Escanear informe para "n103.meraki.com"

Nivel de membresía: Miembro gratuito
Sumario

Puertos

5

Duración

3mín. 34.59segunda (214.59segunda)

Fecha

2024-08-29

IP

158.115.148.171

Informar
Escanea la información del sistema operativo y Traceroute (nmap -A n103.meraki.com)
Nmap scan report for n103.meraki.com (158.115.148.171)
Host is up (0.14s latency).
Other addresses for n103.meraki.com (not scanned): 2620:12f:c004:117:4eec:fff:fefd:9224
rDNS record for 158.115.148.171: mun739.meraki.com
Not shown: 993 filtered tcp ports (no-response), 2 filtered tcp ports (admin-prohibited)
PORT      STATE  SERVICE    VERSION
80/tcp    open   http       nginx
| http-robots.txt: 1 disallowed entry 
|_/
|_http-title: Did not follow redirect to https://n103.meraki.com/
443/tcp   open   ssl/http   nginx
| http-title: Site doesn't have a title (text/html; charset=utf-8).
|_Requested resource was https://n103.meraki.com/login/dashboard_login?go=%2F&sh=103
| http-robots.txt: 1 disallowed entry 
|_/
| ssl-cert: Subject: commonName=*.meraki.com/organizationName=Meraki LLC/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.meraki.com, DNS:meraki.com
| Not valid before: 2024-07-30T00:00:00
|_Not valid after:  2025-07-29T23:59:59
|_ssl-date: TLS randomness does not represent time
993/tcp   open   ssl/imaps?
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, JavaRMI, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, NCP, NULL, NotesRPC, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, WMSRequest, X11Probe, afp, giop, ms-sql-s, oracle-tns: 
|_    GET /hello/1 HTTP/1.1
|_ssl-date: TLS randomness does not represent time
|_imap-capabilities: CAPABILITY
| ssl-cert: Subject: commonName=*.meraki.com/organizationName=Meraki LLC/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.meraki.com, DNS:meraki.com
| Not valid before: 2024-07-30T00:00:00
|_Not valid after:  2025-07-29T23:59:59
60020/tcp closed unknown
60443/tcp closed unknown
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port993-TCP:V=7.92%T=SSL%I=7%D=8/29%Time=66D01FF7%P=x86_64-redhat-linux
SF:-gnu%r(NULL,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(GetRequest,19,
SF:"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(GenericLines,19,"GET\x20/hell
SF:o/1\x20HTTP/1\.1\r\n\r\n")%r(HTTPOptions,19,"GET\x20/hello/1\x20HTTP/1\
SF:.1\r\n\r\n")%r(RTSPRequest,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r
SF:(RPCCheck,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(DNSVersionBindRe
SF:qTCP,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(DNSStatusRequestTCP,1
SF:9,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(Help,19,"GET\x20/hello/1\x2
SF:0HTTP/1\.1\r\n\r\n")%r(SSLSessionReq,19,"GET\x20/hello/1\x20HTTP/1\.1\r
SF:\n\r\n")%r(TerminalServerCookie,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\
SF:n")%r(TLSSessionReq,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(Kerber
SF:os,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(SMBProgNeg,19,"GET\x20/
SF:hello/1\x20HTTP/1\.1\r\n\r\n")%r(X11Probe,19,"GET\x20/hello/1\x20HTTP/1
SF:\.1\r\n\r\n")%r(FourOhFourRequest,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\
SF:r\n")%r(LPDString,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(LDAPSear
SF:chReq,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(LDAPBindReq,19,"GET\
SF:x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(SIPOptions,19,"GET\x20/hello/1\x20
SF:HTTP/1\.1\r\n\r\n")%r(LANDesk-RC,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r
SF:\n")%r(TerminalServer,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(NCP,
SF:19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(NotesRPC,19,"GET\x20/hello
SF:/1\x20HTTP/1\.1\r\n\r\n")%r(JavaRMI,19,"GET\x20/hello/1\x20HTTP/1\.1\r\
SF:n\r\n")%r(WMSRequest,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(oracl
SF:e-tns,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(ms-sql-s,19,"GET\x20
SF:/hello/1\x20HTTP/1\.1\r\n\r\n")%r(afp,19,"GET\x20/hello/1\x20HTTP/1\.1\
SF:r\n\r\n")%r(giop,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n");
Device type: general purpose|WAP|storage-misc|load balancer|router
Running (JUST GUESSING): Linux 2.6.X (92%), Ubiquiti embedded (92%), Netgear embedded (92%), F5 Networks TMOS 11.1.X (89%), Synology embedded (88%), HP embedded (86%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:2.6 cpe:/h:netgear:readynas_3200 cpe:/h:netgear:wndap660 cpe:/o:f5:tmos:11.1 cpe:/h:synology:rt1900ac cpe:/o:linux:linux_kernel cpe:/h:hp:p2000_msa
Aggressive OS guesses: Linux 2.6.32 (92%), Ubiquiti WAP (Linux 2.6.32) (92%), Netgear ReadyNAS 3200 NAS device (Linux 2.6) (92%), Linux 2.6.11 - 2.6.18 (89%), Netgear WNDAP660 WAP (Linux 2.6.36) (89%), F5 3600 LTM load balancer (89%), Synology RT1900ac router (88%), HP P2000 MSA storage controller (86%), Palo Alto PA-500 firewall (85%), F5 BIG-IP load balancer (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 16 hops

TRACEROUTE (using port 60020/tcp)
HOP RTT       ADDRESS
1   0.41 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.55 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.77 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   1.27 ms   hurricane-electric.as6939.any2ix.coresite.com (206.72.210.122)
5   0.85 ms   port-channel14.core2.lax1.he.net (72.52.92.121)
6   ... 11
12  143.33 ms 100ge0-33.core2.muc1.he.net (184.105.223.110)
13  142.05 ms mun-edge-rtr-01a.meraki.com (184.104.190.194)
14  142.21 ms 169.254.31.7
15  ...
16  150.25 ms mun739.meraki.com (158.115.148.171)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 214.59 seconds
Esquema de color
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Informe detallado
Objetivo
IP de destino
158.115.148.171
Estado de host
ARRIBA
País de destino
La ubicación de la IP de destino es Estados Unidos de América
Estados Unidos de América
Escaneo gratuito
Escaneo gratuito
Método de escaneo
Escanea la información del sistema operativo y Traceroute
Estado del escaneo
Se identificaron 5 puertos
Comando
nmap -A n103.meraki.com
Fecha de escaneo
29 Aug 2024 03:18
API - Scan ID
Duración del escaneo
3mín. 34.59segunda (214.59segunda)
Descargar resultado
Eliminar resultado de escaneo
$
Escaneos totales
Escanear más
Precios

PROFESIONAL


  • 5 escaneos/día
  • Llamadas API diarias - 100 000 solicitudes
  • Guardar registro
  • Escaneo público
  • Escaneo OSINT
  • Escaneo no listado
  • Escaneo privado
  • Sin ads
  • Eliminar resultado de escaneo
  • Quitar después de escanear
  • Métodos adicionales para escanear
$0.75$7.50/mes
Facturado anualmente @ $9.00$90.00 90% de descuento
Hazte profesional

REGISTRADA


  • 5 escaneos/día
  • Llamadas API diarias - 20 solicitudes
  • Guardar registro
  • Escaneo público
  • Escaneo OSINT
  • Escaneo no listado
  • Escaneo privado
  • Sin ads
  • Eliminar resultado de escaneo
  • Quitar después de escanear
  • Métodos adicionales para escanear
$0/toda la vida
 
Registrarse
Anfitrión de escaneo
Algunos cortafuegos bloquean los escaneos de puertos. Para obtener verdaderos resultados positivos, agregue las direcciones IP de portscanner.online (208.76.253.232-208.76.253.239 o CIDR 208.76.253.232/29) a la lista blanca
[scan_method]
Visibilidad:
Método de escaneo: