Scan OS information and Traceroute (nmap -A sip121-1121.ringcentral.com)
Nmap scan report for sip121-1121.ringcentral.com (104.245.57.103)
Host is up (0.068s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
443/tcp open ssl/https Cowboy
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 404 Not Found
| connection: close
| content-length: 0
| date: Sun, 19 Nov 2023 19:38:24 GMT
| server: Cowboy
| GetRequest:
| HTTP/1.1 400 Bad Request
| connection: close
| content-length: 0
| date: Sun, 19 Nov 2023 19:38:24 GMT
| server: Cowboy
| HTTPOptions:
| HTTP/1.1 400 Bad Request
| connection: close
| content-length: 0
| date: Sun, 19 Nov 2023 19:38:25 GMT
| server: Cowboy
| Help, Kerberos, LDAPSearchReq, LPDString, SIPOptions, SSLSessionReq, TLSSessionReq:
| HTTP/1.1 400 Bad Request
| connection: close
| content-length: 0
| RTSPRequest:
| HTTP/1.1 505 HTTP Version Not Supported
| connection: close
|_ content-length: 0
|_http-server-header: Cowboy
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=*.ringcentral.com
| Subject Alternative Name: DNS:*.ringcentral.com, DNS:ringcentral.com
| Not valid before: 2023-05-20T07:02:56
|_Not valid after: 2024-06-20T07:02:56
|_ssl-date: 2023-11-19T19:40:23+00:00; 0s from scanner time.
8083/tcp open ssl/us-srv?
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 404 Not Found
| connection: close
| content-length: 0
| date: Sun, 19 Nov 2023 19:38:59 GMT
| server: Cowboy
| GetRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| connection: close
| content-length: 0
| date: Sun, 19 Nov 2023 19:38:30 GMT
| server: Cowboy
| Help, Kerberos, LDAPSearchReq, LPDString, SIPOptions, SSLSessionReq, TLSSessionReq:
| HTTP/1.1 400 Bad Request
| connection: close
| content-length: 0
| RTSPRequest:
| HTTP/1.1 505 HTTP Version Not Supported
| connection: close
|_ content-length: 0
| ssl-cert: Subject: commonName=*.ringcentral.com
| Subject Alternative Name: DNS:*.ringcentral.com, DNS:ringcentral.com
| Not valid before: 2023-05-20T07:02:56
|_Not valid after: 2024-06-20T07:02:56
|_ssl-date: 2023-11-19T19:40:23+00:00; 0s from scanner time.
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655A6431%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,77,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection
SF::\x20close\r\ncontent-length:\x200\r\ndate:\x20Sun,\x2019\x20Nov\x20202
SF:3\x2019:38:24\x20GMT\r\nserver:\x20Cowboy\r\n\r\n")%r(HTTPOptions,77,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-le
SF:ngth:\x200\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2019:38:25\x20GMT\r\n
SF:server:\x20Cowboy\r\n\r\n")%r(FourOhFourRequest,75,"HTTP/1\.1\x20404\x2
SF:0Not\x20Found\r\nconnection:\x20close\r\ncontent-length:\x200\r\ndate:\
SF:x20Sun,\x2019\x20Nov\x202023\x2019:38:24\x20GMT\r\nserver:\x20Cowboy\r\
SF:n\r\n")%r(RTSPRequest,51,"HTTP/1\.1\x20505\x20HTTP\x20Version\x20Not\x2
SF:0Supported\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(
SF:Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\n
SF:content-length:\x200\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20
SF:Bad\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n"
SF:)%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:
SF:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x2
SF:0400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\
SF:r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnect
SF:ion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(LDAPSearchReq,42,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-leng
SF:th:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Bad\x20Request\
SF:r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8083-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655A6437%P=x86_64-redhat-lin
SF:ux-gnu%r(GetRequest,77,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnectio
SF:n:\x20close\r\ncontent-length:\x200\r\ndate:\x20Sun,\x2019\x20Nov\x2020
SF:23\x2019:38:30\x20GMT\r\nserver:\x20Cowboy\r\n\r\n")%r(HTTPOptions,77,"
SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-l
SF:ength:\x200\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2019:38:30\x20GMT\r\
SF:nserver:\x20Cowboy\r\n\r\n")%r(RTSPRequest,51,"HTTP/1\.1\x20505\x20HTTP
SF:\x20Version\x20Not\x20Supported\r\nconnection:\x20close\r\ncontent-leng
SF:th:\x200\r\n\r\n")%r(Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncon
SF:nection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(SSLSessionReq,42,
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-
SF:length:\x200\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20R
SF:equest\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(Kerb
SF:eros,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\n
SF:content-length:\x200\r\n\r\n")%r(FourOhFourRequest,75,"HTTP/1\.1\x20404
SF:\x20Not\x20Found\r\nconnection:\x20close\r\ncontent-length:\x200\r\ndat
SF:e:\x20Sun,\x2019\x20Nov\x202023\x2019:38:59\x20GMT\r\nserver:\x20Cowboy
SF:\r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnec
SF:tion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(LDAPSearchReq,42,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-len
SF:gth:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X (86%)
OS CPE: cpe:/o:linux:linux_kernel:2.6
Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 30.21 ms 208.76.251.177
2 0.67 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.79 ms multacom.com (96.45.162.9)
4 0.42 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5 1.27 ms ae-13.r24.lsanca07.us.bb.gin.ntt.net (129.250.3.141)
6 29.47 ms ae-3.r22.dllstx14.us.bb.gin.ntt.net (129.250.7.68)
7 30.33 ms ae-15.r21.dllstx14.us.bb.gin.ntt.net (129.250.2.58)
8 45.35 ms ae-5.r22.chcgil09.us.bb.gin.ntt.net (129.250.4.153)
9 ...
10 44.97 ms ge-2-1-7.a04.chcgil09.us.ce.gin.ntt.net (168.143.229.10)
11 67.17 ms 208.87.42.122
12 ... 13
14 67.40 ms sip121-1121.ringcentral.com (104.245.57.103)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 142.96 seconds
Color Scheme
-
Target
-
Target IP
104.245.57.103
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A sip121-1121.ringcentral.com
-
Scan date
19 Nov 2023 14:40
-
Copy scan report
-
Download report
-
Remove scan result