Host 188.134.82.94. We perform a port scan and collect primary information about NetBIOS:
Starting Nmap 7.92 ( https://nmap.org ) at 2022-03-09 06:23 MSK
Nmap scan report for 188x134x82x94.static-business.spb.ertelecom.ru (188.134.82.94)
Host is up (0.012s latency).

PORT    STATE         SERVICE      VERSION
137/tcp filtered      netbios-ns
139/tcp open          netbios-ssn  Microsoft Windows netbios-ssn
445/tcp open          microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WORKGROUP)
137/udp open          netbios-ns   Microsoft Windows netbios-ns (workgroup: WORKGROUP)
138/udp open|filtered netbios-dgm
Service Info: Host: LORD; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| nbstat: NetBIOS name: LORD, NetBIOS user: , NetBIOS MAC: 6c:f0:49:e0:f3:0e (Giga-byte Technology)
| Names:
|   LORD<00>             Flags: 
|   WORKGROUP<00>        Flags: 
|   LORD<20>             Flags: 
|   WORKGROUP<1e>        Flags: 
|   WORKGROUP<1d>        Flags: 
|_  \x01\x02__MSBROWSE__\x02<01>  Flags: 

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 120.16 seconds
The NBTscan utility collects information about NetBIOS names.
Doing NBT name scan for addresses from 188.134.82.94


NetBIOS Name Table for Host 188.134.82.94:

Incomplete packet, 209 bytes long.
Name             Service          Type             
----------------------------------------
LORD             Workstation Service
WORKGROUP        Domain Name
LORD             File Server Service
WORKGROUP        Browser Service Elections
WORKGROUP        Master Browser
__MSBROWSE__  Master Browser

Adapter address: 6c:f0:49:e0:f3:0e
----------------------------------------
The nbtscan-unixwiz utility scans NETBIOS, determines the computer name, workgroup (or domain), and lists running services.
188.134.82.94   WORKGROUP\LORD                  SHARING
  LORD           <00> UNIQUE Workstation Service
  WORKGROUP      <00> GROUP  Domain Name
  LORD           <20> UNIQUE File Server Service
  WORKGROUP      <1e> GROUP  Browser Service Elections
  WORKGROUP      <1d> UNIQUE Master Browser
  ..__MSBROWSE__.<01> GROUP  Master Browser
  6c:f0:49:e0:f3:0e   ETHER  188x134x82x94.static-business.spb.ertelecom.ru

We perform a port scan and collect primary information about SMB and Samba.
Starting Nmap 7.92 ( https://nmap.org ) at 2022-03-09 06:25 MSK
Nmap scan report for 188x134x82x94.static-business.spb.ertelecom.ru (188.134.82.94)
Host is up (0.011s latency).

PORT    STATE SERVICE      VERSION
139/tcp open  netbios-ssn  Microsoft Windows netbios-ssn
445/tcp open  microsoft-ds Windows 10 Enterprise 2016 LTSB 14393 microsoft-ds (workgroup: WORKGROUP)
Service Info: Host: LORD; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb-enum-shares: 
|   account_used: guest
|   \\188.134.82.94\ADMIN$: 
|     Type: STYPE_DISKTREE_HIDDEN
|     Comment: \xD0\xA3\xD0\xB4\xD0\xB0\xD0\xBB\xD0\xB5\xD0\xBD\xD0\xBD\xD1\x8B\xD0\xB9 Admin
|     Anonymous access: 
|     Current user access: 
|   \\188.134.82.94\C$: 
|     Type: STYPE_DISKTREE_HIDDEN
|     Comment: \xD0\xA1\xD1\x82\xD0\xB0\xD0\xBD\xD0\xB4\xD0\xB0\xD1\x80\xD1\x82\xD0\xBD\xD1\x8B\xD0\xB9 \xD0\xBE\xD0\xB1\xD1\x89\xD0\xB8\xD0\xB9 \xD1\x80\xD0\xB5\xD1\x81\xD1\x83\xD1\x80\xD1\x81
|     Anonymous access: 
|     Current user access: 
|   \\188.134.82.94\D$: 
|     Type: STYPE_DISKTREE_HIDDEN
|     Comment: \xD0\xA1\xD1\x82\xD0\xB0\xD0\xBD\xD0\xB4\xD0\xB0\xD1\x80\xD1\x82\xD0\xBD\xD1\x8B\xD0\xB9 \xD0\xBE\xD0\xB1\xD1\x89\xD0\xB8\xD0\xB9 \xD1\x80\xD0\xB5\xD1\x81\xD1\x83\xD1\x80\xD1\x81
|     Anonymous access: 
|     Current user access: 
|   \\188.134.82.94\E$: 
|     Type: STYPE_DISKTREE_HIDDEN
|     Comment: \xD0\xA1\xD1\x82\xD0\xB0\xD0\xBD\xD0\xB4\xD0\xB0\xD1\x80\xD1\x82\xD0\xBD\xD1\x8B\xD0\xB9 \xD0\xBE\xD0\xB1\xD1\x89\xD0\xB8\xD0\xB9 \xD1\x80\xD0\xB5\xD1\x81\xD1\x83\xD1\x80\xD1\x81
|     Anonymous access: 
|     Current user access: 
|   \\188.134.82.94\IPC$: 
|     Type: STYPE_IPC_HIDDEN
|     Comment: \xD0\xA3\xD0\xB4\xD0\xB0\xD0\xBB\xD0\xB5\xD0\xBD\xD0\xBD\xD1\x8B\xD0\xB9 IPC
|     Anonymous access: READ
|     Current user access: READ/WRITE
|   \\188.134.82.94\L$: 
|     Type: STYPE_DISKTREE_HIDDEN
|     Comment: \xD0\xA1\xD1\x82\xD0\xB0\xD0\xBD\xD0\xB4\xD0\xB0\xD1\x80\xD1\x82\xD0\xBD\xD1\x8B\xD0\xB9 \xD0\xBE\xD0\xB1\xD1\x89\xD0\xB8\xD0\xB9 \xD1\x80\xD0\xB5\xD1\x81\xD1\x83\xD1\x80\xD1\x81
|     Anonymous access: 
|     Current user access: 
|   \\188.134.82.94\M$: 
|     Type: STYPE_DISKTREE_HIDDEN
|     Comment: \xD0\xA1\xD1\x82\xD0\xB0\xD0\xBD\xD0\xB4\xD0\xB0\xD1\x80\xD1\x82\xD0\xBD\xD1\x8B\xD0\xB9 \xD0\xBE\xD0\xB1\xD1\x89\xD0\xB8\xD0\xB9 \xD1\x80\xD0\xB5\xD1\x81\xD1\x83\xD1\x80\xD1\x81
|     Anonymous access: 
|     Current user access: 
|   \\188.134.82.94\Upload: 
|     Type: STYPE_DISKTREE
|     Comment: 
|     Anonymous access: 
|     Current user access: READ
|   \\188.134.82.94\VFSRoot: 
|     Type: STYPE_DISKTREE
|     Comment: 
|     Anonymous access: 
|_    Current user access: READ
| smb2-security-mode: 
|   3.1.1: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2022-03-09T03:25:38
|_  start_date: 2022-03-07T09:26:09
| smb2-capabilities: 
|   2.0.2: 
|     Distributed File System
|   2.1: 
|     Distributed File System
|     Leasing
|     Multi-credit operations
|   3.0: 
|     Distributed File System
|     Leasing
|     Multi-credit operations
|   3.0.2: 
|     Distributed File System
|     Leasing
|     Multi-credit operations
|   3.1.1: 
|     Distributed File System
|     Leasing
|_    Multi-credit operations
| smb-protocols: 
|   dialects: 
|     NT LM 0.12 (SMBv1) [dangerous, but default]
|     2.0.2
|     2.1
|     3.0
|     3.0.2
|_    3.1.1
| smb-os-discovery: 
|   OS: Windows 10 Enterprise 2016 LTSB 14393 (Windows 10 Enterprise 2016 LTSB 6.3)
|   OS CPE: cpe:/o:microsoft:windows_10::-
|   Computer name: LORD
|   NetBIOS computer name: LORD\x00
|   Workgroup: WORKGROUP\x00
|_  System time: 2022-03-09T06:25:38+03:00

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 20.58 seconds
The enum4linux utility collects information about Samba
Starting enum4linux v0.9.1 ( http://labs.portcullis.co.uk/application/enum4linux/ ) on Wed Mar  9 06:25:55 2022

 =========================================( Target Information )=========================================

Target ........... 188.134.82.94
RID Range ........ 500-550,1000-1050
Username ......... ''
Password ......... ''
Known Usernames .. administrator, guest, krbtgt, domain admins, root, bin, none


 ===========================( Enumerating Workgroup/Domain on 188.134.82.94 )===========================


[+] Got domain/workgroup name: WORKGROUP


 ===============================( Nbtstat Information for 188.134.82.94 )===============================

Looking up status of 188.134.82.94
	LORD            <00> -         B <ACTIVE>  Workstation Service
	WORKGROUP       <00> - <GROUP> B <ACTIVE>  Domain/Workgroup Name
	LORD            <20> -         B <ACTIVE>  File Server Service
	WORKGROUP       <1e> - <GROUP> B <ACTIVE>  Browser Service Elections
	WORKGROUP       <1d> -         B <ACTIVE>  Master Browser
	..__MSBROWSE__. <01> - <GROUP> B <ACTIVE>  Master Browser

	MAC Address = 6C-F0-49-E0-F3-0E

 ===================================( Session Check on 188.134.82.94 )===================================


[E] Server doesn't allow session using username '', password ''.  Aborting remainder of tests.

The Nullinux utility tries to enumerate information about OS, domains, network shares, directories and users via SMB. Tries to login anonymously.
    Starting nullinux v5.5.0dev | 03-09-2022 06:25



[*] Enumerating Shares for: 188.134.82.94
        Shares                     Comments
   -------------------------------------------
   
[-] No Shares Detected

[*] Enumerating Domain Information for: 188.134.82.94
[-] Could not attain Domain SID

[*] Enumerating querydispinfo for: 188.134.82.94

[*] Enumerating enumdomusers for: 188.134.82.94

[*] Enumerating LSA for: 188.134.82.94

[*] Performing RID Cycling for: 188.134.82.94
[-] RID Failed: Could not attain Domain SID

[*] Testing 188.134.82.94 for Known Users

[*] Enumerating Group Memberships for: 188.134.82.94

[*] 0 unique user(s) identified
NMBscan utility scans SMB/NetBIOS network shares using NMB/SMB/NetBIOS protocols.
nmbscan version 1.2.6 - suip.biz - Wed Mar  9 06:25:57 AM MSK 2022
domain WORKGROUP
  server LORD
    ip-address 188.134.82.94
      ip-name 188x134x82x94.static-business.spb.ertelecom.ru
      mac-address 6C:F0:49:E0:F3:0E
      smb-mac-address 6C:F0:49:E0:F3:0E
The NetBIOS Share Scanner utility checks for available NetBIOS shares, i.e. network folders and network printers.
Scanning  188.134.82.94

Sharename       Type      Comment
---------       ----      -------
ADMIN$          Disk      Удаленный Admin
C$              Disk      Стандартный общий ресурс
D$              Disk      Стандартный общий ресурс
E$              Disk      Стандартный общий ресурс
IPC$            IPC       Удаленный IPC
L$              Disk      Стандартный общий ресурс
M$              Disk      Стандартный общий ресурс
Upload          Disk
VFSRoot         Disk
SMB1 disabled -- no workgroup available
Found share: M$
tree connect failed: Share is VISIBLE but password protected


Found share: L$
tree connect failed: Share is VISIBLE but password protected


Found share: ADMIN$
tree connect failed: Share is VISIBLE but password protected


Found share: VFSRoot
.                                   D        0  Sat Aug 28 03:16:41 2021
..                                  D        0  Sat Aug 28 03:16:41 2021
DUNE_VIDEO                         Dr        0  Tue Apr  6 23:32:57 2021
Upload                             Dr        0  Wed Aug 12 18:39:10 2020
VIDEO                              Dr        0  Sat Feb 22 20:27:37 2020
web.config                          A      168  Sat Aug 28 03:16:41 2021

949614079 blocks of size 4096. 257118636 blocks available


Found share: E$
tree connect failed: Share is VISIBLE but password protected


Found share: D$
tree connect failed: Share is VISIBLE but password protected


Found share: Upload
.                                   D        0  Mon Mar  7 11:14:30 2022
..                                  D        0  Mon Mar  7 11:14:30 2022
2014-06-17_00001.jpg                A   445290  Tue Jun 17 22:01:28 2014
2015-04-27_00001.jpg                A   390682  Mon Apr 27 21:47:45 2015
648377ac55d5328c9728b270049153e9.png      A  5125804  Tue Jun 17 15:38:10 2014
8e89f42a6b7631b02f9b0600e6eededb.png      A  7725124  Tue Jun 17 15:36:25 2014
ac130_vopros_o_HECU.mp3            Ar        0  Mon Mar  8 00:41:04 2021
Add Licence To Your Windows.reg      A     2364  Sat Jan 12 17:53:00 2008
AddOns_atlasloot.7z                 A  1279647  Thu Jan  6 19:51:02 2022
andrey-from-hecu.jpg                A    56422  Thu Nov 19 15:10:40 2020
blood.png                           A   800569  Mon Jun 22 03:26:14 2020
blood.rar                           A 29766995  Sun Jan 10 21:57:54 2016
Borderlands 2 by xatab-1.8.5.rar     Ar        0  Thu Apr 30 00:37:44 2020
Borderlands 2 by xatab-1.8.5.rar.torrent      A   193581  Mon May 18 12:36:01 2020
Borderlands-2.torrent               A    29182  Thu Aug 21 00:42:56 2014
Borderlands2.rar                    A  7552305  Sat Sep 19 21:39:58 2020
command.html                        A   100740  Thu Jun 24 14:49:25 2021
corp_lic_XP3.reg                    A     2838  Wed Jun 16 15:07:00 2010
daemon                              D        0  Wed Apr 28 07:32:39 2021
DIABDAT.MPQ                        Ar        0  Fri Apr 30 10:24:55 2021
Diablo-2.rar.torrent                A    19025  Wed Apr 23 16:16:27 2014
diablo.png                          A   731698  Sat Aug 30 16:29:13 2014
Diablo3.png                         A  2418925  Sun Dec 17 00:20:34 2017
directx                             D        0  Mon Jan  6 11:58:37 2020
dm_crossfire2_b20001.jpg            A   579545  Sun Oct 25 11:42:45 2020
dm_lockdown0000.jpg                 A   541154  Sun Oct 25 11:13:03 2020
drv                                 D        0  Sun Sep  5 14:48:25 2021
DSC_0029.JPG                       Ae  3017998  Tue May 26 13:47:56 2015
DSC_0030.JPG                       Ae  2808366  Tue May 26 13:48:12 2015
DSC_0100.JPG                        A  5248087  Thu Jun 11 19:13:45 2015
DSC_0101.JPG                        A  3186282  Thu Jun 11 19:17:17 2015
DSC_0105.JPG                        A  2052207  Thu Jun 11 20:39:01 2015
DTLiteInstaller.zip                 A   866966  Sun Mar  7 16:21:54 2021
ezquake-win32-3.2.zip               A  2200443  Mon May  4 00:47:36 2020
fav_regedit.reg                     A     4232  Sun Aug 13 11:22:06 2017
GameData.zip                        A  1369379  Sat Mar  1 17:46:22 2014
hellfire.mpq                       Ar        0  Tue Dec 14 15:46:38 2021
ipxwrapper-0.6.0.zip                A   129506  Wed Jun 29 23:46:41 2016
la2                                 D        0  Wed Aug 18 22:19:16 2021
LJ-M401dne-drv-installer_13068.exe      A 167853896  Fri Mar 19 14:18:56 2021
Microsoft.Office.2019x64.v2018.12.iso     Ar        0  Wed Aug 18 11:25:42 2021
NDP452-KB2901907-x86-x64-AllOS-ENU.zip      A 69885176  Sun Mar  7 16:24:04 2021
OpenVpn                             D        0  Fri Jan  7 16:51:45 2022
QUAKE.rar                           A 45110156  Sun Mar 30 13:07:19 2014
QUAKE.rar.torrent                   A    13988  Sun Nov  5 14:43:35 2017
Radmin_VPN_1.1.3969.3.rar           A 19179578  Sat Apr 25 14:55:12 2020
ru_windows_10_enterprise_2016_ltsb_x86x64.iso     Ar        0  Sat Aug  7 16:47:57 2021
scr.png                             A  1455064  Thu Oct 25 00:59:16 2018
Screenshot_2015-11-04_21_00_55_300140.jpg      A   817100  Wed Nov  4 21:01:39 2015
SkyNet_IPTV_playlist.m3u            A     3550  Thu Jun 15 12:09:54 2017
softether-vpnclient-v4.38-9760-rtm-2021.08.17-windows-x86_x64-intel.exe     Ar        0  Sun Aug 29 22:05:37 2021
softether-vpnclient-v4.38-9760-rtm-2021.08.17-windows-x86_x64-intel.rar      A 43550634  Sun Aug 29 22:19:45 2021
start_rdmin.bat                     A       77  Sat May 29 13:47:42 2021
stop_rdmin.bat                      A       78  Sat May 29 13:47:43 2021
TeamViewerPortable_12.0.71503.zip      A 22613465  Mon Dec  5 13:21:33 2016
tele.html                           A   461359  Thu Jun 24 14:49:47 2021
tmp                                 D        0  Mon Mar  7 11:14:30 2022
trinity_command.html                A   134436  Thu Jun 24 14:49:55 2021
TS3                                 D        0  Tue Jun 16 14:12:28 2020
upd-pcl6-x64-7.0.0.24832.exe        A 20216840  Fri Mar 19 14:15:49 2021
UTbasePatch436-451nodelta.rar       A 33519363  Mon Jan 15 17:04:00 2007
vc2008sp1AtlUpdate                  D        0  Mon Jan  6 11:58:39 2020
vcr2010                             D        0  Tue Jun 16 14:12:28 2020
vcredist_x64_2015.exe               A 14572000  Fri Aug 19 18:09:52 2016
vcredist_x64_2017.exe               A 15222904  Wed Aug 16 16:46:04 2017
vcredist_x64_2019.exe               A 14887048  Thu Nov 26 12:38:05 2020
vpn                                 D        0  Thu Aug 20 23:33:46 2020
WADS                               Dr        0  Thu Aug 20 23:35:07 2020
War3                                D        0  Mon Aug  9 13:30:36 2021
web.config                        AHS      168  Sun Aug  4 20:00:36 2013
wiki-grub.txt                       A       88  Sat Feb 20 22:30:41 2021
Windows_10_PRO_1909_x64_Rus.iso      A 3387850752  Tue Apr 13 11:45:19 2021
WinRar                              D        0  Wed Jan 27 12:54:40 2021
WoW                                 D        0  Fri Feb 18 10:19:07 2022
WoWSimpleRegistration-master.zip      A 67528928  Fri Jul 23 10:33:09 2021
YoggSaron.mp3                       A   887037  Mon Nov 26 00:19:31 2012
zandronum-3.0.1.rar                 A  3691735  Sat Apr 25 01:25:33 2020
защищайте_меня.mp3      A   163132  Sun Oct 13 19:21:05 2013

949614079 blocks of size 4096. 257118636 blocks available


Found share: C$
tree connect failed: Share is VISIBLE but password protected