Analyser le rapport pour "mirrors.ocf.berkeley.edu"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A mirrors.ocf.berkeley.edu)
Nmap scan report for mirrors.ocf.berkeley.edu (169.229.200.70)
Host is up (0.012s latency).
Other addresses for mirrors.ocf.berkeley.edu (not scanned): 2607:f140:0:32::70
Not shown: 989 closed ports
PORT     STATE    SERVICE        VERSION
22/tcp   open     ssh            OpenSSH 9.2p1 Debian 2+deb12u1 (protocol 2.0)
80/tcp   open     http           nginx 1.22.1
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: nginx/1.22.1
|_http-title: OCF Mirrors
111/tcp  open     rpcbind        2-4 (RPC #100000)
| rpcinfo: 
|   program version   port/proto  service
|   100000  2,3,4        111/tcp  rpcbind
|_  100000  2,3,4        111/udp  rpcbind
135/tcp  filtered msrpc
139/tcp  filtered netbios-ssn
161/tcp  filtered snmp
443/tcp  open     ssl/http       nginx 1.22.1
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: nginx/1.22.1
|_http-title: OCF Mirrors
| ssl-cert: Subject: commonName=fallingrocks.ocf.berkeley.edu
| Subject Alternative Name: DNS:apt.ocf.berkeley.edu, DNS:apt.ocf.io, DNS:fallingrocks.ocf.berkeley.edu, DNS:fallingrocks.ocf.io, DNS:mirrors.ocf.berkeley.edu, DNS:mirrors.ocf.io
| Not valid before: 2023-10-24T09:24:59
|_Not valid after:  2024-01-22T09:24:58
445/tcp  filtered microsoft-ds
593/tcp  filtered http-rpc-epmap
873/tcp  open     rsync          (protocol version 31)
9100/tcp open     jetdirect?
Aggressive OS guesses: Linux 2.6.32 (96%), Linux 3.2 - 4.9 (96%), Linux 3.3 (96%), Linux 2.6.32 - 3.10 (96%), Linux 3.4 - 3.10 (95%), Linux 3.1 (94%), Linux 3.2 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), Synology DiskStation Manager 5.2-5644 (94%), Netgear RAIDiator 4.2.28 (94%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 21/tcp)
HOP RTT      ADDRESS
1   0.22 ms  208.76.251.177
2   0.51 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.99 ms  multacom.com (96.45.162.9)
4   0.58 ms  ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5   ... 6
7   0.68 ms  CENIC.ear1.LosAngeles1.Level3.net (4.35.156.66)
8   12.59 ms dc-lax-agg8--lax-agg10-300g.cenic.net (137.164.11.71)
9   12.35 ms dc-svl-agg8--lax-agg8--100g--2.cenic.net (137.164.11.21)
10  12.02 ms dc-svl-agg10--svl-agg8-300g.cenic.net (137.164.11.80)
11  11.99 ms ewdc-322-dr2--e59.net.berkeley.edu (128.32.255.45)
12  11.96 ms 169.229.200.70

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 143.14 seconds
Schéma de couleur
Cible
mirrors.ocf.berkeley.edu
IP cible
169.229.200.70
Pays cible
US
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A mirrors.ocf.berkeley.edu
Scan date
20 Nov 2023 19:17
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Total scans
About 3 times
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: