sudo nmap -p- -v -A hawk**********
Password:
Starting Nmap 7.95 ( https://nmap.org ) at 2025-01-16 09:01 CST
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 09:01
Completed NSE at 09:01, 0.00s elapsed
Initiating NSE at 09:01
Completed NSE at 09:01, 0.00s elapsed
Initiating NSE at 09:01
Completed NSE at 09:01, 0.00s elapsed
Initiating Ping Scan at 09:01
Scanning hawk-brook.com (185.230.63.171) [4 ports]
Completed Ping Scan at 09:01, 0.06s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 09:01
Completed Parallel DNS resolution of 1 host. at 09:01, 0.22s elapsed
Initiating SYN Stealth Scan at 09:01
Scanning hawk-brook.com (185.230.63.171) [65535 ports]
Discovered open port 443/tcp on 185.230.63.171
Discovered open port 445/tcp on 185.230.63.171
Discovered open port 80/tcp on 185.230.63.171
SYN Stealth Scan Timing: About 16.79% done; ETC: 09:04 (0:02:34 remaining)
SYN Stealth Scan Timing: About 25.44% done; ETC: 09:05 (0:02:59 remaining)
SYN Stealth Scan Timing: About 36.54% done; ETC: 09:05 (0:02:38 remaining)
SYN Stealth Scan Timing: About 46.35% done; ETC: 09:05 (0:02:20 remaining)
SYN Stealth Scan Timing: About 57.28% done; ETC: 09:05 (0:01:53 remaining)
Discovered open port 82/tcp on 185.230.63.171
SYN Stealth Scan Timing: About 67.37% done; ETC: 09:05 (0:01:28 remaining)
SYN Stealth Scan Timing: About 76.85% done; ETC: 09:05 (0:01:04 remaining)
SYN Stealth Scan Timing: About 83.47% done; ETC: 09:06 (0:00:49 remaining)
SYN Stealth Scan Timing: About 89.26% done; ETC: 09:06 (0:00:36 remaining)
SYN Stealth Scan Timing: About 90.32% done; ETC: 09:07 (0:00:37 remaining)
adjust_timeouts2: packet supposedly had rtt of 35598464 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 35598464 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 11997279 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 11997279 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 11991964 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 11991964 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 11994515 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 11994515 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 11993111 microseconds. Ignoring time.
adjust_timeouts2: packet supposedly had rtt of 11993111 microseconds. Ignoring time.
Completed SYN Stealth Scan at 09:07, 363.54s elapsed (65535 total ports)
Initiating Service scan at 09:07
Scanning 4 services on hawk-brook.com (185.230.63.171)
Service scan Timing: About 75.00% done; ETC: 09:10 (0:00:42 remaining)
Completed Service scan at 09:09, 139.11s elapsed (4 services on 1 host)
Initiating OS detection (try #1) against hawk-brook.com (185.230.63.171)
Retrying OS detection (try #2) against hawk-brook.com (185.230.63.171)
NSE: Script scanning 185.230.63.171.
Initiating NSE at 09:09
Completed NSE at 09:10, 16.66s elapsed
Initiating NSE at 09:10
Completed NSE at 09:10, 1.16s elapsed
Initiating NSE at 09:10
Completed NSE at 09:10, 0.01s elapsed
Nmap scan report for hawk-brook.com (185.230.63.171)
Host is up (0.058s latency).
Other addresses for hawk-brook.com (not scanned): 185.230.63.107 185.230.63.186
rDNS record for 185.230.63.171: unalocated.63.wixsite.com
Not shown: 65531 closed tcp ports (reset)
PORT STATE SERVICE VERSION
80/tcp open http
|_http-title: Site doesn’t have a title.
| fingerprint-strings:
| FourOhFourRequest, GetRequest, RTSPRequest:
| HTTP/1.0 403 Forbidden
| X-Seen-By: AHc3TXLcXOul+t9LIbGg9ciHE4dbw+wewoJ5nvKoyjE=
| Connection: close
| Content-Length: 0
| HTTPOptions:
| HTTP/1.0 403 Forbidden
| X-Seen-By: jKB0KR2wTEE1MYSdxvKSbciHE4dbw+wewoJ5nvKoyjE=
| Connection: close
| Content-Length: 0
| TerminalServerCookie:
| HTTP/1.0 403 Forbidden
| X-Seen-By: VtqAe8Wu9wvSsl49B/X4+ewfbs+7qUVAqsIx00yI78k=
| Connection: close
|_ Content-Length: 0
82/tcp open xfer?
443/tcp open ssl/https Pepyaka
|_http-title: Site doesn’t have a title.
| ssl-cert: Subject: commonName=hawk-brook.com
| Subject Alternative Name: DNS:hawk-brook.com, DNS:www.hawk-brook.com
| Issuer: commonName=R11/organizationName=Let’s Encrypt/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2024-11-26T20:54:33
| Not valid after: 2025-02-24T20:54:32
| MD5: ef2c:e84a:e5b7:c681:990c:dd66:a35d:ee94
|_SHA-1: 1290:57dd:3f24:973c:9754:40a4:f20c:c199:4c07:a10f
|_http-server-header: Pepyaka
| fingerprint-strings:
| FourOhFourRequest, RTSPRequest, SIPOptions:
| HTTP/1.0 403 Forbidden
| X-Seen-By: pmHZlB45NPy7b1VBAukQrewfbs+7qUVAqsIx00yI78k=
| Connection: close
| Content-Length: 0
| GetRequest, TerminalServerCookie:
| HTTP/1.0 403 Forbidden
| X-Seen-By: VtqAe8Wu9wvSsl49B/X4+ewfbs+7qUVAqsIx00yI78k=
| Connection: close
| Content-Length: 0
| HTTPOptions:
| HTTP/1.0 403 Forbidden
| X-Seen-By: AHc3TXLcXOul+t9LIbGg9ciHE4dbw+wewoJ5nvKoyjE=
| Connection: close
|_ Content-Length: 0
445/tcp open microsoft-ds?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.95%I=7%D=1/16%Time=678920B4%P=arm-apple-darwin24.1.0%r(G
SF:etRequest,79,”HTTP/1.0x20403x20ForbiddenrnX-Seen-By:x20AHc3TXLcXO
SF:ul+t9LIbGg9ciHE4dbw+wewoJ5nvKoyjE=rnConnection:x20closernContent
SF:-Length:x200rnrn”)%r(HTTPOptions,79,”HTTP/1.0x20403x20Forbidden
SF:rnX-Seen-By:x20jKB0KR2wTEE1MYSdxvKSbciHE4dbw+wewoJ5nvKoyjE=rnConn
SF:ection:x20closernContent-Length:x200rnrn”)%r(RTSPRequest,79,”HT
SF:TP/1.0x20403x20ForbiddenrnX-Seen-By:x20AHc3TXLcXOul+t9LIbGg9ciHE
SF:4dbw+wewoJ5nvKoyjE=rnConnection:x20closernContent-Length:x200r
SF:nrn”)%r(FourOhFourRequest,79,”HTTP/1.0x20403x20ForbiddenrnX-Seen
SF:-By:x20AHc3TXLcXOul+t9LIbGg9ciHE4dbw+wewoJ5nvKoyjE=rnConnection:x
SF:20closernContent-Length:x200rnrn”)%r(TerminalServerCookie,79,”HT
SF:TP/1.0x20403x20ForbiddenrnX-Seen-By:x20VtqAe8Wu9wvSsl49B/X4+ewfb
SF:s+7qUVAqsIx00yI78k=rnConnection:x20closernContent-Length:x200r
SF:nrn”);
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.95%T=SSL%I=7%D=1/16%Time=678920BA%P=arm-apple-darwin24.
SF:1.0%r(GetRequest,79,”HTTP/1.0x20403x20ForbiddenrnX-Seen-By:x20Vtq
SF:Ae8Wu9wvSsl49B/X4+ewfbs+7qUVAqsIx00yI78k=rnConnection:x20closern
SF:Content-Length:x200rnrn”)%r(HTTPOptions,79,”HTTP/1.0x20403x20Fo
SF:rbiddenrnX-Seen-By:x20AHc3TXLcXOul+t9LIbGg9ciHE4dbw+wewoJ5nvKoyjE=
SF:rnConnection:x20closernContent-Length:x200rnrn”)%r(FourOhFour
SF:Request,79,”HTTP/1.0x20403x20ForbiddenrnX-Seen-By:x20pmHZlB45NPy7
SF:b1VBAukQrewfbs+7qUVAqsIx00yI78k=rnConnection:x20closernContent-Le
SF:ngth:x200rnrn”)%r(RTSPRequest,79,”HTTP/1.0x20403x20Forbiddenr
SF:nX-Seen-By:x20pmHZlB45NPy7b1VBAukQrewfbs+7qUVAqsIx00yI78k=rnConnect
SF:ion:x20closernContent-Length:x200rnrn”)%r(TerminalServerCookie,
SF:79,”HTTP/1.0x20403x20ForbiddenrnX-Seen-By:x20VtqAe8Wu9wvSsl49B/X4
SF:+ewfbs+7qUVAqsIx00yI78k=rnConnection:x20closernContent-Length:x
SF:200rnrn”)%r(SIPOptions,79,”HTTP/1.0x20403x20ForbiddenrnX-Seen-
SF:By:x20pmHZlB45NPy7b1VBAukQrewfbs+7qUVAqsIx00yI78k=rnConnection:x20
SF:closernContent-Length:x200rnrn”);
Device type: load balancer|firewall
Running (JUST GUESSING): F5 Networks TMOS 11.6.X|11.4.X (88%)
OS CPE: cpe:/o:f5:tmos:11.6 cpe:/o:f5:tmos:11.4
Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (88%), F5 BIG-IP AFM firewall (86%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 21.683 days (since Wed Dec 25 16:46:27 2024)
Network Distance: 9 hops
TCP Sequence Prediction: Difficulty=255 (Good luck!)
IP ID Sequence Generation: Randomized
Host script results:
|_smb2-time: Protocol negotiation failed (SMB2)
TRACEROUTE
HOP RTT ADDRESS
1 57.68 ms unalocated.63.wixsite.com (185.230.63.171)
NSE: Script Post-scanning.
Initiating NSE at 09:10
Completed NSE at 09:10, 0.00s elapsed
Initiating NSE at 09:10
Completed NSE at 09:10, 0.00s elapsed
Initiating NSE at 09:10
Completed NSE at 09:10, 0.00s elapsed
Read data files from: /opt/homebrew/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 525.73 seconds
Raw packets sent: 65934 (2.903MB) | Rcvd: 65915 (2.638MB)
illphated