$ sudo nmap -sS -sU -T4 -A -v 192.168.1.1
Starting Nmap 7.80 (
https://nmap.org ) at 2024-07-14 07:08 MSK
NSE: Loaded 151 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 07:08
Completed NSE at 07:08, 0.00s elapsed
Initiating NSE at 07:08
Completed NSE at 07:08, 0.00s elapsed
Initiating NSE at 07:08
Completed NSE at 07:08, 0.00s elapsed
Initiating ARP Ping Scan at 07:08
Scanning 192.168.1.1 [1 port]
Completed ARP Ping Scan at 07:08, 0.03s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 07:08
Completed Parallel DNS resolution of 1 host. at 07:08, 0.01s elapsed
Initiating SYN Stealth Scan at 07:08
Scanning 192.168.1.1 [1000 ports]
Increasing send delay for 192.168.1.1 from 0 to 5 due to 70 out of 174 dropped probes since last increase.
Increasing send delay for 192.168.1.1 from 5 to 10 due to max_successful_tryno increase to 5
Discovered open port 7070/tcp on 192.168.1.1
Completed SYN Stealth Scan at 07:08, 15.47s elapsed (1000 total ports)
Initiating UDP Scan at 07:08
Scanning 192.168.1.1 [1000 ports]
Increasing send delay for 192.168.1.1 from 0 to 50 due to max_successful_tryno increase to 5
Increasing send delay for 192.168.1.1 from 50 to 100 due to max_successful_tryno increase to 6
UDP Scan Timing: About 41.50% done; ETC: 07:09 (0:00:44 remaining)
Warning: 192.168.1.1 giving up on port because retransmission cap hit (6).
Completed UDP Scan at 07:10, 112.14s elapsed (1000 total ports)
Initiating Service scan at 07:10
Scanning 2 services on 192.168.1.1
Service scan Timing: About 50.00% done; ETC: 07:11 (0:00:39 remaining)
Completed Service scan at 07:12, 97.59s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against 192.168.1.1
Retrying OS detection (try #2) against 192.168.1.1
Retrying OS detection (try #3) against 192.168.1.1
Retrying OS detection (try #4) against 192.168.1.1
Retrying OS detection (try #5) against 192.168.1.1
NSE: Script scanning 192.168.1.1.
Initiating NSE at 07:12
Completed NSE at 07:12, 14.01s elapsed
Initiating NSE at 07:12
Completed NSE at 07:12, 1.00s elapsed
Initiating NSE at 07:12
Completed NSE at 07:12, 0.00s elapsed
Nmap scan report for 192.168.1.1
Host is up (0.0016s latency).
Not shown: 1998 closed ports
PORT STATE SERVICE VERSION
7070/tcp open rtsp
| fingerprint-strings:
| RTSPRequest:
| RTSP/1.0 200 OK
|_ Public: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE
|_rtsp-methods: ERROR: Script execution failed (use -d to debug)
67/udp open|filtered dhcps
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at
https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port7070-TCP:V=7.80%I=7%D=7/14%Time=66934FC7%P=x86_64-pc-linux-gnu%r(RT
SF:SPRequest,43,"RTSP/1\.0\x20200\x20OK\r\nPublic:\x20DESCRIBE,\x20SETUP,\
SF:x20TEARDOWN,\x20PLAY,\x20PAUSE\r\n\r\n");
MAC Address: D8:83:32:DC:E8:4C (Unknown)
No exact OS matches for host (If you know what OS is running on it, see
https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.80%E=4%D=7/14%OT=7070%CT=1%CU=2%PV=Y%DS=1%DC=D%G=Y%M=D88332%TM=
OS:66935034%P=x86_64-pc-linux-gnu)SEQ(SP=0%GCD=4F%ISR=4D%TI=I%CI=I%II=RI%SS
OS:=O%TS=U)SEQ(CI=RD%II=RI%TS=U)SEQ(TI=I%CI=I%II=RI%SS=O%TS=U)OPS(O1=M5B4NW
OS:2%O2=M5B4NW2%O3=M5B4NW2%O4=M5B4NW2%O5=M5B4NW2%O6=M5B4)WIN(W1=16D0%W2=16D
OS:0%W3=16D0%W4=16D0%W5=16D0%W6=16D0)ECN(R=Y%DF=N%T=FF%W=16D0%O=M5B4NW2%CC=
OS:N%Q=)T1(R=Y%DF=N%T=FF%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=Y%DF=N%T=FF%W=16
OS:D0%S=O%A=S+%F=AS%O=M5B4NW2%RD=0%Q=)T4(R=Y%DF=N%T=FF%W=B405%S=A%A=S%F=AR%
OS:O=%RD=0%Q=)T5(R=Y%DF=N%T=FF%W=B405%S=A%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=N%
OS:T=FF%W=B405%S=A%A=S%F=AR%O=%RD=0%Q=)T7(R=Y%DF=N%T=FF%W=B405%S=A%A=S+%F=A
OS:R%O=%RD=0%Q=)U1(R=Y%DF=N%T=FF%IPL=38%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RU
OS:D=G)IE(R=Y%DFI=S%T=FF%CD=S)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=19 (Good luck!)
IP ID Sequence Generation: Incremental
TRACEROUTE
HOP RTT ADDRESS
1 1.64 ms 192.168.1.1