed NSE at 09:10, 0.01s elapsed

Nmap scan report for hawk-brook.com (185.230.63.171)

Host is up (0.058s latency).

Other addresses for hawk-brook.com (not scanned): 185.230.63.107 185.230.63.186

rDNS record for 185.230.63.171: unalocated.63.wixsite.com

Not shown: 65531 closed tcp ports (reset)

PORT    STATE SERVICE       VERSION

80/tcp  open  http

|_http-title: Site doesn’t have a title.

| fingerprint-strings:

|   FourOhFourRequest, GetRequest, RTSPRequest:

|     HTTP/1.0 403 Forbidden

|     X-Seen-By: AHc3TXLcXOul+t9LIbGg9ciHE4dbw+wewoJ5nvKoyjE=

|     Connection: close

|     Content-Length: 0

|   HTTPOptions:

|     HTTP/1.0 403 Forbidden

|     X-Seen-By: jKB0KR2wTEE1MYSdxvKSbciHE4dbw+wewoJ5nvKoyjE=

|     Connection: close

|     Content-Length: 0

|   TerminalServerCookie:

|     HTTP/1.0 403 Forbidden

|     X-Seen-By: VtqAe8Wu9wvSsl49B/X4+ewfbs+7qUVAqsIx00yI78k=

|     Connection: close

|_    Content-Length: 0

82/tcp  open  xfer?

443/tcp open  ssl/https     Pepyaka

|_http-title: Site doesn’t have a title.

| ssl-cert: Subject: commonName=hawk-brook.com

| Subject Alternative Name: DNS:hawk-brook.com, DNS:www.hawk-brook.com

| Issuer: commonName=R11/organizationName=Let’s Encrypt/countryName=US

| Public Key type: rsa

| Public Key bits: 2048

| Signature Algorithm: sha256WithRSAEncryption

| Not valid before: 2024-11-26T20:54:33

| Not valid after:  2025-02-24T20:54:32

| MD5:   ef2c:e84a:e5b7:c681:990c:dd66:a35d:ee94

|_SHA-1: 1290:57dd:3f24:973c:9754:40a4:f20c:c199:4c07:a10f

|_http-server-header: Pepyaka

| fingerprint-strings:

|   FourOhFourRequest, RTSPRequest, SIPOptions:

|     HTTP/1.0 403 Forbidden

|     X-Seen-By: pmHZlB45NPy7b1VBAukQrewfbs+7qUVAqsIx00yI78k=

|     Connection: close

|     Content-Length: 0

|   GetRequest, TerminalServerCookie:

|     HTTP/1.0 403 Forbidden

|     X-Seen-By: VtqAe8Wu9wvSsl49B/X4+ewfbs+7qUVAqsIx00yI78k=

|     Connection: close

|     Content-Length: 0

|   HTTPOptions:

|     HTTP/1.0 403 Forbidden

|     X-Seen-By: AHc3TXLcXOul+t9LIbGg9ciHE4dbw+wewoJ5nvKoyjE=

|     Connection: close

|_    Content-Length: 0

445/tcp open  microsoft-ds?

2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :

==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============

SF-Port80-TCP:V=7.95%I=7%D=1/16%Time=678920B4%P=arm-apple-darwin24.1.0%r(G

SF:etRequest,79,”HTTP/1.0x20403x20ForbiddenrnX-Seen-By:x20AHc3TXLcXO

SF:ul+t9LIbGg9ciHE4dbw+wewoJ5nvKoyjE=rnConnection:x20closernContent

SF:-Length:x200rnrn”)%r(HTTPOptions,79,”HTTP/1.0x20403x20Forbidden

SF:rnX-Seen-By:x20jKB0KR2wTEE1MYSdxvKSbciHE4dbw+wewoJ5nvKoyjE=rnConn

SF:ection:x20closernContent-Length:x200rnrn”)%r(RTSPRequest,79,”HT

SF:TP/1.0x20403x20ForbiddenrnX-Seen-By:x20AHc3TXLcXOul+t9LIbGg9ciHE

SF:4dbw+wewoJ5nvKoyjE=rnConnection:x20closernContent-Length:x200r

SF:nrn”)%r(FourOhFourRequest,79,”HTTP/1.0x20403x20ForbiddenrnX-Seen

SF:-By:x20AHc3TXLcXOul+t9LIbGg9ciHE4dbw+wewoJ5nvKoyjE=rnConnection:x

SF:20closernContent-Length:x200rnrn”)%r(TerminalServerCookie,79,”HT

SF:TP/1.0x20403x20ForbiddenrnX-Seen-By:x20VtqAe8Wu9wvSsl49B/X4+ewfb

SF:s+7qUVAqsIx00yI78k=rnConnection:x20closernContent-Length:x200r

SF:nrn”);

==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============

SF-Port443-TCP:V=7.95%T=SSL%I=7%D=1/16%Time=678920BA%P=arm-apple-darwin24.

SF:1.0%r(GetRequest,79,”HTTP/1.0x20403x20ForbiddenrnX-Seen-By:x20Vtq

SF:Ae8Wu9wvSsl49B/X4+ewfbs+7qUVAqsIx00yI78k=rnConnection:x20closern

SF:Content-Length:x200rnrn”)%r(HTTPOptions,79,”HTTP/1.0x20403x20Fo

SF:rbiddenrnX-Seen-By:x20AHc3TXLcXOul+t9LIbGg9ciHE4dbw+wewoJ5nvKoyjE=

SF:rnConnection:x20closernContent-Length:x200rnrn”)%r(FourOhFour

SF:Request,79,”HTTP/1.0x20403x20ForbiddenrnX-Seen-By:x20pmHZlB45NPy7

SF:b1VBAukQrewfbs+7qUVAqsIx00yI78k=rnConnection:x20closernContent-Le

SF:ngth:x200rnrn”)%r(RTSPRequest,79,”HTTP/1.0x20403x20Forbiddenr

SF:nX-Seen-By:x20pmHZlB45NPy7b1VBAukQrewfbs+7qUVAqsIx00yI78k=rnConnect

SF:ion:x20closernContent-Length:x200rnrn”)%r(TerminalServerCookie,

SF:79,”HTTP/1.0x20403x20ForbiddenrnX-Seen-By:x20VtqAe8Wu9wvSsl49B/X4

SF:+ewfbs+7qUVAqsIx00yI78k=rnConnection:x20closernContent-Length:x

SF:200rnrn”)%r(SIPOptions,79,”HTTP/1.0x20403x20ForbiddenrnX-Seen-

SF:By:x20pmHZlB45NPy7b1VBAukQrewfbs+7qUVAqsIx00yI78k=rnConnection:x20

SF:closernContent-Length:x200rnrn”);

Device type: load balancer|firewall

Running (JUST GUESSING): F5 Networks TMOS 11.6.X|11.4.X (88%)

OS CPE: cpe:/o:f5:tmos:11.6 cpe:/o:f5:tmos:11.4

Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (88%), F5 BIG-IP AFM firewall (86%)

No exact OS matches for host (test conditions non-ideal).

Uptime guess: 21.683 days (since Wed Dec 25 16:46:27 2024)

Network Distance: 9 hops

TCP Sequence Prediction: Difficulty=255 (Good luck!)

IP ID Sequence Generation: Randomized

Host script results:

|_smb2-time: Protocol negotiation failed (SMB2)

TRACEROUTE

HOP RTT      ADDRESS

1   57.68 ms unalocated.63.wixsite.com (185.230.63.171)

NSE: Script Post-scanning.

Initiating NSE at 09:10

Completed NSE at 09:10, 0.00s elapsed

Initiating NSE at 09:10

Completed NSE at 09:10, 0.00s elapsed

Initiating NSE at 09:10

Completed NSE at 09:10, 0.00s elapsed

Read data files from: /opt/homebrew/bin/../share/nmap

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 525.73 seconds

           Raw packets sent: 65934 (2.903MB) | Rcvd: 65915 (2.638MB)

Email

illphated

URL

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top