Intern Diskussion:Server: Unterschied zwischen den Versionen
| (20 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt) | |||
| Zeile 1: | Zeile 1: | ||
== "Services" und "Dienste" == | == "Services" und "Dienste" == | ||
| Zeile 203: | Zeile 200: | ||
===== stura.htw-dresden.de DNS ===== | ===== stura.htw-dresden.de DNS ===== | ||
; Siehe auch: [[Domain#stura.htw-dresden.de DNS]] | ; Siehe auch: [[Domain#stura.htw-dresden.de DNS]] | ||
; womöglich letzte Meldung beim [[RZ]]: [[ticket:403]] | |||
===== stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen ===== | ===== stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen ===== | ||
| Zeile 474: | Zeile 473: | ||
| style="text-align:right" | <u>balance.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs25]].stura.htw-dresden.de</u> || || 3600 | | style="text-align:right" | <u>balance.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs25]].stura.htw-dresden.de</u> || || 3600 | ||
|- | |- | ||
!--> | |||
|} | |} | ||
</code> | </code> | ||
| Zeile 487: | Zeile 486: | ||
== Belegung vom Serverschrank == | == Belegung vom Serverschrank == | ||
=== Konzept Belegung vom Serverschrank Frühjahr 2017 === | |||
Achtung! | Achtung! | ||
| Zeile 536: | Zeile 537: | ||
| | | | ||
! rowspan="6" | | ! rowspan="6" | | ||
RX 300 | [[srs3008|RX 300 S8]] | ||
|- | |- | ||
| o | | o | ||
| Zeile 553: | Zeile 554: | ||
| | | | ||
|- | |- | ||
| | | 016 | ||
| | | | ||
| rowspan="3" | | | rowspan="3" | | ||
| Zeile 564: | Zeile 565: | ||
| | | | ||
|- | |- | ||
| | | 019 | ||
| | | | ||
! rowspan="6" | | ! rowspan="6" | | ||
| Zeile 575: | Zeile 576: | ||
| | | | ||
|- | |- | ||
| | | 022 | ||
| | | | ||
|- | |- | ||
| Zeile 584: | Zeile 585: | ||
| | | | ||
|- | |- | ||
| | | 025 | ||
| | | | ||
| rowspan="3" | | | rowspan="3" | | ||
| Zeile 595: | Zeile 596: | ||
| | | | ||
|- | |- | ||
| | | 028 | ||
| | | | ||
! rowspan="6" | | ! rowspan="6" | | ||
| Zeile 606: | Zeile 607: | ||
| | | | ||
|- | |- | ||
| | | 031 | ||
| | | | ||
|- | |- | ||
| Zeile 615: | Zeile 616: | ||
| | | | ||
|- | |- | ||
| | | 034 | ||
| | | | ||
| rowspan="3" | | | rowspan="3" | | ||
| Zeile 626: | Zeile 627: | ||
| | | | ||
|- | |- | ||
| | | 037 | ||
| | | | ||
| rowspan="3" | | | rowspan="3" | | ||
Switch | Switch | ||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 040 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 043 | |||
| | |||
| rowspan="3" | | |||
[[dicke Berta]] | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 046 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 049 | |||
| | |||
| rowspan="3" | | |||
[[fette Elke]] | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 052 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 055 | |||
| | |||
| rowspan="3" | | |||
[[mollige Dörte]] | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 058 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 061 | |||
| | |||
| rowspan="3" | | |||
<s>Switch</s> | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 064 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 067 | |||
| | |||
| rowspan="3" | | |||
IBM X3550<br /><small>(vergleichbar [[dicke Berta]])</small> | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 070 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 073 | |||
| | |||
| rowspan="3" | | |||
HP DL160 G6<br /><small>(vergleichbar [[mollige Dörte]])</small> | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 076 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 079 | |||
| | |||
| rowspan="6" | | |||
<s>Lenovo<br /><small>(in Anlehnung an [[dicke Berta]])</small></s> | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 082 | |||
| | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 085 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 088 | |||
| | |||
| rowspan="6" | | |||
<s>Lenovo<br /><small>(in Anlehnung an [[dicke Berta]])</small></s> | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 091 | |||
| | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 094 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 097 | |||
| | |||
| rowspan="3" | | |||
<s>Switch</s> | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 100 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
|} | |||
=== Konzept Belegung vom Serverschrank Sommer 2017 === | |||
Achtung! | |||
Die Tabelle stellt noch nicht die Realität dar. | |||
Die Tabelle muss noch bearbeitet werden! | |||
{| class="wikitable" | |||
|- | |||
|+ großer Serverschrank (32? Höheneinheiten) | |||
|- | |||
! Höhe | |||
! Ist | |||
! Soll | |||
|- | |||
| 001 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 004 | |||
| | |||
! rowspan="3" | | |||
[[Switch]] [[Cisco SG200#Cisco SG200-50 | Cisco SG200-50]] | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 007 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 010 | |||
| | |||
! rowspan="3" | | |||
[[Switch]] [[Cisco SRW20#Cisco SRW2048 | Cisco SRW2048]] | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 013 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 017 | |||
| | |||
! rowspan="6" | | |||
[[Server/srs5100]] | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 020 | |||
| | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 023 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 026 | |||
| | |||
! rowspan="6" | | |||
[[Server/srs3008]] | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 029 | |||
| | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 032 | |||
| | |||
| rowspan="3" | | |||
---- | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 035 | |||
| | |||
! rowspan="6" | | |||
[[Server/srs3006]] | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 038 | |||
| | |||
|- | |- | ||
| o | | o | ||
| Zeile 649: | Zeile 1.030: | ||
|- | |- | ||
| 044 | | 044 | ||
| | |||
! rowspan="6" | | |||
[[Server/srs3005]] | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 047 | |||
| | |||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 050 | |||
| | | | ||
| rowspan="3" | | | rowspan="3" | | ||
[[ | ---- | ||
|- | |||
| o | |||
| | |||
|- | |||
| - | |||
| | |||
|- | |||
| 044 | |||
| | |||
! rowspan="3" | | |||
[[Switch]] [[Cisco SG200#Cisco SG200-26 | Cisco SG200-26]] | |||
|- | |- | ||
| o | | o | ||
| Zeile 672: | Zeile 1.084: | ||
| 050 | | 050 | ||
| | | | ||
! rowspan="3" | | |||
[[ | [[Switch]] [[Cisco SRW20#Cisco SRW2024 | Cisco SRW2024]] | ||
|- | |- | ||
| o | | o | ||
| Zeile 694: | Zeile 1.106: | ||
| 056 | | 056 | ||
| | | | ||
! rowspan="3" | | |||
[[mollige Dörte]] | [[mollige Dörte]] | ||
|- | |- | ||
| Zeile 716: | Zeile 1.128: | ||
| 062 | | 062 | ||
| | | | ||
! rowspan="3" | | |||
[[fette Elke]] | |||
|- | |- | ||
| o | | o | ||
| Zeile 738: | Zeile 1.150: | ||
| 068 | | 068 | ||
| | | | ||
! rowspan="3" | | |||
[[dicke Berta]] | |||
|- | |- | ||
| o | | o | ||
| Zeile 761: | Zeile 1.173: | ||
| | | | ||
| rowspan="3" | | | rowspan="3" | | ||
HP DL160 G6<br /><small>(vergleichbar [[mollige Dörte]])</small> | HP DL160 G6<br /><small>(vergleichbar [[mollige Dörte]])<br />known as ''nax''</small> | ||
|- | |- | ||
| o | | o | ||
| Zeile 782: | Zeile 1.194: | ||
| 080 | | 080 | ||
| | | | ||
| rowspan=" | | rowspan="3" | | ||
IBM X3550<br /><small>(vergleichbar [[dicke Berta]])<br />known as ''nox''</small> | |||
|- | |- | ||
| o | | o | ||
| Zeile 793: | Zeile 1.205: | ||
| 083 | | 083 | ||
| | | | ||
| rowspan="3" | | |||
---- | |||
|- | |- | ||
| o | | o | ||
| Zeile 803: | Zeile 1.217: | ||
| | | | ||
| rowspan="3" | | | rowspan="3" | | ||
<s>Switch<br /><small>unknown</small></s> | |||
|- | |- | ||
| o | | o | ||
| Zeile 814: | Zeile 1.228: | ||
| | | | ||
| rowspan="6" | | | rowspan="6" | | ||
<s>Lenovo<br /><small>(in Anlehnung an [[dicke Berta]])</small></s> | <s>Lenovo<br /><small>(in Anlehnung an [[dicke Berta]])<br />unknown</small></s> | ||
|- | |- | ||
| o | | o | ||
| Zeile 833: | Zeile 1.247: | ||
| 095 | | 095 | ||
| | | | ||
| rowspan=" | | rowspan="6" | | ||
<s>Lenovo<br /><small>(in Anlehnung an [[dicke Berta]])<br />unknown</small></s> | |||
|- | |- | ||
| o | | o | ||
| Zeile 844: | Zeile 1.258: | ||
| 098 | | 098 | ||
| | | | ||
|- | |- | ||
| o | | o | ||
| Zeile 865: | Zeile 1.277: | ||
|- | |- | ||
|} | |} | ||
== gescheitertes == | |||
==== Umzug von [[Server/Jails/SRS1]] Juni 2017 ==== | |||
<pre> | |||
add jails | |||
--------- | |||
* database | |||
** 141.56.50.191 | |||
* semaphore | |||
** 141.56.50.190 | |||
* git | |||
** 141.56.50.192 | |||
* website | |||
** 141.56.50.195 | |||
add storage | |||
----------- | |||
* /lega/storage/git/repos/ansible | |||
* /lega/storage/semaphore/ansible | |||
mount Storage | |||
------------- | |||
* git /lega/storage/git/repos /media/repos # XXX geht nicht | |||
* semaphore /mnt/lega/jails/git/media/repos/ansible /media/repos read-only | |||
* semaphore /lega/storage/semaphore/ansible /media/playbooks | |||
Installationen | |||
-------------- | |||
semaphore | |||
* semaphore | |||
* mariadb100-client | |||
database | |||
* mariadb100-server | |||
git | |||
* git | |||
* neovim | |||
Konfiguration | |||
------------- | |||
database:mariadb100-server | |||
sysrc mysql_enable="YES" | |||
'/usr/local/bin/mysqladmin' -u root password 'passwd' | |||
mysql -u root -p | |||
$ create database semaphore; | |||
$ create user 'semaphore'@'141.56.50.190' identified by 'passwd'; | |||
$ grant all on semaphore.* to 'semaphore'@'141.56.50.190'; | |||
$ exit | |||
website:ssh-access | |||
mv semaphore.pub /root/.ssh/authorized_keys | |||
$EDITOR /etc/ssh/sshd_config | |||
PermitRootLogin without-password | |||
service sshd onestart | |||
semaphore:maraidb100 test | |||
mysql -u semaphore -p -h 141.56.50.191 semaphore | |||
semaphore:ssh-access test | |||
ssh -i /root/.ssh/semaphore root@141.56.50.181 | |||
semaphore:semaphore setup | |||
sysrc semaphore_enable="YES" | |||
semaphore -setup | |||
1. Set up configuration for a MySQL/MariaDB database | |||
2. Set up a path for your playbooks (auto-created) | |||
3. Run database Migrations | |||
4. Set up initial seamphore user & password | |||
> DB Hostname (default 127.0.0.1:3306): 141.56.50.191:3306 | |||
> DB User (default root): semaphore | |||
> DB Password: passwd | |||
> DB Name (default semaphore): | |||
> Playbook path: /media/playbooks | |||
Generated configuration: | |||
{ | |||
"mysql": { | |||
"host": "141.56.50.191:3306", | |||
"user": "semaphore", | |||
"pass": "passwd", | |||
"name": "semaphore" | |||
}, | |||
"port": "", | |||
"bugsnag_key": "", | |||
"tmp_path": "/media/playbooks", | |||
"cookie_hash": "3tVjUpe+RbRU4uBDtcpFZN/m8a3yh2q81pvTNGRoNL8=", | |||
"cookie_encryption": "g881D/r7T8aa8Q0tgKPm00kiFVj5oi/q0loJgYoN2Co=" | |||
} | |||
> Is this correct? (yes/no): yes | |||
Running: mkdir -p /media/playbooks.. | |||
Configuration written to /media/playbooks/semaphore_config.json.. | |||
Pinging database.. | |||
Running DB Migrations.. | |||
Creating migrations table | |||
Executing migration v0.0.0 (at 2017-05-06 13:02:41.78052655 +0200 CEST)... | |||
[11/11] | |||
Executing migration v1.0.0 (at 2017-05-06 13:02:42.992311998 +0200 CEST)... | |||
[7/7] | |||
Executing migration v1.1.0 (at 2017-05-06 13:02:44.672359519 +0200 CEST)... | |||
[1/1] | |||
Executing migration v1.2.0 (at 2017-05-06 13:02:44.92682468 +0200 CEST)... | |||
[1/1] | |||
Executing migration v1.3.0 (at 2017-05-06 13:02:45.041572311 +0200 CEST)... | |||
[3/3] | |||
Executing migration v1.4.0 (at 2017-05-06 13:02:45.694122748 +0200 CEST)... | |||
[2/2] | |||
Executing migration v1.5.0 (at 2017-05-06 13:02:46.42319397 +0200 CEST)... | |||
[1/1] | |||
Executing migration v0.1.0 (at 2017-05-06 13:02:46.551490497 +0200 CEST)... | |||
[6/6] | |||
Executing migration v1.6.0 (at 2017-05-06 13:02:46.804356224 +0200 CEST)... | |||
[4/4] | |||
Executing migration v1.7.0 (at 2017-05-06 13:02:47.39476158 +0200 CEST)... | |||
[1/1] | |||
Executing migration v1.8.0 (at 2017-05-06 13:02:47.545875504 +0200 CEST)... | |||
[2/2] | |||
Executing migration v1.9.0 (at 2017-05-06 13:02:47.69541287 +0200 CEST)... | |||
[2/2] | |||
> Username: root | |||
> Email: semaphore@stura.htw-dresden.de | |||
> Your name: StuRa HTW Dresden | |||
> Password: passwd | |||
cp /media/playbooks/semaphore_config.json /usr/local/etc/semaphore/semaphore_config.json | |||
semaphore:ssh-keygen | |||
ssh-keygen -t ed25519 | |||
Generating public/private ed25519 key pair. | |||
Enter file in which to save the key (/root/.ssh/id_ed25519): /root/.ssh/semaphore | |||
Created directory '/root/.ssh'. | |||
Enter passphrase (empty for no passphrase): | |||
Enter same passphrase again: | |||
Your identification has been saved in /root/.ssh/semaphore. | |||
Your public key has been saved in /root/.ssh/semaphore.pub. | |||
The key fingerprint is: | |||
SHA256:pfwPuz8FVoC5xY0NqbaeP7IhjVizjJEID8riFy6lHvk root@semaphore | |||
The key's randomart image is: | |||
+--[ED25519 256]--+ | |||
| +oB | | |||
| o = + | | |||
| o .+ . | | |||
|.. + . o o+ o | | |||
|o. oo o S. o . | | |||
|o = . * *. . | | |||
| * o o =.=. . | | |||
|. = .+=o | | |||
| . E +*+o | | |||
+----[SHA256]-----+ | |||
semaphore:ansible roles | |||
ansible-galaxy NetworkManager/ | |||
git:git init --bare | |||
cd /media/repos/ansible/ | |||
git init --bare website.git | |||
git:create playbooks | |||
cd /tmp | |||
git clone /media/repos/ansible/website.git | |||
cd website | |||
git config --global user.email "semaphore@stura.htw-dresden.de" | |||
git config --global user.name "Administration Rechentechnik" | |||
...... | |||
plone upgrade | |||
------------- | |||
1. srs3008 | |||
zfs create comp/migration | |||
2. elke | |||
/etc/rc.d/jail stop srs1 | |||
zfs snapshot -r primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20 | |||
/etc/rc.d/jail start srs1 | |||
zfs send primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20 | ssh root@141.56.50.128 zfs recv comp/migration/srs1 | |||
3. srs3008 | |||
zfs create -p comp/storage/website/plone/var/blobstorage | |||
zfs create -p comp/storage/website/plone/var/filestorage | |||
rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/filestorage/ /mnt/comp/storage/website/plone/var/filestorage/ | |||
rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/blobstorage/ /mnt/comp/storage/website/plone/var/blobstorage/ | |||
chown -R www:www /mnt/comp/storage/website/plone/var | |||
zfs snapshot -r comp/storage/website/plone@AFTER_MIGRATION | |||
4. srs3008/website | |||
pkg install python2 sudo | |||
adduser | |||
Username: ansible | |||
Full name: | |||
Uid (Leave empty for default): | |||
Login group [ansible]: | |||
Login group is foo. Invite foo into other groups? []: | |||
Login class [default]: | |||
Shell (sh csh tcsh git-shell nologin) [sh]: | |||
Home directory [/home/ansible]: | |||
Home directory permissions (Leave empty for default): | |||
Use password-based authentication? [yes]: | |||
Use an empty password? (yes/no) [no]: | |||
Use a random password? (yes/no) [no]: yes | |||
Lock out the account after creation? [no]: | |||
Username : ansible | |||
Password : <random> | |||
Full Name : | |||
Uid : 1001 | |||
Class : | |||
Groups : ansible | |||
Home : /home/ansible | |||
Home Mode : | |||
Shell : /bin/sh | |||
Locked : no | |||
OK? (yes/no): yes | |||
su ansible | |||
cd; mkdir .ssh | |||
echo 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN3eeZ3Wcxn9ixD039fSFNg2zpJ09YY45XKb3KMST8Da root@semaphore' > .ssh/authorized_keys | |||
exit | |||
vi /usr/local/etc/sudoers | |||
ansible ALL=(ALL) NOPASSWD: ALL | |||
service sshd onestart | |||
5. browser | |||
5.1. http://141.56.50.190:3000/project/1/templates | |||
5.1.1. Anpassung Inventory plone | |||
plone_neu ansible_host=141.56.50.195 | |||
myhost ansible_host=141.56.50.128 ansible_ssh_user=root | |||
5.1.2. Anpassung Enviroment | |||
"stura_nginx_server_name":"plone.htw.stura-dresden.de", | |||
"myhost_tank":"comp" | |||
5.1.3. run main | |||
5.2. http://141.56.50.128/ > Jails -> Storage | |||
5.2.1 Add Storage | |||
Jail SRC DEST READ-ONLY CREATE DIRECTORY MOUNTED | |||
website /mnt/comp/storage/website/plone/var/blobstorage /usr/local/www/website/var/blobstorage no no yes | |||
website /mnt/comp/storage/website/plone/var/filestorage /usr/local/www/website/var/filestorage no no yes | |||
6. srs3008/website | |||
service zope213 start | |||
7. browser | |||
7.1. http://plone.htw.stura-dresden.de:8080/Plone/@@plone-upgrade | |||
7.2. http://141.56.50.190:3000/project/1/templates | |||
7.2.1 Anpassung Enviroment | |||
"stura_nginx_server_name":"www.stura.htw-dresden.de", | |||
7.2.2 run main | |||
7.3. http://141.56.50.128/ > Jails | |||
7.3.1. stoppe jail website | |||
8. Elke | |||
/etc/rc.d/jail stop srs1 | |||
TODO Ist die IP adresse weg vom interface? | |||
9. browser | |||
9.1. http://141.56.50.128/ > Jails | |||
9.1.2. edit jail | |||
IPv4 address: 141.56.50.1 | |||
9.1.3. starte jail website | |||
</pre> | |||
== Umzug zum Bereich an Adressen für IPv4 141.56.51.0/24 == | |||
<code>nmap -sV -Pn 141.56.50.1-254</code> | |||
<!-- | |||
<pre> | |||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-08-28 13:18 CEST | |||
Nmap scan report for srs1.stura.htw-dresden.de (141.56.50.1) | |||
Host is up (0.00021s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd) | |||
443/tcp open ssl/http Zope httpd 2.13.24 (python 2.7.9, freebsd9; ZServer/1.1) | |||
8080/tcp open http Zope httpd 2.13.24 (python 2.7.9, freebsd9; ZServer/1.1) | |||
Nmap scan report for srs2.stura.htw-dresden.de (141.56.50.2) | |||
Host is up (0.00023s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
8080/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for srs3.stura.htw-dresden.de (141.56.50.3) | |||
Host is up (0.00025s latency). | |||
Not shown: 989 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.6 ((CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3.4 Python/2.7.5) | |||
88/tcp open kerberos-sec MIT Kerberos (server time: 2018-08-28 11:50:41Z) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
389/tcp open ldap (Anonymous bind OK) | |||
443/tcp open https Apache/2.4.6 (CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3 | |||
464/tcp open kpasswd5? | |||
636/tcp open ssl/ldap (Anonymous bind OK) | |||
749/tcp open rpcbind | |||
8080/tcp open http Apache Tomcat/Coyote JSP engine 1.1 | |||
8443/tcp open https-alt? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port8443-TCP:V=6.47%I=7%D=8/28%Time=5B853621%P=x86_64-pc-linux-gnu%r(SS | |||
SF:LSessionReq,7,"\x15\x03\x01\0\x02\x02\("); | |||
Service Info: Host: STURA.HTW-DRESDEN.DE | |||
Nmap scan report for 141.56.50.4 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.4 are filtered | |||
Nmap scan report for 141.56.50.5 | |||
Host is up (0.00025s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD) PHP/5.6.29) | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Nmap scan report for 141.56.50.6 | |||
Host is up (0.00030s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
5900/tcp open vnc VNC (protocol 3.7) | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port22-TCP:V=6.47%I=7%D=8/28%Time=5B85360D%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,29,"SSH-2\.0-OpenSSH_7\.2p2\x20Ubuntu-4ubuntu2\.4\r\n"); | |||
Nmap scan report for 141.56.50.7 | |||
Host is up (0.00050s latency). | |||
Not shown: 991 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Canon imageRUNNER C5185 smtpd | |||
80/tcp open ipp Canon printer http config 2.21 | |||
515/tcp open printer? | |||
631/tcp open ipp Canon printer http config 2.21 | |||
8000/tcp open http Catwalk 1.3.1 (Canon imageRUNNER C5000-series printer http config) | |||
9002/tcp open dynamid? | |||
9010/tcp open sdr? | |||
9011/tcp open unknown | |||
9100/tcp open jetdirect? | |||
Service Info: Device: printer; CPE: cpe:/h:canon:imagerunner_c5185, cpe:/h:canon:imagerunner_c5000 | |||
Nmap scan report for srs8.stura.htw-dresden.de (141.56.50.8) | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on srs8.stura.htw-dresden.de (141.56.50.8) are filtered | |||
Nmap scan report for srs9.stura.htw-dresden.de (141.56.50.9) | |||
Host is up (0.00044s latency). | |||
Not shown: 989 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | |||
25/tcp open smtp Postfix smtpd | |||
53/tcp open domain dnsmasq 2.76 | |||
80/tcp open http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16) | |||
143/tcp open imap Dovecot imapd | |||
443/tcp open ssl/http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16) | |||
465/tcp open ssl/smtp Postfix smtpd | |||
587/tcp open smtp Postfix smtpd | |||
993/tcp open ssl/imap Dovecot imapd | |||
5222/tcp open jabber ejabberd (Protocol 1.0) | |||
5280/tcp open ssl/xmpp-bosh? | |||
Service Info: Hosts: mail.stura-dresden.de, stura-dresden.de | |||
Nmap scan report for srs2342.stura.htw-dresden.de (141.56.50.10) | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on srs2342.stura.htw-dresden.de (141.56.50.10) are filtered | |||
Nmap scan report for srsw1.stura.htw-dresden.de (141.56.50.11) | |||
Host is up (0.019s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Web Server | |||
4242/tcp open vrml-multi-use? | |||
Nmap scan report for srs1337.stura.htw-dresden.de (141.56.50.12) | |||
Host is up (0.00018s latency). | |||
All 1000 scanned ports on srs1337.stura.htw-dresden.de (141.56.50.12) are closed | |||
Nmap scan report for srs13.stura.htw-dresden.de (141.56.50.13) | |||
Host is up (0.00016s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd | |||
443/tcp open ssl/http Apache httpd | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: localhost.localdomain; OS: Unix | |||
Nmap scan report for srs14.stura.htw-dresden.de (141.56.50.14) | |||
Host is up (0.00018s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Postfix smtpd | |||
80/tcp open http Apache httpd 2.4.29 ((FreeBSD)) | |||
Service Info: Host: mail.stura.htw-dresden.de | |||
Nmap scan report for srs15.stura.htw-dresden.de (141.56.50.15) | |||
Host is up (0.00023s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd Phusion_Passenger/5.0.30 mod_fastcgi/mod_fastcgi-SNAP-0910052141) | |||
443/tcp open ssl/http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd Phusion_Passenger/5.0.30 mod_fastcgi/mod_fastcgi-SNAP-0910052141) | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: localhost.localdomain; OS: Unix | |||
Nmap scan report for srs16.stura.htw-dresden.de (141.56.50.16) | |||
Host is up (0.00024s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.5.16) | |||
443/tcp open ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.5.16) | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
Service Info: Host: localhost.localdomain; OSs: FreeBSD, Unix; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for srs17.stura.htw-dresden.de (141.56.50.17) | |||
Host is up (0.00026s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2h PHP/5.5.16) | |||
443/tcp open ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2h PHP/5.5.16) | |||
Nmap scan report for srs18.stura.htw-dresden.de (141.56.50.18) | |||
Host is up (0.00026s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
Nmap scan report for srs19.stura.htw-dresden.de (141.56.50.19) | |||
Host is up (0.00025s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2d PHP/5.5.16) | |||
443/tcp open ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2d PHP/5.5.16) | |||
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for srs20.stura.htw-dresden.de (141.56.50.20) | |||
Host is up (0.00024s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.24) | |||
443/tcp open ssl/http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.24) | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: localhost.localdomain; OS: Unix | |||
Nmap scan report for 141.56.50.21 | |||
Host is up (0.00018s latency). | |||
All 1000 scanned ports on 141.56.50.21 are closed | |||
Nmap scan report for 141.56.50.22 | |||
Host is up (0.00017s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
9000/tcp open tcpwrapped | |||
Nmap scan report for 141.56.50.23 | |||
Host is up (0.00022s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
Nmap scan report for 141.56.50.24 | |||
Host is up (0.00017s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Postfix smtpd | |||
26/tcp open smtp Postfix smtpd | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
Service Info: Host: mail.kss-sachsen.de | |||
Nmap scan report for srs25.stura.htw-dresden.de (141.56.50.25) | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on srs25.stura.htw-dresden.de (141.56.50.25) are filtered | |||
Nmap scan report for 141.56.50.26 | |||
Host is up (0.00018s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
Nmap scan report for srs27.stura.htw-dresden.de (141.56.50.27) | |||
Host is up (0.00028s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD)) | |||
Nmap scan report for srs28.stura.htw-dresden.de (141.56.50.28) | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on srs28.stura.htw-dresden.de (141.56.50.28) are filtered | |||
Nmap scan report for srs29.stura.htw-dresden.de (141.56.50.29) | |||
Host is up (0.00083s latency). | |||
Not shown: 987 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u2 (protocol 2.0) | |||
25/tcp open smtp Postfix smtpd | |||
53/tcp open domain | |||
80/tcp open http Apache httpd 2.4.10 ((Debian)) | |||
110/tcp open pop3 Dovecot pop3d | |||
143/tcp open imap Dovecot imapd | |||
443/tcp open http Apache httpd 2.4.10 ((Debian)) | |||
587/tcp open smtp Postfix smtpd | |||
993/tcp open ssl/imap Dovecot imapd | |||
995/tcp open ssl/pop3 Dovecot pop3d | |||
8080/tcp open http Apache httpd 2.4.10 ((Debian)) | |||
8081/tcp open http Apache httpd 2.4.10 ((Debian)) | |||
10000/tcp closed snet-sensor-mgmt | |||
Service Info: Host: srs29.stura.htw-dresden.de; OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.30 | |||
Host is up (0.00022s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.26) | |||
443/tcp open ssl/http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.26) | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for 141.56.50.31 | |||
Host is up (0.00018s latency). | |||
All 1000 scanned ports on 141.56.50.31 are closed | |||
Nmap scan report for 141.56.50.32 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.32 are filtered | |||
Nmap scan report for 141.56.50.33 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.33 are filtered | |||
Nmap scan report for 141.56.50.34 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.34 are filtered | |||
Nmap scan report for 141.56.50.35 | |||
Host is up (0.00049s latency). | |||
Not shown: 999 filtered ports | |||
PORT STATE SERVICE VERSION | |||
3389/tcp open ms-wbt-server? | |||
Nmap scan report for 141.56.50.36 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.36 are filtered | |||
Nmap scan report for 141.56.50.37 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.37 are filtered | |||
Nmap scan report for 141.56.50.38 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.38 are filtered | |||
Nmap scan report for 141.56.50.39 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.39 are filtered | |||
Nmap scan report for 141.56.50.40 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.40 are filtered | |||
Nmap scan report for 141.56.50.41 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.41 are filtered | |||
Nmap scan report for 141.56.50.42 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.42 are filtered | |||
Nmap scan report for 141.56.50.43 | |||
Host is up (0.061s latency). | |||
All 1000 scanned ports on 141.56.50.43 are filtered | |||
Nmap scan report for 141.56.50.44 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.44 are filtered | |||
Nmap scan report for 141.56.50.45 | |||
Host is up (0.044s latency). | |||
All 1000 scanned ports on 141.56.50.45 are filtered | |||
Nmap scan report for 141.56.50.46 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.46 are filtered | |||
Nmap scan report for 141.56.50.47 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.47 are filtered | |||
Nmap scan report for 141.56.50.48 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.48 are filtered | |||
Nmap scan report for 141.56.50.49 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.49 are filtered | |||
Nmap scan report for 141.56.50.50 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.50 are filtered | |||
Nmap scan report for rbuch2.rz.htw-dresden.de (141.56.50.51) | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on rbuch2.rz.htw-dresden.de (141.56.50.51) are filtered | |||
Nmap scan report for 141.56.50.52 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.52 are filtered | |||
Nmap scan report for 141.56.50.53 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.53 are filtered | |||
Nmap scan report for 141.56.50.54 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.54 are filtered | |||
Nmap scan report for 141.56.50.55 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.55 are filtered | |||
Nmap scan report for 141.56.50.56 | |||
Host is up (2.0s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
135/tcp open msrpc? | |||
139/tcp open netbios-ssn? | |||
445/tcp open microsoft-ds? | |||
Nmap scan report for 141.56.50.57 | |||
Host is up (0.00019s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx | |||
6000/tcp open X11? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port6000-TCP:V=6.47%I=7%D=8/28%Time=5B85362C%P=x86_64-pc-linux-gnu%r(HT | |||
SF:TPOptions,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text | |||
SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20Fri,\x202 | |||
SF:0\x20Jul\x202018\x2018:37:55\x20GMT\r\nServer:\x20Python/3\.6\x20aiohtt | |||
SF:p/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(X11Probe,AA,"HTTP/1\.0\x20400 | |||
SF:\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nC | |||
SF:ontent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:37:55\ | |||
SF:x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Reque | |||
SF:st")%r(GetRequest,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type: | |||
SF:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20F | |||
SF:ri,\x2020\x20Jul\x202018\x2018:38:00\x20GMT\r\nServer:\x20Python/3\.6\x | |||
SF:20aiohttp/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(RTSPRequest,B6,"HTTP/ | |||
SF:1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset | |||
SF:=utf-8\r\nContent-Length:\x2023\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x | |||
SF:2018:38:00\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\ni | |||
SF:nvalid\x20constant\x20string")%r(RPCCheck,AA,"HTTP/1\.0\x20400\x20Bad\x | |||
SF:20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le | |||
SF:ngth:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:38:03\x20GMT\r\ | |||
SF:nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DN | |||
SF:SVersionBindReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\r\nDate:\x20Fr | |||
SF:i,\x2020\x20Jul\x202018\x2018:38:05\x20GMT\r\nServer:\x20Python/3\.6\x2 | |||
SF:0aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DNSStatusRequest,AA,"HTTP/1\ | |||
SF:.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=u | |||
SF:tf-8\r\nContent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x20 | |||
SF:18:38:08\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad | |||
SF:\x20Request")%r(SSLSessionReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ | |||
SF:nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\ | |||
SF:r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:38:14\x20GMT\r\nServer:\x20 | |||
SF:Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request"); | |||
Nmap scan report for 141.56.50.58 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.58 are filtered | |||
Nmap scan report for 141.56.50.59 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.59 are filtered | |||
Nmap scan report for 141.56.50.60 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.60 are filtered | |||
Nmap scan report for 141.56.50.61 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.61 are filtered | |||
Nmap scan report for 141.56.50.62 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.62 are filtered | |||
Nmap scan report for 141.56.50.63 | |||
Host is up (1.1s latency). | |||
All 1000 scanned ports on 141.56.50.63 are filtered | |||
Nmap scan report for 141.56.50.64 | |||
Host is up (0.019s latency). | |||
All 1000 scanned ports on 141.56.50.64 are filtered | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
Nmap scan report for 141.56.50.65 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.65 are filtered | |||
Nmap scan report for 141.56.50.66 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.66 are filtered | |||
Nmap scan report for 141.56.50.67 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.67 are filtered | |||
Nmap scan report for 141.56.50.68 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.68 are filtered | |||
Nmap scan report for 141.56.50.69 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.69 are filtered | |||
Nmap scan report for 141.56.50.70 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.70 are filtered | |||
Nmap scan report for 141.56.50.71 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.71 are filtered | |||
Nmap scan report for 141.56.50.72 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.72 are filtered | |||
Nmap scan report for 141.56.50.73 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.73 are filtered | |||
Nmap scan report for 141.56.50.74 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.74 are filtered | |||
Nmap scan report for 141.56.50.75 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.75 are filtered | |||
Nmap scan report for 141.56.50.76 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.76 are filtered | |||
Nmap scan report for 141.56.50.77 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.77 are filtered | |||
Nmap scan report for 141.56.50.78 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.78 are filtered | |||
Nmap scan report for 141.56.50.79 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.79 are filtered | |||
Nmap scan report for 141.56.50.80 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.80 are filtered | |||
Nmap scan report for 141.56.50.81 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.81 are filtered | |||
Nmap scan report for 141.56.50.82 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.82 are filtered | |||
Nmap scan report for 141.56.50.83 | |||
Host is up (0.00034s latency). | |||
Not shown: 993 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.6 ((CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3.4 Python/2.7.5) | |||
88/tcp open kerberos-sec MIT Kerberos (server time: 2018-08-28 12:03:39Z) | |||
389/tcp open ldap (Anonymous bind OK) | |||
443/tcp open https Apache/2.4.6 (CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3 | |||
464/tcp open kerberos-sec MIT Kerberos (server time: 2018-08-28 12:03:39Z) | |||
636/tcp open ssl/ldap (Anonymous bind OK) | |||
Service Info: Host: STURA-DRESDEN.DE | |||
Nmap scan report for 141.56.50.84 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.84 are filtered | |||
Nmap scan report for 141.56.50.85 | |||
Host is up (1.4s latency). | |||
All 1000 scanned ports on 141.56.50.85 are filtered | |||
Nmap scan report for 141.56.50.86 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.86 are filtered | |||
Nmap scan report for 141.56.50.87 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.87 are filtered | |||
Nmap scan report for 141.56.50.88 | |||
Host is up. | |||
All 1000 scanned ports on 141.56.50.88 are filtered | |||
Nmap scan report for 141.56.50.89 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.89 are filtered | |||
Nmap scan report for 141.56.50.90 | |||
Host is up (0.00029s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.5/8.14.5 | |||
80/tcp open http Apache httpd 2.2.27 ((FreeBSD) PHP/5.4.27 mod_ssl/2.2.27 OpenSSL/0.9.8q DAV/2) | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: lrs0x016a.kss-sachsen.de; OS: Unix | |||
Nmap scan report for 141.56.50.91 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.91 are filtered | |||
Nmap scan report for 141.56.50.92 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.92 are filtered | |||
Nmap scan report for 141.56.50.93 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.93 are filtered | |||
Nmap scan report for 141.56.50.94 | |||
Host is up (0.00024s latency). | |||
All 1000 scanned ports on 141.56.50.94 are closed | |||
Nmap scan report for 141.56.50.95 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.95 are filtered | |||
Nmap scan report for 141.56.50.96 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.96 are filtered | |||
Nmap scan report for 141.56.50.97 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.50.97 are filtered | |||
Nmap scan report for 141.56.50.98 | |||
Host is up (0.12s latency). | |||
All 1000 scanned ports on 141.56.50.98 are filtered | |||
Nmap scan report for 141.56.50.99 | |||
Host is up (1.4s latency). | |||
All 1000 scanned ports on 141.56.50.99 are filtered | |||
Nmap scan report for 141.56.50.100 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.50.100 are filtered | |||
Nmap scan report for raar1.rz.htw-dresden.de (141.56.50.101) | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on raar1.rz.htw-dresden.de (141.56.50.101) are filtered | |||
Nmap scan report for 141.56.50.102 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.102 are filtered | |||
Nmap scan report for 141.56.50.103 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.103 are filtered | |||
Nmap scan report for 141.56.50.104 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.104 are filtered | |||
Nmap scan report for 141.56.50.105 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.50.105 are filtered | |||
Nmap scan report for 141.56.50.106 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.106 are filtered | |||
Nmap scan report for 141.56.50.107 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.107 are filtered | |||
Nmap scan report for 141.56.50.108 | |||
Host is up (0.0048s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http GoAhead-Webs httpd | |||
443/tcp open https GoAhead-Webs | |||
Nmap scan report for 141.56.50.109 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.109 are filtered | |||
Nmap scan report for 141.56.50.110 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.110 are filtered | |||
Nmap scan report for 141.56.50.111 | |||
Host is up (0.0031s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 4.2 (protocol 2.0) | |||
80/tcp open http? | |||
427/tcp open svrloc? | |||
443/tcp open https? | |||
5988/tcp open http sfcHttpd (SuperMicro IPMI Small Footprint CIM Broker) | |||
Nmap scan report for 141.56.50.112 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.112 are filtered | |||
Nmap scan report for 141.56.50.113 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.113 are filtered | |||
Nmap scan report for 141.56.50.114 | |||
Host is up (0.14s latency). | |||
All 1000 scanned ports on 141.56.50.114 are filtered | |||
Nmap scan report for 141.56.50.115 | |||
Host is up (0.14s latency). | |||
All 1000 scanned ports on 141.56.50.115 are filtered | |||
Nmap scan report for 141.56.50.116 | |||
Host is up (0.00095s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open tcpwrapped | |||
80/tcp open http? | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853918%P=x86_64-pc-linux-gnu%r(GetR | |||
SF:equest,3AA,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate:\x20Di | |||
SF:gest\x20realm=\"iRMC\x20S2@srs3006\",\x20qop=\"auth\",\x20nonce=\"15603 | |||
SF:e9b-00001550\",\x20opaque=\"1550\",\x20stale=\"FALSE\"\x20\r\nConnectio | |||
SF:n:\x20close\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nCon | |||
SF:tent-Type:\x20text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n | |||
SF:<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSI | |||
SF:TIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n< | |||
SF:HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE= | |||
SF:EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x2 | |||
SF:0http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http- | |||
SF:equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv | |||
SF:=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC | |||
SF:\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerVie | |||
SF:w\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20Server\x20Information | |||
SF::</h2>\n\x20\x20<h1\x20style=\"color:red\"></p>401 Unauthorized!</ | |||
SF:h1>\x20\x20<p>You\x20need\x20to\x20authenticate\x20yourself\x20with\x20 | |||
SF:a\x20valid\x20username\x20and\x20password\x20to\x20see\x20thi")%r(HTTPO | |||
SF:ptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue,\x202 | |||
SF:8\x20Aug\x202018\x2012:04:52\x20GMT\r\nServer:\x20iRMC\x20S2\x20Webserv | |||
SF:er\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=ut | |||
SF:f-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Len | |||
SF:gth:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x20404\x20Not\x2 | |||
SF:0Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:05:02\x20GMT\r\nServ | |||
SF:er:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma | |||
SF::\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\n<!DOCTYPE\ | |||
SF:x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN | |||
SF:\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x2 | |||
SF:0\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8 | |||
SF:\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equi | |||
SF:v=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Ex | |||
SF:pires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\ | |||
SF:">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20 | |||
SF:Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20S2\x20Web\x | |||
SF:20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:black\"></p | |||
SF:>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B853929%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,397,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@srs3006\",\x20qop=\"auth\",\x20nonce= | |||
SF:\"1560439d-00001551\",\x20opaque=\"1551\",\x20stale=\"FALSE\"\x20\r\nCa | |||
SF:che-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20tex | |||
SF:t/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20html | |||
SF:\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x20\ | |||
SF:"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x20<m | |||
SF:eta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x20/ | |||
SF:>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"Con | |||
SF:tent-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expires\" | |||
SF:>\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n\x2 | |||
SF:0\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20 | |||
SF:Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x20Ma | |||
SF:nagement\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20< | |||
SF:h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p>You | |||
SF:\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20use | |||
SF:rname\x20and\x20password\x20to\x20see\x20this\x20document\.</p></BO")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue | |||
SF:,\x2028\x20Aug\x202018\x2012:05:15\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:06:07\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.50.117 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.117 are filtered | |||
Nmap scan report for 141.56.50.118 | |||
Host is up (0.0057s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.2p2 (protocol 2.0) | |||
80/tcp open http? | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853922%P=x86_64-pc-linux-gnu%r(HTTP | |||
SF:Options,DE,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,POST,PUT,PATCH,DELE | |||
SF:TE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:03:58\x20G | |||
SF:MT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nExpires:\x20Mon,\x2027\x20A | |||
SF:ug\x202018\x2012:03:58\x20GMT\r\nContent-Type:\x20text/html\r\nContent- | |||
SF:Encoding:\x20\(null\)\r\n\r\n")%r(RTSPRequest,DE,"HTTP/1\.1\x20200\x20O | |||
SF:K\r\nAllow:\x20GET,POST,PUT,PATCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue, | |||
SF:\x2028\x20Aug\x202018\x2012:04:03\x20GMT\r\nServer:\x20iRMC\x20S4\x20We | |||
SF:bserver\r\nExpires:\x20Mon,\x2027\x20Aug\x202018\x2012:04:03\x20GMT\r\n | |||
SF:Content-Type:\x20text/html\r\nContent-Encoding:\x20\(null\)\r\n\r\n")%r | |||
SF:(SIPOptions,DE,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,POST,PUT,PATCH, | |||
SF:DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:05:05\ | |||
SF:x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nExpires:\x20Mon,\x2027\ | |||
SF:x20Aug\x202018\x2012:05:05\x20GMT\r\nContent-Type:\x20text/html\r\nCont | |||
SF:ent-Encoding:\x20\(null\)\r\n\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B85392D%P=x86_64-pc-linux-gnu | |||
SF:%r(HTTPOptions,104,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,POST,PUT,PA | |||
SF:TCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:04 | |||
SF::09\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-Transport-Se | |||
SF:curity:\x20max-age=0\r\nExpires:\x20Mon,\x2027\x20Aug\x202018\x2012:04: | |||
SF:09\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Encoding:\x20\(null\ | |||
SF:)\r\n\r\n")%r(RTSPRequest,104,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET, | |||
SF:POST,PUT,PATCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x2020 | |||
SF:18\x2012:04:14\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-T | |||
SF:ransport-Security:\x20max-age=0\r\nExpires:\x20Mon,\x2027\x20Aug\x20201 | |||
SF:8\x2012:04:14\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Encoding: | |||
SF:\x20\(null\)\r\n\r\n")%r(SIPOptions,104,"HTTP/1\.1\x20200\x20OK\r\nAllo | |||
SF:w:\x20GET,POST,PUT,PATCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x2 | |||
SF:0Aug\x202018\x2012:05:16\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r | |||
SF:\nStrict-Transport-Security:\x20max-age=0\r\nExpires:\x20Mon,\x2027\x20 | |||
SF:Aug\x202018\x2012:05:16\x20GMT\r\nContent-Type:\x20text/html\r\nContent | |||
SF:-Encoding:\x20\(null\)\r\n\r\n"); | |||
Nmap scan report for 141.56.50.119 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.119 are filtered | |||
Nmap scan report for 141.56.50.120 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.120 are filtered | |||
Nmap scan report for 141.56.50.121 | |||
Host is up (0.00032s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx | |||
6000/tcp open X11? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port6000-TCP:V=6.47%I=7%D=8/28%Time=5B853918%P=x86_64-pc-linux-gnu%r(HT | |||
SF:TPOptions,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text | |||
SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20Fri,\x202 | |||
SF:0\x20Jul\x202018\x2018:44:09\x20GMT\r\nServer:\x20Python/3\.6\x20aiohtt | |||
SF:p/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(X11Probe,AA,"HTTP/1\.0\x20400 | |||
SF:\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nC | |||
SF:ontent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:44:09\ | |||
SF:x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Reque | |||
SF:st")%r(GetRequest,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type: | |||
SF:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20F | |||
SF:ri,\x2020\x20Jul\x202018\x2018:44:14\x20GMT\r\nServer:\x20Python/3\.6\x | |||
SF:20aiohttp/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(RTSPRequest,B6,"HTTP/ | |||
SF:1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset | |||
SF:=utf-8\r\nContent-Length:\x2023\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x | |||
SF:2018:44:14\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\ni | |||
SF:nvalid\x20constant\x20string")%r(RPCCheck,AA,"HTTP/1\.0\x20400\x20Bad\x | |||
SF:20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le | |||
SF:ngth:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:44:16\x20GMT\r\ | |||
SF:nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DN | |||
SF:SVersionBindReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\r\nDate:\x20Fr | |||
SF:i,\x2020\x20Jul\x202018\x2018:44:19\x20GMT\r\nServer:\x20Python/3\.6\x2 | |||
SF:0aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DNSStatusRequest,AA,"HTTP/1\ | |||
SF:.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=u | |||
SF:tf-8\r\nContent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x20 | |||
SF:18:44:21\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad | |||
SF:\x20Request")%r(SSLSessionReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ | |||
SF:nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\ | |||
SF:r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:44:27\x20GMT\r\nServer:\x20 | |||
SF:Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request"); | |||
Nmap scan report for 141.56.50.122 | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on 141.56.50.122 are filtered | |||
Nmap scan report for 141.56.50.123 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.50.123 are filtered | |||
Nmap scan report for 141.56.50.124 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.124 are filtered | |||
Nmap scan report for 141.56.50.125 | |||
Host is up (0.12s latency). | |||
All 1000 scanned ports on 141.56.50.125 are filtered | |||
Nmap scan report for 141.56.50.126 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.50.126 are filtered | |||
Nmap scan report for 141.56.50.127 | |||
Host is up (0.11s latency). | |||
All 1000 scanned ports on 141.56.50.127 are filtered | |||
Nmap scan report for 141.56.50.128 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.128 are filtered | |||
Nmap scan report for 141.56.50.129 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.129 are filtered | |||
Nmap scan report for 141.56.50.130 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.50.130 are filtered | |||
Nmap scan report for 141.56.50.131 | |||
Host is up (0.00022s latency). | |||
Not shown: 994 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD) PHP/5.6.29) | |||
135/tcp open msrpc Microsoft Windows RPC | |||
1024/tcp open msrpc Microsoft Windows RPC | |||
3306/tcp open mysql? | |||
5432/tcp open postgresql PostgreSQL DB | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port3306-TCP:V=6.47%I=7%D=8/28%Time=5B853F12%P=x86_64-pc-linux-gnu%r(NU | |||
SF:LL,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allow | |||
SF:ed\x20to\x20connect\x20to\x20this\x20MariaDB\x20server")%r(GenericLines | |||
SF:,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed | |||
SF:\x20to\x20connect\x20to\x20this\x20MariaDB\x20server")%r(GetRequest,4C, | |||
SF:"H\0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20 | |||
SF:to\x20connect\x20to\x20this\x20MariaDB\x20server")%r(HTTPOptions,4C,"H\ | |||
SF:0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\ | |||
SF:x20connect\x20to\x20this\x20MariaDB\x20server")%r(RTSPRequest,4C,"H\0\0 | |||
SF:\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20 | |||
SF:connect\x20to\x20this\x20MariaDB\x20server")%r(RPCCheck,4C,"H\0\0\0\xff | |||
SF:j\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connec | |||
SF:t\x20to\x20this\x20MariaDB\x20server")%r(DNSVersionBindReq,4C,"H\0\0\0\ | |||
SF:xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20con | |||
SF:nect\x20to\x20this\x20MariaDB\x20server")%r(DNSStatusRequest,4C,"H\0\0\ | |||
SF:0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20c | |||
SF:onnect\x20to\x20this\x20MariaDB\x20server")%r(Help,4C,"H\0\0\0\xffj\x04 | |||
SF:Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20 | |||
SF:to\x20this\x20MariaDB\x20server")%r(SSLSessionReq,4C,"H\0\0\0\xffj\x04H | |||
SF:ost\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20t | |||
SF:o\x20this\x20MariaDB\x20server")%r(Kerberos,4C,"H\0\0\0\xffj\x04Host\x2 | |||
SF:0'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20t | |||
SF:his\x20MariaDB\x20server")%r(SMBProgNeg,4C,"H\0\0\0\xffj\x04Host\x20'14 | |||
SF:1\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\ | |||
SF:x20MariaDB\x20server")%r(X11Probe,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\ | |||
SF:.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\x20Mar | |||
SF:iaDB\x20server")%r(FourOhFourRequest,4C,"H\0\0\0\xffj\x04Host\x20'141\. | |||
SF:56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\x20 | |||
SF:MariaDB\x20server")%r(LPDString,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\.5 | |||
SF:0\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\x20Maria | |||
SF:DB\x20server"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port5432-TCP:V=6.47%I=7%D=8/28%Time=5B853F18%P=x86_64-pc-linux-gnu%r(SM | |||
SF:BProgNeg,85,"E\0\0\0\x84SFATAL\0C0A000\0Munsupported\x20frontend\x20pro | |||
SF:tocol\x2065363\.19778:\x20server\x20supports\x201\.0\x20to\x203\.0\0Fpo | |||
SF:stmaster\.c\0L1986\0RProcessStartupPacket\0\0"); | |||
Service Info: OSs: FreeBSD, Windows; CPE: cpe:/o:freebsd:freebsd, cpe:/o:microsoft:windows | |||
Nmap scan report for 141.56.50.132 | |||
Host is up (0.00031s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
21/tcp open ftp vsftpd 3.0.3 | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.23 ((FreeBSD) PHP/5.6.24) | |||
3306/tcp open mysql MySQL 5.5.5-10.0.26-MariaDB | |||
10000/tcp open http MiniServ 1.800 (Webmin httpd) | |||
Service Info: OSs: Unix, FreeBSD; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for 141.56.50.133 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.133 are filtered | |||
Nmap scan report for 141.56.50.134 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.134 are filtered | |||
Nmap scan report for 141.56.50.135 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.135 are filtered | |||
Nmap scan report for 141.56.50.136 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.50.136 are filtered | |||
Nmap scan report for 141.56.50.137 | |||
Host is up (0.00027s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
139/tcp open netbios-ssn Samba smbd | |||
445/tcp open netbios-ssn Samba smbd | |||
Nmap scan report for 141.56.50.138 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.138 are filtered | |||
Nmap scan report for 141.56.50.139 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.139 are filtered | |||
Nmap scan report for 141.56.50.140 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.140 are filtered | |||
Nmap scan report for 141.56.50.141 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.141 are filtered | |||
Nmap scan report for 141.56.50.142 | |||
Host is up (0.00027s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD)) | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Nmap scan report for 141.56.50.143 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.143 are filtered | |||
Nmap scan report for 141.56.50.144 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.144 are filtered | |||
Nmap scan report for 141.56.50.145 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.145 are filtered | |||
Nmap scan report for 141.56.50.146 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.146 are filtered | |||
Nmap scan report for 141.56.50.147 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.147 are filtered | |||
Nmap scan report for 141.56.50.148 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.148 are filtered | |||
Nmap scan report for 141.56.50.149 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.149 are filtered | |||
Nmap scan report for 141.56.50.150 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.150 are filtered | |||
Nmap scan report for rwls1.rz.htw-dresden.de (141.56.50.151) | |||
Host is up (0.00034s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 5.1p1 Debian 5 (protocol 2.0) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for rwls2.rz.htw-dresden.de (141.56.50.152) | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on rwls2.rz.htw-dresden.de (141.56.50.152) are filtered | |||
Nmap scan report for rwls3.rz.htw-dresden.de (141.56.50.153) | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on rwls3.rz.htw-dresden.de (141.56.50.153) are filtered | |||
Nmap scan report for 141.56.50.154 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.154 are filtered | |||
Nmap scan report for 141.56.50.155 | |||
Host is up. | |||
All 1000 scanned ports on 141.56.50.155 are filtered | |||
Nmap scan report for 141.56.50.156 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.156 are filtered | |||
Nmap scan report for 141.56.50.157 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.157 are filtered | |||
Nmap scan report for 141.56.50.158 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.158 are filtered | |||
Nmap scan report for 141.56.50.159 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.159 are filtered | |||
Nmap scan report for 141.56.50.160 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.160 are filtered | |||
Nmap scan report for 141.56.50.161 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.161 are filtered | |||
Nmap scan report for 141.56.50.162 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.162 are filtered | |||
Nmap scan report for 141.56.50.163 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.163 are filtered | |||
Nmap scan report for 141.56.50.164 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.164 are filtered | |||
Nmap scan report for 141.56.50.165 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.165 are filtered | |||
Nmap scan report for 141.56.50.166 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.166 are filtered | |||
Nmap scan report for 141.56.50.167 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.167 are filtered | |||
Nmap scan report for 141.56.50.168 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.168 are filtered | |||
Nmap scan report for 141.56.50.169 | |||
Host is up (1.6s latency). | |||
All 1000 scanned ports on 141.56.50.169 are filtered | |||
Nmap scan report for 141.56.50.170 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.170 are filtered | |||
Nmap scan report for 141.56.50.171 | |||
Host is up (0.010s latency). | |||
All 1000 scanned ports on 141.56.50.171 are filtered | |||
Nmap scan report for 141.56.50.172 | |||
Host is up (0.00027s latency). | |||
All 1000 scanned ports on 141.56.50.172 are filtered (656) or closed (344) | |||
Nmap scan report for 141.56.50.173 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.173 are filtered | |||
Nmap scan report for 141.56.50.174 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.174 are filtered | |||
Nmap scan report for 141.56.50.175 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.175 are filtered | |||
Nmap scan report for 141.56.50.176 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.176 are filtered | |||
Nmap scan report for 141.56.50.177 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.177 are filtered | |||
Nmap scan report for 141.56.50.178 | |||
Host is up (0.0011s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open tcpwrapped | |||
80/tcp open http? | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853F18%P=x86_64-pc-linux-gnu%r(GetR | |||
SF:equest,3AD,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate:\x20Di | |||
SF:gest\x20realm=\"iRMC\x20S2@iRMC945BF6\",\x20qop=\"auth\",\x20nonce=\"15 | |||
SF:6257ef-00001899\",\x20opaque=\"1899\",\x20stale=\"FALSE\"\x20\r\nConnec | |||
SF:tion:\x20close\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Type:\x20text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\ | |||
SF:r\n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRA | |||
SF:NSITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML> | |||
SF:\n<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\" | |||
SF:IE=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\" | |||
SF:\x20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20ht | |||
SF:tp-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-eq | |||
SF:uiv=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20i | |||
SF:RMC\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>Server | |||
SF:View\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20Server\x20Informat | |||
SF:ion:</h2>\n\x20\x20<h1\x20style=\"color:red\"></p>401 Unauthorized | |||
SF:!</h1>\x20\x20<p>You\x20need\x20to\x20authenticate\x20yourself\x20with\ | |||
SF:x20a\x20valid\x20username\x20and\x20password\x20to\x20see\x20")%r(HTTPO | |||
SF:ptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue,\x202 | |||
SF:8\x20Aug\x202018\x2012:29:16\x20GMT\r\nServer:\x20iRMC\x20S2\x20Webserv | |||
SF:er\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=ut | |||
SF:f-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Len | |||
SF:gth:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x20404\x20Not\x2 | |||
SF:0Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:29:27\x20GMT\r\nServ | |||
SF:er:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma | |||
SF::\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\n<!DOCTYPE\ | |||
SF:x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN | |||
SF:\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x2 | |||
SF:0\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8 | |||
SF:\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equi | |||
SF:v=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Ex | |||
SF:pires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\ | |||
SF:">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20 | |||
SF:Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20S2\x20Web\x | |||
SF:20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:black\"></p | |||
SF:>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B853F2A%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,39A,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF6\",\x20qop=\"auth\",\x20non | |||
SF:ce=\"15625d31-00001900\",\x20opaque=\"1900\",\x20stale=\"FALSE\"\x20\r\ | |||
SF:nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20 | |||
SF:text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20h | |||
SF:tml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x | |||
SF:20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x2 | |||
SF:0<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x | |||
SF:20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\" | |||
SF:Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expire | |||
SF:s\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n | |||
SF:\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\ | |||
SF:x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x2 | |||
SF:0Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x | |||
SF:20<h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p> | |||
SF:You\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20 | |||
SF:username\x20and\x20password\x20to\x20see\x20this\x20document\.</p><")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue | |||
SF:,\x2028\x20Aug\x202018\x2012:29:40\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:30:33\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.50.179 | |||
Host is up (0.0010s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open tcpwrapped | |||
80/tcp open http? | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853F18%P=x86_64-pc-linux-gnu%r(GetR | |||
SF:equest,3AD,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate:\x20Di | |||
SF:gest\x20realm=\"iRMC\x20S2@iRMC945BF8\",\x20qop=\"auth\",\x20nonce=\"15 | |||
SF:4c72ae-00001739\",\x20opaque=\"1739\",\x20stale=\"FALSE\"\x20\r\nConnec | |||
SF:tion:\x20close\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Type:\x20text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\ | |||
SF:r\n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRA | |||
SF:NSITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML> | |||
SF:\n<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\" | |||
SF:IE=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\" | |||
SF:\x20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20ht | |||
SF:tp-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-eq | |||
SF:uiv=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20i | |||
SF:RMC\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>Server | |||
SF:View\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20Server\x20Informat | |||
SF:ion:</h2>\n\x20\x20<h1\x20style=\"color:red\"></p>401 Unauthorized | |||
SF:!</h1>\x20\x20<p>You\x20need\x20to\x20authenticate\x20yourself\x20with\ | |||
SF:x20a\x20valid\x20username\x20and\x20password\x20to\x20see\x20")%r(HTTPO | |||
SF:ptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue,\x202 | |||
SF:8\x20Aug\x202018\x2012:29:16\x20GMT\r\nServer:\x20iRMC\x20S2\x20Webserv | |||
SF:er\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=ut | |||
SF:f-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Len | |||
SF:gth:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x20404\x20Not\x2 | |||
SF:0Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:29:26\x20GMT\r\nServ | |||
SF:er:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma | |||
SF::\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\n<!DOCTYPE\ | |||
SF:x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN | |||
SF:\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x2 | |||
SF:0\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8 | |||
SF:\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equi | |||
SF:v=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Ex | |||
SF:pires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\ | |||
SF:">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20 | |||
SF:Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20S2\x20Web\x | |||
SF:20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:black\"></p | |||
SF:>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B853F2A%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,39A,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF8\",\x20qop=\"auth\",\x20non | |||
SF:ce=\"154c77f0-00001740\",\x20opaque=\"1740\",\x20stale=\"FALSE\"\x20\r\ | |||
SF:nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20 | |||
SF:text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20h | |||
SF:tml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x | |||
SF:20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x2 | |||
SF:0<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x | |||
SF:20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\" | |||
SF:Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expire | |||
SF:s\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n | |||
SF:\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\ | |||
SF:x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x2 | |||
SF:0Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x | |||
SF:20<h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p> | |||
SF:You\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20 | |||
SF:username\x20and\x20password\x20to\x20see\x20this\x20document\.</p><")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue | |||
SF:,\x2028\x20Aug\x202018\x2012:29:39\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:30:32\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.50.180 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.180 are filtered | |||
Nmap scan report for 141.56.50.181 | |||
Host is up (0.00033s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u5 (protocol 2.0) | |||
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD11) | |||
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD11) | |||
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.182 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.182 are filtered | |||
Nmap scan report for 141.56.50.183 | |||
Host is up (0.00040s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u4 (protocol 2.0) | |||
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.184 | |||
Host is up (0.00038s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u5 (protocol 2.0) | |||
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD14) | |||
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD14) | |||
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.185 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.185 are filtered | |||
Nmap scan report for 141.56.50.186 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.186 are filtered | |||
Nmap scan report for 141.56.50.187 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.187 are filtered | |||
Nmap scan report for 141.56.50.188 | |||
Host is up (0.00031s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u3 (protocol 2.0) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.189 | |||
Host is up (0.00017s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u3 (protocol 2.0) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.190 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.50.190 are filtered | |||
Nmap scan report for 141.56.50.191 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.191 are filtered | |||
Nmap scan report for 141.56.50.192 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.192 are filtered | |||
Nmap scan report for 141.56.50.193 | |||
Host is up (0.00020s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.33 ((FreeBSD)) | |||
Nmap scan report for 141.56.50.194 | |||
Host is up (0.00028s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
80/tcp open http nginx 1.10.3 (Ubuntu) | |||
443/tcp open http nginx 1.10.3 (Ubuntu) | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port22-TCP:V=6.47%I=7%D=8/28%Time=5B85427B%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,29,"SSH-2\.0-OpenSSH_7\.2p2\x20Ubuntu-4ubuntu2\.4\r\n"); | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.195 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.50.195 are filtered | |||
Nmap scan report for 141.56.50.196 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.196 are filtered | |||
Nmap scan report for 141.56.50.197 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.197 are filtered | |||
Nmap scan report for 141.56.50.198 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.198 are filtered | |||
Nmap scan report for 141.56.50.199 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.199 are filtered | |||
Nmap scan report for 141.56.50.200 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.200 are filtered | |||
Nmap scan report for 141.56.50.201 | |||
Host is up (0.00040s latency). | |||
Not shown: 993 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
443/tcp open ssl/https? | |||
444/tcp open tcpwrapped | |||
1000/tcp closed cadlock | |||
3128/tcp closed squid-http | |||
8080/tcp closed http-proxy | |||
16113/tcp open ssl/unknown | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port22-TCP:V=6.47%I=7%D=8/28%Time=5B85427B%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,12,"SSH-2\.0-CISCO_WLC\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B854286%P=x86_64-pc-linux-gnu | |||
SF:%r(HTTPOptions,66,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Tue,\x2028\x20Aug | |||
SF:\x202018\x2012:43:54\x20GMT\r\nContent-Length:\x200\r\nAllow:\x20HEAD,\ | |||
SF:x20GET,\x20OPTIONS\r\n\r\n")%r(RTSPRequest,65,"HTTP/1\.1\x20400\x20Bad\ | |||
SF:x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:43:54\x20GMT\r\n | |||
SF:Content-Length:\x200\r\n\r\n400\x20Bad\x20Request\r\n")%r(Help,52,"HTTP | |||
SF:/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2 | |||
SF:012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(SSLSessionReq,52, | |||
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x2020 | |||
SF:18\x2012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(Kerberos,52, | |||
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x2020 | |||
SF:18\x2012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(SMBProgNeg,5 | |||
SF:2,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x20 | |||
SF:2018\x2012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(FourOhFour | |||
SF:Request,4E,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20 | |||
SF:Aug\x202018\x2012:44:14\x20GMT\r\n\r\n404\x20Not\x20Found\r\n")%r(LPDSt | |||
SF:ring,52,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20A | |||
SF:ug\x202018\x2012:44:14\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(SIPO | |||
SF:ptions,65,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x2 | |||
SF:0Aug\x202018\x2012:44:19\x20GMT\r\nContent-Length:\x200\r\n\r\n400\x20B | |||
SF:ad\x20Request\r\n")%r(oracle-tns,52,"HTTP/1\.1\x20400\x20Bad\x20Request | |||
SF:\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:44:44\x20GMT\r\n\r\n400\x2 | |||
SF:0Bad\x20Request\r\n"); | |||
Nmap scan report for 141.56.50.202 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.202 are filtered | |||
Nmap scan report for 141.56.50.203 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.203 are filtered | |||
Nmap scan report for 141.56.50.204 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.204 are filtered | |||
Nmap scan report for 141.56.50.205 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.205 are filtered | |||
Nmap scan report for 141.56.50.206 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.206 are filtered | |||
Nmap scan report for 141.56.50.207 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.207 are filtered | |||
Nmap scan report for 141.56.50.208 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.208 are filtered | |||
Nmap scan report for 141.56.50.209 | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on 141.56.50.209 are filtered | |||
Nmap scan report for 141.56.50.210 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.210 are filtered | |||
Nmap scan report for 141.56.50.211 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.211 are filtered | |||
Nmap scan report for 141.56.50.212 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.212 are filtered | |||
Nmap scan report for 141.56.50.213 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.213 are filtered | |||
Nmap scan report for 141.56.50.214 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.214 are filtered | |||
Nmap scan report for 141.56.50.215 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.215 are filtered | |||
Nmap scan report for 141.56.50.216 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.216 are filtered | |||
Nmap scan report for 141.56.50.217 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.217 are filtered | |||
Nmap scan report for 141.56.50.218 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.218 are filtered | |||
Nmap scan report for 141.56.50.219 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.219 are filtered | |||
Nmap scan report for 141.56.50.220 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.220 are filtered | |||
Nmap scan report for 141.56.50.221 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.221 are filtered | |||
Nmap scan report for 141.56.50.222 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.222 are filtered | |||
Nmap scan report for 141.56.50.223 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.223 are filtered | |||
Nmap scan report for 141.56.50.224 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.50.224 are filtered | |||
Nmap scan report for 141.56.50.225 | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on 141.56.50.225 are filtered | |||
Nmap scan report for 141.56.50.226 | |||
Host is up (1.6s latency). | |||
All 1000 scanned ports on 141.56.50.226 are filtered | |||
Nmap scan report for 141.56.50.227 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.227 are filtered | |||
Nmap scan report for 141.56.50.228 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.228 are filtered | |||
Nmap scan report for 141.56.50.229 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.229 are filtered | |||
Nmap scan report for 141.56.50.230 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.230 are filtered | |||
Nmap scan report for 141.56.50.231 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.231 are filtered | |||
Nmap scan report for 141.56.50.232 | |||
Host is up (1.7s latency). | |||
All 1000 scanned ports on 141.56.50.232 are filtered | |||
Nmap scan report for 141.56.50.233 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.233 are filtered | |||
Nmap scan report for 141.56.50.234 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.234 are filtered | |||
Nmap scan report for 141.56.50.235 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.50.235 are filtered | |||
Nmap scan report for 141.56.50.236 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.236 are filtered | |||
Nmap scan report for 141.56.50.237 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.237 are filtered | |||
Nmap scan report for 141.56.50.238 | |||
Host is up (0.016s latency). | |||
All 1000 scanned ports on 141.56.50.238 are filtered | |||
Nmap scan report for 141.56.50.239 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.50.239 are filtered | |||
Nmap scan report for 141.56.50.240 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.240 are filtered | |||
Nmap scan report for 141.56.50.241 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.241 are filtered | |||
Nmap scan report for 141.56.50.242 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.242 are filtered | |||
Nmap scan report for 141.56.50.243 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.243 are filtered | |||
Nmap scan report for 141.56.50.244 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.244 are filtered | |||
Nmap scan report for 141.56.50.245 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.245 are filtered | |||
Nmap scan report for 141.56.50.246 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.246 are filtered | |||
Nmap scan report for 141.56.50.247 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.247 are filtered | |||
Nmap scan report for 141.56.50.248 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.248 are filtered | |||
Nmap scan report for 141.56.50.249 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.249 are filtered | |||
Nmap scan report for 141.56.50.250 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.250 are filtered | |||
Nmap scan report for 141.56.50.251 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.251 are filtered | |||
Nmap scan report for 141.56.50.252 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.252 are filtered | |||
Nmap scan report for 141.56.50.253 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.253 are filtered | |||
Nmap scan report for rou1.rz.htw-dresden.de (141.56.50.254) | |||
Host is up (0.0013s latency). | |||
All 1000 scanned ports on rou1.rz.htw-dresden.de (141.56.50.254) are closed | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 254 IP addresses (254 hosts up) scanned in 4895.14 seconds | |||
</pre> | |||
!--> | |||
<code>nmap -sV -Pn 141.56.51.0-50</code> | |||
<!-- | |||
<pre> | |||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:25 CEST | |||
Nmap scan report for 141.56.51.0 | |||
Host is up. | |||
All 1000 scanned ports on 141.56.51.0 are filtered | |||
Nmap scan report for srs1.stura.htw-dresden.de (141.56.51.1) | |||
Host is up (0.021s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd) | |||
443/tcp open ssl/http Zope httpd 2.13.24 (python 2.7.13, freebsd9; ZServer/1.1) | |||
8080/tcp open http Zope httpd 2.13.24 (python 2.7.13, freebsd9; ZServer/1.1) | |||
Nmap scan report for srs2.stura.htw-dresden.de (141.56.51.2) | |||
Host is up (0.00028s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
8080/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for srs3.stura.htw-dresden.de (141.56.51.3) | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on srs3.stura.htw-dresden.de (141.56.51.3) are filtered | |||
Nmap scan report for 141.56.51.4 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.51.4 are filtered | |||
Nmap scan report for 141.56.51.5 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.5 are filtered | |||
Nmap scan report for 141.56.51.6 | |||
Host is up (0.17s latency). | |||
All 1000 scanned ports on 141.56.51.6 are filtered | |||
Nmap scan report for 141.56.51.7 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.7 are filtered | |||
Nmap scan report for srs8.stura.htw-dresden.de (141.56.51.8) | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on srs8.stura.htw-dresden.de (141.56.51.8) are filtered | |||
Nmap scan report for srs9.stura.htw-dresden.de (141.56.51.9) | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on srs9.stura.htw-dresden.de (141.56.51.9) are filtered | |||
Nmap scan report for srs2342.stura.htw-dresden.de (141.56.51.10) | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on srs2342.stura.htw-dresden.de (141.56.51.10) are filtered | |||
Nmap scan report for srsw1.stura.htw-dresden.de (141.56.51.11) | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on srsw1.stura.htw-dresden.de (141.56.51.11) are filtered | |||
Nmap scan report for srs1337.stura.htw-dresden.de (141.56.51.12) | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on srs1337.stura.htw-dresden.de (141.56.51.12) are filtered | |||
Nmap scan report for srs13.stura.htw-dresden.de (141.56.51.13) | |||
Host is up (0.00018s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd | |||
443/tcp open ssl/http Apache httpd | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: localhost.localdomain; OS: Unix | |||
Nmap scan report for srs14.stura.htw-dresden.de (141.56.51.14) | |||
Host is up (0.00033s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Postfix smtpd | |||
80/tcp open http Apache httpd 2.4.29 ((FreeBSD)) | |||
Service Info: Host: mail.stura.htw-dresden.de | |||
Nmap scan report for srs15.stura.htw-dresden.de (141.56.51.15) | |||
Host is up (0.00034s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd Phusion_Passenger/5.0.30 mod_fastcgi/mod_fastcgi-SNAP-0910052141) | |||
443/tcp open ssl/http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd Phusion_Passenger/5.0.30 mod_fastcgi/mod_fastcgi-SNAP-0910052141) | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: localhost.localdomain; OS: Unix | |||
Nmap scan report for srs16.stura.htw-dresden.de (141.56.51.16) | |||
Host is up (0.00041s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.5.16) | |||
443/tcp open ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.5.16) | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
Service Info: Host: localhost.localdomain; OSs: FreeBSD, Unix; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for srs17.stura.htw-dresden.de (141.56.51.17) | |||
Host is up (0.00032s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2h PHP/5.5.16) | |||
443/tcp open ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2h PHP/5.5.16) | |||
Nmap scan report for srs18.stura.htw-dresden.de (141.56.51.18) | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on srs18.stura.htw-dresden.de (141.56.51.18) are filtered | |||
Nmap scan report for srs19.stura.htw-dresden.de (141.56.51.19) | |||
Host is up (0.00032s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2d PHP/5.5.16) | |||
443/tcp open ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2d PHP/5.5.16) | |||
Nmap scan report for srs20.stura.htw-dresden.de (141.56.51.20) | |||
Host is up (0.00037s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.24) | |||
443/tcp open ssl/http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.24) | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: localhost.localdomain; OS: Unix | |||
Nmap scan report for 141.56.51.21 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.21 are filtered | |||
Nmap scan report for 141.56.51.22 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.22 are filtered | |||
Nmap scan report for 141.56.51.23 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.23 are filtered | |||
Nmap scan report for 141.56.51.24 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.24 are filtered | |||
Nmap scan report for srs25.stura.htw-dresden.de (141.56.51.25) | |||
Host is up (1.5s latency). | |||
All 1000 scanned ports on srs25.stura.htw-dresden.de (141.56.51.25) are filtered | |||
Nmap scan report for 141.56.51.26 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.26 are filtered | |||
Nmap scan report for srs27.stura.htw-dresden.de (141.56.51.27) | |||
Host is up (0.00057s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD)) | |||
Nmap scan report for srs28.stura.htw-dresden.de (141.56.51.28) | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on srs28.stura.htw-dresden.de (141.56.51.28) are filtered | |||
Nmap scan report for srs29.stura.htw-dresden.de (141.56.51.29) | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on srs29.stura.htw-dresden.de (141.56.51.29) are filtered | |||
Nmap scan report for 141.56.51.30 | |||
Host is up (0.083s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.26) | |||
443/tcp open ssl/http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.26) | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for 141.56.51.31 | |||
Host is up (0.00020s latency). | |||
All 1000 scanned ports on 141.56.51.31 are closed | |||
Nmap scan report for 141.56.51.32 | |||
Host is up (0.00028s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
9000/tcp open tcpwrapped | |||
Nmap scan report for 141.56.51.33 | |||
Host is up (0.00036s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
Nmap scan report for 141.56.51.34 | |||
Host is up (0.00035s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Postfix smtpd | |||
26/tcp open smtp Postfix smtpd | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
Service Info: Host: mail.kss-sachsen.de | |||
Nmap scan report for 141.56.51.35 | |||
Host is up (0.00053s latency). | |||
Not shown: 999 filtered ports | |||
PORT STATE SERVICE VERSION | |||
3389/tcp open ms-wbt-server? | |||
Nmap scan report for 141.56.51.36 | |||
Host is up (0.00029s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
Nmap scan report for 141.56.51.37 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.51.37 are filtered | |||
Nmap scan report for 141.56.51.38 | |||
Host is up (0.00027s latency). | |||
All 1000 scanned ports on 141.56.51.38 are closed | |||
Nmap scan report for 141.56.51.39 | |||
Host is up (0.00030s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.5/8.14.5 | |||
80/tcp open http Apache httpd 2.2.27 ((FreeBSD) PHP/5.4.27 mod_ssl/2.2.27 OpenSSL/0.9.8q DAV/2) | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: lrs0x016a.kss-sachsen.de; OS: Unix | |||
Nmap scan report for 141.56.51.40 | |||
Host is up (1.1s latency). | |||
All 1000 scanned ports on 141.56.51.40 are filtered | |||
Nmap scan report for 141.56.51.41 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.41 are filtered | |||
Nmap scan report for 141.56.51.42 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.51.42 are filtered | |||
Nmap scan report for 141.56.51.43 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.43 are filtered | |||
Nmap scan report for 141.56.51.44 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.44 are filtered | |||
Nmap scan report for 141.56.51.45 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.45 are filtered | |||
Nmap scan report for 141.56.51.46 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.51.46 are filtered | |||
Nmap scan report for 141.56.51.47 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.47 are filtered | |||
Nmap scan report for 141.56.51.48 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.48 are filtered | |||
Nmap scan report for 141.56.51.49 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.49 are filtered | |||
Nmap scan report for 141.56.51.50 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.50 are filtered | |||
Nmap scan report for 141.56.51.51 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.51 are filtered | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 52 IP addresses (52 hosts up) scanned in 340.91 seconds | |||
</pre> | |||
!--> | |||
<code>nmap -sV -Pn 141.56.51.51-101</code> | |||
<!-- | |||
<pre> | |||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:31 CEST | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
Nmap scan report for 141.56.51.51 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.51 are filtered | |||
Nmap scan report for 141.56.51.52 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.52 are filtered | |||
Nmap scan report for 141.56.51.53 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.53 are filtered | |||
Nmap scan report for 141.56.51.54 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.54 are filtered | |||
Nmap scan report for 141.56.51.55 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.55 are filtered | |||
Nmap scan report for 141.56.51.56 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.56 are filtered | |||
Nmap scan report for 141.56.51.57 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.57 are filtered | |||
Nmap scan report for 141.56.51.58 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.58 are filtered | |||
Nmap scan report for 141.56.51.59 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.59 are filtered | |||
Nmap scan report for 141.56.51.60 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.60 are filtered | |||
Nmap scan report for 141.56.51.61 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.61 are filtered | |||
Nmap scan report for 141.56.51.62 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.62 are filtered | |||
Nmap scan report for 141.56.51.63 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.63 are filtered | |||
Nmap scan report for 141.56.51.64 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.64 are filtered | |||
Nmap scan report for 141.56.51.65 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.65 are filtered | |||
Nmap scan report for 141.56.51.66 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.66 are filtered | |||
Nmap scan report for 141.56.51.67 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.67 are filtered | |||
Nmap scan report for 141.56.51.68 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.68 are filtered | |||
Nmap scan report for 141.56.51.69 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.69 are filtered | |||
Nmap scan report for 141.56.51.70 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.70 are filtered | |||
Nmap scan report for 141.56.51.71 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.71 are filtered | |||
Nmap scan report for 141.56.51.72 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.72 are filtered | |||
Nmap scan report for 141.56.51.73 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.73 are filtered | |||
Nmap scan report for 141.56.51.74 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.74 are filtered | |||
Nmap scan report for 141.56.51.75 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.75 are filtered | |||
Nmap scan report for 141.56.51.76 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.76 are filtered | |||
Nmap scan report for 141.56.51.77 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.77 are filtered | |||
Nmap scan report for 141.56.51.78 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.78 are filtered | |||
Nmap scan report for 141.56.51.79 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.79 are filtered | |||
Nmap scan report for 141.56.51.80 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.80 are filtered | |||
Nmap scan report for 141.56.51.81 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.81 are filtered | |||
Nmap scan report for 141.56.51.82 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.82 are filtered | |||
Nmap scan report for 141.56.51.83 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.83 are filtered | |||
Nmap scan report for 141.56.51.84 | |||
Host is up (4.9s latency). | |||
All 1000 scanned ports on 141.56.51.84 are filtered | |||
Nmap scan report for 141.56.51.85 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.85 are filtered | |||
Nmap scan report for 141.56.51.86 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.86 are filtered | |||
Nmap scan report for 141.56.51.87 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.87 are filtered | |||
Nmap scan report for 141.56.51.88 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.88 are filtered | |||
Nmap scan report for 141.56.51.89 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.89 are filtered | |||
Nmap scan report for 141.56.51.90 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.90 are filtered | |||
Nmap scan report for 141.56.51.91 | |||
Host is up (1.4s latency). | |||
All 1000 scanned ports on 141.56.51.91 are filtered | |||
Nmap scan report for 141.56.51.92 | |||
Host is up (1.6s latency). | |||
All 1000 scanned ports on 141.56.51.92 are filtered | |||
Nmap scan report for 141.56.51.93 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.93 are filtered | |||
Nmap scan report for 141.56.51.94 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.94 are filtered | |||
Nmap scan report for 141.56.51.95 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.95 are filtered | |||
Nmap scan report for 141.56.51.96 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.96 are filtered | |||
Nmap scan report for 141.56.51.97 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.97 are filtered | |||
Nmap scan report for 141.56.51.98 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.98 are filtered | |||
Nmap scan report for 141.56.51.99 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.99 are filtered | |||
Nmap scan report for 141.56.51.100 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.100 are filtered | |||
Nmap scan report for 141.56.51.101 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.101 are filtered | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 51 IP addresses (51 hosts up) scanned in 731.36 seconds | |||
</pre> | |||
!--> | |||
<code>nmap -sV -Pn 141.56.51.101-151</code> | |||
<!-- | |||
<pre> | |||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:34 CEST | |||
Nmap scan report for 141.56.51.101 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.101 are filtered | |||
Nmap scan report for 141.56.51.102 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.102 are filtered | |||
Nmap scan report for 141.56.51.103 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.103 are filtered | |||
Nmap scan report for 141.56.51.104 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.104 are filtered | |||
Nmap scan report for 141.56.51.105 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.105 are filtered | |||
Nmap scan report for 141.56.51.106 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.106 are filtered | |||
Nmap scan report for 141.56.51.107 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.51.107 are filtered | |||
Nmap scan report for 141.56.51.108 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.108 are filtered | |||
Nmap scan report for 141.56.51.109 | |||
Host is up (0.00061s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh Cisco/3com IPSSHd 1.10.0 (protocol 2.0) | |||
80/tcp open http BMC HTTP Server (HP Integrated Lights-Out remote management) | |||
443/tcp open ssl/http BMC HTTP Server (HP Integrated Lights-Out remote management) | |||
Service Info: Device: remote management | |||
Nmap scan report for 141.56.51.110 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.110 are filtered | |||
Nmap scan report for 141.56.51.111 | |||
Host is up (1.4s latency). | |||
All 1000 scanned ports on 141.56.51.111 are filtered | |||
Nmap scan report for 141.56.51.112 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.51.112 are filtered | |||
Nmap scan report for 141.56.51.113 | |||
Host is up (0.00079s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
80/tcp open http | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port22-TCP:V=6.47%I=7%D=9/13%Time=5B9A77F3%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,1A,"SSH-2\.0-IPSSH-6\.0\.9\x20iRMC\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7806%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,39A,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF6\",\x20qop=\"auth\",\x20non | |||
SF:ce=\"1dac314e-00002768\",\x20opaque=\"2768\",\x20stale=\"FALSE\"\x20\r\ | |||
SF:nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20 | |||
SF:text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20h | |||
SF:tml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x | |||
SF:20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x2 | |||
SF:0<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x | |||
SF:20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\" | |||
SF:Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expire | |||
SF:s\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n | |||
SF:\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\ | |||
SF:x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x2 | |||
SF:0Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x | |||
SF:20<h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p> | |||
SF:You\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20 | |||
SF:username\x20and\x20password\x20to\x20see\x20this\x20document\.</p><")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Thu | |||
SF:,\x2013\x20Sep\x202018\x2014:45:30\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46:23\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.51.114 | |||
Host is up (0.00077s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
80/tcp open http | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port22-TCP:V=6.47%I=7%D=9/13%Time=5B9A77F3%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,1A,"SSH-2\.0-IPSSH-6\.0\.9\x20iRMC\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7805%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,399,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF8\",\x20qop=\"auth\",\x20non | |||
SF:ce=\"1d9648c2-00000335\",\x20opaque=\"335\",\x20stale=\"FALSE\"\x20\r\n | |||
SF:Cache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20t | |||
SF:ext/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20ht | |||
SF:ml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x2 | |||
SF:0\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x20 | |||
SF:<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x2 | |||
SF:0/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"C | |||
SF:ontent-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expires | |||
SF:\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n\ | |||
SF:x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x | |||
SF:20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x20 | |||
SF:Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x2 | |||
SF:0<h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p>Y | |||
SF:ou\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20u | |||
SF:sername\x20and\x20password\x20to\x20see\x20this\x20document\.</p></")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Thu | |||
SF:,\x2013\x20Sep\x202018\x2014:45:30\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46:22\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.51.115 | |||
Host is up (0.00069s latency). | |||
Not shown: 998 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
443/tcp open ssl/https? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port22-TCP:V=6.47%I=7%D=9/13%Time=5B9A77F3%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,1A,"SSH-2\.0-IPSSH-6\.0\.9\x20iRMC\r\n"); | |||
Nmap scan report for 141.56.51.116 | |||
Host is up (0.00078s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open tcpwrapped | |||
80/tcp open http | |||
443/tcp open ssl/https? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7805%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,397,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@srs3006\",\x20qop=\"auth\",\x20nonce= | |||
SF:\"1dac6adb-00002613\",\x20opaque=\"2613\",\x20stale=\"FALSE\"\x20\r\nCa | |||
SF:che-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20tex | |||
SF:t/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20html | |||
SF:\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x20\ | |||
SF:"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x20<m | |||
SF:eta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x20/ | |||
SF:>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"Con | |||
SF:tent-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expires\" | |||
SF:>\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n\x2 | |||
SF:0\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20 | |||
SF:Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x20Ma | |||
SF:nagement\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20< | |||
SF:h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p>You | |||
SF:\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20use | |||
SF:rname\x20and\x20password\x20to\x20see\x20this\x20document\.</p></BO")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Thu | |||
SF:,\x2013\x20Sep\x202018\x2014:46:49\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:47:50\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.51.117 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.117 are filtered | |||
Nmap scan report for 141.56.51.118 | |||
Host is up (0.0063s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.0p1 Debian 4+deb7u2 (protocol 2.0) | |||
80/tcp open http? | |||
443/tcp open ssl/https? | |||
9666/tcp open ssl/unknown | |||
9999/tcp open ssl/abyss? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port80-TCP:V=6.47%I=7%D=9/13%Time=5B9A77FD%P=x86_64-pc-linux-gnu%r(HTTP | |||
SF:Options,9A,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,OPTIONS,TRACE\r\nDa | |||
SF:te:\x20Thu,\x2013\x20Sep\x202018\x2014:45:11\x20GMT\r\nServer:\x20iRMC\ | |||
SF:x20S4\x20Webserver\r\nContent-Length:\x200\r\nContent-Encoding:\x20\(nu | |||
SF:ll\)\r\n\r\n")%r(RTSPRequest,80,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GE | |||
SF:T,OPTIONS,TRACE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:45:16\x20GM | |||
SF:T\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nContent-Length:\x200\r\n\r\n | |||
SF:")%r(SIPOptions,9A,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,OPTIONS,TRA | |||
SF:CE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46:19\x20GMT\r\nServer:\ | |||
SF:x20iRMC\x20S4\x20Webserver\r\nContent-Length:\x200\r\nContent-Encoding: | |||
SF:\x20\(null\)\r\n\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7808%P=x86_64-pc-linux-gnu | |||
SF:%r(HTTPOptions,A6,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,OPTIONS,TRAC | |||
SF:E\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:45:23\x20GMT\r\nServer:\x | |||
SF:20iRMC\x20S4\x20Webserver\r\nStrict-Transport-Security:\x20max-age=0\r\ | |||
SF:nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,C0,"HTTP/1\.1\x20200\x20O | |||
SF:K\r\nAllow:\x20GET,OPTIONS,TRACE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\ | |||
SF:x2014:45:28\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-Tran | |||
SF:sport-Security:\x20max-age=0\r\nContent-Length:\x200\r\nContent-Encodin | |||
SF:g:\x20\(null\)\r\n\r\n")%r(SIPOptions,A6,"HTTP/1\.1\x20200\x20OK\r\nAll | |||
SF:ow:\x20GET,OPTIONS,TRACE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46 | |||
SF::31\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-Transport-Se | |||
SF:curity:\x20max-age=0\r\nContent-Length:\x200\r\n\r\n"); | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.119 | |||
Host is up (0.018s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh? | |||
80/tcp open http Mbedthis-Appweb/2.4.2 | |||
443/tcp open https Mbedthis-Appweb/2.4.2 | |||
Nmap scan report for 141.56.51.120 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.51.120 are filtered | |||
Nmap scan report for 141.56.51.121 | |||
Host is up (0.00030s latency). | |||
All 1000 scanned ports on 141.56.51.121 are closed | |||
Nmap scan report for 141.56.51.122 | |||
Host is up (0.73s latency). | |||
All 1000 scanned ports on 141.56.51.122 are filtered | |||
Nmap scan report for 141.56.51.123 | |||
Host is up (0.00058s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.124 | |||
Host is up (0.00028s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.125 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.125 are filtered | |||
Nmap scan report for 141.56.51.126 | |||
Host is up (1.2s latency). | |||
All 1000 scanned ports on 141.56.51.126 are filtered | |||
Nmap scan report for 141.56.51.127 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.51.127 are filtered | |||
Nmap scan report for 141.56.51.128 | |||
Host is up (0.00021s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0) | |||
80/tcp open http nginx 1.10.3 | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
443/tcp open http nginx 1.10.3 | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.129 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.129 are filtered | |||
Nmap scan report for 141.56.51.130 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.130 are filtered | |||
Nmap scan report for 141.56.51.131 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.131 are filtered | |||
Nmap scan report for 141.56.51.132 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.132 are filtered | |||
Nmap scan report for 141.56.51.133 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.133 are filtered | |||
Nmap scan report for 141.56.51.134 | |||
Host is up (1.8s latency). | |||
All 1000 scanned ports on 141.56.51.134 are filtered | |||
Nmap scan report for 141.56.51.135 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.135 are filtered | |||
Nmap scan report for 141.56.51.136 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.136 are filtered | |||
Nmap scan report for 141.56.51.137 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.137 are filtered | |||
Nmap scan report for 141.56.51.138 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.138 are filtered | |||
Nmap scan report for 141.56.51.139 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.139 are filtered | |||
Nmap scan report for 141.56.51.140 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.140 are filtered | |||
Nmap scan report for 141.56.51.141 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.141 are filtered | |||
Nmap scan report for 141.56.51.142 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.142 are filtered | |||
Nmap scan report for 141.56.51.143 | |||
Host is up (0.11s latency). | |||
All 1000 scanned ports on 141.56.51.143 are filtered | |||
Nmap scan report for 141.56.51.144 | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on 141.56.51.144 are filtered | |||
Nmap scan report for 141.56.51.145 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.51.145 are filtered | |||
Nmap scan report for 141.56.51.146 | |||
Host is up (1.7s latency). | |||
All 1000 scanned ports on 141.56.51.146 are filtered | |||
Nmap scan report for 141.56.51.147 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.147 are filtered | |||
Nmap scan report for 141.56.51.148 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.148 are filtered | |||
Nmap scan report for 141.56.51.149 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.149 are filtered | |||
Nmap scan report for 141.56.51.150 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.150 are filtered | |||
Nmap scan report for 141.56.51.151 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.151 are filtered | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 51 IP addresses (51 hosts up) scanned in 795.42 seconds | |||
</pre> | |||
!--> | |||
<code>nmap -sV -Pn 141.56.51.151-201</code> | |||
<!-- | |||
<pre> | |||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:35 CEST | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
Nmap scan report for 141.56.51.151 | |||
Host is up (0.082s latency). | |||
All 1000 scanned ports on 141.56.51.151 are filtered | |||
Nmap scan report for 141.56.51.152 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.152 are filtered | |||
Nmap scan report for 141.56.51.153 | |||
Host is up (1.8s latency). | |||
All 1000 scanned ports on 141.56.51.153 are filtered | |||
Nmap scan report for 141.56.51.154 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.154 are filtered | |||
Nmap scan report for 141.56.51.155 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.155 are filtered | |||
Nmap scan report for 141.56.51.156 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.156 are filtered | |||
Nmap scan report for 141.56.51.157 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.157 are filtered | |||
Nmap scan report for 141.56.51.158 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.158 are filtered | |||
Nmap scan report for 141.56.51.159 | |||
Host is up (1.4s latency). | |||
All 1000 scanned ports on 141.56.51.159 are filtered | |||
Nmap scan report for 141.56.51.160 | |||
Host is up (0.00096s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Canon i-SENSYS MF8040Cn printer http admin | |||
515/tcp open printer | |||
9100/tcp open jetdirect? | |||
Service Info: Device: printer; CPE: cpe:/h:canon:i-sensys_mf8040cn | |||
Nmap scan report for 141.56.51.161 | |||
Host is up (0.00056s latency). | |||
Not shown: 991 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Canon imageRUNNER C5185 smtpd | |||
80/tcp open ipp Canon printer http config 2.21 | |||
515/tcp open printer? | |||
631/tcp open ipp Canon printer http config 2.21 | |||
8000/tcp open http Catwalk 1.3.1 (Canon imageRUNNER C5000-series printer http config) | |||
9002/tcp open dynamid? | |||
9010/tcp open sdr? | |||
9011/tcp open unknown | |||
9100/tcp open jetdirect? | |||
Service Info: Device: printer; CPE: cpe:/h:canon:imagerunner_c5185, cpe:/h:canon:imagerunner_c5000 | |||
Nmap scan report for 141.56.51.162 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.51.162 are filtered | |||
Nmap scan report for 141.56.51.163 | |||
Host is up (1.1s latency). | |||
All 1000 scanned ports on 141.56.51.163 are filtered | |||
Nmap scan report for 141.56.51.164 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.164 are filtered | |||
Nmap scan report for 141.56.51.165 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.165 are filtered | |||
Nmap scan report for 141.56.51.166 | |||
Host is up (0.00039s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx | |||
6000/tcp open X11? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port6000-TCP:V=6.47%I=7%D=9/13%Time=5B9A77FE%P=x86_64-pc-linux-gnu%r(HT | |||
SF:TPOptions,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text | |||
SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20Mon,\x201 | |||
SF:0\x20Sep\x202018\x2002:04:14\x20GMT\r\nServer:\x20Python/3\.6\x20aiohtt | |||
SF:p/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(X11Probe,AA,"HTTP/1\.0\x20400 | |||
SF:\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nC | |||
SF:ontent-Length:\x2011\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x2002:04:14\ | |||
SF:x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Reque | |||
SF:st")%r(GetRequest,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type: | |||
SF:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20M | |||
SF:on,\x2010\x20Sep\x202018\x2002:04:19\x20GMT\r\nServer:\x20Python/3\.6\x | |||
SF:20aiohttp/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(RTSPRequest,B6,"HTTP/ | |||
SF:1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset | |||
SF:=utf-8\r\nContent-Length:\x2023\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x | |||
SF:2002:04:19\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\ni | |||
SF:nvalid\x20constant\x20string")%r(RPCCheck,AA,"HTTP/1\.0\x20400\x20Bad\x | |||
SF:20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le | |||
SF:ngth:\x2011\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x2002:04:21\x20GMT\r\ | |||
SF:nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DN | |||
SF:SVersionBindReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\r\nDate:\x20Mo | |||
SF:n,\x2010\x20Sep\x202018\x2002:04:24\x20GMT\r\nServer:\x20Python/3\.6\x2 | |||
SF:0aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DNSStatusRequest,AA,"HTTP/1\ | |||
SF:.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=u | |||
SF:tf-8\r\nContent-Length:\x2011\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x20 | |||
SF:02:04:26\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad | |||
SF:\x20Request")%r(SSLSessionReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ | |||
SF:nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\ | |||
SF:r\nDate:\x20Mon,\x2010\x20Sep\x202018\x2002:04:32\x20GMT\r\nServer:\x20 | |||
SF:Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request"); | |||
Nmap scan report for 141.56.51.167 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.167 are filtered | |||
Nmap scan report for 141.56.51.168 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.168 are filtered | |||
Nmap scan report for 141.56.51.169 | |||
Host is up (0.00068s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.170 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.170 are filtered | |||
Nmap scan report for 141.56.51.171 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.171 are filtered | |||
Nmap scan report for 141.56.51.172 | |||
Host is up (0.97s latency). | |||
All 1000 scanned ports on 141.56.51.172 are filtered | |||
Nmap scan report for 141.56.51.173 | |||
Host is up (1.8s latency). | |||
All 1000 scanned ports on 141.56.51.173 are filtered | |||
Nmap scan report for 141.56.51.174 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.51.174 are filtered | |||
Nmap scan report for 141.56.51.175 | |||
Host is up (1.8s latency). | |||
All 1000 scanned ports on 141.56.51.175 are filtered | |||
Nmap scan report for 141.56.51.176 | |||
Host is up (1.5s latency). | |||
All 1000 scanned ports on 141.56.51.176 are filtered | |||
Nmap scan report for 141.56.51.177 | |||
Host is up (1.5s latency). | |||
All 1000 scanned ports on 141.56.51.177 are filtered | |||
Nmap scan report for 141.56.51.178 | |||
Host is up (0.0027s latency). | |||
All 1000 scanned ports on 141.56.51.178 are filtered | |||
Nmap scan report for 141.56.51.179 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.179 are filtered | |||
Nmap scan report for 141.56.51.180 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.180 are filtered | |||
Nmap scan report for 141.56.51.181 | |||
Host is up (0.00060s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u7 (protocol 2.0) | |||
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD11) | |||
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD11) | |||
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.182 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.182 are filtered | |||
Nmap scan report for 141.56.51.183 | |||
Host is up (0.00042s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u5 (protocol 2.0) | |||
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.184 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.184 are filtered | |||
Nmap scan report for 141.56.51.185 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.185 are filtered | |||
Nmap scan report for 141.56.51.186 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.186 are filtered | |||
Nmap scan report for 141.56.51.187 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.187 are filtered | |||
Nmap scan report for 141.56.51.188 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.188 are filtered | |||
Nmap scan report for 141.56.51.189 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.189 are filtered | |||
Nmap scan report for 141.56.51.190 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.190 are filtered | |||
Nmap scan report for 141.56.51.191 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.191 are filtered | |||
Nmap scan report for 141.56.51.192 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.192 are filtered | |||
Nmap scan report for 141.56.51.193 | |||
Host is up (0.00020s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.33 ((FreeBSD)) | |||
Nmap scan report for 141.56.51.194 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.194 are filtered | |||
Nmap scan report for 141.56.51.195 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.195 are filtered | |||
Nmap scan report for 141.56.51.196 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.196 are filtered | |||
Nmap scan report for 141.56.51.197 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.197 are filtered | |||
Nmap scan report for 141.56.51.198 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.198 are filtered | |||
Nmap scan report for 141.56.51.199 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.199 are filtered | |||
Nmap scan report for 141.56.51.200 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.200 are filtered | |||
Nmap scan report for 141.56.51.201 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.51.201 are filtered | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 51 IP addresses (51 hosts up) scanned in 731.03 seconds | |||
</pre> | |||
!--> | |||
<code>nmap -sV -Pn 141.56.51.201-255</code> | |||
<!-- | |||
<pre> | |||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:35 CEST | |||
Nmap scan report for 141.56.51.201 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.201 are filtered | |||
Nmap scan report for 141.56.51.202 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.202 are filtered | |||
Nmap scan report for 141.56.51.203 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.203 are filtered | |||
Nmap scan report for 141.56.51.204 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.204 are filtered | |||
Nmap scan report for 141.56.51.205 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.205 are filtered | |||
Nmap scan report for 141.56.51.206 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.206 are filtered | |||
Nmap scan report for 141.56.51.207 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.207 are filtered | |||
Nmap scan report for 141.56.51.208 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.208 are filtered | |||
Nmap scan report for 141.56.51.209 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.209 are filtered | |||
Nmap scan report for 141.56.51.210 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.210 are filtered | |||
Nmap scan report for 141.56.51.211 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.211 are filtered | |||
Nmap scan report for 141.56.51.212 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.212 are filtered | |||
Nmap scan report for 141.56.51.213 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.51.213 are filtered | |||
Nmap scan report for 141.56.51.214 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.214 are filtered | |||
Nmap scan report for 141.56.51.215 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.215 are filtered | |||
Nmap scan report for 141.56.51.216 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.216 are filtered | |||
Nmap scan report for 141.56.51.217 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.217 are filtered | |||
Nmap scan report for 141.56.51.218 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.218 are filtered | |||
Nmap scan report for 141.56.51.219 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.219 are filtered | |||
Nmap scan report for 141.56.51.220 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.220 are filtered | |||
Nmap scan report for 141.56.51.221 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.221 are filtered | |||
Nmap scan report for 141.56.51.222 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.51.222 are filtered | |||
Nmap scan report for 141.56.51.223 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.51.223 are filtered | |||
Nmap scan report for 141.56.51.224 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.224 are filtered | |||
Nmap scan report for 141.56.51.225 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.225 are filtered | |||
Nmap scan report for 141.56.51.226 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.226 are filtered | |||
Nmap scan report for 141.56.51.227 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.227 are filtered | |||
Nmap scan report for 141.56.51.228 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.228 are filtered | |||
Nmap scan report for 141.56.51.229 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.229 are filtered | |||
Nmap scan report for 141.56.51.230 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.230 are filtered | |||
Nmap scan report for 141.56.51.231 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.231 are filtered | |||
Nmap scan report for 141.56.51.232 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.232 are filtered | |||
Nmap scan report for 141.56.51.233 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.233 are filtered | |||
Nmap scan report for 141.56.51.234 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.234 are filtered | |||
Nmap scan report for 141.56.51.235 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.235 are filtered | |||
Nmap scan report for 141.56.51.236 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.236 are filtered | |||
Nmap scan report for 141.56.51.237 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.237 are filtered | |||
Nmap scan report for 141.56.51.238 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.238 are filtered | |||
Nmap scan report for 141.56.51.239 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.239 are filtered | |||
Nmap scan report for 141.56.51.240 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.240 are filtered | |||
Nmap scan report for 141.56.51.241 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.241 are filtered | |||
Nmap scan report for 141.56.51.242 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.242 are filtered | |||
Nmap scan report for 141.56.51.243 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.243 are filtered | |||
Nmap scan report for 141.56.51.244 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.244 are filtered | |||
Nmap scan report for 141.56.51.245 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.245 are filtered | |||
Nmap scan report for 141.56.51.246 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.246 are filtered | |||
Nmap scan report for 141.56.51.247 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.247 are filtered | |||
Nmap scan report for 141.56.51.248 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.248 are filtered | |||
Nmap scan report for 141.56.51.249 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.249 are filtered | |||
Nmap scan report for 141.56.51.250 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.250 are filtered | |||
Nmap scan report for 141.56.51.251 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.51.251 are filtered | |||
Nmap scan report for 141.56.51.252 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.252 are filtered | |||
Nmap scan report for 141.56.51.253 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.253 are filtered | |||
Nmap scan report for rou1.rz.htw-dresden.de (141.56.51.254) | |||
Host is up (0.0070s latency). | |||
All 1000 scanned ports on rou1.rz.htw-dresden.de (141.56.51.254) are closed | |||
Nmap scan report for 141.56.51.255 | |||
Host is up. | |||
All 1000 scanned ports on 141.56.51.255 are filtered | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 55 IP addresses (55 hosts up) scanned in 884.81 seconds | |||
</pre> | |||
!--> | |||
== mx stura.htw-dresden.de == | |||
; ab 2018-09-06: | |||
<code>dig mx stura.htw-dresden.de</code> | |||
<pre> | |||
; <<>> DiG 9.9.5-9+deb8u16-Debian <<>> mx stura.htw-dresden.de | |||
;; global options: +cmd | |||
;; Got answer: | |||
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65421 | |||
;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 8 | |||
;; OPT PSEUDOSECTION: | |||
; EDNS: version: 0, flags:; udp: 4000 | |||
;; QUESTION SECTION: | |||
;stura.htw-dresden.de. IN MX | |||
;; ANSWER SECTION: | |||
stura.htw-dresden.de. 84695 IN MX 20 rmx6.rz.htw-dresden.de. | |||
stura.htw-dresden.de. 84695 IN MX 10 srs14.stura.htw-dresden.de. | |||
stura.htw-dresden.de. 84695 IN MX 12 srs9.stura.htw-dresden.de. | |||
stura.htw-dresden.de. 84695 IN MX 14 srs25.stura.htw-dresden.de. | |||
stura.htw-dresden.de. 84695 IN MX 15 srs28.stura.htw-dresden.de. | |||
stura.htw-dresden.de. 84695 IN MX 20 rmx4.rz.htw-dresden.de. | |||
stura.htw-dresden.de. 84695 IN MX 20 rmx5.rz.htw-dresden.de. | |||
;; ADDITIONAL SECTION: | |||
rmx6.rz.htw-dresden.de. 84689 IN A 141.56.16.136 | |||
srs14.stura.htw-dresden.de. 84717 IN A 141.56.51.14 | |||
srs9.stura.htw-dresden.de. 84695 IN A 141.56.51.9 | |||
srs25.stura.htw-dresden.de. 84695 IN A 141.56.51.25 | |||
srs28.stura.htw-dresden.de. 84695 IN A 141.56.51.28 | |||
rmx4.rz.htw-dresden.de. 84689 IN A 141.56.16.134 | |||
rmx5.rz.htw-dresden.de. 84689 IN A 141.56.16.135 | |||
;; Query time: 9 msec | |||
;; SERVER: 141.56.1.1#53(141.56.1.1) | |||
;; WHEN: Thu Sep 06 11:20:31 CEST 2018 | |||
;; MSG SIZE rcvd: 314 | |||
</pre> | |||
== Test internes Netz == | |||
FreeNAS | |||
: <code>ifconfig bce0 172.16.10.11 netmask 255.255.255.0 alias</code> | |||
LMDE | |||
: <code>ip addr add 172.16.10.10/24 dev eno1</code> | |||
: <code>ping 172.16.10.10</code> | |||
: <code>ping -c 3 172.16.10.11</code> | |||
<pre> | |||
PING 172.16.10.11 (172.16.10.11) 56(84) bytes of data. 64 bytes from 172.16.10.11: icmp_seq=1 ttl=64 time=0.153 ms | |||
64 bytes from 172.16.10.11: icmp_seq=2 ttl=64 time=0.141 ms | |||
64 bytes from 172.16.10.11: icmp_seq=3 ttl=64 time=0.163 ms | |||
--- 172.16.10.11 ping statistics --- | |||
3 packets transmitted, 3 received, 0% packet loss, time 45ms | |||
rtt min/avg/max/mdev = 0.141/0.152/0.163/0.013 ms | |||
</pre> | |||
== Versorgung mit Strom == | |||
so redundant wie möglich :-D | |||
--[[Benutzer:PaulRiegel|Paul]] 00:20, 15. Sep. 2021 (CEST) | |||
{| class="wikitable" | |||
|- | |||
! Gerät | |||
! 0 (weiß) | |||
! 1 (rot) | |||
|- | |||
| Strom | |||
| Steckdose Leiste (Wand rechts vorn) | |||
| | |||
---- | |||
|- | |||
| Strom | |||
| Steckdose Leiste (Wand rechts hinten) | |||
| | |||
---- | |||
|- | |||
| Strom | |||
| | |||
---- | |||
| Steckdose Leiste (Wand rechts hinten) oben | |||
|- | |||
| Strom | |||
| | |||
---- | |||
| Steckdose Leiste (Wand rechts hinten) mitte | |||
|- | |||
| Strom | |||
| | |||
---- | |||
| Steckdose Leiste (Wand rechts hinten) unten | |||
|- | |||
| Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen | |||
| (irgendeine) Steckdose | |||
| | |||
---- | |||
|- | |||
| Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen | |||
| | |||
---- | |||
| (irgendeine) Steckdose | |||
|- | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links | |||
| | |||
Verlängerungskabel vom der | |||
: Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen | |||
zu der | |||
: Leiste für die Verteilung [[Serverschrank#schrarz]] hinten oben links | |||
| | |||
---- | |||
|- | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts | |||
| | |||
---- | |||
| | |||
Verlängerungskabel vom der | |||
: Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen | |||
zu der | |||
: Leiste für die Verteilung [[Serverschrank#schrarz]] hinten oben rechts | |||
|- | |||
| Switch 00 (Typ A klein) | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links | |||
| | |||
|- | |||
| Switch 01 (Typ A groß) | |||
| | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts | |||
|- | |||
| Switch 10 (Typ B klein) | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links | |||
| | |||
|- | |||
| Switch 11 (Typ B groß) | |||
| | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts | |||
|- | |||
| [[srs2110]] | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links | |||
| | |||
|- | |||
| [[srs2111]] | |||
| | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts | |||
|- | |||
| [[srs5100]] | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts | |||
|- | |||
| [[srs5110]] | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts | |||
|- | |||
| [[srs5111]] | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links | |||
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts | |||
|- | |||
|} | |||
== mac srd12 == | |||
ist noch im Artikel nachzutragen | |||
00:23:24:3c:ad:cf | |||
== [[Computer]] == | |||
ist noch im Artikel nachzutragen | |||
[[srd16]] hat die IPv4 ….51.186 und steht in der [[A107]]. | |||
[[srd11]] hat die IPv4 ….51.181 und steht in der [[A107]]. | |||
Aktuelle Version vom 11. März 2022, 22:38 Uhr
"Services" und "Dienste"
[Bearbeiten]Worin besteht der Unterschied zwischen der von mir kürzlich vorgeschlagenen Kategorie "Dienst" und der bereits genutzten (aber mir bis eben unbekannten) Kategorie "Services"? --Mr N (Diskussion) 20:00, 2. Jan. 2016 (CET)
Es gibt eine Kategorie:Dienst oder Kategorie:Services?
Meinerseits wurde doch nur erstmal die Begrifflichkeit Services als Überschrift verwendet.
Spontan würde ich sagen, dass das auch alles mit der Kategorie:Server versehen wird. Es könnte nur überlegt werden, ob die Artikel Server/Service/ oder so heißen.
Solltest du die meinen, so ist das schlicht die Kategorie für den Bereich Service des StuRa. (Also da geht es um wahren Service, nicht Dienste durch Server.)
BTW: Eine Kategorie für einen Service (Singular) mit Services (Plural) zu kategorisieren, fände ich "nicht schön".
--Paul 11:38, 4. Jan. 2016 (CET)
zu klärendes mit dem RZ
[Bearbeiten]Zuschalten von Dosen für Netzwerk
[Bearbeiten]Sehr geehrtes Rechenzentrum, lieber Herr Müller,
wie beim Gespräch im Februar besprochen, bitten wir um das Zuschalten der Dosen fürs Netzwerk. Im Übrigen bedauern wir, dass unsere Meldung so lange auf sich warten ließ. Die Vielzahl von unerwarteten Komplikationen forderte uns zeitlich arg.
Gern können Sie alle noch nicht im Betrieb befindliche Dosen "pauschal" freischalten.
Selbstverständlich haben wir uns zwischenzeitlich auch einen Übersicht zu den einzelnen uns zugeordneten Dosen verschafft.
Wenn die einzelnen Dosen benannt werden sollen, so wären das mindestens: Erdgeschoss
- D03-102-A03
- D01-104-A03
- D05-104-A03
- D01-105-A03
- D03-105-A03
- D05-105-A03
- D07-105-A03 (Raum A105/A106)
- D09-105-A03 (Raum A105/A106)
- D11-105-A03 (Raum A105/A106)
- D03-107-A03 (Raum A108)
- D05-107-A03 (Raum A108)
- D01-108-A03 (Raum A109)
Untergeschoss
- D01-007-A03
- D04-007-A03
- D05-007-A03
- D06-007-A03
- D01-008-A03
- D03-008-A03
- D04-008-A03
Den Raum A110 werden wir gemeinschaftlich mit der Hochschule für Beratungen nutzen.
- D01-109-A03
- D03-109-A03
Den Raum A103 nutzt Faranto.
- D01-103-A03
- D03-103-A03
Den Raum A107 nutzt der FSR ET.
- D01-107-A03
Den Raum A001 nutzt der FSR I/M.
- D01-001-A03
Den Raum A002 nutzt der FSR WiWi.
- D01-002-A03
Den Raum A004 nutzt der FSR MBau.
- D01-004-A03
Das Zuschalten der Dosen bei den FSRä kann als präventive Maßnahme zur Absicherung der Verfügbarkeit von Netzwerk verstanden werden. Langfristig ändert sich das vielleicht.
Mit besten Grüßen
IP-Adressen und Bereich an IP-Adressen
[Bearbeiten]- "eigenes" Netz
- Anzahl von IP-Adressen
| Switch | (02 (+ 01)) * 2 | 006 |
|
| Server | (03 (+ 02)) * 4) | 020 |
|
| Desktop (GNU/Linux) | 04 (+ 06) | 010 |
|
| Desktop (UNIX) | 02 | 002 |
|
| Desktop (Windows) | 02 | 002 |
|
| Laptop | 03 * 0 | 000 |
|
| Drucker | 05 (+ 01) | 006 |
|
| Desktop (Faranto) | 03 (+ 01) | 004 |
|
| Drucker (Faranto) | 02 | 002 |
|
| Dienste | 15 (* 2) | 030 |
|
| Dienste KSS | 10 (* 2) | 020 |
|
| Summe | 102 | ||
| Sonstiges | 10? | 009 |
als Beispiele: |
| Summe | 111 |
Einträge für DNS
[Bearbeiten]stura.htw-dresden.de DNS
[Bearbeiten]- Siehe auch
- Domain#stura.htw-dresden.de DNS
- womöglich letzte Meldung beim RZ
- ticket:403
stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen
[Bearbeiten]| u | hinzufügen |
| entfernen | |
| entfernbar |
stura.htw-dresden.de DNS mittelfristig gewünschte Änderungen
[Bearbeiten]Achtung! Dieser Abschnitt dient bisher nur als Grundlage für den zu erstellenden Entwurf! #stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen
| u | hinzufügen |
| entfernen | |
| entfernbar |
Vereinbarung für inhaltliche Verantwortlichkeit
[Bearbeiten]Zertifikate für Dienste
[Bearbeiten]anstehendes Treffen
[Bearbeiten]- Ende März
Belegung vom Serverschrank
[Bearbeiten]Konzept Belegung vom Serverschrank Frühjahr 2017
[Bearbeiten]Achtung! Die Tabelle stellt noch nicht die Realität dar. Die Tabelle muss noch bearbeitet werden!
| Höhe | Ist | Soll |
|---|---|---|
| 001 |
| |
| o | ||
| - | ||
| 004 |
Switch | |
| o | ||
| - | ||
| 007 |
| |
| o | ||
| - | ||
| 010 | ||
| o | ||
| - | ||
| 013 | ||
| o | ||
| - | ||
| 016 |
| |
| o | ||
| - | ||
| 019 |
RX 300 | |
| o | ||
| - | ||
| 022 | ||
| o | ||
| - | ||
| 025 |
| |
| o | ||
| - | ||
| 028 |
RX 300 | |
| o | ||
| - | ||
| 031 | ||
| o | ||
| - | ||
| 034 |
| |
| o | ||
| - | ||
| 037 |
Switch | |
| o | ||
| - | ||
| 040 |
| |
| o | ||
| - | ||
| 043 | ||
| o | ||
| - | ||
| 046 |
| |
| o | ||
| - | ||
| 049 | ||
| o | ||
| - | ||
| 052 |
| |
| o | ||
| - | ||
| 055 | ||
| o | ||
| - | ||
| 058 |
| |
| o | ||
| - | ||
| 061 |
| |
| o | ||
| - | ||
| 064 |
| |
| o | ||
| - | ||
| 067 |
IBM X3550 | |
| o | ||
| - | ||
| 070 |
| |
| o | ||
| - | ||
| 073 |
HP DL160 G6 | |
| o | ||
| - | ||
| 076 |
| |
| o | ||
| - | ||
| 079 |
| |
| o | ||
| - | ||
| 082 | ||
| o | ||
| - | ||
| 085 |
| |
| o | ||
| - | ||
| 088 |
| |
| o | ||
| - | ||
| 091 | ||
| o | ||
| - | ||
| 094 |
| |
| o | ||
| - | ||
| 097 |
| |
| o | ||
| - | ||
| 100 |
| |
| o | ||
| - |
Konzept Belegung vom Serverschrank Sommer 2017
[Bearbeiten]Achtung! Die Tabelle stellt noch nicht die Realität dar. Die Tabelle muss noch bearbeitet werden!
| Höhe | Ist | Soll |
|---|---|---|
| 001 |
| |
| o | ||
| - | ||
| 004 | ||
| o | ||
| - | ||
| 007 |
| |
| o | ||
| - | ||
| 010 | ||
| o | ||
| - | ||
| 013 |
| |
| o | ||
| - | ||
| 017 | ||
| o | ||
| - | ||
| 020 | ||
| o | ||
| - | ||
| 023 |
| |
| o | ||
| - | ||
| 026 | ||
| o | ||
| - | ||
| 029 | ||
| o | ||
| - | ||
| 032 |
| |
| o | ||
| - | ||
| 035 | ||
| o | ||
| - | ||
| 038 | ||
| o | ||
| - | ||
| 041 |
| |
| o | ||
| - | ||
| 044 | ||
| o | ||
| - | ||
| 047 | ||
| o | ||
| - | ||
| 050 |
| |
| o | ||
| - | ||
| 044 | ||
| o | ||
| - | ||
| 047 |
| |
| o | ||
| - | ||
| 050 | ||
| o | ||
| - | ||
| 053 |
| |
| o | ||
| - | ||
| 056 | ||
| o | ||
| - | ||
| 059 |
| |
| o | ||
| - | ||
| 062 | ||
| o | ||
| - | ||
| 065 |
| |
| o | ||
| - | ||
| 068 | ||
| o | ||
| - | ||
| 071 |
| |
| o | ||
| - | ||
| 074 |
HP DL160 G6 | |
| o | ||
| - | ||
| 077 |
| |
| o | ||
| - | ||
| 080 |
IBM X3550 | |
| o | ||
| - | ||
| 083 |
| |
| o | ||
| - | ||
| 086 |
| |
| o | ||
| - | ||
| 089 |
| |
| o | ||
| - | ||
| 092 | ||
| o | ||
| - | ||
| 095 |
| |
| o | ||
| - | ||
| 098 | ||
| o | ||
| - | ||
| 101 |
| |
| o | ||
| - |
gescheitertes
[Bearbeiten]Umzug von Server/Jails/SRS1 Juni 2017
[Bearbeiten]add jails
---------
* database
** 141.56.50.191
* semaphore
** 141.56.50.190
* git
** 141.56.50.192
* website
** 141.56.50.195
add storage
-----------
* /lega/storage/git/repos/ansible
* /lega/storage/semaphore/ansible
mount Storage
-------------
* git /lega/storage/git/repos /media/repos # XXX geht nicht
* semaphore /mnt/lega/jails/git/media/repos/ansible /media/repos read-only
* semaphore /lega/storage/semaphore/ansible /media/playbooks
Installationen
--------------
semaphore
* semaphore
* mariadb100-client
database
* mariadb100-server
git
* git
* neovim
Konfiguration
-------------
database:mariadb100-server
sysrc mysql_enable="YES"
'/usr/local/bin/mysqladmin' -u root password 'passwd'
mysql -u root -p
$ create database semaphore;
$ create user 'semaphore'@'141.56.50.190' identified by 'passwd';
$ grant all on semaphore.* to 'semaphore'@'141.56.50.190';
$ exit
website:ssh-access
mv semaphore.pub /root/.ssh/authorized_keys
$EDITOR /etc/ssh/sshd_config
PermitRootLogin without-password
service sshd onestart
semaphore:maraidb100 test
mysql -u semaphore -p -h 141.56.50.191 semaphore
semaphore:ssh-access test
ssh -i /root/.ssh/semaphore root@141.56.50.181
semaphore:semaphore setup
sysrc semaphore_enable="YES"
semaphore -setup
1. Set up configuration for a MySQL/MariaDB database
2. Set up a path for your playbooks (auto-created)
3. Run database Migrations
4. Set up initial seamphore user & password
> DB Hostname (default 127.0.0.1:3306): 141.56.50.191:3306
> DB User (default root): semaphore
> DB Password: passwd
> DB Name (default semaphore):
> Playbook path: /media/playbooks
Generated configuration:
{
"mysql": {
"host": "141.56.50.191:3306",
"user": "semaphore",
"pass": "passwd",
"name": "semaphore"
},
"port": "",
"bugsnag_key": "",
"tmp_path": "/media/playbooks",
"cookie_hash": "3tVjUpe+RbRU4uBDtcpFZN/m8a3yh2q81pvTNGRoNL8=",
"cookie_encryption": "g881D/r7T8aa8Q0tgKPm00kiFVj5oi/q0loJgYoN2Co="
}
> Is this correct? (yes/no): yes
Running: mkdir -p /media/playbooks..
Configuration written to /media/playbooks/semaphore_config.json..
Pinging database..
Running DB Migrations..
Creating migrations table
Executing migration v0.0.0 (at 2017-05-06 13:02:41.78052655 +0200 CEST)...
[11/11]
Executing migration v1.0.0 (at 2017-05-06 13:02:42.992311998 +0200 CEST)...
[7/7]
Executing migration v1.1.0 (at 2017-05-06 13:02:44.672359519 +0200 CEST)...
[1/1]
Executing migration v1.2.0 (at 2017-05-06 13:02:44.92682468 +0200 CEST)...
[1/1]
Executing migration v1.3.0 (at 2017-05-06 13:02:45.041572311 +0200 CEST)...
[3/3]
Executing migration v1.4.0 (at 2017-05-06 13:02:45.694122748 +0200 CEST)...
[2/2]
Executing migration v1.5.0 (at 2017-05-06 13:02:46.42319397 +0200 CEST)...
[1/1]
Executing migration v0.1.0 (at 2017-05-06 13:02:46.551490497 +0200 CEST)...
[6/6]
Executing migration v1.6.0 (at 2017-05-06 13:02:46.804356224 +0200 CEST)...
[4/4]
Executing migration v1.7.0 (at 2017-05-06 13:02:47.39476158 +0200 CEST)...
[1/1]
Executing migration v1.8.0 (at 2017-05-06 13:02:47.545875504 +0200 CEST)...
[2/2]
Executing migration v1.9.0 (at 2017-05-06 13:02:47.69541287 +0200 CEST)...
[2/2]
> Username: root
> Email: semaphore@stura.htw-dresden.de
> Your name: StuRa HTW Dresden
> Password: passwd
cp /media/playbooks/semaphore_config.json /usr/local/etc/semaphore/semaphore_config.json
semaphore:ssh-keygen
ssh-keygen -t ed25519
Generating public/private ed25519 key pair.
Enter file in which to save the key (/root/.ssh/id_ed25519): /root/.ssh/semaphore
Created directory '/root/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/semaphore.
Your public key has been saved in /root/.ssh/semaphore.pub.
The key fingerprint is:
SHA256:pfwPuz8FVoC5xY0NqbaeP7IhjVizjJEID8riFy6lHvk root@semaphore
The key's randomart image is:
+--[ED25519 256]--+
| +oB |
| o = + |
| o .+ . |
|.. + . o o+ o |
|o. oo o S. o . |
|o = . * *. . |
| * o o =.=. . |
|. = .+=o |
| . E +*+o |
+----[SHA256]-----+
semaphore:ansible roles
ansible-galaxy NetworkManager/
git:git init --bare
cd /media/repos/ansible/
git init --bare website.git
git:create playbooks
cd /tmp
git clone /media/repos/ansible/website.git
cd website
git config --global user.email "semaphore@stura.htw-dresden.de"
git config --global user.name "Administration Rechentechnik"
......
plone upgrade
-------------
1. srs3008
zfs create comp/migration
2. elke
/etc/rc.d/jail stop srs1
zfs snapshot -r primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20
/etc/rc.d/jail start srs1
zfs send primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20 | ssh root@141.56.50.128 zfs recv comp/migration/srs1
3. srs3008
zfs create -p comp/storage/website/plone/var/blobstorage
zfs create -p comp/storage/website/plone/var/filestorage
rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/filestorage/ /mnt/comp/storage/website/plone/var/filestorage/
rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/blobstorage/ /mnt/comp/storage/website/plone/var/blobstorage/
chown -R www:www /mnt/comp/storage/website/plone/var
zfs snapshot -r comp/storage/website/plone@AFTER_MIGRATION
4. srs3008/website
pkg install python2 sudo
adduser
Username: ansible
Full name:
Uid (Leave empty for default):
Login group [ansible]:
Login group is foo. Invite foo into other groups? []:
Login class [default]:
Shell (sh csh tcsh git-shell nologin) [sh]:
Home directory [/home/ansible]:
Home directory permissions (Leave empty for default):
Use password-based authentication? [yes]:
Use an empty password? (yes/no) [no]:
Use a random password? (yes/no) [no]: yes
Lock out the account after creation? [no]:
Username : ansible
Password : <random>
Full Name :
Uid : 1001
Class :
Groups : ansible
Home : /home/ansible
Home Mode :
Shell : /bin/sh
Locked : no
OK? (yes/no): yes
su ansible
cd; mkdir .ssh
echo 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN3eeZ3Wcxn9ixD039fSFNg2zpJ09YY45XKb3KMST8Da root@semaphore' > .ssh/authorized_keys
exit
vi /usr/local/etc/sudoers
ansible ALL=(ALL) NOPASSWD: ALL
service sshd onestart
5. browser
5.1. http://141.56.50.190:3000/project/1/templates
5.1.1. Anpassung Inventory plone
plone_neu ansible_host=141.56.50.195
myhost ansible_host=141.56.50.128 ansible_ssh_user=root
5.1.2. Anpassung Enviroment
"stura_nginx_server_name":"plone.htw.stura-dresden.de",
"myhost_tank":"comp"
5.1.3. run main
5.2. http://141.56.50.128/ > Jails -> Storage
5.2.1 Add Storage
Jail SRC DEST READ-ONLY CREATE DIRECTORY MOUNTED
website /mnt/comp/storage/website/plone/var/blobstorage /usr/local/www/website/var/blobstorage no no yes
website /mnt/comp/storage/website/plone/var/filestorage /usr/local/www/website/var/filestorage no no yes
6. srs3008/website
service zope213 start
7. browser
7.1. http://plone.htw.stura-dresden.de:8080/Plone/@@plone-upgrade
7.2. http://141.56.50.190:3000/project/1/templates
7.2.1 Anpassung Enviroment
"stura_nginx_server_name":"www.stura.htw-dresden.de",
7.2.2 run main
7.3. http://141.56.50.128/ > Jails
7.3.1. stoppe jail website
8. Elke
/etc/rc.d/jail stop srs1
TODO Ist die IP adresse weg vom interface?
9. browser
9.1. http://141.56.50.128/ > Jails
9.1.2. edit jail
IPv4 address: 141.56.50.1
9.1.3. starte jail website
Umzug zum Bereich an Adressen für IPv4 141.56.51.0/24
[Bearbeiten]nmap -sV -Pn 141.56.50.1-254
nmap -sV -Pn 141.56.51.0-50
nmap -sV -Pn 141.56.51.51-101
nmap -sV -Pn 141.56.51.101-151
nmap -sV -Pn 141.56.51.151-201
nmap -sV -Pn 141.56.51.201-255
mx stura.htw-dresden.de
[Bearbeiten]- ab 2018-09-06
dig mx stura.htw-dresden.de
; <<>> DiG 9.9.5-9+deb8u16-Debian <<>> mx stura.htw-dresden.de ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65421 ;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 8 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4000 ;; QUESTION SECTION: ;stura.htw-dresden.de. IN MX ;; ANSWER SECTION: stura.htw-dresden.de. 84695 IN MX 20 rmx6.rz.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 10 srs14.stura.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 12 srs9.stura.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 14 srs25.stura.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 15 srs28.stura.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 20 rmx4.rz.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 20 rmx5.rz.htw-dresden.de. ;; ADDITIONAL SECTION: rmx6.rz.htw-dresden.de. 84689 IN A 141.56.16.136 srs14.stura.htw-dresden.de. 84717 IN A 141.56.51.14 srs9.stura.htw-dresden.de. 84695 IN A 141.56.51.9 srs25.stura.htw-dresden.de. 84695 IN A 141.56.51.25 srs28.stura.htw-dresden.de. 84695 IN A 141.56.51.28 rmx4.rz.htw-dresden.de. 84689 IN A 141.56.16.134 rmx5.rz.htw-dresden.de. 84689 IN A 141.56.16.135 ;; Query time: 9 msec ;; SERVER: 141.56.1.1#53(141.56.1.1) ;; WHEN: Thu Sep 06 11:20:31 CEST 2018 ;; MSG SIZE rcvd: 314
Test internes Netz
[Bearbeiten]FreeNAS
ifconfig bce0 172.16.10.11 netmask 255.255.255.0 alias
LMDE
ip addr add 172.16.10.10/24 dev eno1ping 172.16.10.10ping -c 3 172.16.10.11
PING 172.16.10.11 (172.16.10.11) 56(84) bytes of data. 64 bytes from 172.16.10.11: icmp_seq=1 ttl=64 time=0.153 ms 64 bytes from 172.16.10.11: icmp_seq=2 ttl=64 time=0.141 ms 64 bytes from 172.16.10.11: icmp_seq=3 ttl=64 time=0.163 ms --- 172.16.10.11 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 45ms rtt min/avg/max/mdev = 0.141/0.152/0.163/0.013 ms
Versorgung mit Strom
[Bearbeiten]so redundant wie möglich :-D
--Paul 00:20, 15. Sep. 2021 (CEST)
| Gerät | 0 (weiß) | 1 (rot) |
|---|---|---|
| Strom | Steckdose Leiste (Wand rechts vorn) |
|
| Strom | Steckdose Leiste (Wand rechts hinten) |
|
| Strom |
|
Steckdose Leiste (Wand rechts hinten) oben |
| Strom |
|
Steckdose Leiste (Wand rechts hinten) mitte |
| Strom |
|
Steckdose Leiste (Wand rechts hinten) unten |
| Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen | (irgendeine) Steckdose |
|
| Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen |
|
(irgendeine) Steckdose |
| Leiste für Steckdosen Serverschrank#schrarz hinten oben links |
Verlängerungskabel vom der
zu der
|
|
| Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts |
|
Verlängerungskabel vom der
zu der
|
| Switch 00 (Typ A klein) | Leiste für Steckdosen Serverschrank#schrarz hinten oben links | |
| Switch 01 (Typ A groß) | Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts | |
| Switch 10 (Typ B klein) | Leiste für Steckdosen Serverschrank#schrarz hinten oben links | |
| Switch 11 (Typ B groß) | Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts | |
| srs2110 | Leiste für Steckdosen Serverschrank#schrarz hinten oben links | |
| srs2111 | Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts | |
| srs5100 | Leiste für Steckdosen Serverschrank#schrarz hinten oben links | Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts |
| srs5110 | Leiste für Steckdosen Serverschrank#schrarz hinten oben links | Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts |
| srs5111 | Leiste für Steckdosen Serverschrank#schrarz hinten oben links | Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts |
mac srd12
[Bearbeiten]ist noch im Artikel nachzutragen
00:23:24:3c:ad:cf
ist noch im Artikel nachzutragen