Scan report for "sip121-1121.ringcentral.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A sip121-1121.ringcentral.com)
Nmap scan report for sip121-1121.ringcentral.com (104.245.57.103)
Host is up (0.068s latency).
Not shown: 998 filtered ports
PORT     STATE SERVICE     VERSION
443/tcp  open  ssl/https   Cowboy
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     connection: close
|     content-length: 0
|     date: Sun, 19 Nov 2023 19:38:24 GMT
|     server: Cowboy
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     connection: close
|     content-length: 0
|     date: Sun, 19 Nov 2023 19:38:24 GMT
|     server: Cowboy
|   HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     connection: close
|     content-length: 0
|     date: Sun, 19 Nov 2023 19:38:25 GMT
|     server: Cowboy
|   Help, Kerberos, LDAPSearchReq, LPDString, SIPOptions, SSLSessionReq, TLSSessionReq: 
|     HTTP/1.1 400 Bad Request
|     connection: close
|     content-length: 0
|   RTSPRequest: 
|     HTTP/1.1 505 HTTP Version Not Supported
|     connection: close
|_    content-length: 0
|_http-server-header: Cowboy
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=*.ringcentral.com
| Subject Alternative Name: DNS:*.ringcentral.com, DNS:ringcentral.com
| Not valid before: 2023-05-20T07:02:56
|_Not valid after:  2024-06-20T07:02:56
|_ssl-date: 2023-11-19T19:40:23+00:00; 0s from scanner time.
8083/tcp open  ssl/us-srv?
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     connection: close
|     content-length: 0
|     date: Sun, 19 Nov 2023 19:38:59 GMT
|     server: Cowboy
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     connection: close
|     content-length: 0
|     date: Sun, 19 Nov 2023 19:38:30 GMT
|     server: Cowboy
|   Help, Kerberos, LDAPSearchReq, LPDString, SIPOptions, SSLSessionReq, TLSSessionReq: 
|     HTTP/1.1 400 Bad Request
|     connection: close
|     content-length: 0
|   RTSPRequest: 
|     HTTP/1.1 505 HTTP Version Not Supported
|     connection: close
|_    content-length: 0
| ssl-cert: Subject: commonName=*.ringcentral.com
| Subject Alternative Name: DNS:*.ringcentral.com, DNS:ringcentral.com
| Not valid before: 2023-05-20T07:02:56
|_Not valid after:  2024-06-20T07:02:56
|_ssl-date: 2023-11-19T19:40:23+00:00; 0s from scanner time.
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655A6431%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,77,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection
SF::\x20close\r\ncontent-length:\x200\r\ndate:\x20Sun,\x2019\x20Nov\x20202
SF:3\x2019:38:24\x20GMT\r\nserver:\x20Cowboy\r\n\r\n")%r(HTTPOptions,77,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-le
SF:ngth:\x200\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2019:38:25\x20GMT\r\n
SF:server:\x20Cowboy\r\n\r\n")%r(FourOhFourRequest,75,"HTTP/1\.1\x20404\x2
SF:0Not\x20Found\r\nconnection:\x20close\r\ncontent-length:\x200\r\ndate:\
SF:x20Sun,\x2019\x20Nov\x202023\x2019:38:24\x20GMT\r\nserver:\x20Cowboy\r\
SF:n\r\n")%r(RTSPRequest,51,"HTTP/1\.1\x20505\x20HTTP\x20Version\x20Not\x2
SF:0Supported\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(
SF:Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\n
SF:content-length:\x200\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20
SF:Bad\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n"
SF:)%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:
SF:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x2
SF:0400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\
SF:r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnect
SF:ion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(LDAPSearchReq,42,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-leng
SF:th:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Bad\x20Request\
SF:r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8083-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655A6437%P=x86_64-redhat-lin
SF:ux-gnu%r(GetRequest,77,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnectio
SF:n:\x20close\r\ncontent-length:\x200\r\ndate:\x20Sun,\x2019\x20Nov\x2020
SF:23\x2019:38:30\x20GMT\r\nserver:\x20Cowboy\r\n\r\n")%r(HTTPOptions,77,"
SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-l
SF:ength:\x200\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2019:38:30\x20GMT\r\
SF:nserver:\x20Cowboy\r\n\r\n")%r(RTSPRequest,51,"HTTP/1\.1\x20505\x20HTTP
SF:\x20Version\x20Not\x20Supported\r\nconnection:\x20close\r\ncontent-leng
SF:th:\x200\r\n\r\n")%r(Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncon
SF:nection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(SSLSessionReq,42,
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-
SF:length:\x200\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20R
SF:equest\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(Kerb
SF:eros,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\n
SF:content-length:\x200\r\n\r\n")%r(FourOhFourRequest,75,"HTTP/1\.1\x20404
SF:\x20Not\x20Found\r\nconnection:\x20close\r\ncontent-length:\x200\r\ndat
SF:e:\x20Sun,\x2019\x20Nov\x202023\x2019:38:59\x20GMT\r\nserver:\x20Cowboy
SF:\r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnec
SF:tion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(LDAPSearchReq,42,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-len
SF:gth:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X (86%)
OS CPE: cpe:/o:linux:linux_kernel:2.6
Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   30.21 ms 208.76.251.177
2   0.67 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.79 ms  multacom.com (96.45.162.9)
4   0.42 ms  ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5   1.27 ms  ae-13.r24.lsanca07.us.bb.gin.ntt.net (129.250.3.141)
6   29.47 ms ae-3.r22.dllstx14.us.bb.gin.ntt.net (129.250.7.68)
7   30.33 ms ae-15.r21.dllstx14.us.bb.gin.ntt.net (129.250.2.58)
8   45.35 ms ae-5.r22.chcgil09.us.bb.gin.ntt.net (129.250.4.153)
9   ...
10  44.97 ms ge-2-1-7.a04.chcgil09.us.ce.gin.ntt.net (168.143.229.10)
11  67.17 ms 208.87.42.122
12  ... 13
14  67.40 ms sip121-1121.ringcentral.com (104.245.57.103)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 142.96 seconds
Color Scheme
Target
sip121-1121.ringcentral.com
Target IP
104.245.57.103
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A sip121-1121.ringcentral.com
Scan date
19 Nov 2023 14:40
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: