Host 78.29.14.143. We perform a port scan and collect primary information about NetBIOS:
Starting Nmap 7.92 ( https://nmap.org ) at 2022-05-17 09:20 MSK
Nmap scan report for pool-78-29-14-143.is74.ru (78.29.14.143)
Host is up (0.026s latency).

PORT    STATE         SERVICE      VERSION
137/tcp closed        netbios-ns
139/tcp open          netbios-ssn  Microsoft Windows netbios-ssn
445/tcp filtered      microsoft-ds
137/udp open          netbios-ns   Microsoft Windows netbios-ns (workgroup: BOTNET)
138/udp open|filtered netbios-dgm
Service Info: Host: GT118; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| nbstat: NetBIOS name: GT118, NetBIOS user: , NetBIOS MAC: bc:ae:c5:96:3b:30 (Asustek Computer)
| Names:
|   GT118<00>            Flags: 
|   BOTNET<00>           Flags: 
|   BOTNET<1e>           Flags: 
|   BOTNET<1d>           Flags: 
|_  \x01\x02__MSBROWSE__\x02<01>  Flags: 

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 120.27 seconds
The NBTscan utility collects information about NetBIOS names.
Doing NBT name scan for addresses from 78.29.14.143


NetBIOS Name Table for Host 78.29.14.143:

Name             Service          Type             
----------------------------------------
GT118            Workstation Service
BOTNET           Domain Name
BOTNET           Browser Service Elections
BOTNET           Master Browser
__MSBROWSE__  Master Browser

Adapter address: bc:ae:c5:96:3b:30
----------------------------------------
The nbtscan-unixwiz utility scans NETBIOS, determines the computer name, workgroup (or domain), and lists running services.
78.29.14.143    BOTNET\GT118                   
  GT118          <00> UNIQUE Workstation Service
  BOTNET         <00> GROUP  Domain Name
  BOTNET         <1e> GROUP  Browser Service Elections
  BOTNET         <1d> UNIQUE Master Browser
  ..__MSBROWSE__.<01> GROUP  Master Browser
  bc:ae:c5:96:3b:30   ETHER  pool-78-29-14-143.is74.ru

We perform a port scan and collect primary information about SMB and Samba.
Starting Nmap 7.92 ( https://nmap.org ) at 2022-05-17 09:22 MSK
Nmap scan report for pool-78-29-14-143.is74.ru (78.29.14.143)
Host is up (0.026s latency).

PORT    STATE    SERVICE      VERSION
139/tcp open     netbios-ssn  Microsoft Windows netbios-ssn
445/tcp filtered microsoft-ds
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_smb2-time: ERROR: Script execution failed (use -d to debug)
|_smb2-security-mode: SMB: Couldn't find a NetBIOS name that works for the server. Sorry!
|_smb2-capabilities: SMB: Couldn't find a NetBIOS name that works for the server. Sorry!

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 18.33 seconds
The enum4linux utility collects information about Samba
Starting enum4linux v0.9.1 ( http://labs.portcullis.co.uk/application/enum4linux/ ) on Tue May 17 09:22:23 2022

 =========================================( Target Information )=========================================

Target ........... 78.29.14.143
RID Range ........ 500-550,1000-1050
Username ......... ''
Password ......... ''
Known Usernames .. administrator, guest, krbtgt, domain admins, root, bin, none


 ============================( Enumerating Workgroup/Domain on 78.29.14.143 )============================


[+] Got domain/workgroup name: WORKGROUP


 ================================( Nbtstat Information for 78.29.14.143 )================================

Looking up status of 78.29.14.143
	GT118           <00> -         B <ACTIVE>  Workstation Service
	BOTNET          <00> - <GROUP> B <ACTIVE>  Domain/Workgroup Name
	BOTNET          <1e> - <GROUP> B <ACTIVE>  Browser Service Elections
	BOTNET          <1d> -         B <ACTIVE>  Master Browser
	..__MSBROWSE__. <01> - <GROUP> B <ACTIVE>  Master Browser

	MAC Address = BC-AE-C5-96-3B-30

 ===================================( Session Check on 78.29.14.143 )===================================


[E] Server doesn't allow session using username '', password ''.  Aborting remainder of tests.

The Nullinux utility tries to enumerate information about OS, domains, network shares, directories and users via SMB. Tries to login anonymously.
    Starting nullinux v5.5.0dev | 05-17-2022 09:22



[*] Enumerating Shares for: 78.29.14.143
        Shares                     Comments
   -------------------------------------------
   
[-] No Shares Detected

[*] Enumerating Domain Information for: 78.29.14.143
[-] Could not attain Domain SID

[*] Enumerating querydispinfo for: 78.29.14.143

[*] Enumerating enumdomusers for: 78.29.14.143

[*] Enumerating LSA for: 78.29.14.143

[*] Performing RID Cycling for: 78.29.14.143
[-] RID Failed: Could not attain Domain SID

[*] Testing 78.29.14.143 for Known Users

[*] Enumerating Group Memberships for: 78.29.14.143

[*] 0 unique user(s) identified
NMBscan utility scans SMB/NetBIOS network shares using NMB/SMB/NetBIOS protocols.
nmbscan version 1.2.6 - Tue May 17 09:23:21 AM MSK 2022
domain BOTNET
  server -
    ip-address 78.29.14.143
      ip-name pool-78-29-14-143.is74.ru
      mac-address BC:AE:C5:96:3B:30
      smb-mac-address BC:AE:C5:96:3B:30