You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
I've tried running nmap with the following command: nmap --resolve-all -p- -sV -sC -vvv -Pn -oX output.xml -oN output -iL ../scope -d2 -sT
nmap appears to be stuck sending probes to two ports, the output in the terminal was as folllows:
[...]
Connect Scan Timing: About 95.33% done; ETC: 14:33 (3:05:42 remaining)
Ultrascan PING SENT to 192.168.0.2 [connect to port 995]
Ultrascan GLOBAL PING SENT to 192.168.0.3 [connect to port 443]
Ultrascan PING SENT to 192.168.0.3 [connect to port 443]
Ultrascan DROPPED PING probe packet to 192.168.0.2 detected
Ultrascan PING SENT to 192.168.0.2 [connect to port 995]
Ultrascan DROPPED PING probe packet to 192.168.0.2 detected
Ultrascan GLOBAL PING SENT to 192.168.0.3 [connect to port 443]
Ultrascan PING SENT to 192.168.0.3 [connect to port 443]
Ultrascan PING SENT to 192.168.0.2 [connect to port 995]
Ultrascan DROPPED PING probe packet to 192.168.0.2 detected
Connect Scan Timing: About 95.33% done; ETC: 14:33 (3:05:42 remaining)
Ultrascan PING SENT to 192.168.0.2 [connect to port 995]
Ultrascan DROPPED PING probe packet to 192.168.0.2 detected
Ultrascan GLOBAL PING SENT to 192.168.0.3 [connect to port 443]
Ultrascan PING SENT to 192.168.0.3 [connect to port 443]
Ultrascan PING SENT to 192.168.0.2 [connect to port 995]
Ultrascan DROPPED PING probe packet to 192.168.0.2 detected
Ultrascan PING SENT to 192.168.0.2 [connect to port 995]
Ultrascan DROPPED PING probe packet to 192.168.0.2 detected
Connect Scan Timing: About 95.33% done; ETC: 14:34 (3:05:42 remaining)
Ultrascan GLOBAL PING SENT to 192.168.0.3 [connect to port 443]
Ultrascan PING SENT to 192.168.0.3 [connect to port 443]
Ultrascan PING SENT to 192.168.0.2 [connect to port 995]
Ultrascan DROPPED PING probe packet to 192.168.0.2 detected
Ultrascan PING SENT to 192.168.0.2 [connect to port 995]
Ultrascan DROPPED PING probe packet to 192.168.0.2 detected
Ultrascan GLOBAL PING SENT to 192.168.0.3 [connect to port 443]
Ultrascan PING SENT to 192.168.0.3 [connect to port 443]
Connect Scan Timing: About 95.34% done; ETC: 14:34 (3:05:41 remaining)
Ultrascan PING SENT to 192.168.0.2 [connect to port 995]
Ultrascan DROPPED PING probe packet to 192.168.0.2 detected
Ultrascan PING SENT to 192.168.0.2 [connect to port 995]
Ultrascan DROPPED PING probe packet to 192.168.0.2 detected
Ultrascan GLOBAL PING SENT to 192.168.0.3 [connect to port 443]
Ultrascan PING SENT to 192.168.0.3 [connect to port 443]
Stats: 63:19:30 elapsed; 4 hosts completed (14 up), 10 undergoing Connect Scan
Connect Scan Timing: About 95.34% done; ETC: 14:35 (3:05:41 remaining)
Current sending rates: 1.10 packets / s.
I've had this scan running for 63 hours. I've only included the ending of the output as these messages have been repeated over and over again over the course of more than 48 hours, with no seeming progress besides the change in time and percentage done. For privacy reasons I changed the actual public IPs with private IPs. Is this the expected behavior if max-retries or host-timeout is not specified?
The two scanned ports should be detected as open, but a firewall might be in place and blocking some probes. At the moment I force, closed the process the ports were accessible (tested with nc). I have the beginning of the output as well if this helps with debugging.
Version info
Latest at the time of writing, compiled from the repository.
From the Log and command, I understood two things. The first one is the host "192.168.0.2" typically dropping the ping prob bash Ultrascan **DROPPED PING probe** packet to 192.168.0.2 detected, As you mentioned it could be some Intrusion Detection System that makes the packet not to pass or other network security mechanism.
For the "192.168.0.3" host, it's not responding again it could be IDS. For further encounters, I would prefer you to see the packets using Wireshark.
Describe the bug
I've tried running nmap with the following command:
nmap --resolve-all -p- -sV -sC -vvv -Pn -oX output.xml -oN output -iL ../scope -d2 -sT
nmap appears to be stuck sending probes to two ports, the output in the terminal was as folllows:
I've had this scan running for 63 hours. I've only included the ending of the output as these messages have been repeated over and over again over the course of more than 48 hours, with no seeming progress besides the change in time and percentage done. For privacy reasons I changed the actual public IPs with private IPs. Is this the expected behavior if max-retries or host-timeout is not specified?
The two scanned ports should be detected as open, but a firewall might be in place and blocking some probes. At the moment I force, closed the process the ports were accessible (tested with nc). I have the beginning of the output as well if this helps with debugging.
Version info
Latest at the time of writing, compiled from the repository.
Nmap version 7.94SVN ( https://nmap.org )
Platform: x86_64-unknown-linux-gnu
Compiled with: nmap-liblua-5.4.6 openssl-1.1.1f nmap-libssh2-1.11.0 libz-1.2.11 libpcre2-10.34 libpcap-1.9.1 nmap-libdnet-1.12 ipv6
The text was updated successfully, but these errors were encountered: