# Nmap 7.93 scan initiated Sat Jan 28 20:06:56 2023 as: nmap -vv --reason -Pn -T4 -sU -A --top-ports 100 -oN /home/kali/htb/results/scans/_top_100_udp_nmap.txt -oX /home/kali/htb/results/scans/xml/_top_100_udp_nmap.xml 10.129.123.2 Warning: 10.129.123.2 giving up on port because retransmission cap hit (6). Increasing send delay for 10.129.123.2 from 100 to 200 due to 11 out of 11 dropped probes since last increase. Increasing send delay for 10.129.123.2 from 200 to 400 due to 11 out of 11 dropped probes since last increase. Increasing send delay for 10.129.123.2 from 400 to 800 due to 11 out of 11 dropped probes since last increase. adjust_timeouts2: packet supposedly had rtt of -184576 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -184576 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -303015 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -303015 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -527666 microseconds. Ignoring time. adjust_timeouts2: packet supposedly had rtt of -527666 microseconds. Ignoring time. Nmap scan report for encoding.htb (10.129.123.2) Host is up, received user-set (0.026s latency). Scanned at 2023-01-28 20:06:56 CET for 244s Not shown: 84 closed udp ports (port-unreach) PORT STATE SERVICE REASON VERSION 68/udp open|filtered dhcpc no-response 80/udp open|filtered http no-response 111/udp open|filtered rpcbind no-response 120/udp open|filtered cfdptkt no-response 135/udp open|filtered msrpc no-response 177/udp open|filtered xdmcp no-response 520/udp open|filtered route no-response 593/udp open|filtered http-rpc-epmap no-response 998/udp open|filtered puparp no-response 999/udp open|filtered applix no-response 3703/udp open|filtered adobeserver-3 no-response 4500/udp open|filtered nat-t-ike no-response 49186/udp open|filtered unknown no-response 49190/udp open|filtered unknown no-response 49192/udp open|filtered unknown no-response 49193/udp open|filtered unknown no-response Too many fingerprints match this host to give specific OS details TCP/IP fingerprint: SCAN(V=7.93%E=4%D=1/28%OT=%CT=%CU=7%PV=Y%DS=2%DC=T%G=N%TM=63D57344%P=x86_64-pc-linux-gnu) SEQ(CI=Z%II=I) SEQ(CI=Z) T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=) T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=) U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G) IE(R=Y%DFI=N%T=40%CD=S) Network Distance: 2 hops TRACEROUTE (using port 49152/udp) HOP RTT ADDRESS 1 25.83 ms 10.10.14.1 2 26.04 ms encoding.htb (10.129.123.2) Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Sat Jan 28 20:11:00 2023 -- 1 IP address (1 host up) scanned in 243.96 seconds