Degenerate 103.41.124.64

Hostname:

Region: Central District,Hong Kong

Whois:

Unknown AS number or IP network. Please upgrade this program.

Host Scan:

Starting Nmap 5.00 ( http://nmap.org ) at 2015-01-02 15:13 CST
Interesting ports on 103.41.124.64:
Not shown: 1985 closed ports
PORT     STATE         SERVICE      VERSION
22/tcp   open          ssh          (protocol 2.0)
|  ssh-hostkey: 1024 41:9a:f0:50:eb:53:7a:f5:1a:4b:8a:77:74:f9:1c:4d (DSA)
|_ 2048 ed:ab:d7:07:d5:f7:6c:68:b5:4f:b3:39:f6:b8:e9:bb (RSA)
25/tcp   filtered      smtp
135/tcp  filtered      msrpc
139/tcp  filtered      netbios-ssn
445/tcp  filtered      microsoft-ds
6006/tcp open          tcpwrapped
68/udp   open|filtered dhcpc
135/udp  open|filtered msrpc
136/udp  open|filtered profile
137/udp  open|filtered netbios-ns
138/udp  open|filtered netbios-dgm
139/udp  open|filtered netbios-ssn
161/udp  open|filtered snmp
445/udp  open|filtered microsoft-ds
520/udp  open|filtered route
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port22-TCP:V=5.00%I=7%D=1/2%Time=54A70E2D%P=x86_64-unknown-linux-gnu%r(
SF:NULL,20,"SSH-2.0-OpenSSH_6.2p2 Ubuntu-6
");
Device type: general purpose|WAP|router|broadband router|printer
Running (JUST GUESSING) : Linux 2.6.X|2.4.X (91%), Linksys Linux 2.4.X (90%), D-Link embedded (88%), Linksys embedded (88%), Peplink embedded (88%), Lexmark embedded (86%)
Aggressive OS guesses: Linux 2.6.18 - 2.6.27 (91%), Linux 2.6.22 (91%), Linux 2.6.23 (91%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (91%), OpenWrt White Russian 0.9 (Linux 2.4.30) (90%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (90%), Linux 2.6.17 - 2.6.28 (89%), Linux 2.6.15 - 2.6.24 (88%), Linux 2.6.26 (88%), Linux 2.6.9 - 2.6.26 (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

Host script results:
|_ nbstat: ERROR: Name query failed: TIMEOUT

OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1155.55 seconds
BACK  |  HOME