Zenmap Scan Tools Profile Help Target: scanme.nmap.org Command: nmap -T4 -A -v scanme.nmap.org Hosts Services Nmap Output Ports/Hosts Topology Host Details Scans OS Host scanme.nmap.or nmap - T4-A -v scanme.nmap.org Host is up (0.10s latency). Not shown: 996 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh | ssh-hostkey: | VERSION OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0) 1024 ac:00:a0:1a:82:ff:cc:55:99:dc:67:2b:34:97:6b:75 (DSA) 2048 20:3d:2d: 44:62:2a:b0:5a: 9d: b5:b3:05:14:c2:a6:b2 (RSA) 256 96:02:bb:5e:57:54:1c:4e:45:2f:56:4c:4a:24:b2:57 (ECDSA) 256 33:fa:91:0f:e0:el:7b:lf: 6d:05:a2:b0:f1:54:41:56 (ED25519) 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) |_http-favicon: Nmap Project | http-title: Go ahead and ScanMe! |_http-server-header: Apache/2.4.7 (Ubuntu) http-methods: Supported Methods: GET HEAD POST OPTIONS 9929/tcp open nping-echo Nping echo 31337/tcp open tcpwrapped Device type: general purpose Running: Linux 5.X OS CPE: cpe:/o: linux: linux_kernel:5 OS details: Linux 5.0 - 5.4 Uptime quess: 13.060 days (since Wed Mar 6 21:26:10 2024) Network Distance: 18 hops TCP Sequence Prediction: Difficulty=249 (Good luck!) IP ID Sequence Generation: All zeros Service Info: 05: Linux; CPE: cpe:/o:linux: linux_kernel TRACEROUTE (using port 1723/tcp) HOP RTT 1 2.00 ms 2 14.00 ms 3 16.00 ms 4 16.00 ms 5 19.00 ms 6 20.00 ms 7 83.00 ms 8 86.00 ms 9 85.00 ms 10 11 86.00 ms 12 82.00 ms 13 14 15 ... 17 18 ADDRESS Linksys02559 (192.168.1.1)|| 072-031-129-145.res.spectrum.com (72.31.129.145) int-0-7-1-6.tamp04-serl.netops.charter.com (71.46.8.55) lag-23.tamp04-carl.netops.charter.com (72.31.117.12) lag-10.tamp20-carl.netops.charter.com (72.31.7.128) lag-15-10.tamsflde20w-bcr00.netops.charter.com (66.109.6.96) lag-17.hstqtx0209w-bcr00.netops.charter.com (66.109.1.70) lag-412.dllstx976iw-bcr00.netops.charter.com (66.109.6.90) lag-12.tustca4200w-bcr00.netops.charter.com (66.109.6.0) 579.00 ms lag-14.1sancarc0yw-bcr00.netops.charter.com (66.109.6.4) lag-12.snjucac167w-bcr00.netops.charter.com (66.109.6.6) lag-0.pr1.sjc10.netops.charter.com (66.109.5.133) 78.00 ms 024-030-201-057.inf.spectrum.com (24.30.201.57) 121.00 ms a23-203-158-51.deploy.static.akamaitechnologies.com (23.203.158.51) 77.00 ms scanme.nmap.org (45.33.32.156) NSE: Script Post-scanning. Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Read data files from: C:\Program Files (x86)\Nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ Nmap done: 1 IP address (1 host up) scanned in 21.48 seconds Raw packets sent: 1057 (48.028KB) | Rcvd: 4264 (210.835KB) Profile: Intense scan

icon
Related questions
Question

What do these ports represent, what is their function?  Are there ports open that could be closed (specify and explain your answer)?

Zenmap
Scan Tools Profile Help
Target:
scanme.nmap.org
Command:
nmap -T4 -A -v scanme.nmap.org
Hosts
Services
Nmap Output Ports/Hosts Topology
Host Details
Scans
OS
Host
scanme.nmap.or
nmap - T4-A -v scanme.nmap.org
Host is up (0.10s latency).
Not shown: 996 closed tcp ports (reset)
PORT
STATE SERVICE
22/tcp
open ssh
| ssh-hostkey:
|
VERSION
OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0)
1024 ac:00:a0:1a:82:ff:cc:55:99:dc:67:2b:34:97:6b:75 (DSA)
2048 20:3d:2d: 44:62:2a:b0:5a: 9d: b5:b3:05:14:c2:a6:b2 (RSA)
256 96:02:bb:5e:57:54:1c:4e:45:2f:56:4c:4a:24:b2:57 (ECDSA)
256 33:fa:91:0f:e0:el:7b:lf: 6d:05:a2:b0:f1:54:41:56 (ED25519)
80/tcp open http
Apache httpd 2.4.7 ((Ubuntu))
|_http-favicon: Nmap Project
| http-title: Go ahead and ScanMe!
|_http-server-header: Apache/2.4.7 (Ubuntu)
http-methods:
Supported Methods: GET HEAD POST OPTIONS
9929/tcp open nping-echo Nping echo
31337/tcp open tcpwrapped
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o: linux: linux_kernel:5
OS details: Linux 5.0 - 5.4
Uptime quess: 13.060 days (since Wed Mar 6 21:26:10 2024)
Network Distance: 18 hops
TCP Sequence Prediction: Difficulty=249 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: 05: Linux; CPE: cpe:/o:linux: linux_kernel
TRACEROUTE (using port 1723/tcp)
HOP RTT
1
2.00 ms
2
14.00 ms
3
16.00 ms
4
16.00 ms
5
19.00 ms
6
20.00 ms
7
83.00 ms
8
86.00 ms
9
85.00 ms
10
11
86.00 ms
12
82.00 ms
13
14
15
... 17
18
ADDRESS
Linksys02559 (192.168.1.1)||
072-031-129-145.res.spectrum.com (72.31.129.145)
int-0-7-1-6.tamp04-serl.netops.charter.com (71.46.8.55)
lag-23.tamp04-carl.netops.charter.com (72.31.117.12)
lag-10.tamp20-carl.netops.charter.com (72.31.7.128)
lag-15-10.tamsflde20w-bcr00.netops.charter.com (66.109.6.96)
lag-17.hstqtx0209w-bcr00.netops.charter.com (66.109.1.70)
lag-412.dllstx976iw-bcr00.netops.charter.com (66.109.6.90)
lag-12.tustca4200w-bcr00.netops.charter.com (66.109.6.0)
579.00 ms lag-14.1sancarc0yw-bcr00.netops.charter.com (66.109.6.4)
lag-12.snjucac167w-bcr00.netops.charter.com (66.109.6.6)
lag-0.pr1.sjc10.netops.charter.com (66.109.5.133)
78.00 ms 024-030-201-057.inf.spectrum.com (24.30.201.57)
121.00 ms a23-203-158-51.deploy.static.akamaitechnologies.com (23.203.158.51)
77.00 ms
scanme.nmap.org (45.33.32.156)
NSE: Script Post-scanning.
Initiating NSE at 23:52
Completed NSE at 23:52, 0.00s elapsed
Initiating NSE at 23:52
Completed NSE at 23:52, 0.00s elapsed
Initiating NSE at 23:52
Completed NSE at 23:52, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/
Nmap done: 1 IP address (1 host up) scanned in 21.48 seconds
Raw packets sent: 1057 (48.028KB) | Rcvd: 4264 (210.835KB)
Profile:
Intense scan
Transcribed Image Text:Zenmap Scan Tools Profile Help Target: scanme.nmap.org Command: nmap -T4 -A -v scanme.nmap.org Hosts Services Nmap Output Ports/Hosts Topology Host Details Scans OS Host scanme.nmap.or nmap - T4-A -v scanme.nmap.org Host is up (0.10s latency). Not shown: 996 closed tcp ports (reset) PORT STATE SERVICE 22/tcp open ssh | ssh-hostkey: | VERSION OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0) 1024 ac:00:a0:1a:82:ff:cc:55:99:dc:67:2b:34:97:6b:75 (DSA) 2048 20:3d:2d: 44:62:2a:b0:5a: 9d: b5:b3:05:14:c2:a6:b2 (RSA) 256 96:02:bb:5e:57:54:1c:4e:45:2f:56:4c:4a:24:b2:57 (ECDSA) 256 33:fa:91:0f:e0:el:7b:lf: 6d:05:a2:b0:f1:54:41:56 (ED25519) 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) |_http-favicon: Nmap Project | http-title: Go ahead and ScanMe! |_http-server-header: Apache/2.4.7 (Ubuntu) http-methods: Supported Methods: GET HEAD POST OPTIONS 9929/tcp open nping-echo Nping echo 31337/tcp open tcpwrapped Device type: general purpose Running: Linux 5.X OS CPE: cpe:/o: linux: linux_kernel:5 OS details: Linux 5.0 - 5.4 Uptime quess: 13.060 days (since Wed Mar 6 21:26:10 2024) Network Distance: 18 hops TCP Sequence Prediction: Difficulty=249 (Good luck!) IP ID Sequence Generation: All zeros Service Info: 05: Linux; CPE: cpe:/o:linux: linux_kernel TRACEROUTE (using port 1723/tcp) HOP RTT 1 2.00 ms 2 14.00 ms 3 16.00 ms 4 16.00 ms 5 19.00 ms 6 20.00 ms 7 83.00 ms 8 86.00 ms 9 85.00 ms 10 11 86.00 ms 12 82.00 ms 13 14 15 ... 17 18 ADDRESS Linksys02559 (192.168.1.1)|| 072-031-129-145.res.spectrum.com (72.31.129.145) int-0-7-1-6.tamp04-serl.netops.charter.com (71.46.8.55) lag-23.tamp04-carl.netops.charter.com (72.31.117.12) lag-10.tamp20-carl.netops.charter.com (72.31.7.128) lag-15-10.tamsflde20w-bcr00.netops.charter.com (66.109.6.96) lag-17.hstqtx0209w-bcr00.netops.charter.com (66.109.1.70) lag-412.dllstx976iw-bcr00.netops.charter.com (66.109.6.90) lag-12.tustca4200w-bcr00.netops.charter.com (66.109.6.0) 579.00 ms lag-14.1sancarc0yw-bcr00.netops.charter.com (66.109.6.4) lag-12.snjucac167w-bcr00.netops.charter.com (66.109.6.6) lag-0.pr1.sjc10.netops.charter.com (66.109.5.133) 78.00 ms 024-030-201-057.inf.spectrum.com (24.30.201.57) 121.00 ms a23-203-158-51.deploy.static.akamaitechnologies.com (23.203.158.51) 77.00 ms scanme.nmap.org (45.33.32.156) NSE: Script Post-scanning. Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Initiating NSE at 23:52 Completed NSE at 23:52, 0.00s elapsed Read data files from: C:\Program Files (x86)\Nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ Nmap done: 1 IP address (1 host up) scanned in 21.48 seconds Raw packets sent: 1057 (48.028KB) | Rcvd: 4264 (210.835KB) Profile: Intense scan
AI-Generated Solution
AI-generated content may present inaccurate or offensive content that does not represent bartleby’s views.
steps

Unlock instant AI solutions

Tap the button
to generate a solution