got this error when I scanned our external facing website? anyone know the 'whys' this happened. it says 'scanned completed'.
Whats the error? Did you attach a pic?
Do you mean the message was displayed that way, with grammatical mistake?
I ‘snipped’ it from the ‘view’ portion of qualysguard.
Any number of issues could be happening. Your scan could be misconfigured and not be picking up the device (i.e. not using the external scanner). Or your firewall or IPS could be doing its job and dropping you to >>devnull
If it were me, I would probably create a custom scan profile and turn the performance down as to not set off any alarms and see what happens. Also remember to set it to the external scanner.
You could also take NMAP home and do a test scan there and see what the results are and if you are still getting dropped, thank your network guys.
On another note, your scan may be misconfigured. Here are the results of an NMAP scan.
Starting Nmap 6.00 ( http://nmap.org ) at 2013-08-01 09:19 Central Daylight Time
NSE: Loaded 93 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Ping Scan at 09:19
Scanning 22.214.171.124 [8 ports]
Completed Ping Scan at 09:19, 0.13s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 09:19
Completed Parallel DNS resolution of 1 host. at 09:19, 0.00s elapsed
Initiating SYN Stealth Scan at 09:19
Scanning 126.96.36.199 [1000 ports]
Discovered open port 21/tcp on 188.8.131.52
Discovered open port 80/tcp on 184.108.40.206
Discovered open port 443/tcp on 220.127.116.11
Completed SYN Stealth Scan at 09:19, 2.56s elapsed (1000 total ports)
Initiating Service scan at 09:19
Scanning 3 services on 18.104.22.168
Completed Service scan at 09:19, 17.58s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against 22.214.171.124
Retrying OS detection (try #2) against 126.96.36.199
Initiating Traceroute at 09:19
Completed Traceroute at 09:19, 0.02s elapsed
Initiating Parallel DNS resolution of 3 hosts. at 09:19
Completed Parallel DNS resolution of 3 hosts. at 09:19, 0.00s elapsed
NSE: Script scanning 188.8.131.52.
Initiating NSE at 09:19
Completed NSE at 09:20, 4.42s elapsed
Nmap scan report for 184.108.40.206
Host is up (0.000015s latency).
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
21/tcp open tcpwrapped
80/tcp open http Microsoft IIS httpd 7.5
| http-methods: OPTIONS TRACE GET HEAD POST
| Potentially risky methods: TRACE
| http-robots.txt: 8 disallowed entries
| /_admin/ /apps/ /_mm/ /_notes/ /_baks/ /MMWIP/
|_http-title: Gordon College, one of the top Christian colleges in America &...
|_http-favicon: Unknown favicon MD5: 3E5631287A5E02C569FC187A1CD82936
443/tcp open ssl/http Microsoft IIS httpd 7.5
|_sslv2: server still supports SSLv2
| ssl-cert: Subject: commonName=www.gordon.edu/organizationName=Gordon College/stateOrProvinceName=MA/countryName=US
| Issuer: commonName=COMODO High-Assurance Secure Server CA/organizationName=COMODO CA Limited/stateOrProvinceName=Greater Manchester/countryName=GB
| Public Key type: rsa
| Public Key bits: 2048
| Not valid before: 2012-02-24 00:00:00
| Not valid after: 2014-03-30 23:59:59
| MD5: 0d34 d0d5 21ac 5f47 97fc e5b1 a0b8 3b73
|_SHA-1: c2bc 62fc 8c6b 97b6 96eb e5ef 9857 4711 0f50 0d4c
|_http-title: Did not follow redirect to http://220.127.116.11/ and no page was returned.
1935/tcp filtered rtmp
Device type: specialized|general purpose
Running (JUST GUESSING): Comau embedded (97%), Linux 2.6.X (96%), OpenBSD 4.X (91%)
OS CPE: cpe:/o:linux:kernel:2.6.29 cpe:/o:openbsd:openbsd:4.0
Aggressive OS guesses: Comau C4G robot control unit (97%), Linux 2.6.29 (96%), OpenBSD 4.0 (91%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 0.000 days (since Thu Aug 01 09:19:48 2013)
Network Distance: 3 hops
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: Randomized
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
TRACEROUTE (using port 8080/tcp)
HOP RTT ADDRESS
1 0.00 ms xxx.xxx.local (xxx.xxx.xxx.xxx)
2 0.00 ms xxx.xxx.xxx.xxx
3 0.00 ms 18.104.22.168
NSE: Script Post-scanning.
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 36.06 seconds
Raw packets sent: 1110 (53.948KB) | Rcvd: 1035 (41.816KB)
Retrieving data ...