The results of some scans of/from my laptop from 10-11AM Nov 5, 2014 in Weitz Commons. My eduroam IP address at the time was 137.22.168.43. I was running MacOS X 10.9.5, with nmap installed. ======= http://www.cyberciti.biz/networking/nmap-command-examples-tutorials/ Some obsolete flags. See "a white hatter" comment http://linuxcommando.blogspot.com/2008/05/ping-or-nmap-to-identify-machines-on.html Some obsolete and/or Linux flags ======== Commands of interest ifconfig ipconfig ping netstat dig host nmap [not in standard Mac build] ======== ~$ ifconfig lo0: flags=8049 mtu 16384 options=3 inet6 ::1 prefixlen 128 inet 127.0.0.1 netmask 0xff000000 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 nd6 options=1 gif0: flags=8010 mtu 1280 stf0: flags=0<> mtu 1280 en0: flags=8863 mtu 1500 ether 14:10:9f:d9:af:95 inet6 fe80::1610:9fff:fed9:af95%en0 prefixlen 64 scopeid 0x4 inet 137.22.168.43 netmask 0xffffff00 broadcast 137.22.168.255 nd6 options=1 media: autoselect status: active en3: flags=8963 mtu 1500 options=60 ether 32:00:18:97:ed:e0 media: autoselect status: inactive en4: flags=8963 mtu 1500 options=60 ether 32:00:18:97:ed:e1 media: autoselect status: inactive bridge0: flags=8863 mtu 1500 options=63 ether 16:10:9f:9d:6f:00 Configuration: id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0 maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200 root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0 ipfilter disabled flags 0x2 member: en3 flags=3 ifmaxaddr 0 port 5 priority 0 path cost 0 member: en4 flags=3 ifmaxaddr 0 port 6 priority 0 path cost 0 nd6 options=1 media: status: inactive p2p0: flags=8843 mtu 2304 ether 06:10:9f:d9:af:95 media: autoselect status: inactive vboxnet0: flags=8842 mtu 1500 ether 0a:00:27:00:00:00 ======== ~$ ifconfig en0 en0: flags=8863 mtu 1500 ether 14:10:9f:d9:af:95 inet6 fe80::1610:9fff:fed9:af95%en0 prefixlen 64 scopeid 0x4 inet 137.22.168.43 netmask 0xffffff00 broadcast 137.22.168.255 nd6 options=1 media: autoselect status: active ======= ping -c 2 -i 10 ======== ~$ nmap -sn 137.22.168.1-254 Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-05 10:21 CST Strange error from connect (64):Host is down Nmap scan report for eduroam-168-6.dyn.carleton.edu (137.22.168.6) Host is up (0.094s latency). Nmap scan report for eduroam-168-7.dyn.carleton.edu (137.22.168.7) Host is up (0.082s latency). Nmap scan report for eduroam-168-9.dyn.carleton.edu (137.22.168.9) Host is up (0.080s latency). Nmap scan report for eduroam-168-12.dyn.carleton.edu (137.22.168.12) Host is up (0.027s latency). Nmap scan report for eduroam-168-17.dyn.carleton.edu (137.22.168.17) Host is up (0.12s latency). Nmap scan report for eduroam-168-19.dyn.carleton.edu (137.22.168.19) Host is up (0.0020s latency). Nmap scan report for eduroam-168-22.dyn.carleton.edu (137.22.168.22) Host is up (0.16s latency). Nmap scan report for eduroam-168-25.dyn.carleton.edu (137.22.168.25) Host is up (0.090s latency). Nmap scan report for eduroam-168-29.dyn.carleton.edu (137.22.168.29) Host is up (0.0062s latency). Nmap scan report for eduroam-168-38.dyn.carleton.edu (137.22.168.38) Host is up (0.11s latency). Nmap scan report for eduroam-168-43.dyn.carleton.edu (137.22.168.43) Host is up (0.00053s latency). Nmap scan report for eduroam-168-52.dyn.carleton.edu (137.22.168.52) Host is up (0.21s latency). Nmap scan report for eduroam-168-60.dyn.carleton.edu (137.22.168.60) Host is up (0.058s latency). Nmap scan report for eduroam-168-72.dyn.carleton.edu (137.22.168.72) Host is up (0.0070s latency). Nmap scan report for eduroam-168-81.dyn.carleton.edu (137.22.168.81) Host is up (0.083s latency). Nmap scan report for eduroam-168-82.dyn.carleton.edu (137.22.168.82) Host is up (0.069s latency). Nmap scan report for eduroam-168-86.dyn.carleton.edu (137.22.168.86) Host is up (0.10s latency). Nmap scan report for eduroam-168-87.dyn.carleton.edu (137.22.168.87) Host is up (0.072s latency). Nmap scan report for eduroam-168-91.dyn.carleton.edu (137.22.168.91) Host is up (0.087s latency). Nmap scan report for eduroam-168-94.dyn.carleton.edu (137.22.168.94) Host is up (0.47s latency). Nmap scan report for eduroam-168-99.dyn.carleton.edu (137.22.168.99) Host is up (0.056s latency). Nmap scan report for eduroam-168-102.dyn.carleton.edu (137.22.168.102) Host is up (0.012s latency). Nmap scan report for eduroam-168-108.dyn.carleton.edu (137.22.168.108) Host is up (0.0054s latency). Nmap scan report for eduroam-168-109.dyn.carleton.edu (137.22.168.109) Host is up (0.10s latency). Nmap scan report for eduroam-168-111.dyn.carleton.edu (137.22.168.111) Host is up (0.26s latency). Nmap scan report for eduroam-168-112.dyn.carleton.edu (137.22.168.112) Host is up (0.086s latency). Nmap scan report for eduroam-168-113.dyn.carleton.edu (137.22.168.113) Host is up (0.21s latency). Nmap scan report for eduroam-168-119.dyn.carleton.edu (137.22.168.119) Host is up (0.15s latency). Nmap scan report for eduroam-168-121.dyn.carleton.edu (137.22.168.121) Host is up (0.098s latency). Nmap scan report for eduroam-168-129.dyn.carleton.edu (137.22.168.129) Host is up (0.14s latency). Nmap scan report for eduroam-168-130.dyn.carleton.edu (137.22.168.130) Host is up (0.036s latency). Nmap scan report for eduroam-168-135.dyn.carleton.edu (137.22.168.135) Host is up (0.10s latency). Nmap scan report for eduroam-168-140.dyn.carleton.edu (137.22.168.140) Host is up (0.30s latency). Nmap scan report for eduroam-168-143.dyn.carleton.edu (137.22.168.143) Host is up (0.090s latency). Nmap scan report for eduroam-168-151.dyn.carleton.edu (137.22.168.151) Host is up (0.12s latency). Nmap scan report for eduroam-168-154.dyn.carleton.edu (137.22.168.154) Host is up (0.0068s latency). Nmap scan report for eduroam-168-156.dyn.carleton.edu (137.22.168.156) Host is up (0.045s latency). Nmap scan report for eduroam-168-157.dyn.carleton.edu (137.22.168.157) Host is up (0.089s latency). Nmap scan report for eduroam-168-163.dyn.carleton.edu (137.22.168.163) Host is up (0.13s latency). Nmap scan report for eduroam-168-169.dyn.carleton.edu (137.22.168.169) Host is up (0.0096s latency). Nmap scan report for eduroam-168-179.dyn.carleton.edu (137.22.168.179) Host is up (0.031s latency). Nmap scan report for eduroam-168-187.dyn.carleton.edu (137.22.168.187) Host is up (0.0032s latency). Nmap scan report for eduroam-168-190.dyn.carleton.edu (137.22.168.190) Host is up (0.45s latency). Nmap scan report for eduroam-168-211.dyn.carleton.edu (137.22.168.211) Host is up (0.011s latency). Nmap scan report for eduroam-168-214.dyn.carleton.edu (137.22.168.214) Host is up (0.080s latency). Nmap scan report for eduroam-168-224.dyn.carleton.edu (137.22.168.224) Host is up (0.11s latency). Nmap scan report for eduroam-168-225.dyn.carleton.edu (137.22.168.225) Host is up (0.046s latency). Nmap scan report for eduroam-168-237.dyn.carleton.edu (137.22.168.237) Host is up (0.032s latency). Nmap scan report for eduroam-168-238.dyn.carleton.edu (137.22.168.238) Host is up (0.0060s latency). Nmap scan report for eduroam-168-242.dyn.carleton.edu (137.22.168.242) Host is up (0.075s latency). Nmap scan report for eduroam-168-246.dyn.carleton.edu (137.22.168.246) Host is up (0.019s latency). Nmap scan report for eduroam-168-248.dyn.carleton.edu (137.22.168.248) Host is up (0.12s latency). Nmap scan report for eduroam-168-254.dyn.carleton.edu (137.22.168.254) Host is up (0.0056s latency). Nmap done: 254 IP addresses (53 hosts up) scanned in 4.00 seconds ======= ~$ nmap 137.22.168.43 Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-05 10:24 CST Nmap scan report for eduroam-168-43.dyn.carleton.edu (137.22.168.43) Host is up (0.00023s latency). All 1000 scanned ports on eduroam-168-43.dyn.carleton.edu (137.22.168.43) are closed Nmap done: 1 IP address (1 host up) scanned in 7.58 seconds ~$ nmap 137.22.168.43 Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-05 10:24 CST Nmap scan report for eduroam-168-43.dyn.carleton.edu (137.22.168.43) Host is up (0.00022s latency). Not shown: 969 closed ports, 27 filtered ports PORT STATE SERVICE 22/tcp open ssh 88/tcp open kerberos-sec 445/tcp open microsoft-ds 548/tcp open afp ======= ~$ nmap --reason 137.22.168.43 Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-05 10:26 CST Nmap scan report for eduroam-168-43.dyn.carleton.edu (137.22.168.43) Host is up, received conn-refused (0.00092s latency). Not shown: 498 closed ports, 498 filtered ports Reason: 498 conn-refused and 498 no-responses PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 88/tcp open kerberos-sec syn-ack 445/tcp open microsoft-ds syn-ack 548/tcp open afp syn-ack Nmap done: 1 IP address (1 host up) scanned in 5.16 seconds ======= nmap --packet-trace 137.22.168.43 ======= ~$ nmap -iflist Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-05 10:30 CST ************************INTERFACES************************ DEV (SHORT) IP/MASK TYPE UP MTU MAC lo0 (lo0) 127.0.0.1/8 loopback up 16384 lo0 (lo0) ::1/128 loopback up 16384 lo0 (lo0) fe80::1/64 loopback up 16384 gif0 (gif0) (null)/0 point2point down 1280 stf0 (stf0) (null)/0 other down 1280 en0 (en0) 137.22.168.43/24 ethernet up 1500 14:10:9F:D9:AF:95 en0 (en0) fe80::1610:9fff:fed9:af95/64 ethernet up 1500 14:10:9F:D9:AF:95 en3 (en3) (null)/0 ethernet up 1500 32:00:18:97:ED:E0 en4 (en4) (null)/0 ethernet up 1500 32:00:18:97:ED:E1 bridge0 (bridge0) (null)/0 ethernet up 1500 16:10:9F:9D:6F:00 p2p0 (p2p0) (null)/0 ethernet up 2304 06:10:9F:D9:AF:95 vboxnet0 (vboxnet0) (null)/0 ethernet down 1500 0A:00:27:00:00:00 **************************ROUTES************************** DST/MASK DEV METRIC GATEWAY 108.168.151.6/32 en0 0 137.22.168.254 17.110.227.99/32 en0 0 137.22.168.254 17.171.4.33/32 en0 0 137.22.168.254 17.172.232.104/32 en0 0 137.22.168.254 74.125.196.188/32 en0 0 137.22.168.254 74.125.196.189/32 en0 0 137.22.168.254 108.160.167.158/32 en0 0 137.22.168.254 108.160.167.165/32 en0 0 137.22.168.254 255.255.255.255/32 en0 0 137.22.168.254 127.0.0.1/32 lo0 0 127.0.0.1 137.22.168.43/32 lo0 0 127.0.0.1 173.194.37.70/32 en0 0 137.22.168.254 173.194.37.86/32 en0 0 137.22.168.254 137.22.168.0/24 en0 0 169.254.0.0/16 en0 0 127.0.0.0/8 lo0 0 127.0.0.1 0.0.0.0/0 en0 0 137.22.168.254 fe80:1::1/128 lo0 0 ::1/128 lo0 0 ::1 ff01:1::/32 lo0 0 ::1 fe80:4::/32 en0 0 fe80:1::/32 lo0 0 fe80:1::1 ff01:4::/32 en0 0 ff02:1::/32 lo0 0 ::1 ff02:4::/32 en0 0 ======== ~$ nmap -O 137.22.168.43 TCP/IP fingerprinting (for OS scan) requires root privileges. QUITTING! ~$ sudo !! sudo nmap -O 137.22.168.43 Password: Sorry, try again. Password: Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-05 10:40 CST Nmap scan report for eduroam-168-43.dyn.carleton.edu (137.22.168.43) Host is up (0.00010s latency). Not shown: 500 filtered ports, 497 closed ports PORT STATE SERVICE 22/tcp open ssh 445/tcp open microsoft-ds 548/tcp open afp Device type: general purpose|phone|media device Running: Apple Mac OS X 10.8.X, Apple iOS 5.X OS CPE: cpe:/o:apple:mac_os_x:10.8 cpe:/o:apple:iphone_os:5 OS details: Apple Mac OS X 10.8 - 10.8.1 (Mountain Lion) (Darwin 12.0.0 - 12.1.0) or iOS 5.0.1 Network Distance: 0 hops OS detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 4.66 seconds ======= ~$ sudo nmap -O -v 137.22.168.43 Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-05 10:41 CST Initiating Parallel DNS resolution of 1 host. at 10:41 Completed Parallel DNS resolution of 1 host. at 10:41, 0.00s elapsed Initiating SYN Stealth Scan at 10:41 Scanning eduroam-168-43.dyn.carleton.edu (137.22.168.43) [1000 ports] Discovered open port 22/tcp on 137.22.168.43 Discovered open port 445/tcp on 137.22.168.43 Discovered open port 548/tcp on 137.22.168.43 Completed SYN Stealth Scan at 10:41, 3.16s elapsed (1000 total ports) Initiating OS detection (try #1) against eduroam-168-43.dyn.carleton.edu (137.22.168.43) Nmap scan report for eduroam-168-43.dyn.carleton.edu (137.22.168.43) Host is up (0.00011s latency). Not shown: 500 filtered ports, 497 closed ports PORT STATE SERVICE 22/tcp open ssh 445/tcp open microsoft-ds 548/tcp open afp Device type: general purpose|phone|media device Running: Apple Mac OS X 10.8.X, Apple iOS 5.X OS CPE: cpe:/o:apple:mac_os_x:10.8 cpe:/o:apple:iphone_os:5 OS details: Apple Mac OS X 10.8 - 10.8.1 (Mountain Lion) (Darwin 12.0.0 - 12.1.0) or iOS 5.0.1 Uptime guess: 12.932 days (since Thu Oct 23 13:18:50 2014) Network Distance: 0 hops TCP Sequence Prediction: Difficulty=260 (Good luck!) IP ID Sequence Generation: Randomized Read data files from: /usr/local/bin/../share/nmap OS detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 4.87 seconds Raw packets sent: 1524 (67.866KB) | Rcvd: 2046 (88.928KB) ======= ~$ nmap -sV -p 22 137.22.168.43 Starting Nmap 6.40 ( http://nmap.org ) at 2014-11-05 10:44 CST Nmap scan report for eduroam-168-43.dyn.carleton.edu (137.22.168.43) Host is up (0.000074s latency). PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.2 (protocol 2.0) Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 0.12 seconds