chan #server
!login Your Password
!join #example
!part #example
!dl.start C:file.exe 1 (0=No 1=Execute)
!dl.stop (To Stopping Download)
!update 1 (0=No 1=Execute)
!remove (To Removing the Bot)
!msn.msg Its Your Body @ the Image?
Resolved : [] To []
Initiating SYN Stealth Scan against ( ) [1660 ports] at 06:16
Discovered open port 80/tcp on
Discovered open port 21/tcp on
Discovered open port 1723/tcp on
Discovered open port 443/tcp on
Discovered open port 22/tcp on
Discovered open port 3128/tcp on
The SYN Stealth Scan took 42.33s to scan 1660 total ports.
Initiating service scan against 6 services on ( at 06:17
The service scan took 94.02s to scan 6 services on 1 host.
For OSScan assuming that port 21 is open and port 1 is closed and neither are firewalled
Host ( appears to be up … good.
Interesting ports on (
(The 1639 ports scanned but not shown below are in state: closed)
21/tcp open ftp?
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
25/tcp filtered smtp
80/tcp open ssh OpenSSH 4.3 (protocol 2.0)
135/tcp filtered msrpc
137/tcp filtered netbios-ns
139/tcp filtered netbios-ssn
443/tcp open https?
445/tcp filtered microsoft-ds
465/tcp filtered smtps
593/tcp filtered http-rpc-epmap
1068/tcp filtered instl_bootc
1434/tcp filtered ms-sql-m
1723/tcp open pptp?
2048/tcp filtered dls-monitor
2500/tcp filtered rtsserv
3128/tcp open squid-http?
4444/tcp filtered krb524
5900/tcp filtered vnc
6346/tcp filtered gnutella
6667/tcp filtered irc

Categories: Uncategorized


Anonymous - May 4, 2009 at 9:19 am

[REQUEST_URI] => /index.php?s=

Ебем блогъри - May 5, 2009 at 5:36 pm

You are complete idiots. Those are automated RFI requests by botnets as a retailiation because that blog exposes information about botnets. Do you find any malicious php code on that page?

zsuffa - July 3, 2009 at 11:51 am

here is a little FUCK YOU for you guys whi make this blog from HUNGARY !!!!!

David - July 11, 2009 at 9:08 am


Comments are closed