Scan OS information and Traceroute (nmap -A device-nlb.verkada.com)
Nmap scan report for device-nlb.verkada.com (35.166.49.153)
Host is up (0.026s latency).
Other addresses for device-nlb.verkada.com (not scanned): 2600:1f13:9b6:1002:e1fb:263c:63e8:1967
Not shown: 999 filtered ports
PORT STATE SERVICE VERSION
443/tcp open ssl/https
| fingerprint-strings:
| DNSStatusRequestTCP:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 02:17:33 GMT
| connection: close
| Request
| DNSVersionBindReqTCP:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 02:17:32 GMT
| connection: close
| Request
| FourOhFourRequest:
| HTTP/1.1 426 Upgrade Required
| date: Mon, 20 Nov 2023 02:17:22 GMT
| connection: close
| content-length: 0
| GetRequest:
| HTTP/1.1 426 Upgrade Required
| date: Mon, 20 Nov 2023 02:17:20 GMT
| connection: close
| content-length: 0
| HTTPOptions:
| HTTP/1.1 426 Upgrade Required
| date: Mon, 20 Nov 2023 02:17:21 GMT
| connection: close
| content-length: 0
| Help:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 02:17:34 GMT
| connection: close
| Request
| RPCCheck:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 02:17:31 GMT
| connection: close
| Request
| RTSPRequest:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 02:17:29 GMT
| connection: close
| Request
| SSLSessionReq:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 02:17:35 GMT
| connection: close
| Request
| tor-versions:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 02:17:23 GMT
| connection: close
|_ Request
|_http-title: Site doesn't have a title (application/json).
| ssl-cert: Subject: commonName=*.verkada.com
| Subject Alternative Name: DNS:*.verkada.com, DNS:*.prod1.command.verkada.com, DNS:*.vcamera.net, DNS:*.my.verkada.com, DNS:*.command.verkada.com, DNS:*.control.verkada.com, DNS:*.registration.verkada.com, DNS:*.pyramid.verkada.com, DNS:*.guest.verkada.com, DNS:*.prod1.control.verkada.com, DNS:*.prod1.verkada.com
| Not valid before: 2023-05-31T00:00:00
|_Not valid after: 2024-06-28T23:59:59
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655AC1B1%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,6C,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:
SF:\x20Mon,\x2020\x20Nov\x202023\x2002:17:20\x20GMT\r\nconnection:\x20clos
SF:e\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,6C,"HTTP/1\.1\x20426\
SF:x20Upgrade\x20Required\r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2002:17:2
SF:1\x20GMT\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(Fo
SF:urOhFourRequest,6C,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x2
SF:0Mon,\x2020\x20Nov\x202023\x2002:17:22\x20GMT\r\nconnection:\x20close\r
SF:\ncontent-length:\x200\r\n\r\n")%r(tor-versions,8D,"HTTP/1\.1\x20400\x2
SF:0Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain
SF:\r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2002:17:23\x20GMT\r\nconnection
SF::\x20close\r\n\r\nBad\x20Request")%r(RTSPRequest,8D,"HTTP/1\.1\x20400\x
SF:20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plai
SF:n\r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2002:17:29\x20GMT\r\nconnectio
SF:n:\x20close\r\n\r\nBad\x20Request")%r(RPCCheck,8D,"HTTP/1\.1\x20400\x20
SF:Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\
SF:r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2002:17:31\x20GMT\r\nconnection:
SF:\x20close\r\n\r\nBad\x20Request")%r(DNSVersionBindReqTCP,8D,"HTTP/1\.1\
SF:x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20t
SF:ext/plain\r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2002:17:32\x20GMT\r\nc
SF:onnection:\x20close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,8D,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-t
SF:ype:\x20text/plain\r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2002:17:33\x2
SF:0GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(Help,8D,"HTTP/1\
SF:.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x
SF:20text/plain\r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2002:17:34\x20GMT\r
SF:\nconnection:\x20close\r\n\r\nBad\x20Request")%r(SSLSessionReq,8D,"HTTP
SF:/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type
SF::\x20text/plain\r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2002:17:35\x20GM
SF:T\r\nconnection:\x20close\r\n\r\nBad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.64 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.62 ms multacom.com (96.45.162.9)
4 0.37 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146)
5 ... 30
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 86.97 seconds
Color Scheme
-
Target
-
Target IP
35.166.49.153
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A device-nlb.verkada.com
-
Scan date
19 Nov 2023 21:18
-
Copy scan report
-
Download report
-
Remove scan result