Degenerate 119.97.227.194

Hostname: 194.227.97.119.broad.wh.hb.dynamic.163data.com.cn

Region: Wuhan,China

Whois:

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to "119.96.0.0 - 119.103.255.255"

inetnum:        119.96.0.0 - 119.103.255.255
netname:        CHINANET-HB
descr:          CHINANET Hubei province network
descr:          Data Communication Division
descr:          China Telecom
country:        CN
admin-c:        CH93-AP
tech-c:         CHA1-AP
remarks:        service provider
status:         ALLOCATED PORTABLE
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks:        This object can only be updated by APNIC hostmasters.
remarks:        To update this object, please contact APNIC
remarks:        hostmasters and include your organisation"s account
remarks:        name in the subject line.
remarks:        -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
changed:        hm-changed@apnic.net 20080131
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET
mnt-routes:     MAINT-CHINANET-HB
source:         APNIC

role:           CHINANET HB ADMIN
address:        8th floor of JinGuang Building
address:        #232 of Macao Road
address:        HanKou Wuhan Hubei Province
address:        P.R.China
country:        CN
phone:          +86 27 82862199
fax-no:         +86 27 82861499
e-mail:         hbadd@189.cn
remarks:        send spam reports to hbadd@189.cn
remarks:        and abuse reports to hbadd@189.cn
remarks:        Please include detailed information and
remarks:        times in GMT+8
admin-c:        YZ83-AP
admin-c:        ZC77-AP
tech-c:         YZ83-AP
tech-c:         ZC77-AP
nic-hdl:        CHA1-AP
notify:         hbadd@189.cn
mnt-by:         MAINT-CN-CHINANET-HB
changed:        zhangyl68@public.wh.hb.cn 20031114
changed:        hm-changed@apnic.net 20111114
changed:        zhengzm@gsta.com  20130806
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@ns.chinanet.cn.net
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
changed:        dingsy@cndata.com 20070416
changed:        zhengzm@gsta.com 20140227
mnt-by:         MAINT-CHINANET
source:         APNIC

% This query was served by the APNIC Whois Service version 1.69.1-APNICv1r0 (UNDEFINED)

Host Scan:

Starting Nmap 5.00 ( http://nmap.org ) at 2015-01-02 13:36 CST
Interesting ports on 194.227.97.119.broad.wh.hb.dynamic.163data.com.cn (119.97.227.194):
Not shown: 1000 open|filtered ports, 998 filtered ports
PORT    STATE SERVICE    VERSION
23/tcp  open  telnet?
443/tcp open  ssl/https?
|_ sslv2: server still supports SSLv2
|_ html-title: TOPSEC TOS Web User Interface
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port23-TCP:V=5.00%I=7%D=1/2%Time=54A6F409%P=x86_64-unknown-linux-gnu%r(
SF:NULL,16," § § §! ч чlogin
SF:: ")%r(GenericLines,28," § § §! ч
SF:1 чlogin: 

login: login: ")%r(GetRequest,32,"
SF: § § §! ч чGET / HT
SF:TP/1.0

login: Password: ")%r(HTTPOptions,36," §
SF: § §! ч чOPTIONS / HTTP/1.0
SF:r

login: Password: ")%r(RTSPRequest,36," § §
SF: §! ч чOPTIONS / RTSP/1.0

l
SF:ogin: Password: ")%r(RPCCheck,19," § § 
SF:d! ч чђ^@^@(r■^]")%r(DNSVersionBindReq,1
SF:6," § § §! ч чlogin: "
SF:)%r(DNSStatusRequest,30," § § §! ч
SF:xffчlogin: ^@^L^@^@^P^@^@^@^@^@^@^@^@")%r(Help,2
SF:6," § § §! ч чHELP
log
SF:in: Password: ")%r(SSLSessionReq,18," § § 
SF:§! ч чlogin: ^A")%r(SMBProgNeg,E7," §
SF:x01 § §! ч чlogin: ^@^@^@ц
SF:Br^@^@^@^@^H^A@^@^@^@^@^@^@^@^@^@^@^@^@^@^@@^F^@
SF:^@^A^@^@Ђ^@^BPC NETWORK PROGRAM 1.0^@^BMICROSOFT
SF:0NETWORKS 1.03^@^BMICROSOFT NETWORKS 3.0^@^BLANMAN1.0^
SF:@^BLM1.2X002^@^BSamba^@^BNT LANMAN 1.0^@^BNT LM 0
SF:.12")%r(X11Probe,2B," § § §! ч 
SF:xfbl^@^K^@^@^@^@^@^@^@^@login: ")%r(FourOhFourRequest,
SF:55," § § §! ч чGET /ni
SF:ce%20ports%2C/Tri%6Eity.txt%2ebak HTTP/1.0

login: Passwo
SF:rd: ")%r(LPDString,28," § § §! ч
SF: ч^Adefault
login: login: ")%r(LDAPBindReq,2B," 
SF:§ § §! ч ч0^L^B^A^A`^G
SF:^B^A^B^@ђlogin: ");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=5.00%T=SSL%I=7%D=1/2%Time=54A6F411%P=x86_64-unknown-linux-gnu%r(GetRequest,6CF,"HTTP/1.1 200 OK
Date: Fri, 02 Jan
SF: 2015 20:01:15 GMT
Server: Topsec
Last-Modified: W
SF:ed, 17 Mar 2010 05:07:35 GMT
ETag: "81c-5e7-4ba06
SF:397"
Accept-Ranges: bytes
Content-Length: 1511
Connecti
SF:on: close
Content-Type: text/html




SF:r








TOPSEC 
SF:TOS Web User Interface




function loginCheck()
SF:
{
	if(theForm.username.value == "")
	{
		a
SF:lert("Кв╩С╚в╣▄└ьн▒├ч");
SF:		theForm.username.focus();
		return false;
	}


SF:telse if(theForm.passwd.value == "")
	{
		alert
SF:("Кв╩С╚в┐┌┴Ь");
		theForm.pas")%r
SF:(HTTPOptions,90,"HTTP/1.1 200 OK
Date: Fri, 02 Janx
SF:202015 20:01:17 GMT
Server: Topsec
Content-Length: 0
SF:r
Allow: GET, HEAD, OPTIONS, TRACE
Connection: close
SF:

")%r(RTSPRequest,1BC,"HTTP/1.1 400 Bad Request
Dat
SF:e: Fri, 02 Jan 2015 20:01:19 GMT
Server: Topsec
SF:
Connection: close
Content-Type: text/html; charset=iso-
SF:8859-1



400 Bad Request

Bad Request
Your browser sent a reque
SF:st that this server could not understand.
The
SF:0request line contained invalid characters following 
SF:the protocol string.


");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: WAP|switch|general purpose|print server|broadband router|load balancer
Running (JUST GUESSING) : Actiontec Linux 2.4.X (93%), HP embedded (93%), Linksys embedded (93%), Netgear embedded (93%), MontaVista Linux 2.4.X (92%), F5 Networks embedded (89%), Linux 2.4.X (88%), AVM embedded (87%)
Aggressive OS guesses: HP Brocade 4100 switch; or Actiontec MI-424-WR, Linksys WRVS4400N, or Netgear WNR834B wireless broadband router (93%), MontaVista embedded Linux 2.4.17 (92%), HP 4200 PSA (Print Server Appliance) model J4117A (91%), Linksys WRV200 wireless broadband router (91%), F5 BIG-IP Local Traffic Manager load balancer (89%), Linux 2.4.20 (88%), AVM FRITZ!Box FON WLAN 7050, Linksys WAG200G, or Netgear DG834GT wireless broadband router (87%), Linksys WET54GS5 WAP or Xerox WorkCentre Pro 265 printer (87%), Linux 2.4.21 - 2.4.31 (likely embedded) (87%), DD-WRT v23 (Linux 2.4.34) (87%)
No exact OS matches for host (test conditions non-ideal).

Host script results:
|_ nbstat: ERROR: Name query failed: TIMEOUT

OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 5819.35 seconds
BACK  |  HOME