Scan OS information and Traceroute (nmap -A sip131-1131.ringcentral.com)
Nmap scan report for sip131-1131.ringcentral.com (199.255.120.218)
Host is up (0.052s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
443/tcp open ssl/https Cowboy
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 404 Not Found
| connection: close
| content-length: 0
| date: Tue, 21 Nov 2023 18:21:43 GMT
| server: Cowboy
| GetRequest:
| HTTP/1.1 400 Bad Request
| connection: close
| content-length: 0
| date: Tue, 21 Nov 2023 18:21:42 GMT
| server: Cowboy
| HTTPOptions:
| HTTP/1.1 400 Bad Request
| connection: close
| content-length: 0
| date: Tue, 21 Nov 2023 18:21:43 GMT
| server: Cowboy
| Help, Kerberos, LDAPSearchReq, LPDString, SIPOptions, SSLSessionReq, TLSSessionReq:
| HTTP/1.1 400 Bad Request
| connection: close
| content-length: 0
| RTSPRequest:
| HTTP/1.1 505 HTTP Version Not Supported
| connection: close
|_ content-length: 0
|_http-server-header: Cowboy
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=*.ringcentral.com
| Subject Alternative Name: DNS:*.ringcentral.com, DNS:ringcentral.com
| Not valid before: 2023-05-20T07:02:56
|_Not valid after: 2024-06-20T07:02:56
|_ssl-date: 2023-11-21T18:23:39+00:00; 0s from scanner time.
8083/tcp open ssl/us-srv?
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 404 Not Found
| connection: close
| content-length: 0
| date: Tue, 21 Nov 2023 18:22:15 GMT
| server: Cowboy
| GetRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| connection: close
| content-length: 0
| date: Tue, 21 Nov 2023 18:21:48 GMT
| server: Cowboy
| Help, Kerberos, LDAPSearchReq, LPDString, SIPOptions, SSLSessionReq, TLSSessionReq:
| HTTP/1.1 400 Bad Request
| connection: close
| content-length: 0
| RTSPRequest:
| HTTP/1.1 505 HTTP Version Not Supported
| connection: close
|_ content-length: 0
| ssl-cert: Subject: commonName=*.ringcentral.com
| Subject Alternative Name: DNS:*.ringcentral.com, DNS:ringcentral.com
| Not valid before: 2023-05-20T07:02:56
|_Not valid after: 2024-06-20T07:02:56
|_ssl-date: 2023-11-21T18:23:39+00:00; 0s from scanner time.
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655CF536%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,77,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection
SF::\x20close\r\ncontent-length:\x200\r\ndate:\x20Tue,\x2021\x20Nov\x20202
SF:3\x2018:21:42\x20GMT\r\nserver:\x20Cowboy\r\n\r\n")%r(HTTPOptions,77,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-le
SF:ngth:\x200\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2018:21:43\x20GMT\r\n
SF:server:\x20Cowboy\r\n\r\n")%r(FourOhFourRequest,75,"HTTP/1\.1\x20404\x2
SF:0Not\x20Found\r\nconnection:\x20close\r\ncontent-length:\x200\r\ndate:\
SF:x20Tue,\x2021\x20Nov\x202023\x2018:21:43\x20GMT\r\nserver:\x20Cowboy\r\
SF:n\r\n")%r(RTSPRequest,51,"HTTP/1\.1\x20505\x20HTTP\x20Version\x20Not\x2
SF:0Supported\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(
SF:Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\n
SF:content-length:\x200\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20
SF:Bad\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n"
SF:)%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:
SF:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x2
SF:0400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\
SF:r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnect
SF:ion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(LDAPSearchReq,42,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-leng
SF:th:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Bad\x20Request\
SF:r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8083-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655CF53C%P=x86_64-redhat-lin
SF:ux-gnu%r(GetRequest,77,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnectio
SF:n:\x20close\r\ncontent-length:\x200\r\ndate:\x20Tue,\x2021\x20Nov\x2020
SF:23\x2018:21:48\x20GMT\r\nserver:\x20Cowboy\r\n\r\n")%r(HTTPOptions,77,"
SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-l
SF:ength:\x200\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2018:21:48\x20GMT\r\
SF:nserver:\x20Cowboy\r\n\r\n")%r(RTSPRequest,51,"HTTP/1\.1\x20505\x20HTTP
SF:\x20Version\x20Not\x20Supported\r\nconnection:\x20close\r\ncontent-leng
SF:th:\x200\r\n\r\n")%r(Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncon
SF:nection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(SSLSessionReq,42,
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-
SF:length:\x200\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20R
SF:equest\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(Kerb
SF:eros,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\n
SF:content-length:\x200\r\n\r\n")%r(FourOhFourRequest,75,"HTTP/1\.1\x20404
SF:\x20Not\x20Found\r\nconnection:\x20close\r\ncontent-length:\x200\r\ndat
SF:e:\x20Tue,\x2021\x20Nov\x202023\x2018:22:15\x20GMT\r\nserver:\x20Cowboy
SF:\r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnec
SF:tion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(LDAPSearchReq,42,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-len
SF:gth:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X (86%)
OS CPE: cpe:/o:linux:linux_kernel:2.6
Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 14.26 ms 208.76.251.177
2 0.47 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.88 ms multacom.com (96.45.162.9)
4 13.07 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5 5.69 ms ae-13.r24.lsanca07.us.bb.gin.ntt.net (129.250.3.141)
6 29.53 ms ae-3.r22.dllstx14.us.bb.gin.ntt.net (129.250.7.68)
7 26.55 ms ae-15.r21.dllstx14.us.bb.gin.ntt.net (129.250.2.58)
8 49.88 ms ae-5.r22.chcgil09.us.bb.gin.ntt.net (129.250.4.153)
9 ...
10 48.43 ms ge-2-1-7.a04.chcgil09.us.ce.gin.ntt.net (168.143.229.10)
11 ... 12
13 50.96 ms sip131-1131.ringcentral.com (199.255.120.218)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 160.16 seconds
Color Scheme
-
Target
-
Target IP
199.255.120.218
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A sip131-1131.ringcentral.com
-
Scan date
21 Nov 2023 13:23
-
Copy scan report
-
Download report
-
Remove scan result