Scan OS information and Traceroute (nmap -A mx00.schlund.de)
Nmap scan report for mx00.schlund.de (212.227.15.41)
Host is up (0.15s latency).
rDNS record for 212.227.15.41: mx00.kundenserver.de
Not shown: 997 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
25/tcp open smtp
| smtp-commands: kundenserver.de Hello mx00.schlund.de [208.76.253.234], 8BITMIME, SIZE 157286400, STARTTLS
|_ This server supports the following commands: EHLO HELO MAIL RCPT DATA RSET NOOP QUIT HELP STARTTLS
|_ssl-date: TLS randomness does not represent time
| fingerprint-strings:
| GenericLines:
| 220 kundenserver.de (mxeue001) Nemesis ESMTP Service ready
| Syntax error, command unrecognized
| Syntax error, command unrecognized
| GetRequest:
| 220 kundenserver.de (mxeue003) Nemesis ESMTP Service ready
| Syntax error, command unrecognized
| Syntax error, command unrecognized
| Hello:
| 220 kundenserver.de (mxeue003) Nemesis ESMTP Service ready
| Syntax error in parameters or arguments
| Help:
| 220 kundenserver.de (mxeue001) Nemesis ESMTP Service ready
| 214-This server supports the following commands:
| 214-EHLO HELO MAIL RCPT DATA RSET NOOP QUIT HELP
| STARTTLS
| NULL:
|_ 220 kundenserver.de (mxeue003) Nemesis ESMTP Service ready
| ssl-cert: Subject: commonName=mx.kundenserver.de/organizationName=IONOS SE/stateOrProvinceName=Rheinland-Pfalz/countryName=DE
| Subject Alternative Name: DNS:mx.kundenserver.de, DNS:mx00.kundenserver.de, DNS:mx01.kundenserver.de, DNS:mx00.emig.kundenserver.de, DNS:mx01.emig.kundenserver.de, DNS:mx00.ionos.co.uk, DNS:mx00.ionos.de, DNS:mx00.ionos.es, DNS:mx00.ionos.fr, DNS:mx00.ionos.it, DNS:mx01.ionos.co.uk, DNS:mx01.ionos.de, DNS:mx01.ionos.es, DNS:mx01.ionos.fr, DNS:mx01.ionos.it
| Not valid before: 2023-06-20T11:08:11
|_Not valid after: 2024-06-24T23:59:59
465/tcp closed smtps
587/tcp closed submission
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port25-TCP:V=7.92%I=7%D=6/11%Time=6668C306%P=x86_64-redhat-linux-gnu%r(
SF:NULL,3C,"220\x20kundenserver\.de\x20\(mxeue003\)\x20Nemesis\x20ESMTP\x2
SF:0Service\x20ready\r\n")%r(Hello,69,"220\x20kundenserver\.de\x20\(mxeue0
SF:03\)\x20Nemesis\x20ESMTP\x20Service\x20ready\r\n501\x20Syntax\x20error\
SF:x20in\x20parameters\x20or\x20arguments\r\n")%r(Help,AE,"220\x20kundense
SF:rver\.de\x20\(mxeue001\)\x20Nemesis\x20ESMTP\x20Service\x20ready\r\n214
SF:-This\x20server\x20supports\x20the\x20following\x20commands:\r\n214-EHL
SF:O\x20HELO\x20MAIL\x20RCPT\x20DATA\x20RSET\x20NOOP\x20QUIT\x20HELP\r\n21
SF:4\x20STARTTLS\r\n")%r(GenericLines,8C,"220\x20kundenserver\.de\x20\(mxe
SF:ue001\)\x20Nemesis\x20ESMTP\x20Service\x20ready\r\n500\x20Syntax\x20err
SF:or,\x20command\x20unrecognized\r\n500\x20Syntax\x20error,\x20command\x2
SF:0unrecognized\r\n")%r(GetRequest,8C,"220\x20kundenserver\.de\x20\(mxeue
SF:003\)\x20Nemesis\x20ESMTP\x20Service\x20ready\r\n500\x20Syntax\x20error
SF:,\x20command\x20unrecognized\r\n500\x20Syntax\x20error,\x20command\x20u
SF:nrecognized\r\n");
Device type: general purpose
Running (JUST GUESSING): Linux 5.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:5
Aggressive OS guesses: Linux 5.0 - 5.4 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops
TRACEROUTE (using port 587/tcp)
HOP RTT ADDRESS
1 0.28 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.62 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.64 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4 ...
5 0.99 ms be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102)
6 0.55 ms telia.lax05.atlas.cogentco.com (154.54.10.10)
7 60.07 ms rest-bb1-link.ip.twelve99.net (62.115.137.36)
8 ...
9 148.61 ms ffm-bb1-link.ip.twelve99.net (62.115.123.12)
10 ...
11 148.99 ms ionos-ic-350360.ip.twelve99-cust.net (62.115.181.11)
12 153.47 ms lo-0.rc-b.bs.kae.de.net.ionos.com (212.227.117.207)
13 151.32 ms lo-0-0.gw-diste2-a.bs.kae.de.net.ionos.com (212.227.112.212)
14 146.40 ms mx00.kundenserver.de (212.227.15.41)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 59.55 seconds
Color Scheme
-
Target
mx00.schlund.de
-
Target IP
212.227.15.41
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A mx00.schlund.de
-
Scan date
11 Jun 2024 17:35
-
Copy scan report
-
Download report
-
Remove scan result
-
Total scans