Escanear informe para "mirrors.ocf.berkeley.edu"

Nivel de membresía: Miembro gratuito
Escanea la información del sistema operativo y Traceroute (nmap -A mirrors.ocf.berkeley.edu)
Nmap scan report for mirrors.ocf.berkeley.edu (169.229.200.70)
Host is up (0.012s latency).
Other addresses for mirrors.ocf.berkeley.edu (not scanned): 2607:f140:0:32::70
Not shown: 989 closed ports
PORT     STATE    SERVICE        VERSION
22/tcp   open     ssh            OpenSSH 9.2p1 Debian 2+deb12u1 (protocol 2.0)
80/tcp   open     http           nginx 1.22.1
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: nginx/1.22.1
|_http-title: OCF Mirrors
111/tcp  open     rpcbind        2-4 (RPC #100000)
| rpcinfo: 
|   program version   port/proto  service
|   100000  2,3,4        111/tcp  rpcbind
|_  100000  2,3,4        111/udp  rpcbind
135/tcp  filtered msrpc
139/tcp  filtered netbios-ssn
161/tcp  filtered snmp
443/tcp  open     ssl/http       nginx 1.22.1
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: nginx/1.22.1
|_http-title: OCF Mirrors
| ssl-cert: Subject: commonName=fallingrocks.ocf.berkeley.edu
| Subject Alternative Name: DNS:apt.ocf.berkeley.edu, DNS:apt.ocf.io, DNS:fallingrocks.ocf.berkeley.edu, DNS:fallingrocks.ocf.io, DNS:mirrors.ocf.berkeley.edu, DNS:mirrors.ocf.io
| Not valid before: 2023-10-24T09:24:59
|_Not valid after:  2024-01-22T09:24:58
445/tcp  filtered microsoft-ds
593/tcp  filtered http-rpc-epmap
873/tcp  open     rsync          (protocol version 31)
9100/tcp open     jetdirect?
Aggressive OS guesses: Linux 2.6.32 (96%), Linux 3.2 - 4.9 (96%), Linux 3.3 (96%), Linux 2.6.32 - 3.10 (96%), Linux 3.4 - 3.10 (95%), Linux 3.1 (94%), Linux 3.2 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), Synology DiskStation Manager 5.2-5644 (94%), Netgear RAIDiator 4.2.28 (94%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 21/tcp)
HOP RTT      ADDRESS
1   0.22 ms  208.76.251.177
2   0.51 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.99 ms  multacom.com (96.45.162.9)
4   0.58 ms  ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5   ... 6
7   0.68 ms  CENIC.ear1.LosAngeles1.Level3.net (4.35.156.66)
8   12.59 ms dc-lax-agg8--lax-agg10-300g.cenic.net (137.164.11.71)
9   12.35 ms dc-svl-agg8--lax-agg8--100g--2.cenic.net (137.164.11.21)
10  12.02 ms dc-svl-agg10--svl-agg8-300g.cenic.net (137.164.11.80)
11  11.99 ms ewdc-322-dr2--e59.net.berkeley.edu (128.32.255.45)
12  11.96 ms 169.229.200.70

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 143.14 seconds
Esquema de color
Objetivo
mirrors.ocf.berkeley.edu
IP de destino
169.229.200.70
País de destino
US
Método de escaneo
Escanea la información del sistema operativo y Traceroute
Comando
nmap -A mirrors.ocf.berkeley.edu
Fecha de escaneo
20 Nov 2023 19:17
Copiar resultado de escaneo
Descargar resultado
Eliminar resultado de escaneo
$
Escaneos totales
Unas 3 veces
Algunos cortafuegos bloquean los escaneos de puertos. Para obtener verdaderos resultados positivos, agregue las direcciones IP de portscanner.online (208.76.253.232-208.76.253.239 o CIDR 208.76.253.232/29) a la lista blanca
[scan_method]
Visibilidad:
Método de escaneo: