Scan OS information and Traceroute (nmap -A vap-bp2.sip.thinkingphones.net)
Nmap scan report for vap-bp2.sip.thinkingphones.net (170.76.189.56)
Host is up (0.061s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
5060/tcp open sip Fuze SIP Border Proxy (v1.10.3-11) (Status: 403 Forbidden)
| fingerprint-strings:
| SIPOptions:
| SIP/2.0 403 Forbidden
| Via: SIP/2.0/TCP nm;received=208.76.253.234;rport=34752;branch=foo
| From: <sip:nm@nm>;tag=root
| <sip:nm2@nm2>;tag=aaefa9537d5168e23e2a645faf38cb7e.fe3b
| Call-ID: 50000
| CSeq: 42 OPTIONS
| Server: Fuze SIP Border Proxy (v1.10.3-11)
|_ Content-Length: 0
5061/tcp open ssl/sip Fuze SIP Border Proxy (v1.10.3-11) (Status: 403 Forbidden)
| fingerprint-strings:
| SIPOptions:
| SIP/2.0 403 Forbidden
| Via: SIP/2.0/TCP nm;received=208.76.253.234;rport=53336;branch=foo
| From: <sip:nm@nm>;tag=root
| <sip:nm2@nm2>;tag=aaefa9537d5168e23e2a645faf38cb7e.fe3b
| Call-ID: 50000
| CSeq: 42 OPTIONS
| Server: Fuze SIP Border Proxy (v1.10.3-11)
|_ Content-Length: 0
| ssl-cert: Subject: commonName=border.sip.thinkingphones.net/organizationName=Fuze, Inc./stateOrProvinceName=Massachusetts/countryName=US
| Subject Alternative Name: DNS:border.sip.thinkingphones.net, DNS:border-aup.sip.thinkingphones.net, DNS:border-aux.sip.thinkingphones.net, DNS:border-brp.sip.thinkingphones.net, DNS:border-cad.sip.thinkingphones.net, DNS:border-cap.sip.thinkingphones.net, DNS:border-cas.sip.thinkingphones.net, DNS:border-dep.sip.thinkingphones.net, DNS:border-hkp.sip.thinkingphones.net, DNS:border-sgp.sip.thinkingphones.net, DNS:border-ukp.sip.thinkingphones.net, DNS:border-vad.sip.thinkingphones.net, DNS:border-vap.sip.thinkingphones.net, DNS:border-vas.sip.thinkingphones.net, DNS:border-vbd.sip.thinkingphones.net, DNS:border-zap.sip.thinkingphones.net
| Not valid before: 2023-02-23T00:00:00
|_Not valid after: 2024-03-25T23:59:59
|_ssl-date: 2023-11-20T01:30:13+00:00; 0s from scanner time.
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port5060-TCP:V=7.70%I=7%D=11/19%Time=655AB68A%P=x86_64-redhat-linux-gnu
SF:%r(SIPOptions,117,"SIP/2\.0\x20403\x20Forbidden\r\nVia:\x20SIP/2\.0/TCP
SF:\x20nm;received=208\.76\.253\.234;rport=34752;branch=foo\r\nFrom:\x20<s
SF:ip:nm@nm>;tag=root\r\nTo:\x20<sip:nm2@nm2>;tag=aaefa9537d5168e23e2a645f
SF:af38cb7e\.fe3b\r\nCall-ID:\x2050000\r\nCSeq:\x2042\x20OPTIONS\r\nServer
SF::\x20Fuze\x20SIP\x20Border\x20Proxy\x20\(v1\.10\.3-11\)\r\nContent-Leng
SF:th:\x200\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port5061-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655AB68E%P=x86_64-redhat-lin
SF:ux-gnu%r(SIPOptions,117,"SIP/2\.0\x20403\x20Forbidden\r\nVia:\x20SIP/2\
SF:.0/TCP\x20nm;received=208\.76\.253\.234;rport=53336;branch=foo\r\nFrom:
SF:\x20<sip:nm@nm>;tag=root\r\nTo:\x20<sip:nm2@nm2>;tag=aaefa9537d5168e23e
SF:2a645faf38cb7e\.fe3b\r\nCall-ID:\x2050000\r\nCSeq:\x2042\x20OPTIONS\r\n
SF:Server:\x20Fuze\x20SIP\x20Border\x20Proxy\x20\(v1\.10\.3-11\)\r\nConten
SF:t-Length:\x200\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 - 3.10, Linux 2.6.32 - 3.13
Network Distance: 13 hops
TRACEROUTE (using port 5061/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.61 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.68 ms multacom.com (96.45.162.9)
4 0.35 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5 ... 6
7 58.02 ms ae-1.a05.asbnva02.us.bb.gin.ntt.net (129.250.3.244)
8 57.92 ms xe-0-4-3-1.a05.asbnva02.us.ce.gin.ntt.net (128.241.1.242)
9 60.58 ms vr-core-fra1.inf.thinkingphones.net (45.252.184.17)
10 ...
11 58.15 ms 7.94.1.102
12 ...
13 65.43 ms 170.76.189.56
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 75.70 seconds
Color Scheme
-
Target
vap-bp2.sip.thinkingphones.net
-
Target IP
170.76.189.56
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A vap-bp2.sip.thinkingphones.net
-
Scan date
19 Nov 2023 20:30
-
Copy scan report
-
Download report
-
Remove scan result