┌──(root㉿kali)-[~] └─# rustscan -a 192.168.43.48 .----. .-. .-. .----..---. .----. .---. .--. .-. .-. | {} }| { } |{ {__ {_ _}{ {__ / ___} / {} \ | `| | | .-. \| {_} |.-._} } | | .-._} }\ }/ /\ \| |\ | `-' `-'`-----'`----' `-' `----' `---' `-' `-'`-' `-' The Modern Day Port Scanner. ________________________________________ : http://discord.skerritt.blog : : https://github.com/RustScan/RustScan : -------------------------------------- Port scanning: Because every port has a story to tell.
[~] The config file is expected to be at "/root/.rustscan.toml" [!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers [!] Your file limit is very small, which negatively impacts RustScan's speed. Use the Docker image, or up the Ulimit with '--ulimit 5000'. Open 192.168.43.48:22 Open 192.168.43.48:80 [~] Starting Script(s) [~] Starting Nmap 7.95 ( https://nmap.org ) at 2026-04-09 04:06 EDT Initiating ARP Ping Scan at 04:06 Scanning 192.168.43.48 [1 port] Completed ARP Ping Scan at 04:06, 0.05s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 04:06 Completed Parallel DNS resolution of 1 host. at 04:06, 0.16s elapsed DNS resolution of 1 IPs took 0.16s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan at 04:06 Scanning 192.168.43.48 [2 ports] Discovered open port 22/tcp on 192.168.43.48 Discovered open port 80/tcp on 192.168.43.48 Completed SYN Stealth Scan at 04:06, 0.04s elapsed (2 total ports) Nmap scan report for 192.168.43.48 Host is up, received arp-response (0.00055s latency). Scanned at 2026-04-09 04:06:26 EDT for 0s
PORT STATE SERVICE REASON 22/tcp open ssh syn-ack ttl 64 80/tcp open http syn-ack ttl 64 MAC Address: 08:00:27:5F:EE:09 (PCS Systemtechnik/Oracle VirtualBox virtual NIC)
Read data files from: /usr/share/nmap Nmap done: 1 IP address (1 host up) scanned in 0.38 seconds Raw packets sent: 3 (116B) | Rcvd: 3 (116B)