# Nmap 7.92 scan initiated Tue Dec 28 23:49:36 2021 as: nmap -p- --open -vvv -sS --min-rate 5000 -n -Pn -sCV -oN Sniper_nmap.txt 10.10.10.151 Nmap scan report for 10.10.10.151 Host is up, received user-set (0.073s latency). Scanned at 2021-12-28 23:49:36 CET for 136s Not shown: 65530 filtered tcp ports (no-response) Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE REASON VERSION 80/tcp open http syn-ack ttl 127 Microsoft IIS httpd 10.0 |_http-server-header: Microsoft-IIS/10.0 |_http-title: Sniper Co. | http-methods: | Supported Methods: OPTIONS TRACE GET HEAD POST |_ Potentially risky methods: TRACE 135/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC 139/tcp open netbios-ssn syn-ack ttl 127 Microsoft Windows netbios-ssn 445/tcp open microsoft-ds? syn-ack ttl 127 49667/tcp open msrpc syn-ack ttl 127 Microsoft Windows RPC Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Host script results: | smb2-time: | date: 2021-12-29T05:56:24 |_ start_date: N/A | smb2-security-mode: | 3.1.1: |_ Message signing enabled but not required |_clock-skew: 7h05m08s | p2p-conficker: | Checking for Conficker.C or higher... | Check 1 (port 28299/tcp): CLEAN (Timeout) | Check 2 (port 18459/tcp): CLEAN (Timeout) | Check 3 (port 51336/udp): CLEAN (Timeout) | Check 4 (port 56468/udp): CLEAN (Timeout) |_ 0/4 checks are positive: Host is CLEAN or ports are blocked Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Tue Dec 28 23:51:52 2021 -- 1 IP address (1 host up) scanned in 136.40 seconds