rustscan -a 192.168.56.103 --ulimit 5000 -- -sV -O .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner. ________________________________________ : http://discord.skerritt.blog : : https://github.com/RustScan/RustScan : -------------------------------------- TCP handshake? More like a friendly high-five! [~] The config file is expected to be at "/home/tlgjm/.rustscan.toml" [~] Automatically increasing ulimit value to 5000. Open 192.168.56.103:22 Open 192.168.56.103:80 Open 192.168.56.103:1212 [~] Starting Script(s) [>] Running script "nmap -vvv -p {{port}} -{{ipversion}} {{ip}} -sV -O" on ip 192.168.56.103 Depending on the complexity of the script, results may take some time to appear. [~] Starting Nmap 7.98 ( https://nmap.org ) at 2026-03-12 16:41 +0800 NSE: Loaded 48 scripts for scanning. Initiating ARP Ping Scan at 16:41 Scanning 192.168.56.103 [1 port] Completed ARP Ping Scan at 16:41, 0.05s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 16:41 Completed Parallel DNS resolution of 1 host. at 16:41, 0.50s elapsed DNS resolution of 1 IPs took 0.50s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 16:41 Scanning 192.168.56.103 [3 ports] Discovered open port 22/tcp on 192.168.56.103 Discovered open port 80/tcp on 192.168.56.103 Discovered open port 1212/tcp on 192.168.56.103 Completed SYN Stealth Scan at 16:41, 0.02s elapsed (3 total ports) Initiating Service scan at 16:41 Scanning 3 services on 192.168.56.103 Completed Service scan at 16:41, 6.07s elapsed (3 services on 1 host) Initiating OS detection (try #1) against 192.168.56.103 NSE: Script scanning 192.168.56.103. NSE: Starting runlevel 1 (of 2) scan. Initiating NSE at 16:41 Completed NSE at 16:41, 0.07s elapsed NSE: Starting runlevel 2 (of 2) scan. Initiating NSE at 16:41 Completed NSE at 16:41, 0.01s elapsed Nmap scan report for 192.168.56.103 Host is up, received arp-response (0.00098s latency). Scanned at 2026-03-12 16:41:25 CST for 8s PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 64 OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0) 80/tcp open http syn-ack ttl 64 Apache httpd 2.4.66 ((Debian)) 1212/tcp open http syn-ack ttl 64 Werkzeug httpd 2.2.2 (Python 3.11.2) MAC Address: 08:00:27:71:FE:6C (Oracle VirtualBox virtual NIC) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|router Running: Linux 4.X|5.X, MikroTik RouterOS 7.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3 OS details: Linux 4.15 - 5.19, OpenWrt 21.02 (Linux 5.4), MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3) TCP/IP fingerprint: OS:SCAN(V=7.98%E=4%D=3/12%OT=22%CT=%CU=31394%PV=Y%DS=1%DC=D%G=N%M=080027%TM OS:=69B27C3D%P=x86_64-pc-linux-gnu)SEQ(SP=104%GCD=1%ISR=10A%TI=Z%CI=Z%II=I% OS:TS=A)OPS(O1=M5B4ST11NW7%O2=M5B4ST11NW7%O3=M5B4NNT11NW7%O4=M5B4ST11NW7%O5 OS:=M5B4ST11NW7%O6=M5B4ST11)WIN(W1=FE88%W2=FE88%W3=FE88%W4=FE88%W5=FE88%W6= OS:FE88)ECN(R=Y%DF=Y%T=40%W=FAF0%O=M5B4NNSNW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O% OS:A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0 OS:%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S OS:=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R OS:=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N OS:%T=40%CD=S) Uptime guess: 46.464 days (since Sun Jan 25 05:33:21 2026) Network Distance: 1 hop TCP Sequence Prediction: Difficulty=260 (Good luck!) IP ID Sequence Generation: All zeros Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Read data files from: /usr/share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 8.42 seconds Raw packets sent: 26 (1.938KB) | Rcvd: 18 (1.410KB)