Scan OS information and Traceroute (nmap -A n81.network-auth.com)
Nmap scan report for n81.network-auth.com (209.206.63.240)
Host is up (0.035s latency).
Other addresses for n81.network-auth.com (not scanned): 2620:12f:c002:0:baa3:77ff:fe8e:a0fc
rDNS record for 209.206.63.240: dal1001.meraki.com
Not shown: 995 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http nginx
| http-robots.txt: 1 disallowed entry
|_/
|_http-title: 403 Forbidden
443/tcp open ssl/http nginx
| http-robots.txt: 1 disallowed entry
|_/
|_http-server-header: nginx
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=*.network-auth.com/organizationName=Meraki LLC/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.network-auth.com, DNS:network-auth.com
| Not valid before: 2023-07-24T00:00:00
|_Not valid after: 2024-07-22T23:59:59
993/tcp open ssl/imaps?
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, JavaRMI, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, NCP, NULL, NotesRPC, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, WMSRequest, X11Probe, afp, giop, ms-sql-s, oracle-tns:
|_ GET /hello/1 HTTP/1.1
|_imap-capabilities: CAPABILITY
| ssl-cert: Subject: commonName=*.meraki.com/organizationName=Meraki LLC/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.meraki.com, DNS:meraki.com
| Not valid before: 2023-04-25T00:00:00
|_Not valid after: 2024-04-23T23:59:59
|_ssl-date: TLS randomness does not represent time
60020/tcp closed unknown
60443/tcp closed unknown
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port993-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655B0507%P=x86_64-redhat-linu
SF:x-gnu%r(NULL,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(GetRequest,19
SF:,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(GenericLines,19,"GET\x20/hel
SF:lo/1\x20HTTP/1\.1\r\n\r\n")%r(HTTPOptions,19,"GET\x20/hello/1\x20HTTP/1
SF:\.1\r\n\r\n")%r(RTSPRequest,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%
SF:r(RPCCheck,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(DNSVersionBindR
SF:eqTCP,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(DNSStatusRequestTCP,
SF:19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(Help,19,"GET\x20/hello/1\x
SF:20HTTP/1\.1\r\n\r\n")%r(SSLSessionReq,19,"GET\x20/hello/1\x20HTTP/1\.1\
SF:r\n\r\n")%r(TLSSessionReq,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(
SF:Kerberos,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(SMBProgNeg,19,"GE
SF:T\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(X11Probe,19,"GET\x20/hello/1\x20
SF:HTTP/1\.1\r\n\r\n")%r(FourOhFourRequest,19,"GET\x20/hello/1\x20HTTP/1\.
SF:1\r\n\r\n")%r(LPDString,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(LD
SF:APSearchReq,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(LDAPBindReq,19
SF:,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(SIPOptions,19,"GET\x20/hello
SF:/1\x20HTTP/1\.1\r\n\r\n")%r(LANDesk-RC,19,"GET\x20/hello/1\x20HTTP/1\.1
SF:\r\n\r\n")%r(TerminalServer,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%
SF:r(NCP,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(NotesRPC,19,"GET\x20
SF:/hello/1\x20HTTP/1\.1\r\n\r\n")%r(JavaRMI,19,"GET\x20/hello/1\x20HTTP/1
SF:\.1\r\n\r\n")%r(WMSRequest,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r
SF:(oracle-tns,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(ms-sql-s,19,"G
SF:ET\x20/hello/1\x20HTTP/1\.1\r\n\r\n")%r(afp,19,"GET\x20/hello/1\x20HTTP
SF:/1\.1\r\n\r\n")%r(giop,19,"GET\x20/hello/1\x20HTTP/1\.1\r\n\r\n");
Aggressive OS guesses: Linux 3.2 - 4.9 (95%), Linux 2.6.32 - 3.10 (95%), Linux 2.6.32 (94%), Linux 3.2 (93%), Linux 3.1 (92%), Symantec Web Gateway 5.2.0.361 (Linux 2.6) (92%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (92%), Linux 2.6.32 - 3.5 (92%), Linux 2.6.18 (91%), Linux 3.8 (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops
TRACEROUTE (using port 60020/tcp)
HOP RTT ADDRESS
1 0.63 ms 208.76.251.177
2 0.59 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.74 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1)
4 1.11 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5 0.64 ms be3359.ccr41.lax05.atlas.cogentco.com (154.54.3.70)
6 ... 8
9 33.96 ms ae2.ter1.dfw2.us.zip.zayo.com (64.125.26.203)
10 34.04 ms dal-edge-rtr-01a.meraki.com (128.177.140.90)
11 ...
12 34.08 ms dal1001.meraki.com (209.206.63.240)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 219.18 seconds
Color Scheme
-
Target
-
Target IP
209.206.63.240
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A n81.network-auth.com
-
Scan date
20 Nov 2023 02:07
-
Copy scan report
-
Download report
-
Remove scan result