Starting Nmap 7.40 (
https://nmap.org ) at 2017-04-08 07:36 Stoední Evropa (letní eas)
NSE: Loaded 143 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 07:36
Completed NSE at 07:36, 0.00s elapsed
Initiating NSE at 07:36
Completed NSE at 07:36, 0.00s elapsed
Initiating ARP Ping Scan at 07:36
Scanning 192.168.1.162 [1 port]
Completed ARP Ping Scan at 07:36, 0.47s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 07:36
Completed Parallel DNS resolution of 1 host. at 07:36, 0.00s elapsed
Initiating SYN Stealth Scan at 07:36
Scanning oipkam.lan (192.168.1.162) [1000 ports]
Completed SYN Stealth Scan at 07:36, 5.01s elapsed (1000 total ports)
Initiating Service scan at 07:36
Initiating OS detection (try #1) against ipcam.lan (192.168.1.162)
Retrying OS detection (try #2) against ipcam.lan (192.168.1.162)
NSE: Script scanning 192.168.1.162.
Initiating NSE at 07:36
Completed NSE at 07:36, 0.00s elapsed
Initiating NSE at 07:36
Completed NSE at 07:36, 0.00s elapsed
Nmap scan report for ipcam.lan (192.168.1.162)
Host is up (0.015s latency).
All 1000 scanned ports on ipcam.lan (192.168.1.162) are closed
MAC Address: E0:B9:4D:F8:4A:9B (Shenzhen Bilian Electronicltd)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: 2N Helios IP VoIP doorbell (95%), Advanced Illumination DCS-100E lighting controller (95%), AudioControl D3400 network amplifier (95%), British Gas GS-Z3 data logger (95%), Denver Electronics AC-5000W MK2 camera (95%), Espressif ESP8266 WiFi system-on-a-chip (95%), Fatek FBs-CBEH PLC Ethernet communication board (95%), Grandstream GXP1105 VoIP phone (95%), iRobot Roomba 980 vacuum cleaner (95%), LaSAT satellite receiver (95%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop
TRACEROUTE
HOP RTT ADDRESS
1 15.36 ms ipcam.lan (192.168.1.162)
NSE: Script Post-scanning.
Initiating NSE at 07:36
Completed NSE at 07:36, 0.00s elapsed
Initiating NSE at 07:36
Completed NSE at 07:36, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 10.52 seconds
Raw packets sent: 1057 (47.632KB) | Rcvd: 1267 (101.406KB)