Starting Nmap 7.70 (
Nmap: the Network Mapper - Free Security Scanner ) at 2018-11-15 23:23 GMT Standard Time
NSE: Loaded 148 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 23:23
Completed NSE at 23:23, 0.00s elapsed
Initiating NSE at 23:23
Completed NSE at 23:23, 0.00s elapsed
Initiating ARP Ping Scan at 23:23
Scanning 192.168.0.1 [1 port]
Completed ARP Ping Scan at 23:23, 2.58s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 23:23
Completed Parallel DNS resolution of 1 host. at 23:23, 0.06s elapsed
Initiating SYN Stealth Scan at 23:23
Scanning 192.168.0.1 [1000 ports]
Discovered open port 53/tcp on 192.168.0.1
Discovered open port 22/tcp on 192.168.0.1
Discovered open port 80/tcp on 192.168.0.1
Increasing send delay for 192.168.0.1 from 0 to 5 due to 34 out of 84 dropped probes since last increase.
Increasing send delay for 192.168.0.1 from 5 to 10 due to 32 out of 79 dropped probes since last increase.
Discovered open port 1900/tcp on 192.168.0.1
Completed SYN Stealth Scan at 23:24, 38.03s elapsed (1000 total ports)
Initiating Service scan at 23:24
Scanning 4 services on 192.168.0.1
Completed Service scan at 23:24, 21.17s elapsed (4 services on 1 host)
Initiating OS detection (try #1) against 192.168.0.1
Failed to resolve "nmap".
WARNING: Service 192.168.0.1:1900 had already soft-matched upnp, but now soft-matched rtsp; ignoring second value
WARNING: Service 192.168.0.1:1900 had already soft-matched upnp, but now soft-matched sip; ignoring second value
NSE: Script scanning 192.168.0.1.
Initiating NSE at 23:24
Completed NSE at 23:25, 8.50s elapsed
Initiating NSE at 23:25
Completed NSE at 23:25, 0.00s elapsed
Nmap scan report for 192.168.0.1
Host is up (0.0049s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh Dropbear sshd 2011.54 (protocol 2.0)
| ssh-hostkey:
|_ 1039 e3:46:f3:c4:92:e6:54:ae:ae:65:f8:7a:3b:b7:29:49 (RSA)
53/tcp open domain dnsmasq 2.62
| dns-nsid:
|_ bind.version: dnsmasq-2.62
80/tcp open http BusyBox http 1.19.4
| http-methods:
|_ Supported Methods: GET HEAD POST
|_http-title: Site doesn't have a title (text/html).
1900/tcp open upnp MiniUPnP 1.8 (UPnP 1.1)
| fingerprint-strings:
| FourOhFourRequest, GetRequest:
| HTTP/1.0 404 Not Found
| Content-Type: text/html
| Connection: close
| Content-Length: 134
| Server: TP-Link/TP-LINK UPnP/1.1 MiniUPnPd/1.8
| Ext:
| <HTML><HEAD><TITLE>404 Not Found</TITLE></HEAD><BODY><H1>Not Found</H1>The requested URL was not found on this server.</BODY></HTML>
| GenericLines:
| 501 Not Implemented
| Content-Type: text/html
| Connection: close
| Content-Length: 149
| Server: TP-Link/TP-LINK UPnP/1.1 MiniUPnPd/1.8
| Ext:
| <HTML><HEAD><TITLE>501 Not Implemented</TITLE></HEAD><BODY><H1>Not Implemented</H1>The HTTP Method is not implemented by this server.</BODY></HTML>
| HTTPOptions:
| HTTP/1.0 501 Not Implemented
| Content-Type: text/html
| Connection: close
| Content-Length: 149
| Server: TP-Link/TP-LINK UPnP/1.1 MiniUPnPd/1.8
| Ext:
| <HTML><HEAD><TITLE>501 Not Implemented</TITLE></HEAD><BODY><H1>Not Implemented</H1>The HTTP Method is not implemented by this server.</BODY></HTML>
| RTSPRequest:
| RTSP/1.0 501 Not Implemented
| Content-Type: text/html
| Connection: close
| Content-Length: 149
| Server: TP-Link/TP-LINK UPnP/1.1 MiniUPnPd/1.8
| Ext:
| <HTML><HEAD><TITLE>501 Not Implemented</TITLE></HEAD><BODY><H1>Not Implemented</H1>The HTTP Method is not implemented by this server.</BODY></HTML>
| SIPOptions:
| SIP/2.0 501 Not Implemented
| Content-Type: text/html
| Connection: close
| Content-Length: 149
| Server: TP-Link/TP-LINK UPnP/1.1 MiniUPnPd/1.8
| Ext:
|_ <HTML><HEAD><TITLE>501 Not Implemented</TITLE></HEAD><BODY><H1>Not Implemented</H1>The HTTP Method is not implemented by this server.</BODY></HTML>
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at
Nmap Fingerprint Submitter 2.0 :
SF-Port1900-TCP:V=7.70%I=7%D=11/15%Time=5BEE0035%P=i686-pc-windows-windows
SF:%r(GetRequest,117,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x2
SF:0text/html\r\nConnection:\x20close\r\nContent-Length:\x20134\r\nServer:
SF:\x20TP-Link/TP-LINK\x20UPnP/1\.1\x20MiniUPnPd/1\.8\r\nExt:\r\n\r\n<HTML
SF:><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD><BODY><H1>Not\x20Found<
SF:/H1>The\x20requested\x20URL\x20was\x20not\x20found\x20on\x20this\x20ser
SF:ver\.</BODY></HTML>\r\n")%r(GenericLines,124,"\x20501\x20Not\x20Impleme
SF:nted\r\nContent-Type:\x20text/html\r\nConnection:\x20close\r\nContent-L
SF:ength:\x20149\r\nServer:\x20TP-Link/TP-LINK\x20UPnP/1\.1\x20MiniUPnPd/1
SF:\.8\r\nExt:\r\n\r\n<HTML><HEAD><TITLE>501\x20Not\x20Implemented</TITLE>
SF:</HEAD><BODY><H1>Not\x20Implemented</H1>The\x20HTTP\x20Method\x20is\x20
SF:not\x20implemented\x20by\x20this\x20server\.</BODY></HTML>\r\n")%r(HTTP
SF:Options,12C,"HTTP/1\.0\x20501\x20Not\x20Implemented\r\nContent-Type:\x2
SF:0text/html\r\nConnection:\x20close\r\nContent-Length:\x20149\r\nServer:
SF:\x20TP-Link/TP-LINK\x20UPnP/1\.1\x20MiniUPnPd/1\.8\r\nExt:\r\n\r\n<HTML
SF:><HEAD><TITLE>501\x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20
SF:Implemented</H1>The\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by
SF:\x20this\x20server\.</BODY></HTML>\r\n")%r(RTSPRequest,12C,"RTSP/1\.0\x
SF:20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConnection
SF::\x20close\r\nContent-Length:\x20149\r\nServer:\x20TP-Link/TP-LINK\x20U
SF
nP/1\.1\x20MiniUPnPd/1\.8\r\nExt:\r\n\r\n<HTML><HEAD><TITLE>501\x20Not
SF:\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20Implemented</H1>The\x20H
SF:TTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\x20server\.</BO
SF
Y></HTML>\r\n")%r(FourOhFourRequest,117,"HTTP/1\.0\x20404\x20Not\x20Fo
SF:und\r\nContent-Type:\x20text/html\r\nConnection:\x20close\r\nContent-Le
SF:ngth:\x20134\r\nServer:\x20TP-Link/TP-LINK\x20UPnP/1\.1\x20MiniUPnPd/1\
SF:.8\r\nExt:\r\n\r\n<HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HEAD>
SF:<BODY><H1>Not\x20Found</H1>The\x20requested\x20URL\x20was\x20not\x20fou
SF:nd\x20on\x20this\x20server\.</BODY></HTML>\r\n")%r(SIPOptions,12B,"SIP/
SF:2\.0\x20501\x20Not\x20Implemented\r\nContent-Type:\x20text/html\r\nConn
SF:ection:\x20close\r\nContent-Length:\x20149\r\nServer:\x20TP-Link/TP-LIN
SF:K\x20UPnP/1\.1\x20MiniUPnPd/1\.8\r\nExt:\r\n\r\n<HTML><HEAD><TITLE>501\
SF:x20Not\x20Implemented</TITLE></HEAD><BODY><H1>Not\x20Implemented</H1>Th
SF:e\x20HTTP\x20Method\x20is\x20not\x20implemented\x20by\x20this\x20server
SF:\.</BODY></HTML>\r\n");
MAC Address: B0:4E:26:01:34:86 (Tp-link Technologies)
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 - 3.10
Uptime guess: 0.043 days (since Thu Nov 15 22:23:03 2018)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=263 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE
HOP RTT ADDRESS
1 4.91 ms 192.168.0.1
NSE: Script Post-scanning.
Initiating NSE at 23:25
Completed NSE at 23:25, 0.00s elapsed
Initiating NSE at 23:25
Completed NSE at 23:25, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at
Nmap OS/Service Fingerprint and Correction Submission Page .
Nmap done: 1 IP address (1 host up) scanned in 85.87 seconds
Raw packets sent: 1881 (83.558KB) | Rcvd: 1044 (44.241KB)