個人情報流出サイト情報きぼーん!!

このエントリーをはてなブックマークに追加
俺のサーバーだ、
オマエラ出来るもんなら落としてみれや!
Host ns.coeur.jp (218.44.157.186) appears to be up ... good.
Initiating SYN Stealth Scan against ns.coeur.jp (218.44.157.186)
Adding open port 80/tcp
Adding open port 53/tcp
Adding open port 110/tcp
Adding open port 25/tcp
The SYN Stealth Scan took 168 seconds to scan 1601 ports.
For OSScan assuming that port 25 is open and port 113 is closed and neither are firewalled
For OSScan assuming that port 25 is open and port 113 is closed and neither are firewalled
For OSScan assuming that port 25 is open and port 113 is closed and neither are firewalled
Interesting ports on ns.coeur.jp (218.44.157.186):
(The 1594 ports scanned but not shown below are in state: filtered)
Port State Service
25/tcp open smtp
53/tcp open domain
80/tcp open http
110/tcp open pop-3
113/tcp closed auth
123/tcp closed ntp
443/tcp closed https
No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
SInfo(V=3.00%P=i686-pc-linux-gnu%D=1/5%Time=3E170B4B%O=25%C=113)