Scan report for "sip131-1131.ringcentral.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A sip131-1131.ringcentral.com)
Nmap scan report for sip131-1131.ringcentral.com (199.255.120.218)
Host is up (0.052s latency).
Not shown: 998 filtered ports
PORT     STATE SERVICE     VERSION
443/tcp  open  ssl/https   Cowboy
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     connection: close
|     content-length: 0
|     date: Tue, 21 Nov 2023 18:21:43 GMT
|     server: Cowboy
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     connection: close
|     content-length: 0
|     date: Tue, 21 Nov 2023 18:21:42 GMT
|     server: Cowboy
|   HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     connection: close
|     content-length: 0
|     date: Tue, 21 Nov 2023 18:21:43 GMT
|     server: Cowboy
|   Help, Kerberos, LDAPSearchReq, LPDString, SIPOptions, SSLSessionReq, TLSSessionReq: 
|     HTTP/1.1 400 Bad Request
|     connection: close
|     content-length: 0
|   RTSPRequest: 
|     HTTP/1.1 505 HTTP Version Not Supported
|     connection: close
|_    content-length: 0
|_http-server-header: Cowboy
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=*.ringcentral.com
| Subject Alternative Name: DNS:*.ringcentral.com, DNS:ringcentral.com
| Not valid before: 2023-05-20T07:02:56
|_Not valid after:  2024-06-20T07:02:56
|_ssl-date: 2023-11-21T18:23:39+00:00; 0s from scanner time.
8083/tcp open  ssl/us-srv?
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     connection: close
|     content-length: 0
|     date: Tue, 21 Nov 2023 18:22:15 GMT
|     server: Cowboy
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     connection: close
|     content-length: 0
|     date: Tue, 21 Nov 2023 18:21:48 GMT
|     server: Cowboy
|   Help, Kerberos, LDAPSearchReq, LPDString, SIPOptions, SSLSessionReq, TLSSessionReq: 
|     HTTP/1.1 400 Bad Request
|     connection: close
|     content-length: 0
|   RTSPRequest: 
|     HTTP/1.1 505 HTTP Version Not Supported
|     connection: close
|_    content-length: 0
| ssl-cert: Subject: commonName=*.ringcentral.com
| Subject Alternative Name: DNS:*.ringcentral.com, DNS:ringcentral.com
| Not valid before: 2023-05-20T07:02:56
|_Not valid after:  2024-06-20T07:02:56
|_ssl-date: 2023-11-21T18:23:39+00:00; 0s from scanner time.
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655CF536%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,77,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection
SF::\x20close\r\ncontent-length:\x200\r\ndate:\x20Tue,\x2021\x20Nov\x20202
SF:3\x2018:21:42\x20GMT\r\nserver:\x20Cowboy\r\n\r\n")%r(HTTPOptions,77,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-le
SF:ngth:\x200\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2018:21:43\x20GMT\r\n
SF:server:\x20Cowboy\r\n\r\n")%r(FourOhFourRequest,75,"HTTP/1\.1\x20404\x2
SF:0Not\x20Found\r\nconnection:\x20close\r\ncontent-length:\x200\r\ndate:\
SF:x20Tue,\x2021\x20Nov\x202023\x2018:21:43\x20GMT\r\nserver:\x20Cowboy\r\
SF:n\r\n")%r(RTSPRequest,51,"HTTP/1\.1\x20505\x20HTTP\x20Version\x20Not\x2
SF:0Supported\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(
SF:Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\n
SF:content-length:\x200\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20
SF:Bad\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n"
SF:)%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:
SF:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x2
SF:0400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\
SF:r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnect
SF:ion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(LDAPSearchReq,42,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-leng
SF:th:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Bad\x20Request\
SF:r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8083-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655CF53C%P=x86_64-redhat-lin
SF:ux-gnu%r(GetRequest,77,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnectio
SF:n:\x20close\r\ncontent-length:\x200\r\ndate:\x20Tue,\x2021\x20Nov\x2020
SF:23\x2018:21:48\x20GMT\r\nserver:\x20Cowboy\r\n\r\n")%r(HTTPOptions,77,"
SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-l
SF:ength:\x200\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2018:21:48\x20GMT\r\
SF:nserver:\x20Cowboy\r\n\r\n")%r(RTSPRequest,51,"HTTP/1\.1\x20505\x20HTTP
SF:\x20Version\x20Not\x20Supported\r\nconnection:\x20close\r\ncontent-leng
SF:th:\x200\r\n\r\n")%r(Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncon
SF:nection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(SSLSessionReq,42,
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-
SF:length:\x200\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20R
SF:equest\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(Kerb
SF:eros,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\n
SF:content-length:\x200\r\n\r\n")%r(FourOhFourRequest,75,"HTTP/1\.1\x20404
SF:\x20Not\x20Found\r\nconnection:\x20close\r\ncontent-length:\x200\r\ndat
SF:e:\x20Tue,\x2021\x20Nov\x202023\x2018:22:15\x20GMT\r\nserver:\x20Cowboy
SF:\r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnec
SF:tion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(LDAPSearchReq,42,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-len
SF:gth:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X (86%)
OS CPE: cpe:/o:linux:linux_kernel:2.6
Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   14.26 ms 208.76.251.177
2   0.47 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.88 ms  multacom.com (96.45.162.9)
4   13.07 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5   5.69 ms  ae-13.r24.lsanca07.us.bb.gin.ntt.net (129.250.3.141)
6   29.53 ms ae-3.r22.dllstx14.us.bb.gin.ntt.net (129.250.7.68)
7   26.55 ms ae-15.r21.dllstx14.us.bb.gin.ntt.net (129.250.2.58)
8   49.88 ms ae-5.r22.chcgil09.us.bb.gin.ntt.net (129.250.4.153)
9   ...
10  48.43 ms ge-2-1-7.a04.chcgil09.us.ce.gin.ntt.net (168.143.229.10)
11  ... 12
13  50.96 ms sip131-1131.ringcentral.com (199.255.120.218)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 160.16 seconds
Color Scheme
Target
sip131-1131.ringcentral.com
Target IP
199.255.120.218
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A sip131-1131.ringcentral.com
Scan date
21 Nov 2023 13:23
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: