Ubuntu - nmap - Intense scan, all TCP ports

Scans all TCP ports, then does OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (–traceroute).

sudo nmap -p 1-65535 -T4 -A -v 192.168.1.69

result:

Starting Nmap 6.40 ( http://nmap.org ) at 2016-07-08 01:51 BST
NSE: Loaded 110 scripts for scanning.
NSE: Script Pre-scanning.
Initiating Parallel DNS resolution of 1 host. at 01:51
Completed Parallel DNS resolution of 1 host. at 01:51, 0.00s elapsed
Initiating SYN Stealth Scan at 01:51
Scanning peter-laptop-1 (192.168.1.69) [65535 ports]
Discovered open port 445/tcp on 192.168.1.69
Discovered open port 80/tcp on 192.168.1.69
Discovered open port 139/tcp on 192.168.1.69
Discovered open port 17500/tcp on 192.168.1.69
Completed SYN Stealth Scan at 01:51, 6.54s elapsed (65535 total ports)
Initiating Service scan at 01:51
Scanning 4 services on peter-laptop-1 (192.168.1.69)
Completed Service scan at 01:52, 18.54s elapsed (4 services on 1 host)
Initiating OS detection (try #1) against peter-laptop-1 (192.168.1.69)
Retrying OS detection (try #2) against peter-laptop-1 (192.168.1.69)
Retrying OS detection (try #3) against peter-laptop-1 (192.168.1.69)
Retrying OS detection (try #4) against peter-laptop-1 (192.168.1.69)
adjust_timeouts2: packet supposedly had rtt of -200722 microseconds.  Ignoring time.
adjust_timeouts2: packet supposedly had rtt of -200722 microseconds.  Ignoring time.
Retrying OS detection (try #5) against peter-laptop-1 (192.168.1.69)
NSE: Script scanning 192.168.1.69.
Initiating NSE at 01:52
Completed NSE at 01:52, 0.16s elapsed
Nmap scan report for peter-laptop-1 (192.168.1.69)
Host is up (0.000041s latency).
Not shown: 65531 closed ports
PORT      STATE SERVICE     VERSION
80/tcp    open  http        nginx 1.4.6 (Ubuntu)
|_http-methods: No Allow or Public header in OPTIONS response (status code 405)
|_http-title: Site doesn't have a title (text/html).
139/tcp   open  netbios-ssn Samba smbd 3.X (workgroup: PETER-LAPTOP-1)
445/tcp   open  netbios-ssn Samba smbd 3.X (workgroup: PETER-LAPTOP-1)
17500/tcp open  ssl/db-lsp?
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=6.40%E=4%D=7/8%OT=80%CT=1%CU=36983%PV=Y%DS=0%DC=L%G=Y%TM=577EF940
OS:%P=x86_64-pc-linux-gnu)SEQ(SP=102%GCD=1%ISR=10D%TI=Z%CI=I%TS=8)SEQ(SP=10
OS:2%GCD=1%ISR=10D%TI=Z%II=I%TS=8)OPS(O1=MFFD7ST11NW7%O2=MFFD7ST11NW7%O3=MF
OS:FD7NNT11NW7%O4=MFFD7ST11NW7%O5=MFFD7ST11NW7%O6=MFFD7ST11)WIN(W1=AAAA%W2=
OS:AAAA%W3=AAAA%W4=AAAA%W5=AAAA%W6=AAAA)ECN(R=Y%DF=Y%T=40%W=AAAA%O=MFFD7NNS
OS:NW7%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%
OS:DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%
OS:O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=40%
OS:W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%
OS:RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
 
Uptime guess: 0.241 days (since Thu Jul  7 20:05:36 2016)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=258 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
 
Host script results:
| nbstat: 
|   NetBIOS name: PETER-LAPTOP-1, NetBIOS user: <unknown>, NetBIOS MAC: <unknown>
|   Names
|     PETER-LAPTOP-1<00>   Flags: <unique><active>
|     PETER-LAPTOP-1<03>   Flags: <unique><active>
|     PETER-LAPTOP-1<20>   Flags: <unique><active>
|     \x01\x02__MSBROWSE__\x02<01>  Flags: <group><active>
|     WORKGROUP<00>        Flags: <group><active>
|     WORKGROUP<1d>        Flags: <unique><active>
|_    WORKGROUP<1e>        Flags: <group><active>
| smb-os-discovery: 
|   OS: Windows 6.1 (Samba 4.3.9-Ubuntu)
|   Computer name: peter-laptop-1
|   NetBIOS computer name: PETER-LAPTOP-1
|   Domain name: 
|   FQDN: peter-laptop-1
|_  System time: 2016-07-08T01:52:15+01:00
| smb-security-mode: 
|   Account that was used for smb scripts: guest
|   User-level authentication
|   SMB Security: Challenge/response passwords supported
|_  Message signing disabled (dangerous, but default)
|_smbv2-enabled: Server supports SMBv2 protocol
 
NSE: Script Post-scanning.
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 41.37 seconds
           Raw packets sent: 65797 (2.906MB) | Rcvd: 131627 (5.546MB)