Nmap scan report for vap-bp2.sip.thinkingphones.net (170.76.189.56) Host is up (0.061s latency). Not shown: 998 filtered ports PORT STATE SERVICE VERSION 5060/tcp open sip Fuze SIP Border Proxy (v1.10.3-11) (Status: 403 Forbidden) | fingerprint-strings: | SIPOptions: | SIP/2.0 403 Forbidden | Via: SIP/2.0/TCP nm;received=208.76.253.234;rport=34752;branch=foo | From: ;tag=root | ;tag=aaefa9537d5168e23e2a645faf38cb7e.fe3b | Call-ID: 50000 | CSeq: 42 OPTIONS | Server: Fuze SIP Border Proxy (v1.10.3-11) |_ Content-Length: 0 5061/tcp open ssl/sip Fuze SIP Border Proxy (v1.10.3-11) (Status: 403 Forbidden) | fingerprint-strings: | SIPOptions: | SIP/2.0 403 Forbidden | Via: SIP/2.0/TCP nm;received=208.76.253.234;rport=53336;branch=foo | From: ;tag=root | ;tag=aaefa9537d5168e23e2a645faf38cb7e.fe3b | Call-ID: 50000 | CSeq: 42 OPTIONS | Server: Fuze SIP Border Proxy (v1.10.3-11) |_ Content-Length: 0 | ssl-cert: Subject: commonName=border.sip.thinkingphones.net/organizationName=Fuze, Inc./stateOrProvinceName=Massachusetts/countryName=US | Subject Alternative Name: DNS:border.sip.thinkingphones.net, DNS:border-aup.sip.thinkingphones.net, DNS:border-aux.sip.thinkingphones.net, DNS:border-brp.sip.thinkingphones.net, DNS:border-cad.sip.thinkingphones.net, DNS:border-cap.sip.thinkingphones.net, DNS:border-cas.sip.thinkingphones.net, DNS:border-dep.sip.thinkingphones.net, DNS:border-hkp.sip.thinkingphones.net, DNS:border-sgp.sip.thinkingphones.net, DNS:border-ukp.sip.thinkingphones.net, DNS:border-vad.sip.thinkingphones.net, DNS:border-vap.sip.thinkingphones.net, DNS:border-vas.sip.thinkingphones.net, DNS:border-vbd.sip.thinkingphones.net, DNS:border-zap.sip.thinkingphones.net | Not valid before: 2023-02-23T00:00:00 |_Not valid after: 2024-03-25T23:59:59 |_ssl-date: 2023-11-20T01:30:13+00:00; 0s from scanner time. 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port5060-TCP:V=7.70%I=7%D=11/19%Time=655AB68A%P=x86_64-redhat-linux-gnu SF:%r(SIPOptions,117,"SIP/2\.0\x20403\x20Forbidden\r\nVia:\x20SIP/2\.0/TCP SF:\x20nm;received=208\.76\.253\.234;rport=34752;branch=foo\r\nFrom:\x20;tag=root\r\nTo:\x20;tag=aaefa9537d5168e23e2a645f SF:af38cb7e\.fe3b\r\nCall-ID:\x2050000\r\nCSeq:\x2042\x20OPTIONS\r\nServer SF::\x20Fuze\x20SIP\x20Border\x20Proxy\x20\(v1\.10\.3-11\)\r\nContent-Leng SF:th:\x200\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port5061-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655AB68E%P=x86_64-redhat-lin SF:ux-gnu%r(SIPOptions,117,"SIP/2\.0\x20403\x20Forbidden\r\nVia:\x20SIP/2\ SF:.0/TCP\x20nm;received=208\.76\.253\.234;rport=53336;branch=foo\r\nFrom: SF:\x20;tag=root\r\nTo:\x20;tag=aaefa9537d5168e23e SF:2a645faf38cb7e\.fe3b\r\nCall-ID:\x2050000\r\nCSeq:\x2042\x20OPTIONS\r\n SF:Server:\x20Fuze\x20SIP\x20Border\x20Proxy\x20\(v1\.10\.3-11\)\r\nConten SF:t-Length:\x200\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 2.6.X|3.X OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 OS details: Linux 2.6.32 - 3.10, Linux 2.6.32 - 3.13 Network Distance: 13 hops TRACEROUTE (using port 5061/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177 2 0.61 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.68 ms multacom.com (96.45.162.9) 4 0.35 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121) 5 ... 6 7 58.02 ms ae-1.a05.asbnva02.us.bb.gin.ntt.net (129.250.3.244) 8 57.92 ms xe-0-4-3-1.a05.asbnva02.us.ce.gin.ntt.net (128.241.1.242) 9 60.58 ms vr-core-fra1.inf.thinkingphones.net (45.252.184.17) 10 ... 11 58.15 ms 7.94.1.102 12 ... 13 65.43 ms 170.76.189.56 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 75.70 seconds