Scan report for "cs611-2037.meraki.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A cs611-2037.meraki.com)
Nmap scan report for cs611-2037.meraki.com (158.115.141.129)
Host is up (0.059s latency).
Other addresses for cs611-2037.meraki.com (not scanned): 2600:1f16:941:8e00:2ad6:caa7:fcd9:b7c1
rDNS record for 158.115.141.129: use291.meraki.com
Not shown: 995 filtered tcp ports (no-response)
PORT      STATE  SERVICE    VERSION
80/tcp    open   http       nginx
443/tcp   open   ssl/http   nginx
|_http-title: Page not found - Cisco Meraki
| ssl-cert: Subject: commonName=*.meraki.com/organizationName=Meraki LLC/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.meraki.com, DNS:meraki.com
| Not valid before: 2023-07-12T00:00:00
|_Not valid after:  2024-07-10T23:59:59
|_ssl-date: TLS randomness does not represent time
993/tcp   open   ssl/imaps?
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, JavaRMI, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, NCP, NULL, NotesRPC, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, WMSRequest, X11Probe, afp, giop, ms-sql-s, oracle-tns: 
|_    GET /hello/1 HTTP/1.1
|_imap-capabilities: CAPABILITY
| ssl-cert: Subject: commonName=*.meraki.com/organizationName=Meraki LLC/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.meraki.com, DNS:meraki.com
| Not valid before: 2024-04-02T00:00:00
|_Not valid after:  2025-04-01T23:59:59
|_ssl-date: TLS randomness does not represent time
60020/tcp closed unknown
60443/tcp closed unknown
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port993-TCP:V=7.92%T=SSL%I=7%D=6/10%Time=6667B57A%P=x86_64-redhat-linux
SF:-gnu%r(NULL,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(GetRequest,19,
SF:"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(GenericLines,19,"GET\x20/hell
SF:o/1\x20HTTP/1\.1\r\n\r\n")%r(HTTPOptions,19,"GET\x20/hello/1\x20HTTP/1\
SF:.1\r\n\r\n")%r(RTSPRequest,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r
SF:(RPCCheck,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(DNSVersionBindRe
SF:qTCP,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(DNSStatusRequestTCP,1
SF:9,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(Help,19,"GET\x20/hello/1\x2
SF:0HTTP/1\.1\r\n\r\n")%r(SSLSessionReq,19,"GET\x20/hello/1\x20HTTP/1\.1\r
SF:\n\r\n")%r(TerminalServerCookie,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\
SF:n")%r(TLSSessionReq,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(Kerber
SF:os,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(SMBProgNeg,19,"GET\x20/
SF:hello/1\x20HTTP/1\.1\r\n\r\n")%r(X11Probe,19,"GET\x20/hello/1\x20HTTP/1
SF:\.1\r\n\r\n")%r(FourOhFourRequest,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\
SF:r\n")%r(LPDString,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(LDAPSear
SF:chReq,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(LDAPBindReq,19,"GET\
SF:x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(SIPOptions,19,"GET\x20/hello/1\x20
SF:HTTP/1\.1\r\n\r\n")%r(LANDesk-RC,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r
SF:\n")%r(TerminalServer,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(NCP,
SF:19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(NotesRPC,19,"GET\x20/hello
SF:/1\x20HTTP/1\.1\r\n\r\n")%r(JavaRMI,19,"GET\x20/hello/1\x20HTTP/1\.1\r\
SF:n\r\n")%r(WMSRequest,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(oracl
SF:e-tns,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(ms-sql-s,19,"GET\x20
SF:/hello/1\x20HTTP/1\.1\r\n\r\n")%r(afp,19,"GET\x20/hello/1\x20HTTP/1\.1\
SF:r\n\r\n")%r(giop,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n");
Aggressive OS guesses: Linux 3.2 - 4.9 (96%), Linux 2.6.32 - 3.10 (95%), Linux 5.3 - 5.4 (94%), Linux 3.2 (94%), Linux 3.1 (93%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (92%), Linux 2.6.32 - 3.5 (92%), Symantec Web Gateway 5.2.0.361 (Linux 2.6) (92%), Sony X75CH-series Android TV (Android 5.0) (91%), Linux 2.6.32 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 16 hops

TRACEROUTE (using port 60443/tcp)
HOP RTT      ADDRESS
1   0.20 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.64 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.85 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   12.42 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   20.82 ms be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218)
7   65.14 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8   32.03 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74)
9   ...
10  32.40 ms 150.222.99.63
11  ...
12  59.74 ms 108.166.248.9
13  ... 15
16  59.35 ms use291.meraki.com (158.115.141.129)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 195.30 seconds
Color Scheme
Target
cs611-2037.meraki.com
Target IP
158.115.141.129
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A cs611-2037.meraki.com
Scan date
10 Jun 2024 22:27
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: