Intern Diskussion:Server: Unterschied zwischen den Versionen

Aus Wiki StuRa HTW Dresden
Zur Navigation springen Zur Suche springen
 
(38 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt)
Zeile 1: Zeile 1:
srs19 ist vorhanden -- ich konnte jedoch nicht ihre Aufgabe erkennen. Schrift unlesbar.
[[Benutzer:FrankHebold|FrankHebold]] ([[Benutzer Diskussion:FrankHebold|Diskussion]]) 12:09, 4. Jun. 2013 (CEST)
== "Services" und "Dienste" ==
== "Services" und "Dienste" ==


Zeile 204: Zeile 201:
; Siehe auch: [[Domain#stura.htw-dresden.de DNS]]
; Siehe auch: [[Domain#stura.htw-dresden.de DNS]]


; womöglich letzte Meldung beim [[RZ]]: [[ticket:403]]
===== stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen =====
{| class="wikitable sortable"
|-
|+
{| class="wikitable sortable"
|-
| <u>u</u>
| hinzufügen
|-
| <s>s</s>
| entfernen
|-
| <s><u>su</u></s>
| entfernbar
|-
|}
<code>
<code>
{| class="wikitable sortable"
|-
|-
! Name !! Type !! Content !! Priorty !! TTL
! Name !! Type !! Content !! Priorty !! TTL
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | [[srs14]].stura.htw-dresden.de || 10 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <u>[[srs9]].stura.htw-dresden.de</u> || 12 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <u>[[srs25]].stura.htw-dresden.de</u> || 14 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <u>[[srs28]].stura.htw-dresden.de</u> || 15 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <s><u>rmx4.rz.htw-dresden.de</u></s> || 20 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <s><u>rmx5.rz.htw-dresden.de</u></s> || 20 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <s><u>rmx6.rz.htw-dresden.de</u></s> || 20 || 3600
|-
| style="text-align:right" | [[srs1]].stura.htw-dresden.de || A || 141.56.50.1 || || 3600
|-
| style="text-align:right" | <u>stura.htw-dresden.de</u> || CNAME || style="text-align:right" | [[srs1]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | www.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs1]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | [[srs2]].stura.htw-dresden.de || A || 141.56.50.2 || || 3600
|-
| style="text-align:right" | srs2342.stura.htw-dresden.de || A || 141.56.50.10 || || 3600
|-
| style="text-align:right" | <u>[[srsw1]].stura.htw-dresden.de</u> || A || 141.56.50.11 || || 3600
|-
| style="text-align:right" | <u>[[srs1337]].stura.htw-dresden.de</u> || A || 141.56.50.12 || || 3600
|-
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | [[srs14]].stura.htw-dresden.de || 10 || 3600
| style="text-align:right" | [[srs13]].stura.htw-dresden.de || A || 141.56.50.13 || || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <u>[[srs25]].stura.htw-dresden.de</u> || 14 || 3600
|-
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <u>[[srs28]].stura.htw-dresden.de</u> || 15 || 3600
| style="text-align:right" | wiki.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs13]].stura.htw-dresden.de || || 3600
|-
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <s><u>rmx4.rz.htw-dresden.de</u></s> || 20 || 3600
| style="text-align:right" | www.wiki.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs13]].stura.htw-dresden.de || || 3600
|-
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <s><u>rmx5.rz.htw-dresden.de</u></s> || 20 || 3600
| style="text-align:right" | [[srs14]].stura.htw-dresden.de || A || 141.56.50.14 || || 3600
|-
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <s><u>rmx6.rz.htw-dresden.de</u></s> || 20 || 3600
| style="text-align:right" | mail.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs14]].stura.htw-dresden.de || || 3600
|-
|-
| style="text-align:right" | [[srs1]].stura.htw-dresden.de || A || 141.56.50.1 || || 3600
| style="text-align:right" | lists.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs14]].stura.htw-dresden.de || || 3600
|-
|-
| style="text-align:right" | www.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs1]].stura.htw-dresden.de || || 3600
| style="text-align:right" | <u>www.lists.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | [[srs14]].stura.htw-dresden.de || || 3600
|-
|-
| style="text-align:right" | [[srs2]].stura.htw-dresden.de || A || 141.56.50.2 || || 3600
| style="text-align:right" | [[srs15]].stura.htw-dresden.de || A || 141.56.50.15 || || 3600
|-
|-
| style="text-align:right" | srs2342.stura.htw-dresden.de || A || 141.56.50.10 || || 3600
| style="text-align:right" | <u>pro.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | [[srs15]].stura.htw-dresden.de || || 3600
|-
|-
| style="text-align:right" | <u>www.pro.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | [[srs15]].stura.htw-dresden.de || || 3600
<!--
<!--
| style="text-align:right" | srs2342.stura.htw-dresden.de || A || <s>141.56.50.10</s> || || 3600
|-
|-
| style="text-align:right" | [[srs2342]].stura.htw-dresden.de || A || <u>141.56.50.102</u> || || 3600
| style="text-align:right" | projekt.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs15]].stura.htw-dresden.de || || 3600
|-
|-
| style="text-align:right" | wwww.projekt.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs15]].stura.htw-dresden.de || || 3600
-->
-->
| style="text-align:right" | <u>[[srsw1]].stura.htw-dresden.de</u> || A || 141.56.50.11 || || 3600
|-
|-
| style="text-align:right" | <u>[[srs1337]].stura.htw-dresden.de</u> || A || 141.56.50.12 || || 3600
| style="text-align:right" | [[srs16]].stura.htw-dresden.de || A || 141.56.50.16 || || 3600
|-
| style="text-align:right" | cloud.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs16]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | <u>www.cloud.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | [[srs16]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | [[srs17]].stura.htw-dresden.de || A || 141.56.50.17 || || 3600
|-
| style="text-align:right" | [[srs18]].stura.htw-dresden.de || A || 141.56.50.18 || || 3600
|-
| style="text-align:right" | www2.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs18]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | <u>2010.www.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | [[srs18]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | [[srs19]].stura.htw-dresden.de || A || 141.56.50.19 || || 3600
|-
| style="text-align:right" | [[srs20]].stura.htw-dresden.de || A || 141.56.50.20 || || 3600
|-
| style="text-align:right" | umfragen.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs20]].stura.htw-dresden.de || || 3600
|-
|-
| style="text-align:right" | <u>www.umfragen.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | [[srs20]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | <u>[[srs9]].stura.htw-dresden.de</u> || A || 141.56.50.9 || || 3600
<!--
<!--
| style="text-align:right" | [[srs1337]].stura.htw-dresden.de || A || <s>141.56.50.12</s> || || 3600
|-
| style="text-align:right" | [[srs1337]].stura.htw-dresden.de || A || <u>141.56.50.101</u> || || 3600
|-
|-
| style="text-align:right" | <u>balance.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs9]].stura.htw-dresden.de</u> || || 3600
-->
-->
| style="text-align:right" | [[srs13]].stura.htw-dresden.de || A || 141.56.50.13 || || 3600
|-
|-
| style="text-align:right" | wiki.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs13]].stura.htw-dresden.de || || 3600
| style="text-align:right" | <u>bal.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs9]].stura.htw-dresden.de</u> || || 3600
|-
|-
| style="text-align:right" | <s>www.wiki.stura.htw-dresden.de</s> || CNAME || style="text-align:right" | [[srs13]].stura.htw-dresden.de || || 3600
| style="text-align:right" | <u>[[srs28]].stura.htw-dresden.de</u> || A || 141.56.50.28 || || 3600
|-
|-
| style="text-align:right" | [[srs14]].stura.htw-dresden.de || A || 141.56.50.14 || || 3600
| style="text-align:right" | <u>mta.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs28]].stura.htw-dresden.de</u> || || 3600
|-
|-
| style="text-align:right" | mail.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs14]].stura.htw-dresden.de || || 3600
| style="text-align:right" | [[srs25]].stura.htw-dresden.de || A || 141.56.50.25 || || 3600
|-
|-
| style="text-align:right" | lists.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs14]].stura.htw-dresden.de || || 3600
| style="text-align:right" | <s>amnesty.stura.htw-dresden.de</s> || CNAME || style="text-align:right" | [[srs25]].stura.htw-dresden.de || || 3600
|-
|-
| style="text-align:right" | [[srs15]].stura.htw-dresden.de || A || 141.56.50.15 || || 3600
| style="text-align:right" | <u>mda.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs25]].stura.htw-dresden.de</u> || || 3600
<!--
<!--
|-
|-
| style="text-align:right" | pro.stura.htw-dresden.de || A || style="text-align:right" | [[srs15]].stura.htw-dresden.de || || 3600
| style="text-align:right" | [[srs3]].stura.htw-dresden.de || A || 141.56.50.3 || || 3600
|-
| style="text-align:right" | list.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs3]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | <u>www.list.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | [[srs3]].stura.htw-dresden.de || || 3600
-->
-->
|-
|-
| style="text-align:right" | projekt.stura.htw-dresden.de || A || style="text-align:right" | [[srs15]].stura.htw-dresden.de || || 3600
| style="text-align:right" | <u>[[srs29]].stura.htw-dresden.de</u> || A || 141.56.50.29 || || 3600
<!--
|-
|-
| style="text-align:right" | [[srs16]].stura.htw-dresden.de || A || 141.56.50.16 || || 3600
| style="text-align:right" | <u>isp.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs29]].stura.htw-dresden.de</u> || || 3600
|-
|-
| style="text-align:right" | cloud.stura.htw-dresden.de || A || style="text-align:right" | [[srs16]].stura.htw-dresden.de || || 3600
| style="text-align:right" | <u>config.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs29]].stura.htw-dresden.de</u> || || 3600
-->
|-
|-
| style="text-align:right" | [[srs17]].stura.htw-dresden.de || A || 141.56.50.17 || || 3600
| style="text-align:right" | <u>con.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs29]].stura.htw-dresden.de</u> || || 3600
|-
|-
| style="text-align:right" | [[srs18]].stura.htw-dresden.de || A || 141.56.50.18 || || 3600
| style="text-align:right" | <u>www.con.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs29]].stura.htw-dresden.de</u> || || 3600
|-
|-
| style="text-align:right" | www2.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs18]].stura.htw-dresden.de || || 3600
| style="text-align:right" | <u>[[srs8]].stura.htw-dresden.de</u> || A || 141.56.50.8 || || 3600
|-
|-
| style="text-align:right" | <u>2010.www.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | [[srs18]].stura.htw-dresden.de || || 3600
| style="text-align:right" | <u>mua.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs8]].stura.htw-dresden.de</u> || || 3600
|-
|-
| style="text-align:right" | [[srs19]].stura.htw-dresden.de || A || 141.56.50.19 || || 3600
| style="text-align:right" | <u>www.mua.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs8]].stura.htw-dresden.de</u> || || 3600
|-
|-
| style="text-align:right" | [[srs20]].stura.htw-dresden.de || A || 141.56.50.20 || || 3600
| style="text-align:right" | <u>www.mail.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs8]].stura.htw-dresden.de</u> || || 3600
|-
|-
| style="text-align:right" | umfragen.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs20]].stura.htw-dresden.de || || 3600
| style="text-align:right" | <u>web.mail.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs8]].stura.htw-dresden.de</u> || || 3600
|-
|-
| style="text-align:right" | [[srs25]].stura.htw-dresden.de || CNAME || 141.56.50.25 || || 3600
| style="text-align:right" | <u>[[srs27]].stura.htw-dresden.de</u> || A || 141.56.50.27 || || 3600
|-
|-
| style="text-align:right" | <s>amnesty.stura.htw-dresden.de</s> || CNAME || style="text-align:right" | [[srs25]].stura.htw-dresden.de || || 3600
| style="text-align:right" | <u>www.chat.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs27]].stura.htw-dresden.de</u> || || 3600
|-
|-
| style="text-align:right" | <u>[[srs9]].stura.htw-dresden.de</u> || CNAME || 141.56.50.9 || || 3600
| style="text-align:right" | <u>[[srs17]].stura.htw-dresden.de</u> || A || 141.56.50.17 || || 3600
|-
| style="text-align:right" | <u>jab.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs17]].stura.htw-dresden.de</u> || || 3600
<!--
<!--
|-
|-
| style="text-align:right" | <u>bal.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs25]].stura.htw-dresden.de</u> || || 3600
| style="text-align:right" | <u>[[srs]].stura.htw-dresden.de</u> || A || 141.56.50. || || 3600
|-
| style="text-align:right" | <u>www.jab.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs]].stura.htw-dresden.de</u> || || 3600
-->
-->
|-
|-
| style="text-align:right" | <u>balance.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs25]].stura.htw-dresden.de</u> || || 3600
| style="text-align:right" | <u>[[srs3]].stura.htw-dresden.de</u> || A || 141.56.50.3 || || 3600
|-
| style="text-align:right" | <u>acc.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs3]].stura.htw-dresden.de</u> || || 3600
<!--
|-
|-
|}   
| style="text-align:right" | <u>account.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs3]].stura.htw-dresden.de</u> || || 3600
-->
|-
|}
</code>
 
===== stura.htw-dresden.de DNS mittelfristig gewünschte Änderungen =====
 
  Achtung!
Dieser Abschnitt dient bisher nur als Grundlage für den zu erstellenden Entwurf!
[[#stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen]]
 
{| class="wikitable sortable"
|-
|+
{| class="wikitable sortable"
|-
| <u>u</u>
| hinzufügen
|-
| <s>s</s>
| entfernen
|-
| <s><u>su</u></s>
| entfernbar
|-
|}
<code>
<!--
|-
! Name !! Type !! Content !! Priorty !! TTL
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | [[srs14]].stura.htw-dresden.de || 10 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <u>[[srs25]].stura.htw-dresden.de</u> || 14 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <u>[[srs28]].stura.htw-dresden.de</u> || 15 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <s><u>rmx4.rz.htw-dresden.de</u></s> || 20 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <s><u>rmx5.rz.htw-dresden.de</u></s> || 20 || 3600
|-
| style="text-align:right" | stura.htw-dresden.de || MX || style="text-align:right" | <s><u>rmx6.rz.htw-dresden.de</u></s> || 20 || 3600
|-
| style="text-align:right" | [[srs1]].stura.htw-dresden.de || A || 141.56.50.1 || || 3600
|-
| style="text-align:right" | www.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs1]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | [[srs2]].stura.htw-dresden.de || A || 141.56.50.2 || || 3600
|-
| style="text-align:right" | srs2342.stura.htw-dresden.de || A || <s>141.56.50.10</s> || || 3600
|-
| style="text-align:right" | [[srs2342]].stura.htw-dresden.de || A || <u>141.56.50.102</u> || || 3600
|-
| style="text-align:right" | <u>[[srsw1]].stura.htw-dresden.de</u> || A || 141.56.50.11 || || 3600
|-
| style="text-align:right" | [[srs1337]].stura.htw-dresden.de || A || <s>141.56.50.12</s> || || 3600
|-
| style="text-align:right" | [[srs1337]].stura.htw-dresden.de || A || <u>141.56.50.101</u> || || 3600
|-
| style="text-align:right" | [[srs13]].stura.htw-dresden.de || A || 141.56.50.13 || || 3600
|-
| style="text-align:right" | wiki.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs13]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | <s>www.wiki.stura.htw-dresden.de</s> || CNAME || style="text-align:right" | [[srs13]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | [[srs14]].stura.htw-dresden.de || A || 141.56.50.14 || || 3600
|-
| style="text-align:right" | mail.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs14]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | lists.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs14]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | [[srs15]].stura.htw-dresden.de || A || 141.56.50.15 || || 3600
|-
| style="text-align:right" | pro.stura.htw-dresden.de || A || style="text-align:right" | [[srs15]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | projekt.stura.htw-dresden.de || A || style="text-align:right" | [[srs15]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | [[srs16]].stura.htw-dresden.de || A || 141.56.50.16 || || 3600
|-
| style="text-align:right" | cloud.stura.htw-dresden.de || A || style="text-align:right" | [[srs16]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | [[srs17]].stura.htw-dresden.de || A || 141.56.50.17 || || 3600
|-
| style="text-align:right" | [[srs18]].stura.htw-dresden.de || A || 141.56.50.18 || || 3600
|-
| style="text-align:right" | www2.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs18]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | <u>2010.www.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | [[srs18]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | [[srs19]].stura.htw-dresden.de || A || 141.56.50.19 || || 3600
|-
| style="text-align:right" | [[srs20]].stura.htw-dresden.de || A || 141.56.50.20 || || 3600
|-
| style="text-align:right" | umfragen.stura.htw-dresden.de || CNAME || style="text-align:right" | [[srs20]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | [[srs25]].stura.htw-dresden.de || CNAME || 141.56.50.25 || || 3600
|-
| style="text-align:right" | <s>amnesty.stura.htw-dresden.de</s> || CNAME || style="text-align:right" | [[srs25]].stura.htw-dresden.de || || 3600
|-
| style="text-align:right" | <u>[[srs9]].stura.htw-dresden.de</u> || CNAME || 141.56.50.9 || || 3600
|-
| style="text-align:right" | <u>bal.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs25]].stura.htw-dresden.de</u> || || 3600
|-
| style="text-align:right" | <u>balance.stura.htw-dresden.de</u> || CNAME || style="text-align:right" | <u>[[srs25]].stura.htw-dresden.de</u> || || 3600
|-
!-->
|}
</code>
</code>


Zeile 305: Zeile 484:
==== anstehendes Treffen ====
==== anstehendes Treffen ====
: Ende März
: Ende März
== Belegung vom Serverschrank ==
=== Konzept Belegung vom Serverschrank Frühjahr 2017 ===
Achtung!
Die Tabelle stellt noch nicht die Realität dar.
Die Tabelle muss noch bearbeitet werden!
{| class="wikitable"
|-
|+ großer Serverschrank (32? Höheneinheiten)
|-
! Höhe
! Ist
! Soll
|-
| 001
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 004
|
! rowspan="3" |
Switch
|-
| o
|
|-
| -
|
|-
| 007
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 010
|
! rowspan="6" |
[[srs3008|RX 300 S8]]
|-
| o
|
|-
| -
|
|-
| 013
|
|-
| o
|
|-
| -
|
|-
| 016
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 019
|
! rowspan="6" |
RX 300
|-
| o
|
|-
| -
|
|-
| 022
|
|-
| o
|
|-
| -
|
|-
| 025
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 028
|
! rowspan="6" |
RX 300
|-
| o
|
|-
| -
|
|-
| 031
|
|-
| o
|
|-
| -
|
|-
| 034
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 037
|
| rowspan="3" |
Switch
|-
| o
|
|-
| -
|
|-
| 040
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 043
|
| rowspan="3" |
[[dicke Berta]]
|-
| o
|
|-
| -
|
|-
| 046
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 049
|
| rowspan="3" |
[[fette Elke]]
|-
| o
|
|-
| -
|
|-
| 052
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 055
|
| rowspan="3" |
[[mollige Dörte]]
|-
| o
|
|-
| -
|
|-
| 058
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 061
|
| rowspan="3" |
<s>Switch</s>
|-
| o
|
|-
| -
|
|-
| 064
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 067
|
| rowspan="3" |
IBM X3550<br /><small>(vergleichbar [[dicke Berta]])</small>
|-
| o
|
|-
| -
|
|-
| 070
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 073
|
| rowspan="3" |
HP DL160 G6<br /><small>(vergleichbar [[mollige Dörte]])</small>
|-
| o
|
|-
| -
|
|-
| 076
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 079
|
| rowspan="6" |
<s>Lenovo<br /><small>(in Anlehnung an [[dicke Berta]])</small></s>
|-
| o
|
|-
| -
|
|-
| 082
|
|-
| o
|
|-
| -
|
|-
| 085
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 088
|
| rowspan="6" |
<s>Lenovo<br /><small>(in Anlehnung an [[dicke Berta]])</small></s>
|-
| o
|
|-
| -
|
|-
| 091
|
|-
| o
|
|-
| -
|
|-
| 094
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 097
|
| rowspan="3" |
<s>Switch</s>
|-
| o
|
|-
| -
|
|-
| 100
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
|}
=== Konzept Belegung vom Serverschrank Sommer 2017 ===
Achtung!
Die Tabelle stellt noch nicht die Realität dar.
Die Tabelle muss noch bearbeitet werden!
{| class="wikitable"
|-
|+ großer Serverschrank (32? Höheneinheiten)
|-
! Höhe
! Ist
! Soll
|-
| 001
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 004
|
! rowspan="3" |
[[Switch]] [[Cisco SG200#Cisco SG200-50 | Cisco SG200-50]]
|-
| o
|
|-
| -
|
|-
| 007
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 010
|
! rowspan="3" |
[[Switch]] [[Cisco SRW20#Cisco SRW2048 | Cisco SRW2048]]
|-
| o
|
|-
| -
|
|-
| 013
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 017
|
! rowspan="6" |
[[Server/srs5100]]
|-
| o
|
|-
| -
|
|-
| 020
|
|-
| o
|
|-
| -
|
|-
| 023
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 026
|
! rowspan="6" |
[[Server/srs3008]]
|-
| o
|
|-
| -
|
|-
| 029
|
|-
| o
|
|-
| -
|
|-
| 032
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 035
|
! rowspan="6" |
[[Server/srs3006]]
|-
| o
|
|-
| -
|
|-
| 038
|
|-
| o
|
|-
| -
|
|-
| 041
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 044
|
! rowspan="6" |
[[Server/srs3005]]
|-
| o
|
|-
| -
|
|-
| 047
|
|-
| o
|
|-
| -
|
|-
| 050
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 044
|
! rowspan="3" |
[[Switch]] [[Cisco SG200#Cisco SG200-26 | Cisco SG200-26]]
|-
| o
|
|-
| -
|
|-
| 047
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 050
|
! rowspan="3" |
[[Switch]] [[Cisco SRW20#Cisco SRW2024 | Cisco SRW2024]]
|-
| o
|
|-
| -
|
|-
| 053
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 056
|
! rowspan="3" |
[[mollige Dörte]]
|-
| o
|
|-
| -
|
|-
| 059
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 062
|
! rowspan="3" |
[[fette Elke]]
|-
| o
|
|-
| -
|
|-
| 065
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 068
|
! rowspan="3" |
[[dicke Berta]]
|-
| o
|
|-
| -
|
|-
| 071
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 074
|
| rowspan="3" |
HP DL160 G6<br /><small>(vergleichbar [[mollige Dörte]])<br />known as ''nax''</small>
|-
| o
|
|-
| -
|
|-
| 077
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 080
|
| rowspan="3" |
IBM X3550<br /><small>(vergleichbar [[dicke Berta]])<br />known as ''nox''</small>
|-
| o
|
|-
| -
|
|-
| 083
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
| 086
|
| rowspan="3" |
<s>Switch<br /><small>unknown</small></s>
|-
| o
|
|-
| -
|
|-
| 089
|
| rowspan="6" |
<s>Lenovo<br /><small>(in Anlehnung an [[dicke Berta]])<br />unknown</small></s>
|-
| o
|
|-
| -
|
|-
| 092
|
|-
| o
|
|-
| -
|
|-
| 095
|
| rowspan="6" |
<s>Lenovo<br /><small>(in Anlehnung an [[dicke Berta]])<br />unknown</small></s>
|-
| o
|
|-
| -
|
|-
| 098
|
|-
| o
|
|-
| -
|
|-
| 101
|
| rowspan="3" |
----
|-
| o
|
|-
| -
|
|-
|}
== gescheitertes ==
==== Umzug von [[Server/Jails/SRS1]] Juni 2017 ====
<pre>
add jails
---------
* database
** 141.56.50.191
* semaphore
** 141.56.50.190
* git
** 141.56.50.192
* website
** 141.56.50.195
add storage
-----------
* /lega/storage/git/repos/ansible
* /lega/storage/semaphore/ansible
mount Storage
-------------
* git /lega/storage/git/repos /media/repos  # XXX geht nicht
* semaphore /mnt/lega/jails/git/media/repos/ansible /media/repos read-only
* semaphore /lega/storage/semaphore/ansible /media/playbooks
Installationen
--------------
semaphore
* semaphore
* mariadb100-client
database
* mariadb100-server
git
* git
* neovim
Konfiguration
-------------
database:mariadb100-server
sysrc mysql_enable="YES"
'/usr/local/bin/mysqladmin' -u root password 'passwd'
mysql -u root -p
$ create database semaphore;
$ create user 'semaphore'@'141.56.50.190' identified by 'passwd';
$ grant all on semaphore.* to 'semaphore'@'141.56.50.190';
$ exit
website:ssh-access
mv semaphore.pub /root/.ssh/authorized_keys
$EDITOR /etc/ssh/sshd_config
PermitRootLogin without-password
service sshd onestart
semaphore:maraidb100 test
mysql -u semaphore -p -h 141.56.50.191 semaphore
semaphore:ssh-access test
ssh -i /root/.ssh/semaphore root@141.56.50.181
semaphore:semaphore setup
sysrc semaphore_enable="YES"
semaphore -setup
1. Set up configuration for a MySQL/MariaDB database
2. Set up a path for your playbooks (auto-created)
3. Run database Migrations
4. Set up initial seamphore user & password
> DB Hostname (default 127.0.0.1:3306): 141.56.50.191:3306
> DB User (default root): semaphore
> DB Password: passwd
> DB Name (default semaphore):
> Playbook path: /media/playbooks
Generated configuration:
{
        "mysql": {
                "host": "141.56.50.191:3306",
                "user": "semaphore",
                "pass": "passwd",
                "name": "semaphore"
        },
        "port": "",
        "bugsnag_key": "",
        "tmp_path": "/media/playbooks",
        "cookie_hash": "3tVjUpe+RbRU4uBDtcpFZN/m8a3yh2q81pvTNGRoNL8=",
        "cookie_encryption": "g881D/r7T8aa8Q0tgKPm00kiFVj5oi/q0loJgYoN2Co="
}
> Is this correct? (yes/no): yes
Running: mkdir -p /media/playbooks..
Configuration written to /media/playbooks/semaphore_config.json..
Pinging database..
Running DB Migrations..
Creating migrations table
Executing migration v0.0.0 (at 2017-05-06 13:02:41.78052655 +0200 CEST)...
[11/11]
Executing migration v1.0.0 (at 2017-05-06 13:02:42.992311998 +0200 CEST)...
[7/7]
Executing migration v1.1.0 (at 2017-05-06 13:02:44.672359519 +0200 CEST)...
[1/1]
Executing migration v1.2.0 (at 2017-05-06 13:02:44.92682468 +0200 CEST)...
[1/1]
Executing migration v1.3.0 (at 2017-05-06 13:02:45.041572311 +0200 CEST)...
[3/3]
Executing migration v1.4.0 (at 2017-05-06 13:02:45.694122748 +0200 CEST)...
[2/2]
Executing migration v1.5.0 (at 2017-05-06 13:02:46.42319397 +0200 CEST)...
[1/1]
Executing migration v0.1.0 (at 2017-05-06 13:02:46.551490497 +0200 CEST)...
[6/6]
Executing migration v1.6.0 (at 2017-05-06 13:02:46.804356224 +0200 CEST)...
[4/4]
Executing migration v1.7.0 (at 2017-05-06 13:02:47.39476158 +0200 CEST)...
[1/1]
Executing migration v1.8.0 (at 2017-05-06 13:02:47.545875504 +0200 CEST)...
[2/2]
Executing migration v1.9.0 (at 2017-05-06 13:02:47.69541287 +0200 CEST)...
[2/2]
> Username: root
> Email: semaphore@stura.htw-dresden.de
> Your name: StuRa HTW Dresden
> Password: passwd
cp /media/playbooks/semaphore_config.json /usr/local/etc/semaphore/semaphore_config.json
semaphore:ssh-keygen
ssh-keygen -t ed25519
Generating public/private ed25519 key pair.
Enter file in which to save the key (/root/.ssh/id_ed25519): /root/.ssh/semaphore
Created directory '/root/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/semaphore.
Your public key has been saved in /root/.ssh/semaphore.pub.
The key fingerprint is:
SHA256:pfwPuz8FVoC5xY0NqbaeP7IhjVizjJEID8riFy6lHvk root@semaphore
The key's randomart image is:
+--[ED25519 256]--+
|          +oB  |
|          o = +  |
|  o      .+ .  |
|.. + . o o+ o    |
|o. oo o S. o .  |
|o = .  * *.  .  |
| * o  o =.=. .  |
|. =      .+=o    |
| . E      +*+o  |
+----[SHA256]-----+
semaphore:ansible roles
ansible-galaxy NetworkManager/
git:git init --bare
cd  /media/repos/ansible/
git init --bare website.git
git:create playbooks
cd /tmp
git clone /media/repos/ansible/website.git
cd website
git config --global user.email "semaphore@stura.htw-dresden.de"
git config --global user.name "Administration Rechentechnik"
......
plone upgrade
-------------
1. srs3008
zfs create comp/migration
2. elke
/etc/rc.d/jail stop srs1
zfs snapshot -r primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20
/etc/rc.d/jail start srs1
zfs send primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20 | ssh root@141.56.50.128 zfs recv comp/migration/srs1
3. srs3008
zfs create -p comp/storage/website/plone/var/blobstorage
zfs create -p comp/storage/website/plone/var/filestorage
rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/filestorage/ /mnt/comp/storage/website/plone/var/filestorage/
rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/blobstorage/ /mnt/comp/storage/website/plone/var/blobstorage/
chown -R www:www /mnt/comp/storage/website/plone/var
zfs snapshot -r comp/storage/website/plone@AFTER_MIGRATION
4. srs3008/website
pkg install python2 sudo
adduser
Username: ansible
Full name:
Uid (Leave empty for default):
Login group [ansible]:
Login group is foo. Invite foo into other groups? []:
Login class [default]:
Shell (sh csh tcsh git-shell nologin) [sh]:
Home directory [/home/ansible]:
Home directory permissions (Leave empty for default):
Use password-based authentication? [yes]:
Use an empty password? (yes/no) [no]:
Use a random password? (yes/no) [no]: yes
Lock out the account after creation? [no]:
Username  : ansible
Password  : <random>
Full Name  :
Uid        : 1001
Class      :
Groups    : ansible
Home      : /home/ansible
Home Mode  :
Shell      : /bin/sh
Locked    : no
OK? (yes/no): yes
su ansible
cd; mkdir .ssh
echo 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN3eeZ3Wcxn9ixD039fSFNg2zpJ09YY45XKb3KMST8Da root@semaphore' > .ssh/authorized_keys
exit
vi /usr/local/etc/sudoers
ansible ALL=(ALL) NOPASSWD: ALL
service sshd onestart
5. browser
5.1. http://141.56.50.190:3000/project/1/templates
5.1.1. Anpassung Inventory plone
plone_neu ansible_host=141.56.50.195
myhost ansible_host=141.56.50.128  ansible_ssh_user=root
5.1.2. Anpassung Enviroment
"stura_nginx_server_name":"plone.htw.stura-dresden.de",
"myhost_tank":"comp"
5.1.3. run main
5.2. http://141.56.50.128/ > Jails -> Storage
5.2.1 Add Storage
Jail SRC DEST READ-ONLY CREATE DIRECTORY MOUNTED
website /mnt/comp/storage/website/plone/var/blobstorage /usr/local/www/website/var/blobstorage no no yes
website /mnt/comp/storage/website/plone/var/filestorage /usr/local/www/website/var/filestorage no no yes
6. srs3008/website
service zope213 start
7. browser
7.1. http://plone.htw.stura-dresden.de:8080/Plone/@@plone-upgrade
7.2. http://141.56.50.190:3000/project/1/templates
7.2.1 Anpassung Enviroment
"stura_nginx_server_name":"www.stura.htw-dresden.de",
7.2.2 run main
7.3. http://141.56.50.128/ > Jails
7.3.1. stoppe jail website
8. Elke
/etc/rc.d/jail stop srs1
TODO Ist die IP adresse weg vom interface?
9. browser
9.1. http://141.56.50.128/ > Jails
9.1.2. edit jail
IPv4 address: 141.56.50.1
9.1.3. starte jail website
</pre>
== Umzug zum Bereich an Adressen für IPv4 141.56.51.0/24 ==
<code>nmap -sV -Pn 141.56.50.1-254</code>
<!--
<pre>
Starting Nmap 6.47 ( http://nmap.org ) at 2018-08-28 13:18 CEST
Nmap scan report for srs1.stura.htw-dresden.de (141.56.50.1)
Host is up (0.00021s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE  VERSION
80/tcp  open  http    Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd)
443/tcp  open  ssl/http Zope httpd 2.13.24 (python 2.7.9, freebsd9; ZServer/1.1)
8080/tcp open  http    Zope httpd 2.13.24 (python 2.7.9, freebsd9; ZServer/1.1)
Nmap scan report for srs2.stura.htw-dresden.de (141.56.50.2)
Host is up (0.00023s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  ssh    OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
8080/tcp open  ssh    OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
Nmap scan report for srs3.stura.htw-dresden.de (141.56.50.3)
Host is up (0.00025s latency).
Not shown: 989 closed ports
PORT    STATE SERVICE      VERSION
22/tcp  open  ssh          OpenSSH 7.4 (protocol 2.0)
80/tcp  open  http        Apache httpd 2.4.6 ((CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3.4 Python/2.7.5)
88/tcp  open  kerberos-sec MIT Kerberos (server time: 2018-08-28 11:50:41Z)
111/tcp  open  rpcbind      2-4 (RPC #100000)
389/tcp  open  ldap        (Anonymous bind OK)
443/tcp  open  https        Apache/2.4.6 (CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3
464/tcp  open  kpasswd5?
636/tcp  open  ssl/ldap    (Anonymous bind OK)
749/tcp  open  rpcbind
8080/tcp open  http        Apache Tomcat/Coyote JSP engine 1.1
8443/tcp open  https-alt?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port8443-TCP:V=6.47%I=7%D=8/28%Time=5B853621%P=x86_64-pc-linux-gnu%r(SS
SF:LSessionReq,7,"\x15\x03\x01\0\x02\x02\(");
Service Info: Host: STURA.HTW-DRESDEN.DE
Nmap scan report for 141.56.50.4
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.4 are filtered
Nmap scan report for 141.56.50.5
Host is up (0.00025s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    Apache httpd 2.4.25 ((FreeBSD) PHP/5.6.29)
3306/tcp open  mysql  MySQL (unauthorized)
Nmap scan report for 141.56.50.6
Host is up (0.00030s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
22/tcp  open  ssh    (protocol 2.0)
5900/tcp open  vnc    VNC (protocol 3.7)
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port22-TCP:V=6.47%I=7%D=8/28%Time=5B85360D%P=x86_64-pc-linux-gnu%r(NULL
SF:,29,"SSH-2\.0-OpenSSH_7\.2p2\x20Ubuntu-4ubuntu2\.4\r\n");
Nmap scan report for 141.56.50.7
Host is up (0.00050s latency).
Not shown: 991 closed ports
PORT    STATE SERVICE    VERSION
25/tcp  open  smtp      Canon imageRUNNER C5185 smtpd
80/tcp  open  ipp        Canon printer http config 2.21
515/tcp  open  printer?
631/tcp  open  ipp        Canon printer http config 2.21
8000/tcp open  http      Catwalk 1.3.1 (Canon imageRUNNER C5000-series printer http config)
9002/tcp open  dynamid?
9010/tcp open  sdr?
9011/tcp open  unknown
9100/tcp open  jetdirect?
Service Info: Device: printer; CPE: cpe:/h:canon:imagerunner_c5185, cpe:/h:canon:imagerunner_c5000
Nmap scan report for srs8.stura.htw-dresden.de (141.56.50.8)
Host is up (3.0s latency).
All 1000 scanned ports on srs8.stura.htw-dresden.de (141.56.50.8) are filtered
Nmap scan report for srs9.stura.htw-dresden.de (141.56.50.9)
Host is up (0.00044s latency).
Not shown: 989 closed ports
PORT    STATE SERVICE        VERSION
22/tcp  open  ssh            OpenSSH 7.4 (protocol 2.0)
25/tcp  open  smtp          Postfix smtpd
53/tcp  open  domain        dnsmasq 2.76
80/tcp  open  http          Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16)
143/tcp  open  imap          Dovecot imapd
443/tcp  open  ssl/http      Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16)
465/tcp  open  ssl/smtp      Postfix smtpd
587/tcp  open  smtp          Postfix smtpd
993/tcp  open  ssl/imap      Dovecot imapd
5222/tcp open  jabber        ejabberd (Protocol 1.0)
5280/tcp open  ssl/xmpp-bosh?
Service Info: Hosts:  mail.stura-dresden.de, stura-dresden.de
Nmap scan report for srs2342.stura.htw-dresden.de (141.56.50.10)
Host is up (2.9s latency).
All 1000 scanned ports on srs2342.stura.htw-dresden.de (141.56.50.10) are filtered
Nmap scan report for srsw1.stura.htw-dresden.de (141.56.50.11)
Host is up (0.019s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE        VERSION
80/tcp  open  http            Web Server
4242/tcp open  vrml-multi-use?
Nmap scan report for srs1337.stura.htw-dresden.de (141.56.50.12)
Host is up (0.00018s latency).
All 1000 scanned ports on srs1337.stura.htw-dresden.de (141.56.50.12) are closed
Nmap scan report for srs13.stura.htw-dresden.de (141.56.50.13)
Host is up (0.00016s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE  VERSION
25/tcp  open  smtp    Sendmail 8.14.9/8.14.9
80/tcp  open  http    Apache httpd
443/tcp  open  ssl/http Apache httpd
587/tcp  open  smtp    Sendmail 8.14.9/8.14.9
3306/tcp open  mysql    MySQL (unauthorized)
Service Info: Host: localhost.localdomain; OS: Unix
Nmap scan report for srs14.stura.htw-dresden.de (141.56.50.14)
Host is up (0.00018s latency).
Not shown: 998 closed ports
PORT  STATE SERVICE VERSION
25/tcp open  smtp    Postfix smtpd
80/tcp open  http    Apache httpd 2.4.29 ((FreeBSD))
Service Info: Host:  mail.stura.htw-dresden.de
Nmap scan report for srs15.stura.htw-dresden.de (141.56.50.15)
Host is up (0.00023s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE  VERSION
25/tcp  open  smtp    Sendmail 8.14.9/8.14.9
80/tcp  open  http    Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd Phusion_Passenger/5.0.30 mod_fastcgi/mod_fastcgi-SNAP-0910052141)
443/tcp  open  ssl/http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd Phusion_Passenger/5.0.30 mod_fastcgi/mod_fastcgi-SNAP-0910052141)
587/tcp  open  smtp    Sendmail 8.14.9/8.14.9
3306/tcp open  mysql    MySQL (unauthorized)
Service Info: Host: localhost.localdomain; OS: Unix
Nmap scan report for srs16.stura.htw-dresden.de (141.56.50.16)
Host is up (0.00024s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
25/tcp  open  smtp    Sendmail 8.14.9/8.14.9
80/tcp  open  http    Apache httpd 2.4.10 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.5.16)
443/tcp open  ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.5.16)
587/tcp open  smtp    Sendmail 8.14.9/8.14.9
Service Info: Host: localhost.localdomain; OSs: FreeBSD, Unix; CPE: cpe:/o:freebsd:freebsd
Nmap scan report for srs17.stura.htw-dresden.de (141.56.50.17)
Host is up (0.00026s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE  VERSION
80/tcp  open  http    Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2h PHP/5.5.16)
443/tcp open  ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2h PHP/5.5.16)
Nmap scan report for srs18.stura.htw-dresden.de (141.56.50.18)
Host is up (0.00026s latency).
Not shown: 999 closed ports
PORT  STATE SERVICE VERSION
80/tcp open  http    nginx 1.10.2
Nmap scan report for srs19.stura.htw-dresden.de (141.56.50.19)
Host is up (0.00025s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
80/tcp  open  http    Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2d PHP/5.5.16)
443/tcp open  ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2d PHP/5.5.16)
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
Nmap scan report for srs20.stura.htw-dresden.de (141.56.50.20)
Host is up (0.00024s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE  VERSION
25/tcp  open  smtp    Sendmail 8.14.9/8.14.9
80/tcp  open  http    Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.24)
443/tcp  open  ssl/http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.24)
587/tcp  open  smtp    Sendmail 8.14.9/8.14.9
3306/tcp open  mysql    MySQL (unauthorized)
Service Info: Host: localhost.localdomain; OS: Unix
Nmap scan report for 141.56.50.21
Host is up (0.00018s latency).
All 1000 scanned ports on 141.56.50.21 are closed
Nmap scan report for 141.56.50.22
Host is up (0.00017s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE    VERSION
80/tcp  open  http      nginx 1.10.2
443/tcp  open  http      nginx 1.10.2
9000/tcp open  tcpwrapped
Nmap scan report for 141.56.50.23
Host is up (0.00022s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    nginx 1.10.2
443/tcp open  http    nginx 1.10.2
Nmap scan report for 141.56.50.24
Host is up (0.00017s latency).
Not shown: 996 closed ports
PORT    STATE SERVICE VERSION
25/tcp  open  smtp    Postfix smtpd
26/tcp  open  smtp    Postfix smtpd
80/tcp  open  http    nginx 1.10.2
443/tcp open  http    nginx 1.10.2
Service Info: Host:  mail.kss-sachsen.de
Nmap scan report for srs25.stura.htw-dresden.de (141.56.50.25)
Host is up (2.8s latency).
All 1000 scanned ports on srs25.stura.htw-dresden.de (141.56.50.25) are filtered
Nmap scan report for 141.56.50.26
Host is up (0.00018s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    nginx 1.10.2
443/tcp open  http    nginx 1.10.2
Nmap scan report for srs27.stura.htw-dresden.de (141.56.50.27)
Host is up (0.00028s latency).
Not shown: 999 closed ports
PORT  STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.25 ((FreeBSD))
Nmap scan report for srs28.stura.htw-dresden.de (141.56.50.28)
Host is up (2.6s latency).
All 1000 scanned ports on srs28.stura.htw-dresden.de (141.56.50.28) are filtered
Nmap scan report for srs29.stura.htw-dresden.de (141.56.50.29)
Host is up (0.00083s latency).
Not shown: 987 filtered ports
PORT      STATE  SERVICE          VERSION
22/tcp    open  ssh              OpenSSH 6.7p1 Debian 5+deb8u2 (protocol 2.0)
25/tcp    open  smtp            Postfix smtpd
53/tcp    open  domain
80/tcp    open  http            Apache httpd 2.4.10 ((Debian))
110/tcp  open  pop3            Dovecot pop3d
143/tcp  open  imap            Dovecot imapd
443/tcp  open  http            Apache httpd 2.4.10 ((Debian))
587/tcp  open  smtp            Postfix smtpd
993/tcp  open  ssl/imap        Dovecot imapd
995/tcp  open  ssl/pop3        Dovecot pop3d
8080/tcp  open  http            Apache httpd 2.4.10 ((Debian))
8081/tcp  open  http            Apache httpd 2.4.10 ((Debian))
10000/tcp closed snet-sensor-mgmt
Service Info: Host:  srs29.stura.htw-dresden.de; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.50.30
Host is up (0.00022s latency).
Not shown: 996 closed ports
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
80/tcp  open  http    Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.26)
443/tcp  open  ssl/http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.26)
3306/tcp open  mysql    MySQL (unauthorized)
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
Nmap scan report for 141.56.50.31
Host is up (0.00018s latency).
All 1000 scanned ports on 141.56.50.31 are closed
Nmap scan report for 141.56.50.32
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.32 are filtered
Nmap scan report for 141.56.50.33
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.33 are filtered
Nmap scan report for 141.56.50.34
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.34 are filtered
Nmap scan report for 141.56.50.35
Host is up (0.00049s latency).
Not shown: 999 filtered ports
PORT    STATE SERVICE        VERSION
3389/tcp open  ms-wbt-server?
Nmap scan report for 141.56.50.36
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.36 are filtered
Nmap scan report for 141.56.50.37
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.37 are filtered
Nmap scan report for 141.56.50.38
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.38 are filtered
Nmap scan report for 141.56.50.39
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.39 are filtered
Nmap scan report for 141.56.50.40
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.40 are filtered
Nmap scan report for 141.56.50.41
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.41 are filtered
Nmap scan report for 141.56.50.42
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.42 are filtered
Nmap scan report for 141.56.50.43
Host is up (0.061s latency).
All 1000 scanned ports on 141.56.50.43 are filtered
Nmap scan report for 141.56.50.44
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.44 are filtered
Nmap scan report for 141.56.50.45
Host is up (0.044s latency).
All 1000 scanned ports on 141.56.50.45 are filtered
Nmap scan report for 141.56.50.46
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.46 are filtered
Nmap scan report for 141.56.50.47
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.47 are filtered
Nmap scan report for 141.56.50.48
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.48 are filtered
Nmap scan report for 141.56.50.49
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.49 are filtered
Nmap scan report for 141.56.50.50
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.50 are filtered
Nmap scan report for rbuch2.rz.htw-dresden.de (141.56.50.51)
Host is up (3.0s latency).
All 1000 scanned ports on rbuch2.rz.htw-dresden.de (141.56.50.51) are filtered
Nmap scan report for 141.56.50.52
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.52 are filtered
Nmap scan report for 141.56.50.53
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.53 are filtered
Nmap scan report for 141.56.50.54
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.54 are filtered
Nmap scan report for 141.56.50.55
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.55 are filtered
Nmap scan report for 141.56.50.56
Host is up (2.0s latency).
Not shown: 997 filtered ports
PORT    STATE SERVICE      VERSION
135/tcp open  msrpc?
139/tcp open  netbios-ssn?
445/tcp open  microsoft-ds?
Nmap scan report for 141.56.50.57
Host is up (0.00019s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    nginx
6000/tcp open  X11?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port6000-TCP:V=6.47%I=7%D=8/28%Time=5B85362C%P=x86_64-pc-linux-gnu%r(HT
SF:TPOptions,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text
SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20Fri,\x202
SF:0\x20Jul\x202018\x2018:37:55\x20GMT\r\nServer:\x20Python/3\.6\x20aiohtt
SF:p/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(X11Probe,AA,"HTTP/1\.0\x20400
SF:\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nC
SF:ontent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:37:55\
SF:x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Reque
SF:st")%r(GetRequest,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:
SF:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20F
SF:ri,\x2020\x20Jul\x202018\x2018:38:00\x20GMT\r\nServer:\x20Python/3\.6\x
SF:20aiohttp/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(RTSPRequest,B6,"HTTP/
SF:1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset
SF:=utf-8\r\nContent-Length:\x2023\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x
SF:2018:38:00\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\ni
SF:nvalid\x20constant\x20string")%r(RPCCheck,AA,"HTTP/1\.0\x20400\x20Bad\x
SF:20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le
SF:ngth:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:38:03\x20GMT\r\
SF:nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DN
SF:SVersionBindReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\r\nDate:\x20Fr
SF:i,\x2020\x20Jul\x202018\x2018:38:05\x20GMT\r\nServer:\x20Python/3\.6\x2
SF:0aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DNSStatusRequest,AA,"HTTP/1\
SF:.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=u
SF:tf-8\r\nContent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x20
SF:18:38:08\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad
SF:\x20Request")%r(SSLSessionReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\
SF:nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\
SF:r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:38:14\x20GMT\r\nServer:\x20
SF:Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request");
Nmap scan report for 141.56.50.58
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.58 are filtered
Nmap scan report for 141.56.50.59
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.59 are filtered
Nmap scan report for 141.56.50.60
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.60 are filtered
Nmap scan report for 141.56.50.61
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.61 are filtered
Nmap scan report for 141.56.50.62
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.62 are filtered
Nmap scan report for 141.56.50.63
Host is up (1.1s latency).
All 1000 scanned ports on 141.56.50.63 are filtered
Nmap scan report for 141.56.50.64
Host is up (0.019s latency).
All 1000 scanned ports on 141.56.50.64 are filtered
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
Nmap scan report for 141.56.50.65
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.65 are filtered
Nmap scan report for 141.56.50.66
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.66 are filtered
Nmap scan report for 141.56.50.67
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.67 are filtered
Nmap scan report for 141.56.50.68
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.68 are filtered
Nmap scan report for 141.56.50.69
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.69 are filtered
Nmap scan report for 141.56.50.70
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.70 are filtered
Nmap scan report for 141.56.50.71
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.71 are filtered
Nmap scan report for 141.56.50.72
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.72 are filtered
Nmap scan report for 141.56.50.73
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.73 are filtered
Nmap scan report for 141.56.50.74
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.74 are filtered
Nmap scan report for 141.56.50.75
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.75 are filtered
Nmap scan report for 141.56.50.76
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.76 are filtered
Nmap scan report for 141.56.50.77
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.77 are filtered
Nmap scan report for 141.56.50.78
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.78 are filtered
Nmap scan report for 141.56.50.79
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.79 are filtered
Nmap scan report for 141.56.50.80
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.80 are filtered
Nmap scan report for 141.56.50.81
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.81 are filtered
Nmap scan report for 141.56.50.82
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.82 are filtered
Nmap scan report for 141.56.50.83
Host is up (0.00034s latency).
Not shown: 993 filtered ports
PORT    STATE SERVICE      VERSION
22/tcp  open  ssh          OpenSSH 7.4 (protocol 2.0)
80/tcp  open  http        Apache httpd 2.4.6 ((CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3.4 Python/2.7.5)
88/tcp  open  kerberos-sec MIT Kerberos (server time: 2018-08-28 12:03:39Z)
389/tcp open  ldap        (Anonymous bind OK)
443/tcp open  https        Apache/2.4.6 (CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3
464/tcp open  kerberos-sec MIT Kerberos (server time: 2018-08-28 12:03:39Z)
636/tcp open  ssl/ldap    (Anonymous bind OK)
Service Info: Host: STURA-DRESDEN.DE
Nmap scan report for 141.56.50.84
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.84 are filtered
Nmap scan report for 141.56.50.85
Host is up (1.4s latency).
All 1000 scanned ports on 141.56.50.85 are filtered
Nmap scan report for 141.56.50.86
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.86 are filtered
Nmap scan report for 141.56.50.87
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.87 are filtered
Nmap scan report for 141.56.50.88
Host is up.
All 1000 scanned ports on 141.56.50.88 are filtered
Nmap scan report for 141.56.50.89
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.89 are filtered
Nmap scan report for 141.56.50.90
Host is up (0.00029s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE VERSION
25/tcp  open  smtp    Sendmail 8.14.5/8.14.5
80/tcp  open  http    Apache httpd 2.2.27 ((FreeBSD) PHP/5.4.27 mod_ssl/2.2.27 OpenSSL/0.9.8q DAV/2)
3306/tcp open  mysql  MySQL (unauthorized)
Service Info: Host: lrs0x016a.kss-sachsen.de; OS: Unix
Nmap scan report for 141.56.50.91
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.91 are filtered
Nmap scan report for 141.56.50.92
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.92 are filtered
Nmap scan report for 141.56.50.93
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.93 are filtered
Nmap scan report for 141.56.50.94
Host is up (0.00024s latency).
All 1000 scanned ports on 141.56.50.94 are closed
Nmap scan report for 141.56.50.95
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.95 are filtered
Nmap scan report for 141.56.50.96
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.96 are filtered
Nmap scan report for 141.56.50.97
Host is up (1.3s latency).
All 1000 scanned ports on 141.56.50.97 are filtered
Nmap scan report for 141.56.50.98
Host is up (0.12s latency).
All 1000 scanned ports on 141.56.50.98 are filtered
Nmap scan report for 141.56.50.99
Host is up (1.4s latency).
All 1000 scanned ports on 141.56.50.99 are filtered
Nmap scan report for 141.56.50.100
Host is up (2.2s latency).
All 1000 scanned ports on 141.56.50.100 are filtered
Nmap scan report for raar1.rz.htw-dresden.de (141.56.50.101)
Host is up (2.6s latency).
All 1000 scanned ports on raar1.rz.htw-dresden.de (141.56.50.101) are filtered
Nmap scan report for 141.56.50.102
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.102 are filtered
Nmap scan report for 141.56.50.103
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.103 are filtered
Nmap scan report for 141.56.50.104
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.104 are filtered
Nmap scan report for 141.56.50.105
Host is up (2.1s latency).
All 1000 scanned ports on 141.56.50.105 are filtered
Nmap scan report for 141.56.50.106
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.106 are filtered
Nmap scan report for 141.56.50.107
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.107 are filtered
Nmap scan report for 141.56.50.108
Host is up (0.0048s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    GoAhead-Webs httpd
443/tcp open  https  GoAhead-Webs
Nmap scan report for 141.56.50.109
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.109 are filtered
Nmap scan report for 141.56.50.110
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.110 are filtered
Nmap scan report for 141.56.50.111
Host is up (0.0031s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE VERSION
22/tcp  open  ssh    OpenSSH 4.2 (protocol 2.0)
80/tcp  open  http?
427/tcp  open  svrloc?
443/tcp  open  https?
5988/tcp open  http    sfcHttpd (SuperMicro IPMI Small Footprint CIM Broker)
Nmap scan report for 141.56.50.112
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.112 are filtered
Nmap scan report for 141.56.50.113
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.113 are filtered
Nmap scan report for 141.56.50.114
Host is up (0.14s latency).
All 1000 scanned ports on 141.56.50.114 are filtered
Nmap scan report for 141.56.50.115
Host is up (0.14s latency).
All 1000 scanned ports on 141.56.50.115 are filtered
Nmap scan report for 141.56.50.116
Host is up (0.00095s latency).
Not shown: 997 filtered ports
PORT    STATE SERVICE    VERSION
22/tcp  open  tcpwrapped
80/tcp  open  http?
443/tcp open  ssl/https?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853918%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,3AA,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate:\x20Di
SF:gest\x20realm=\"iRMC\x20S2@srs3006\",\x20qop=\"auth\",\x20nonce=\"15603
SF:e9b-00001550\",\x20opaque=\"1550\",\x20stale=\"FALSE\"\x20\r\nConnectio
SF:n:\x20close\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nCon
SF:tent-Type:\x20text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n
SF:<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSI
SF:TIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<
SF:HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=
SF:EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x2
SF:0http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-
SF:equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv
SF:=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC
SF:\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerVie
SF:w\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20Server\x20Information
SF::</h2>\n\x20\x20<h1\x20style=\"color:red\"></p>401&nbsp;Unauthorized!</
SF:h1>\x20\x20<p>You\x20need\x20to\x20authenticate\x20yourself\x20with\x20
SF:a\x20valid\x20username\x20and\x20password\x20to\x20see\x20thi")%r(HTTPO
SF:ptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue,\x202
SF:8\x20Aug\x202018\x2012:04:52\x20GMT\r\nServer:\x20iRMC\x20S2\x20Webserv
SF:er\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=ut
SF:f-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Len
SF:gth:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x20404\x20Not\x2
SF:0Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:05:02\x20GMT\r\nServ
SF:er:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nContent-Type:
SF:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma
SF::\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\n<!DOCTYPE\
SF:x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN
SF:\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x2
SF:0\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8
SF:\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equi
SF:v=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Ex
SF:pires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\
SF:">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20
SF:Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20S2\x20Web\x
SF:20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:black\"></p
SF:>404&nbsp;Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B853929%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,397,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate
SF::\x20Digest\x20realm=\"iRMC\x20S2@srs3006\",\x20qop=\"auth\",\x20nonce=
SF:\"1560439d-00001551\",\x20opaque=\"1551\",\x20stale=\"FALSE\"\x20\r\nCa
SF:che-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20tex
SF:t/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20html
SF:\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x20\
SF:"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x20<m
SF:eta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x20/
SF:>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"Con
SF:tent-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expires\"
SF:>\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n\x2
SF:0\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20
SF:Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x20Ma
SF:nagement\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<
SF:h1\x20style=\"color:red\"></p>401&nbsp;Unauthorized!</h1>\x20\x20<p>You
SF:\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20use
SF:rname\x20and\x20password\x20to\x20see\x20this\x20document\.</p></BO")%r
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue
SF:,\x2028\x20Aug\x202018\x2012:05:15\x20GMT\r\nServer:\x20iRMC\x20S2\x20W
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:06:07\x20
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:
SF:black\"></p>404&nbsp;Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n
SF:");
Nmap scan report for 141.56.50.117
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.117 are filtered
Nmap scan report for 141.56.50.118
Host is up (0.0057s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 7.2p2 (protocol 2.0)
80/tcp  open  http?
443/tcp open  ssl/https?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853922%P=x86_64-pc-linux-gnu%r(HTTP
SF:Options,DE,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,POST,PUT,PATCH,DELE
SF:TE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:03:58\x20G
SF:MT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nExpires:\x20Mon,\x2027\x20A
SF:ug\x202018\x2012:03:58\x20GMT\r\nContent-Type:\x20text/html\r\nContent-
SF:Encoding:\x20\(null\)\r\n\r\n")%r(RTSPRequest,DE,"HTTP/1\.1\x20200\x20O
SF:K\r\nAllow:\x20GET,POST,PUT,PATCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,
SF:\x2028\x20Aug\x202018\x2012:04:03\x20GMT\r\nServer:\x20iRMC\x20S4\x20We
SF:bserver\r\nExpires:\x20Mon,\x2027\x20Aug\x202018\x2012:04:03\x20GMT\r\n
SF:Content-Type:\x20text/html\r\nContent-Encoding:\x20\(null\)\r\n\r\n")%r
SF:(SIPOptions,DE,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,POST,PUT,PATCH,
SF:DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:05:05\
SF:x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nExpires:\x20Mon,\x2027\
SF:x20Aug\x202018\x2012:05:05\x20GMT\r\nContent-Type:\x20text/html\r\nCont
SF:ent-Encoding:\x20\(null\)\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B85392D%P=x86_64-pc-linux-gnu
SF:%r(HTTPOptions,104,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,POST,PUT,PA
SF:TCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:04
SF::09\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-Transport-Se
SF:curity:\x20max-age=0\r\nExpires:\x20Mon,\x2027\x20Aug\x202018\x2012:04:
SF:09\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Encoding:\x20\(null\
SF:)\r\n\r\n")%r(RTSPRequest,104,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,
SF:POST,PUT,PATCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x2020
SF:18\x2012:04:14\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-T
SF:ransport-Security:\x20max-age=0\r\nExpires:\x20Mon,\x2027\x20Aug\x20201
SF:8\x2012:04:14\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Encoding:
SF:\x20\(null\)\r\n\r\n")%r(SIPOptions,104,"HTTP/1\.1\x20200\x20OK\r\nAllo
SF:w:\x20GET,POST,PUT,PATCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x2
SF:0Aug\x202018\x2012:05:16\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r
SF:\nStrict-Transport-Security:\x20max-age=0\r\nExpires:\x20Mon,\x2027\x20
SF:Aug\x202018\x2012:05:16\x20GMT\r\nContent-Type:\x20text/html\r\nContent
SF:-Encoding:\x20\(null\)\r\n\r\n");
Nmap scan report for 141.56.50.119
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.119 are filtered
Nmap scan report for 141.56.50.120
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.120 are filtered
Nmap scan report for 141.56.50.121
Host is up (0.00032s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    nginx
6000/tcp open  X11?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port6000-TCP:V=6.47%I=7%D=8/28%Time=5B853918%P=x86_64-pc-linux-gnu%r(HT
SF:TPOptions,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text
SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20Fri,\x202
SF:0\x20Jul\x202018\x2018:44:09\x20GMT\r\nServer:\x20Python/3\.6\x20aiohtt
SF:p/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(X11Probe,AA,"HTTP/1\.0\x20400
SF:\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nC
SF:ontent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:44:09\
SF:x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Reque
SF:st")%r(GetRequest,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:
SF:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20F
SF:ri,\x2020\x20Jul\x202018\x2018:44:14\x20GMT\r\nServer:\x20Python/3\.6\x
SF:20aiohttp/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(RTSPRequest,B6,"HTTP/
SF:1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset
SF:=utf-8\r\nContent-Length:\x2023\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x
SF:2018:44:14\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\ni
SF:nvalid\x20constant\x20string")%r(RPCCheck,AA,"HTTP/1\.0\x20400\x20Bad\x
SF:20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le
SF:ngth:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:44:16\x20GMT\r\
SF:nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DN
SF:SVersionBindReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\r\nDate:\x20Fr
SF:i,\x2020\x20Jul\x202018\x2018:44:19\x20GMT\r\nServer:\x20Python/3\.6\x2
SF:0aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DNSStatusRequest,AA,"HTTP/1\
SF:.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=u
SF:tf-8\r\nContent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x20
SF:18:44:21\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad
SF:\x20Request")%r(SSLSessionReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\
SF:nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\
SF:r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:44:27\x20GMT\r\nServer:\x20
SF:Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request");
Nmap scan report for 141.56.50.122
Host is up (1.9s latency).
All 1000 scanned ports on 141.56.50.122 are filtered
Nmap scan report for 141.56.50.123
Host is up (1.3s latency).
All 1000 scanned ports on 141.56.50.123 are filtered
Nmap scan report for 141.56.50.124
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.124 are filtered
Nmap scan report for 141.56.50.125
Host is up (0.12s latency).
All 1000 scanned ports on 141.56.50.125 are filtered
Nmap scan report for 141.56.50.126
Host is up (2.2s latency).
All 1000 scanned ports on 141.56.50.126 are filtered
Nmap scan report for 141.56.50.127
Host is up (0.11s latency).
All 1000 scanned ports on 141.56.50.127 are filtered
Nmap scan report for 141.56.50.128
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.128 are filtered
Nmap scan report for 141.56.50.129
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.129 are filtered
Nmap scan report for 141.56.50.130
Host is up (1.3s latency).
All 1000 scanned ports on 141.56.50.130 are filtered
Nmap scan report for 141.56.50.131
Host is up (0.00022s latency).
Not shown: 994 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
80/tcp  open  http      Apache httpd 2.4.25 ((FreeBSD) PHP/5.6.29)
135/tcp  open  msrpc      Microsoft Windows RPC
1024/tcp open  msrpc      Microsoft Windows RPC
3306/tcp open  mysql?
5432/tcp open  postgresql PostgreSQL DB
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port3306-TCP:V=6.47%I=7%D=8/28%Time=5B853F12%P=x86_64-pc-linux-gnu%r(NU
SF:LL,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allow
SF:ed\x20to\x20connect\x20to\x20this\x20MariaDB\x20server")%r(GenericLines
SF:,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed
SF:\x20to\x20connect\x20to\x20this\x20MariaDB\x20server")%r(GetRequest,4C,
SF:"H\0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20
SF:to\x20connect\x20to\x20this\x20MariaDB\x20server")%r(HTTPOptions,4C,"H\
SF:0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\
SF:x20connect\x20to\x20this\x20MariaDB\x20server")%r(RTSPRequest,4C,"H\0\0
SF:\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20
SF:connect\x20to\x20this\x20MariaDB\x20server")%r(RPCCheck,4C,"H\0\0\0\xff
SF:j\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connec
SF:t\x20to\x20this\x20MariaDB\x20server")%r(DNSVersionBindReq,4C,"H\0\0\0\
SF:xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20con
SF:nect\x20to\x20this\x20MariaDB\x20server")%r(DNSStatusRequest,4C,"H\0\0\
SF:0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20c
SF:onnect\x20to\x20this\x20MariaDB\x20server")%r(Help,4C,"H\0\0\0\xffj\x04
SF:Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20
SF:to\x20this\x20MariaDB\x20server")%r(SSLSessionReq,4C,"H\0\0\0\xffj\x04H
SF:ost\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20t
SF:o\x20this\x20MariaDB\x20server")%r(Kerberos,4C,"H\0\0\0\xffj\x04Host\x2
SF:0'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20t
SF:his\x20MariaDB\x20server")%r(SMBProgNeg,4C,"H\0\0\0\xffj\x04Host\x20'14
SF:1\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\
SF:x20MariaDB\x20server")%r(X11Probe,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\
SF:.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\x20Mar
SF:iaDB\x20server")%r(FourOhFourRequest,4C,"H\0\0\0\xffj\x04Host\x20'141\.
SF:56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\x20
SF:MariaDB\x20server")%r(LPDString,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\.5
SF:0\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\x20Maria
SF:DB\x20server");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port5432-TCP:V=6.47%I=7%D=8/28%Time=5B853F18%P=x86_64-pc-linux-gnu%r(SM
SF:BProgNeg,85,"E\0\0\0\x84SFATAL\0C0A000\0Munsupported\x20frontend\x20pro
SF:tocol\x2065363\.19778:\x20server\x20supports\x201\.0\x20to\x203\.0\0Fpo
SF:stmaster\.c\0L1986\0RProcessStartupPacket\0\0");
Service Info: OSs: FreeBSD, Windows; CPE: cpe:/o:freebsd:freebsd, cpe:/o:microsoft:windows
Nmap scan report for 141.56.50.132
Host is up (0.00031s latency).
Not shown: 995 closed ports
PORT      STATE SERVICE VERSION
21/tcp    open  ftp    vsftpd 3.0.3
22/tcp    open  ssh    OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
80/tcp    open  http    Apache httpd 2.4.23 ((FreeBSD) PHP/5.6.24)
3306/tcp  open  mysql  MySQL 5.5.5-10.0.26-MariaDB
10000/tcp open  http    MiniServ 1.800 (Webmin httpd)
Service Info: OSs: Unix, FreeBSD; CPE: cpe:/o:freebsd:freebsd
Nmap scan report for 141.56.50.133
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.133 are filtered
Nmap scan report for 141.56.50.134
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.134 are filtered
Nmap scan report for 141.56.50.135
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.135 are filtered
Nmap scan report for 141.56.50.136
Host is up (2.2s latency).
All 1000 scanned ports on 141.56.50.136 are filtered
Nmap scan report for 141.56.50.137
Host is up (0.00027s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE    VERSION
139/tcp open  netbios-ssn Samba smbd
445/tcp open  netbios-ssn Samba smbd
Nmap scan report for 141.56.50.138
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.138 are filtered
Nmap scan report for 141.56.50.139
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.139 are filtered
Nmap scan report for 141.56.50.140
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.140 are filtered
Nmap scan report for 141.56.50.141
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.141 are filtered
Nmap scan report for 141.56.50.142
Host is up (0.00027s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    Apache httpd 2.4.25 ((FreeBSD))
3306/tcp open  mysql  MySQL (unauthorized)
Nmap scan report for 141.56.50.143
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.143 are filtered
Nmap scan report for 141.56.50.144
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.144 are filtered
Nmap scan report for 141.56.50.145
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.145 are filtered
Nmap scan report for 141.56.50.146
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.146 are filtered
Nmap scan report for 141.56.50.147
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.147 are filtered
Nmap scan report for 141.56.50.148
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.148 are filtered
Nmap scan report for 141.56.50.149
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.149 are filtered
Nmap scan report for 141.56.50.150
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.150 are filtered
Nmap scan report for rwls1.rz.htw-dresden.de (141.56.50.151)
Host is up (0.00034s latency).
Not shown: 999 closed ports
PORT  STATE SERVICE VERSION
22/tcp open  ssh    OpenSSH 5.1p1 Debian 5 (protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for rwls2.rz.htw-dresden.de (141.56.50.152)
Host is up (1.9s latency).
All 1000 scanned ports on rwls2.rz.htw-dresden.de (141.56.50.152) are filtered
Nmap scan report for rwls3.rz.htw-dresden.de (141.56.50.153)
Host is up (2.8s latency).
All 1000 scanned ports on rwls3.rz.htw-dresden.de (141.56.50.153) are filtered
Nmap scan report for 141.56.50.154
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.154 are filtered
Nmap scan report for 141.56.50.155
Host is up.
All 1000 scanned ports on 141.56.50.155 are filtered
Nmap scan report for 141.56.50.156
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.156 are filtered
Nmap scan report for 141.56.50.157
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.157 are filtered
Nmap scan report for 141.56.50.158
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.158 are filtered
Nmap scan report for 141.56.50.159
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.159 are filtered
Nmap scan report for 141.56.50.160
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.160 are filtered
Nmap scan report for 141.56.50.161
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.161 are filtered
Nmap scan report for 141.56.50.162
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.162 are filtered
Nmap scan report for 141.56.50.163
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.163 are filtered
Nmap scan report for 141.56.50.164
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.164 are filtered
Nmap scan report for 141.56.50.165
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.165 are filtered
Nmap scan report for 141.56.50.166
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.166 are filtered
Nmap scan report for 141.56.50.167
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.167 are filtered
Nmap scan report for 141.56.50.168
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.168 are filtered
Nmap scan report for 141.56.50.169
Host is up (1.6s latency).
All 1000 scanned ports on 141.56.50.169 are filtered
Nmap scan report for 141.56.50.170
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.170 are filtered
Nmap scan report for 141.56.50.171
Host is up (0.010s latency).
All 1000 scanned ports on 141.56.50.171 are filtered
Nmap scan report for 141.56.50.172
Host is up (0.00027s latency).
All 1000 scanned ports on 141.56.50.172 are filtered (656) or closed (344)
Nmap scan report for 141.56.50.173
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.173 are filtered
Nmap scan report for 141.56.50.174
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.174 are filtered
Nmap scan report for 141.56.50.175
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.175 are filtered
Nmap scan report for 141.56.50.176
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.176 are filtered
Nmap scan report for 141.56.50.177
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.177 are filtered
Nmap scan report for 141.56.50.178
Host is up (0.0011s latency).
Not shown: 997 filtered ports
PORT    STATE SERVICE    VERSION
22/tcp  open  tcpwrapped
80/tcp  open  http?
443/tcp open  ssl/https?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853F18%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,3AD,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate:\x20Di
SF:gest\x20realm=\"iRMC\x20S2@iRMC945BF6\",\x20qop=\"auth\",\x20nonce=\"15
SF:6257ef-00001899\",\x20opaque=\"1899\",\x20stale=\"FALSE\"\x20\r\nConnec
SF:tion:\x20close\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n
SF:Content-Type:\x20text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\
SF:r\n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRA
SF:NSITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>
SF:\n<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"
SF:IE=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"
SF:\x20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20ht
SF:tp-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-eq
SF:uiv=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20i
SF:RMC\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>Server
SF:View\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20Server\x20Informat
SF:ion:</h2>\n\x20\x20<h1\x20style=\"color:red\"></p>401&nbsp;Unauthorized
SF:!</h1>\x20\x20<p>You\x20need\x20to\x20authenticate\x20yourself\x20with\
SF:x20a\x20valid\x20username\x20and\x20password\x20to\x20see\x20")%r(HTTPO
SF:ptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue,\x202
SF:8\x20Aug\x202018\x2012:29:16\x20GMT\r\nServer:\x20iRMC\x20S2\x20Webserv
SF:er\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=ut
SF:f-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Len
SF:gth:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x20404\x20Not\x2
SF:0Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:29:27\x20GMT\r\nServ
SF:er:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nContent-Type:
SF:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma
SF::\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\n<!DOCTYPE\
SF:x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN
SF:\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x2
SF:0\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8
SF:\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equi
SF:v=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Ex
SF:pires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\
SF:">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20
SF:Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20S2\x20Web\x
SF:20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:black\"></p
SF:>404&nbsp;Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B853F2A%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,39A,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF6\",\x20qop=\"auth\",\x20non
SF:ce=\"15625d31-00001900\",\x20opaque=\"1900\",\x20stale=\"FALSE\"\x20\r\
SF:nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20
SF:text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20h
SF:tml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x
SF:20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x2
SF:0<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x
SF:20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"
SF:Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expire
SF:s\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n
SF:\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\
SF:x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x2
SF:0Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x
SF:20<h1\x20style=\"color:red\"></p>401&nbsp;Unauthorized!</h1>\x20\x20<p>
SF:You\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20
SF:username\x20and\x20password\x20to\x20see\x20this\x20document\.</p><")%r
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue
SF:,\x2028\x20Aug\x202018\x2012:29:40\x20GMT\r\nServer:\x20iRMC\x20S2\x20W
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:30:33\x20
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:
SF:black\"></p>404&nbsp;Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n
SF:");
Nmap scan report for 141.56.50.179
Host is up (0.0010s latency).
Not shown: 997 filtered ports
PORT    STATE SERVICE    VERSION
22/tcp  open  tcpwrapped
80/tcp  open  http?
443/tcp open  ssl/https?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853F18%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,3AD,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate:\x20Di
SF:gest\x20realm=\"iRMC\x20S2@iRMC945BF8\",\x20qop=\"auth\",\x20nonce=\"15
SF:4c72ae-00001739\",\x20opaque=\"1739\",\x20stale=\"FALSE\"\x20\r\nConnec
SF:tion:\x20close\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n
SF:Content-Type:\x20text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\
SF:r\n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRA
SF:NSITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>
SF:\n<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"
SF:IE=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"
SF:\x20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20ht
SF:tp-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-eq
SF:uiv=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20i
SF:RMC\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>Server
SF:View\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20Server\x20Informat
SF:ion:</h2>\n\x20\x20<h1\x20style=\"color:red\"></p>401&nbsp;Unauthorized
SF:!</h1>\x20\x20<p>You\x20need\x20to\x20authenticate\x20yourself\x20with\
SF:x20a\x20valid\x20username\x20and\x20password\x20to\x20see\x20")%r(HTTPO
SF:ptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue,\x202
SF:8\x20Aug\x202018\x2012:29:16\x20GMT\r\nServer:\x20iRMC\x20S2\x20Webserv
SF:er\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=ut
SF:f-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Len
SF:gth:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x20404\x20Not\x2
SF:0Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:29:26\x20GMT\r\nServ
SF:er:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nContent-Type:
SF:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma
SF::\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\n<!DOCTYPE\
SF:x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN
SF:\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x2
SF:0\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8
SF:\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equi
SF:v=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Ex
SF:pires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\
SF:">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20
SF:Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20S2\x20Web\x
SF:20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:black\"></p
SF:>404&nbsp;Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B853F2A%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,39A,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF8\",\x20qop=\"auth\",\x20non
SF:ce=\"154c77f0-00001740\",\x20opaque=\"1740\",\x20stale=\"FALSE\"\x20\r\
SF:nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20
SF:text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20h
SF:tml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x
SF:20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x2
SF:0<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x
SF:20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"
SF:Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expire
SF:s\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n
SF:\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\
SF:x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x2
SF:0Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x
SF:20<h1\x20style=\"color:red\"></p>401&nbsp;Unauthorized!</h1>\x20\x20<p>
SF:You\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20
SF:username\x20and\x20password\x20to\x20see\x20this\x20document\.</p><")%r
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue
SF:,\x2028\x20Aug\x202018\x2012:29:39\x20GMT\r\nServer:\x20iRMC\x20S2\x20W
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:30:32\x20
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:
SF:black\"></p>404&nbsp;Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n
SF:");
Nmap scan report for 141.56.50.180
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.180 are filtered
Nmap scan report for 141.56.50.181
Host is up (0.00033s latency).
Not shown: 996 closed ports
PORT    STATE SERVICE        VERSION
22/tcp  open  ssh            OpenSSH 6.7p1 Debian 5+deb8u5 (protocol 2.0)
139/tcp open  netbios-ssn    Samba smbd 3.X (workgroup: SRD11)
445/tcp open  netbios-ssn    Samba smbd 3.X (workgroup: SRD11)
902/tcp open  ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.50.182
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.182 are filtered
Nmap scan report for 141.56.50.183
Host is up (0.00040s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE        VERSION
22/tcp  open  ssh            OpenSSH 6.7p1 Debian 5+deb8u4 (protocol 2.0)
902/tcp open  ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.50.184
Host is up (0.00038s latency).
Not shown: 996 closed ports
PORT    STATE SERVICE        VERSION
22/tcp  open  ssh            OpenSSH 6.7p1 Debian 5+deb8u5 (protocol 2.0)
139/tcp open  netbios-ssn    Samba smbd 3.X (workgroup: SRD14)
445/tcp open  netbios-ssn    Samba smbd 3.X (workgroup: SRD14)
902/tcp open  ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.50.185
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.185 are filtered
Nmap scan report for 141.56.50.186
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.186 are filtered
Nmap scan report for 141.56.50.187
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.187 are filtered
Nmap scan report for 141.56.50.188
Host is up (0.00031s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 7.4p1 Debian 10+deb9u3 (protocol 2.0)
111/tcp  open  rpcbind    2-4 (RPC #100000)
3128/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.50.189
Host is up (0.00017s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 7.4p1 Debian 10+deb9u3 (protocol 2.0)
111/tcp  open  rpcbind    2-4 (RPC #100000)
3128/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.50.190
Host is up (2.2s latency).
All 1000 scanned ports on 141.56.50.190 are filtered
Nmap scan report for 141.56.50.191
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.191 are filtered
Nmap scan report for 141.56.50.192
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.50.192 are filtered
Nmap scan report for 141.56.50.193
Host is up (0.00020s latency).
Not shown: 999 closed ports
PORT  STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.33 ((FreeBSD))
Nmap scan report for 141.56.50.194
Host is up (0.00028s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE VERSION
22/tcp  open  ssh    (protocol 2.0)
80/tcp  open  http    nginx 1.10.3 (Ubuntu)
443/tcp open  http    nginx 1.10.3 (Ubuntu)
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port22-TCP:V=6.47%I=7%D=8/28%Time=5B85427B%P=x86_64-pc-linux-gnu%r(NULL
SF:,29,"SSH-2\.0-OpenSSH_7\.2p2\x20Ubuntu-4ubuntu2\.4\r\n");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.50.195
Host is up (2.1s latency).
All 1000 scanned ports on 141.56.50.195 are filtered
Nmap scan report for 141.56.50.196
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.196 are filtered
Nmap scan report for 141.56.50.197
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.197 are filtered
Nmap scan report for 141.56.50.198
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.198 are filtered
Nmap scan report for 141.56.50.199
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.50.199 are filtered
Nmap scan report for 141.56.50.200
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.200 are filtered
Nmap scan report for 141.56.50.201
Host is up (0.00040s latency).
Not shown: 993 filtered ports
PORT      STATE  SERVICE    VERSION
22/tcp    open  ssh        (protocol 2.0)
443/tcp  open  ssl/https?
444/tcp  open  tcpwrapped
1000/tcp  closed cadlock
3128/tcp  closed squid-http
8080/tcp  closed http-proxy
16113/tcp open  ssl/unknown
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port22-TCP:V=6.47%I=7%D=8/28%Time=5B85427B%P=x86_64-pc-linux-gnu%r(NULL
SF:,12,"SSH-2\.0-CISCO_WLC\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B854286%P=x86_64-pc-linux-gnu
SF:%r(HTTPOptions,66,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Tue,\x2028\x20Aug
SF:\x202018\x2012:43:54\x20GMT\r\nContent-Length:\x200\r\nAllow:\x20HEAD,\
SF:x20GET,\x20OPTIONS\r\n\r\n")%r(RTSPRequest,65,"HTTP/1\.1\x20400\x20Bad\
SF:x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:43:54\x20GMT\r\n
SF:Content-Length:\x200\r\n\r\n400\x20Bad\x20Request\r\n")%r(Help,52,"HTTP
SF:/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2
SF:012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(SSLSessionReq,52,
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x2020
SF:18\x2012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(Kerberos,52,
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x2020
SF:18\x2012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(SMBProgNeg,5
SF:2,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x20
SF:2018\x2012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(FourOhFour
SF:Request,4E,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20
SF:Aug\x202018\x2012:44:14\x20GMT\r\n\r\n404\x20Not\x20Found\r\n")%r(LPDSt
SF:ring,52,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20A
SF:ug\x202018\x2012:44:14\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(SIPO
SF:ptions,65,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x2
SF:0Aug\x202018\x2012:44:19\x20GMT\r\nContent-Length:\x200\r\n\r\n400\x20B
SF:ad\x20Request\r\n")%r(oracle-tns,52,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:44:44\x20GMT\r\n\r\n400\x2
SF:0Bad\x20Request\r\n");
Nmap scan report for 141.56.50.202
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.202 are filtered
Nmap scan report for 141.56.50.203
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.203 are filtered
Nmap scan report for 141.56.50.204
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.204 are filtered
Nmap scan report for 141.56.50.205
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.205 are filtered
Nmap scan report for 141.56.50.206
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.206 are filtered
Nmap scan report for 141.56.50.207
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.207 are filtered
Nmap scan report for 141.56.50.208
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.208 are filtered
Nmap scan report for 141.56.50.209
Host is up (1.9s latency).
All 1000 scanned ports on 141.56.50.209 are filtered
Nmap scan report for 141.56.50.210
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.210 are filtered
Nmap scan report for 141.56.50.211
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.211 are filtered
Nmap scan report for 141.56.50.212
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.212 are filtered
Nmap scan report for 141.56.50.213
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.50.213 are filtered
Nmap scan report for 141.56.50.214
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.214 are filtered
Nmap scan report for 141.56.50.215
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.215 are filtered
Nmap scan report for 141.56.50.216
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.216 are filtered
Nmap scan report for 141.56.50.217
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.217 are filtered
Nmap scan report for 141.56.50.218
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.218 are filtered
Nmap scan report for 141.56.50.219
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.219 are filtered
Nmap scan report for 141.56.50.220
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.220 are filtered
Nmap scan report for 141.56.50.221
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.221 are filtered
Nmap scan report for 141.56.50.222
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.222 are filtered
Nmap scan report for 141.56.50.223
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.223 are filtered
Nmap scan report for 141.56.50.224
Host is up (2.1s latency).
All 1000 scanned ports on 141.56.50.224 are filtered
Nmap scan report for 141.56.50.225
Host is up (1.9s latency).
All 1000 scanned ports on 141.56.50.225 are filtered
Nmap scan report for 141.56.50.226
Host is up (1.6s latency).
All 1000 scanned ports on 141.56.50.226 are filtered
Nmap scan report for 141.56.50.227
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.227 are filtered
Nmap scan report for 141.56.50.228
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.228 are filtered
Nmap scan report for 141.56.50.229
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.229 are filtered
Nmap scan report for 141.56.50.230
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.230 are filtered
Nmap scan report for 141.56.50.231
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.231 are filtered
Nmap scan report for 141.56.50.232
Host is up (1.7s latency).
All 1000 scanned ports on 141.56.50.232 are filtered
Nmap scan report for 141.56.50.233
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.233 are filtered
Nmap scan report for 141.56.50.234
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.50.234 are filtered
Nmap scan report for 141.56.50.235
Host is up (2.0s latency).
All 1000 scanned ports on 141.56.50.235 are filtered
Nmap scan report for 141.56.50.236
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.236 are filtered
Nmap scan report for 141.56.50.237
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.237 are filtered
Nmap scan report for 141.56.50.238
Host is up (0.016s latency).
All 1000 scanned ports on 141.56.50.238 are filtered
Nmap scan report for 141.56.50.239
Host is up (2.1s latency).
All 1000 scanned ports on 141.56.50.239 are filtered
Nmap scan report for 141.56.50.240
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.240 are filtered
Nmap scan report for 141.56.50.241
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.241 are filtered
Nmap scan report for 141.56.50.242
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.242 are filtered
Nmap scan report for 141.56.50.243
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.243 are filtered
Nmap scan report for 141.56.50.244
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.244 are filtered
Nmap scan report for 141.56.50.245
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.245 are filtered
Nmap scan report for 141.56.50.246
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.50.246 are filtered
Nmap scan report for 141.56.50.247
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.247 are filtered
Nmap scan report for 141.56.50.248
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.50.248 are filtered
Nmap scan report for 141.56.50.249
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.249 are filtered
Nmap scan report for 141.56.50.250
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.250 are filtered
Nmap scan report for 141.56.50.251
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.251 are filtered
Nmap scan report for 141.56.50.252
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.50.252 are filtered
Nmap scan report for 141.56.50.253
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.50.253 are filtered
Nmap scan report for rou1.rz.htw-dresden.de (141.56.50.254)
Host is up (0.0013s latency).
All 1000 scanned ports on rou1.rz.htw-dresden.de (141.56.50.254) are closed
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 254 IP addresses (254 hosts up) scanned in 4895.14 seconds
</pre>
!-->
<code>nmap -sV -Pn 141.56.51.0-50</code>
<!--
<pre>
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:25 CEST
Nmap scan report for 141.56.51.0
Host is up.
All 1000 scanned ports on 141.56.51.0 are filtered
Nmap scan report for srs1.stura.htw-dresden.de (141.56.51.1)
Host is up (0.021s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE  VERSION
80/tcp  open  http    Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd)
443/tcp  open  ssl/http Zope httpd 2.13.24 (python 2.7.13, freebsd9; ZServer/1.1)
8080/tcp open  http    Zope httpd 2.13.24 (python 2.7.13, freebsd9; ZServer/1.1)
Nmap scan report for srs2.stura.htw-dresden.de (141.56.51.2)
Host is up (0.00028s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  ssh    OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
8080/tcp open  ssh    OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
Nmap scan report for srs3.stura.htw-dresden.de (141.56.51.3)
Host is up (2.4s latency).
All 1000 scanned ports on srs3.stura.htw-dresden.de (141.56.51.3) are filtered
Nmap scan report for 141.56.51.4
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.51.4 are filtered
Nmap scan report for 141.56.51.5
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.5 are filtered
Nmap scan report for 141.56.51.6
Host is up (0.17s latency).
All 1000 scanned ports on 141.56.51.6 are filtered
Nmap scan report for 141.56.51.7
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.7 are filtered
Nmap scan report for srs8.stura.htw-dresden.de (141.56.51.8)
Host is up (2.5s latency).
All 1000 scanned ports on srs8.stura.htw-dresden.de (141.56.51.8) are filtered
Nmap scan report for srs9.stura.htw-dresden.de (141.56.51.9)
Host is up (2.8s latency).
All 1000 scanned ports on srs9.stura.htw-dresden.de (141.56.51.9) are filtered
Nmap scan report for srs2342.stura.htw-dresden.de (141.56.51.10)
Host is up (2.9s latency).
All 1000 scanned ports on srs2342.stura.htw-dresden.de (141.56.51.10) are filtered
Nmap scan report for srsw1.stura.htw-dresden.de (141.56.51.11)
Host is up (2.8s latency).
All 1000 scanned ports on srsw1.stura.htw-dresden.de (141.56.51.11) are filtered
Nmap scan report for srs1337.stura.htw-dresden.de (141.56.51.12)
Host is up (2.1s latency).
All 1000 scanned ports on srs1337.stura.htw-dresden.de (141.56.51.12) are filtered
Nmap scan report for srs13.stura.htw-dresden.de (141.56.51.13)
Host is up (0.00018s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE  VERSION
25/tcp  open  smtp    Sendmail 8.14.9/8.14.9
80/tcp  open  http    Apache httpd
443/tcp  open  ssl/http Apache httpd
587/tcp  open  smtp    Sendmail 8.14.9/8.14.9
3306/tcp open  mysql    MySQL (unauthorized)
Service Info: Host: localhost.localdomain; OS: Unix
Nmap scan report for srs14.stura.htw-dresden.de (141.56.51.14)
Host is up (0.00033s latency).
Not shown: 998 closed ports
PORT  STATE SERVICE VERSION
25/tcp open  smtp    Postfix smtpd
80/tcp open  http    Apache httpd 2.4.29 ((FreeBSD))
Service Info: Host:  mail.stura.htw-dresden.de
Nmap scan report for srs15.stura.htw-dresden.de (141.56.51.15)
Host is up (0.00034s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE  VERSION
25/tcp  open  smtp    Sendmail 8.14.9/8.14.9
80/tcp  open  http    Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd Phusion_Passenger/5.0.30 mod_fastcgi/mod_fastcgi-SNAP-0910052141)
443/tcp  open  ssl/http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd Phusion_Passenger/5.0.30 mod_fastcgi/mod_fastcgi-SNAP-0910052141)
587/tcp  open  smtp    Sendmail 8.14.9/8.14.9
3306/tcp open  mysql    MySQL (unauthorized)
Service Info: Host: localhost.localdomain; OS: Unix
Nmap scan report for srs16.stura.htw-dresden.de (141.56.51.16)
Host is up (0.00041s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
25/tcp  open  smtp    Sendmail 8.14.9/8.14.9
80/tcp  open  http    Apache httpd 2.4.10 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.5.16)
443/tcp open  ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.5.16)
587/tcp open  smtp    Sendmail 8.14.9/8.14.9
Service Info: Host: localhost.localdomain; OSs: FreeBSD, Unix; CPE: cpe:/o:freebsd:freebsd
Nmap scan report for srs17.stura.htw-dresden.de (141.56.51.17)
Host is up (0.00032s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE  VERSION
80/tcp  open  http    Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2h PHP/5.5.16)
443/tcp open  ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2h PHP/5.5.16)
Nmap scan report for srs18.stura.htw-dresden.de (141.56.51.18)
Host is up (2.7s latency).
All 1000 scanned ports on srs18.stura.htw-dresden.de (141.56.51.18) are filtered
Nmap scan report for srs19.stura.htw-dresden.de (141.56.51.19)
Host is up (0.00032s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE  VERSION
80/tcp  open  http    Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2d PHP/5.5.16)
443/tcp open  ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2d PHP/5.5.16)
Nmap scan report for srs20.stura.htw-dresden.de (141.56.51.20)
Host is up (0.00037s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE  VERSION
25/tcp  open  smtp    Sendmail 8.14.9/8.14.9
80/tcp  open  http    Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.24)
443/tcp  open  ssl/http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.24)
587/tcp  open  smtp    Sendmail 8.14.9/8.14.9
3306/tcp open  mysql    MySQL (unauthorized)
Service Info: Host: localhost.localdomain; OS: Unix
Nmap scan report for 141.56.51.21
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.21 are filtered
Nmap scan report for 141.56.51.22
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.22 are filtered
Nmap scan report for 141.56.51.23
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.23 are filtered
Nmap scan report for 141.56.51.24
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.24 are filtered
Nmap scan report for srs25.stura.htw-dresden.de (141.56.51.25)
Host is up (1.5s latency).
All 1000 scanned ports on srs25.stura.htw-dresden.de (141.56.51.25) are filtered
Nmap scan report for 141.56.51.26
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.26 are filtered
Nmap scan report for srs27.stura.htw-dresden.de (141.56.51.27)
Host is up (0.00057s latency).
Not shown: 999 closed ports
PORT  STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.25 ((FreeBSD))
Nmap scan report for srs28.stura.htw-dresden.de (141.56.51.28)
Host is up (1.9s latency).
All 1000 scanned ports on srs28.stura.htw-dresden.de (141.56.51.28) are filtered
Nmap scan report for srs29.stura.htw-dresden.de (141.56.51.29)
Host is up (2.4s latency).
All 1000 scanned ports on srs29.stura.htw-dresden.de (141.56.51.29) are filtered
Nmap scan report for 141.56.51.30
Host is up (0.083s latency).
Not shown: 996 closed ports
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0)
80/tcp  open  http    Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.26)
443/tcp  open  ssl/http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.26)
3306/tcp open  mysql    MySQL (unauthorized)
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
Nmap scan report for 141.56.51.31
Host is up (0.00020s latency).
All 1000 scanned ports on 141.56.51.31 are closed
Nmap scan report for 141.56.51.32
Host is up (0.00028s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE    VERSION
80/tcp  open  http      nginx 1.10.2
443/tcp  open  http      nginx 1.10.2
9000/tcp open  tcpwrapped
Nmap scan report for 141.56.51.33
Host is up (0.00036s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    nginx 1.10.2
443/tcp open  http    nginx 1.10.2
Nmap scan report for 141.56.51.34
Host is up (0.00035s latency).
Not shown: 996 closed ports
PORT    STATE SERVICE VERSION
25/tcp  open  smtp    Postfix smtpd
26/tcp  open  smtp    Postfix smtpd
80/tcp  open  http    nginx 1.10.2
443/tcp open  http    nginx 1.10.2
Service Info: Host:  mail.kss-sachsen.de
Nmap scan report for 141.56.51.35
Host is up (0.00053s latency).
Not shown: 999 filtered ports
PORT    STATE SERVICE        VERSION
3389/tcp open  ms-wbt-server?
Nmap scan report for 141.56.51.36
Host is up (0.00029s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    nginx 1.10.2
443/tcp open  http    nginx 1.10.2
Nmap scan report for 141.56.51.37
Host is up (2.1s latency).
All 1000 scanned ports on 141.56.51.37 are filtered
Nmap scan report for 141.56.51.38
Host is up (0.00027s latency).
All 1000 scanned ports on 141.56.51.38 are closed
Nmap scan report for 141.56.51.39
Host is up (0.00030s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE VERSION
25/tcp  open  smtp    Sendmail 8.14.5/8.14.5
80/tcp  open  http    Apache httpd 2.2.27 ((FreeBSD) PHP/5.4.27 mod_ssl/2.2.27 OpenSSL/0.9.8q DAV/2)
3306/tcp open  mysql  MySQL (unauthorized)
Service Info: Host: lrs0x016a.kss-sachsen.de; OS: Unix
Nmap scan report for 141.56.51.40
Host is up (1.1s latency).
All 1000 scanned ports on 141.56.51.40 are filtered
Nmap scan report for 141.56.51.41
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.41 are filtered
Nmap scan report for 141.56.51.42
Host is up (2.1s latency).
All 1000 scanned ports on 141.56.51.42 are filtered
Nmap scan report for 141.56.51.43
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.43 are filtered
Nmap scan report for 141.56.51.44
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.44 are filtered
Nmap scan report for 141.56.51.45
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.45 are filtered
Nmap scan report for 141.56.51.46
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.51.46 are filtered
Nmap scan report for 141.56.51.47
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.47 are filtered
Nmap scan report for 141.56.51.48
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.48 are filtered
Nmap scan report for 141.56.51.49
Host is up (2.0s latency).
All 1000 scanned ports on 141.56.51.49 are filtered
Nmap scan report for 141.56.51.50
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.50 are filtered
Nmap scan report for 141.56.51.51
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.51 are filtered
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 52 IP addresses (52 hosts up) scanned in 340.91 seconds
</pre>
!-->
<code>nmap -sV -Pn 141.56.51.51-101</code>
<!--
<pre>
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:31 CEST
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
Nmap scan report for 141.56.51.51
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.51 are filtered
Nmap scan report for 141.56.51.52
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.52 are filtered
Nmap scan report for 141.56.51.53
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.53 are filtered
Nmap scan report for 141.56.51.54
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.54 are filtered
Nmap scan report for 141.56.51.55
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.55 are filtered
Nmap scan report for 141.56.51.56
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.56 are filtered
Nmap scan report for 141.56.51.57
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.57 are filtered
Nmap scan report for 141.56.51.58
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.58 are filtered
Nmap scan report for 141.56.51.59
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.59 are filtered
Nmap scan report for 141.56.51.60
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.60 are filtered
Nmap scan report for 141.56.51.61
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.61 are filtered
Nmap scan report for 141.56.51.62
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.62 are filtered
Nmap scan report for 141.56.51.63
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.63 are filtered
Nmap scan report for 141.56.51.64
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.64 are filtered
Nmap scan report for 141.56.51.65
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.65 are filtered
Nmap scan report for 141.56.51.66
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.66 are filtered
Nmap scan report for 141.56.51.67
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.67 are filtered
Nmap scan report for 141.56.51.68
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.68 are filtered
Nmap scan report for 141.56.51.69
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.69 are filtered
Nmap scan report for 141.56.51.70
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.70 are filtered
Nmap scan report for 141.56.51.71
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.71 are filtered
Nmap scan report for 141.56.51.72
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.72 are filtered
Nmap scan report for 141.56.51.73
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.73 are filtered
Nmap scan report for 141.56.51.74
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.74 are filtered
Nmap scan report for 141.56.51.75
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.75 are filtered
Nmap scan report for 141.56.51.76
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.76 are filtered
Nmap scan report for 141.56.51.77
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.77 are filtered
Nmap scan report for 141.56.51.78
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.78 are filtered
Nmap scan report for 141.56.51.79
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.79 are filtered
Nmap scan report for 141.56.51.80
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.80 are filtered
Nmap scan report for 141.56.51.81
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.81 are filtered
Nmap scan report for 141.56.51.82
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.82 are filtered
Nmap scan report for 141.56.51.83
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.83 are filtered
Nmap scan report for 141.56.51.84
Host is up (4.9s latency).
All 1000 scanned ports on 141.56.51.84 are filtered
Nmap scan report for 141.56.51.85
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.85 are filtered
Nmap scan report for 141.56.51.86
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.86 are filtered
Nmap scan report for 141.56.51.87
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.87 are filtered
Nmap scan report for 141.56.51.88
Host is up (2.0s latency).
All 1000 scanned ports on 141.56.51.88 are filtered
Nmap scan report for 141.56.51.89
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.89 are filtered
Nmap scan report for 141.56.51.90
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.90 are filtered
Nmap scan report for 141.56.51.91
Host is up (1.4s latency).
All 1000 scanned ports on 141.56.51.91 are filtered
Nmap scan report for 141.56.51.92
Host is up (1.6s latency).
All 1000 scanned ports on 141.56.51.92 are filtered
Nmap scan report for 141.56.51.93
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.93 are filtered
Nmap scan report for 141.56.51.94
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.94 are filtered
Nmap scan report for 141.56.51.95
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.95 are filtered
Nmap scan report for 141.56.51.96
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.96 are filtered
Nmap scan report for 141.56.51.97
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.97 are filtered
Nmap scan report for 141.56.51.98
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.98 are filtered
Nmap scan report for 141.56.51.99
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.99 are filtered
Nmap scan report for 141.56.51.100
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.100 are filtered
Nmap scan report for 141.56.51.101
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.101 are filtered
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 51 IP addresses (51 hosts up) scanned in 731.36 seconds
</pre>
!-->
<code>nmap -sV -Pn 141.56.51.101-151</code>
<!--
<pre>
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:34 CEST
Nmap scan report for 141.56.51.101
Host is up (2.0s latency).
All 1000 scanned ports on 141.56.51.101 are filtered
Nmap scan report for 141.56.51.102
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.102 are filtered
Nmap scan report for 141.56.51.103
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.103 are filtered
Nmap scan report for 141.56.51.104
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.104 are filtered
Nmap scan report for 141.56.51.105
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.105 are filtered
Nmap scan report for 141.56.51.106
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.106 are filtered
Nmap scan report for 141.56.51.107
Host is up (1.3s latency).
All 1000 scanned ports on 141.56.51.107 are filtered
Nmap scan report for 141.56.51.108
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.108 are filtered
Nmap scan report for 141.56.51.109
Host is up (0.00061s latency).
Not shown: 997 filtered ports
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      Cisco/3com IPSSHd 1.10.0 (protocol 2.0)
80/tcp  open  http    BMC HTTP Server (HP Integrated Lights-Out remote management)
443/tcp open  ssl/http BMC HTTP Server (HP Integrated Lights-Out remote management)
Service Info: Device: remote management
Nmap scan report for 141.56.51.110
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.110 are filtered
Nmap scan report for 141.56.51.111
Host is up (1.4s latency).
All 1000 scanned ports on 141.56.51.111 are filtered
Nmap scan report for 141.56.51.112
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.51.112 are filtered
Nmap scan report for 141.56.51.113
Host is up (0.00079s latency).
Not shown: 997 filtered ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        (protocol 2.0)
80/tcp  open  http
443/tcp open  ssl/https?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port22-TCP:V=6.47%I=7%D=9/13%Time=5B9A77F3%P=x86_64-pc-linux-gnu%r(NULL
SF:,1A,"SSH-2\.0-IPSSH-6\.0\.9\x20iRMC\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7806%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,39A,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF6\",\x20qop=\"auth\",\x20non
SF:ce=\"1dac314e-00002768\",\x20opaque=\"2768\",\x20stale=\"FALSE\"\x20\r\
SF:nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20
SF:text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20h
SF:tml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x
SF:20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x2
SF:0<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x
SF:20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"
SF:Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expire
SF:s\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n
SF:\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\
SF:x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x2
SF:0Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x
SF:20<h1\x20style=\"color:red\"></p>401&nbsp;Unauthorized!</h1>\x20\x20<p>
SF:You\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20
SF:username\x20and\x20password\x20to\x20see\x20this\x20document\.</p><")%r
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Thu
SF:,\x2013\x20Sep\x202018\x2014:45:30\x20GMT\r\nServer:\x20iRMC\x20S2\x20W
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040
SF:4\x20Not\x20Found\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46:23\x20
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:
SF:black\"></p>404&nbsp;Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n
SF:");
Nmap scan report for 141.56.51.114
Host is up (0.00077s latency).
Not shown: 997 filtered ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        (protocol 2.0)
80/tcp  open  http
443/tcp open  ssl/https?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port22-TCP:V=6.47%I=7%D=9/13%Time=5B9A77F3%P=x86_64-pc-linux-gnu%r(NULL
SF:,1A,"SSH-2\.0-IPSSH-6\.0\.9\x20iRMC\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7805%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,399,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF8\",\x20qop=\"auth\",\x20non
SF:ce=\"1d9648c2-00000335\",\x20opaque=\"335\",\x20stale=\"FALSE\"\x20\r\n
SF:Cache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20t
SF:ext/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20ht
SF:ml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x2
SF:0\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x20
SF:<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x2
SF:0/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"C
SF:ontent-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expires
SF:\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n\
SF:x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x
SF:20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x20
SF:Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x2
SF:0<h1\x20style=\"color:red\"></p>401&nbsp;Unauthorized!</h1>\x20\x20<p>Y
SF:ou\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20u
SF:sername\x20and\x20password\x20to\x20see\x20this\x20document\.</p></")%r
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Thu
SF:,\x2013\x20Sep\x202018\x2014:45:30\x20GMT\r\nServer:\x20iRMC\x20S2\x20W
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040
SF:4\x20Not\x20Found\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46:22\x20
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:
SF:black\"></p>404&nbsp;Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n
SF:");
Nmap scan report for 141.56.51.115
Host is up (0.00069s latency).
Not shown: 998 filtered ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        (protocol 2.0)
443/tcp open  ssl/https?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port22-TCP:V=6.47%I=7%D=9/13%Time=5B9A77F3%P=x86_64-pc-linux-gnu%r(NULL
SF:,1A,"SSH-2\.0-IPSSH-6\.0\.9\x20iRMC\r\n");
Nmap scan report for 141.56.51.116
Host is up (0.00078s latency).
Not shown: 997 filtered ports
PORT    STATE SERVICE    VERSION
22/tcp  open  tcpwrapped
80/tcp  open  http
443/tcp open  ssl/https?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7805%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,397,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate
SF::\x20Digest\x20realm=\"iRMC\x20S2@srs3006\",\x20qop=\"auth\",\x20nonce=
SF:\"1dac6adb-00002613\",\x20opaque=\"2613\",\x20stale=\"FALSE\"\x20\r\nCa
SF:che-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20tex
SF:t/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20html
SF:\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x20\
SF:"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x20<m
SF:eta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x20/
SF:>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"Con
SF:tent-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expires\"
SF:>\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n\x2
SF:0\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20
SF:Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x20Ma
SF:nagement\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<
SF:h1\x20style=\"color:red\"></p>401&nbsp;Unauthorized!</h1>\x20\x20<p>You
SF:\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20use
SF:rname\x20and\x20password\x20to\x20see\x20this\x20document\.</p></BO")%r
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Thu
SF:,\x2013\x20Sep\x202018\x2014:46:49\x20GMT\r\nServer:\x20iRMC\x20S2\x20W
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040
SF:4\x20Not\x20Found\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:47:50\x20
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:
SF:black\"></p>404&nbsp;Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n
SF:");
Nmap scan report for 141.56.51.117
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.117 are filtered
Nmap scan report for 141.56.51.118
Host is up (0.0063s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 6.0p1 Debian 4+deb7u2 (protocol 2.0)
80/tcp  open  http?
443/tcp  open  ssl/https?
9666/tcp open  ssl/unknown
9999/tcp open  ssl/abyss?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=6.47%I=7%D=9/13%Time=5B9A77FD%P=x86_64-pc-linux-gnu%r(HTTP
SF:Options,9A,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,OPTIONS,TRACE\r\nDa
SF:te:\x20Thu,\x2013\x20Sep\x202018\x2014:45:11\x20GMT\r\nServer:\x20iRMC\
SF:x20S4\x20Webserver\r\nContent-Length:\x200\r\nContent-Encoding:\x20\(nu
SF:ll\)\r\n\r\n")%r(RTSPRequest,80,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GE
SF:T,OPTIONS,TRACE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:45:16\x20GM
SF:T\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nContent-Length:\x200\r\n\r\n
SF:")%r(SIPOptions,9A,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,OPTIONS,TRA
SF:CE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46:19\x20GMT\r\nServer:\
SF:x20iRMC\x20S4\x20Webserver\r\nContent-Length:\x200\r\nContent-Encoding:
SF:\x20\(null\)\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7808%P=x86_64-pc-linux-gnu
SF:%r(HTTPOptions,A6,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,OPTIONS,TRAC
SF:E\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:45:23\x20GMT\r\nServer:\x
SF:20iRMC\x20S4\x20Webserver\r\nStrict-Transport-Security:\x20max-age=0\r\
SF:nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,C0,"HTTP/1\.1\x20200\x20O
SF:K\r\nAllow:\x20GET,OPTIONS,TRACE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\
SF:x2014:45:28\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-Tran
SF:sport-Security:\x20max-age=0\r\nContent-Length:\x200\r\nContent-Encodin
SF:g:\x20\(null\)\r\n\r\n")%r(SIPOptions,A6,"HTTP/1\.1\x20200\x20OK\r\nAll
SF:ow:\x20GET,OPTIONS,TRACE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46
SF::31\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-Transport-Se
SF:curity:\x20max-age=0\r\nContent-Length:\x200\r\n\r\n");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.51.119
Host is up (0.018s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE VERSION
22/tcp  open  ssh?
80/tcp  open  http    Mbedthis-Appweb/2.4.2
443/tcp open  https  Mbedthis-Appweb/2.4.2
Nmap scan report for 141.56.51.120
Host is up (2.1s latency).
All 1000 scanned ports on 141.56.51.120 are filtered
Nmap scan report for 141.56.51.121
Host is up (0.00030s latency).
All 1000 scanned ports on 141.56.51.121 are closed
Nmap scan report for 141.56.51.122
Host is up (0.73s latency).
All 1000 scanned ports on 141.56.51.122 are filtered
Nmap scan report for 141.56.51.123
Host is up (0.00058s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0)
111/tcp  open  rpcbind    2-4 (RPC #100000)
3128/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.51.124
Host is up (0.00028s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0)
111/tcp  open  rpcbind    2-4 (RPC #100000)
3128/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.51.125
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.125 are filtered
Nmap scan report for 141.56.51.126
Host is up (1.2s latency).
All 1000 scanned ports on 141.56.51.126 are filtered
Nmap scan report for 141.56.51.127
Host is up (2.2s latency).
All 1000 scanned ports on 141.56.51.127 are filtered
Nmap scan report for 141.56.51.128
Host is up (0.00021s latency).
Not shown: 995 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0)
80/tcp  open  http      nginx 1.10.3
111/tcp  open  rpcbind    2-4 (RPC #100000)
443/tcp  open  http      nginx 1.10.3
3128/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.51.129
Host is up (2.0s latency).
All 1000 scanned ports on 141.56.51.129 are filtered
Nmap scan report for 141.56.51.130
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.130 are filtered
Nmap scan report for 141.56.51.131
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.131 are filtered
Nmap scan report for 141.56.51.132
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.132 are filtered
Nmap scan report for 141.56.51.133
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.133 are filtered
Nmap scan report for 141.56.51.134
Host is up (1.8s latency).
All 1000 scanned ports on 141.56.51.134 are filtered
Nmap scan report for 141.56.51.135
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.135 are filtered
Nmap scan report for 141.56.51.136
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.136 are filtered
Nmap scan report for 141.56.51.137
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.137 are filtered
Nmap scan report for 141.56.51.138
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.138 are filtered
Nmap scan report for 141.56.51.139
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.139 are filtered
Nmap scan report for 141.56.51.140
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.140 are filtered
Nmap scan report for 141.56.51.141
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.141 are filtered
Nmap scan report for 141.56.51.142
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.142 are filtered
Nmap scan report for 141.56.51.143
Host is up (0.11s latency).
All 1000 scanned ports on 141.56.51.143 are filtered
Nmap scan report for 141.56.51.144
Host is up (1.9s latency).
All 1000 scanned ports on 141.56.51.144 are filtered
Nmap scan report for 141.56.51.145
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.51.145 are filtered
Nmap scan report for 141.56.51.146
Host is up (1.7s latency).
All 1000 scanned ports on 141.56.51.146 are filtered
Nmap scan report for 141.56.51.147
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.147 are filtered
Nmap scan report for 141.56.51.148
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.148 are filtered
Nmap scan report for 141.56.51.149
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.149 are filtered
Nmap scan report for 141.56.51.150
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.150 are filtered
Nmap scan report for 141.56.51.151
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.151 are filtered
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 51 IP addresses (51 hosts up) scanned in 795.42 seconds
</pre>
!-->
<code>nmap -sV -Pn 141.56.51.151-201</code>
<!--
<pre>
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:35 CEST
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
Nmap scan report for 141.56.51.151
Host is up (0.082s latency).
All 1000 scanned ports on 141.56.51.151 are filtered
Nmap scan report for 141.56.51.152
Host is up (2.0s latency).
All 1000 scanned ports on 141.56.51.152 are filtered
Nmap scan report for 141.56.51.153
Host is up (1.8s latency).
All 1000 scanned ports on 141.56.51.153 are filtered
Nmap scan report for 141.56.51.154
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.154 are filtered
Nmap scan report for 141.56.51.155
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.155 are filtered
Nmap scan report for 141.56.51.156
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.156 are filtered
Nmap scan report for 141.56.51.157
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.157 are filtered
Nmap scan report for 141.56.51.158
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.158 are filtered
Nmap scan report for 141.56.51.159
Host is up (1.4s latency).
All 1000 scanned ports on 141.56.51.159 are filtered
Nmap scan report for 141.56.51.160
Host is up (0.00096s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE    VERSION
80/tcp  open  http      Canon i-SENSYS MF8040Cn printer http admin
515/tcp  open  printer
9100/tcp open  jetdirect?
Service Info: Device: printer; CPE: cpe:/h:canon:i-sensys_mf8040cn
Nmap scan report for 141.56.51.161
Host is up (0.00056s latency).
Not shown: 991 closed ports
PORT    STATE SERVICE    VERSION
25/tcp  open  smtp      Canon imageRUNNER C5185 smtpd
80/tcp  open  ipp        Canon printer http config 2.21
515/tcp  open  printer?
631/tcp  open  ipp        Canon printer http config 2.21
8000/tcp open  http      Catwalk 1.3.1 (Canon imageRUNNER C5000-series printer http config)
9002/tcp open  dynamid?
9010/tcp open  sdr?
9011/tcp open  unknown
9100/tcp open  jetdirect?
Service Info: Device: printer; CPE: cpe:/h:canon:imagerunner_c5185, cpe:/h:canon:imagerunner_c5000
Nmap scan report for 141.56.51.162
Host is up (1.3s latency).
All 1000 scanned ports on 141.56.51.162 are filtered
Nmap scan report for 141.56.51.163
Host is up (1.1s latency).
All 1000 scanned ports on 141.56.51.163 are filtered
Nmap scan report for 141.56.51.164
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.164 are filtered
Nmap scan report for 141.56.51.165
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.165 are filtered
Nmap scan report for 141.56.51.166
Host is up (0.00039s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    nginx
6000/tcp open  X11?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
SF-Port6000-TCP:V=6.47%I=7%D=9/13%Time=5B9A77FE%P=x86_64-pc-linux-gnu%r(HT
SF:TPOptions,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text
SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20Mon,\x201
SF:0\x20Sep\x202018\x2002:04:14\x20GMT\r\nServer:\x20Python/3\.6\x20aiohtt
SF:p/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(X11Probe,AA,"HTTP/1\.0\x20400
SF:\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nC
SF:ontent-Length:\x2011\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x2002:04:14\
SF:x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Reque
SF:st")%r(GetRequest,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:
SF:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20M
SF:on,\x2010\x20Sep\x202018\x2002:04:19\x20GMT\r\nServer:\x20Python/3\.6\x
SF:20aiohttp/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(RTSPRequest,B6,"HTTP/
SF:1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset
SF:=utf-8\r\nContent-Length:\x2023\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x
SF:2002:04:19\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\ni
SF:nvalid\x20constant\x20string")%r(RPCCheck,AA,"HTTP/1\.0\x20400\x20Bad\x
SF:20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le
SF:ngth:\x2011\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x2002:04:21\x20GMT\r\
SF:nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DN
SF:SVersionBindReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\r\nDate:\x20Mo
SF:n,\x2010\x20Sep\x202018\x2002:04:24\x20GMT\r\nServer:\x20Python/3\.6\x2
SF:0aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DNSStatusRequest,AA,"HTTP/1\
SF:.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=u
SF:tf-8\r\nContent-Length:\x2011\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x20
SF:02:04:26\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad
SF:\x20Request")%r(SSLSessionReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\
SF:nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\
SF:r\nDate:\x20Mon,\x2010\x20Sep\x202018\x2002:04:32\x20GMT\r\nServer:\x20
SF:Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request");
Nmap scan report for 141.56.51.167
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.167 are filtered
Nmap scan report for 141.56.51.168
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.168 are filtered
Nmap scan report for 141.56.51.169
Host is up (0.00068s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0)
111/tcp  open  rpcbind    2-4 (RPC #100000)
3128/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.51.170
Host is up (2.0s latency).
All 1000 scanned ports on 141.56.51.170 are filtered
Nmap scan report for 141.56.51.171
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.171 are filtered
Nmap scan report for 141.56.51.172
Host is up (0.97s latency).
All 1000 scanned ports on 141.56.51.172 are filtered
Nmap scan report for 141.56.51.173
Host is up (1.8s latency).
All 1000 scanned ports on 141.56.51.173 are filtered
Nmap scan report for 141.56.51.174
Host is up (1.3s latency).
All 1000 scanned ports on 141.56.51.174 are filtered
Nmap scan report for 141.56.51.175
Host is up (1.8s latency).
All 1000 scanned ports on 141.56.51.175 are filtered
Nmap scan report for 141.56.51.176
Host is up (1.5s latency).
All 1000 scanned ports on 141.56.51.176 are filtered
Nmap scan report for 141.56.51.177
Host is up (1.5s latency).
All 1000 scanned ports on 141.56.51.177 are filtered
Nmap scan report for 141.56.51.178
Host is up (0.0027s latency).
All 1000 scanned ports on 141.56.51.178 are filtered
Nmap scan report for 141.56.51.179
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.179 are filtered
Nmap scan report for 141.56.51.180
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.180 are filtered
Nmap scan report for 141.56.51.181
Host is up (0.00060s latency).
Not shown: 996 closed ports
PORT    STATE SERVICE        VERSION
22/tcp  open  ssh            OpenSSH 6.7p1 Debian 5+deb8u7 (protocol 2.0)
139/tcp open  netbios-ssn    Samba smbd 3.X (workgroup: SRD11)
445/tcp open  netbios-ssn    Samba smbd 3.X (workgroup: SRD11)
902/tcp open  ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.51.182
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.182 are filtered
Nmap scan report for 141.56.51.183
Host is up (0.00042s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE        VERSION
22/tcp  open  ssh            OpenSSH 6.7p1 Debian 5+deb8u5 (protocol 2.0)
902/tcp open  ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Nmap scan report for 141.56.51.184
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.184 are filtered
Nmap scan report for 141.56.51.185
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.185 are filtered
Nmap scan report for 141.56.51.186
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.186 are filtered
Nmap scan report for 141.56.51.187
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.187 are filtered
Nmap scan report for 141.56.51.188
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.188 are filtered
Nmap scan report for 141.56.51.189
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.189 are filtered
Nmap scan report for 141.56.51.190
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.190 are filtered
Nmap scan report for 141.56.51.191
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.191 are filtered
Nmap scan report for 141.56.51.192
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.192 are filtered
Nmap scan report for 141.56.51.193
Host is up (0.00020s latency).
Not shown: 999 closed ports
PORT  STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.33 ((FreeBSD))
Nmap scan report for 141.56.51.194
Host is up (3.0s latency).
All 1000 scanned ports on 141.56.51.194 are filtered
Nmap scan report for 141.56.51.195
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.195 are filtered
Nmap scan report for 141.56.51.196
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.196 are filtered
Nmap scan report for 141.56.51.197
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.197 are filtered
Nmap scan report for 141.56.51.198
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.198 are filtered
Nmap scan report for 141.56.51.199
Host is up (2.9s latency).
All 1000 scanned ports on 141.56.51.199 are filtered
Nmap scan report for 141.56.51.200
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.200 are filtered
Nmap scan report for 141.56.51.201
Host is up (2.2s latency).
All 1000 scanned ports on 141.56.51.201 are filtered
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 51 IP addresses (51 hosts up) scanned in 731.03 seconds
</pre>
!-->
<code>nmap -sV -Pn 141.56.51.201-255</code>
<!--
<pre>
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:35 CEST
Nmap scan report for 141.56.51.201
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.201 are filtered
Nmap scan report for 141.56.51.202
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.202 are filtered
Nmap scan report for 141.56.51.203
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.203 are filtered
Nmap scan report for 141.56.51.204
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.204 are filtered
Nmap scan report for 141.56.51.205
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.205 are filtered
Nmap scan report for 141.56.51.206
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.206 are filtered
Nmap scan report for 141.56.51.207
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.207 are filtered
Nmap scan report for 141.56.51.208
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.208 are filtered
Nmap scan report for 141.56.51.209
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.209 are filtered
Nmap scan report for 141.56.51.210
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.210 are filtered
Nmap scan report for 141.56.51.211
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.211 are filtered
Nmap scan report for 141.56.51.212
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.212 are filtered
Nmap scan report for 141.56.51.213
Host is up (2.2s latency).
All 1000 scanned ports on 141.56.51.213 are filtered
Nmap scan report for 141.56.51.214
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.214 are filtered
Nmap scan report for 141.56.51.215
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.215 are filtered
Nmap scan report for 141.56.51.216
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.216 are filtered
Nmap scan report for 141.56.51.217
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.217 are filtered
Nmap scan report for 141.56.51.218
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.218 are filtered
Nmap scan report for 141.56.51.219
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.219 are filtered
Nmap scan report for 141.56.51.220
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.220 are filtered
Nmap scan report for 141.56.51.221
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.221 are filtered
Nmap scan report for 141.56.51.222
Host is up (2.2s latency).
All 1000 scanned ports on 141.56.51.222 are filtered
Nmap scan report for 141.56.51.223
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.51.223 are filtered
Nmap scan report for 141.56.51.224
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.224 are filtered
Nmap scan report for 141.56.51.225
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.225 are filtered
Nmap scan report for 141.56.51.226
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.226 are filtered
Nmap scan report for 141.56.51.227
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.227 are filtered
Nmap scan report for 141.56.51.228
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.228 are filtered
Nmap scan report for 141.56.51.229
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.229 are filtered
Nmap scan report for 141.56.51.230
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.230 are filtered
Nmap scan report for 141.56.51.231
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.231 are filtered
Nmap scan report for 141.56.51.232
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.232 are filtered
Nmap scan report for 141.56.51.233
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.233 are filtered
Nmap scan report for 141.56.51.234
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.234 are filtered
Nmap scan report for 141.56.51.235
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.235 are filtered
Nmap scan report for 141.56.51.236
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.236 are filtered
Nmap scan report for 141.56.51.237
Host is up (2.8s latency).
All 1000 scanned ports on 141.56.51.237 are filtered
Nmap scan report for 141.56.51.238
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.238 are filtered
Nmap scan report for 141.56.51.239
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.239 are filtered
Nmap scan report for 141.56.51.240
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.240 are filtered
Nmap scan report for 141.56.51.241
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.241 are filtered
Nmap scan report for 141.56.51.242
Host is up (2.6s latency).
All 1000 scanned ports on 141.56.51.242 are filtered
Nmap scan report for 141.56.51.243
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.243 are filtered
Nmap scan report for 141.56.51.244
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.244 are filtered
Nmap scan report for 141.56.51.245
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.245 are filtered
Nmap scan report for 141.56.51.246
Host is up (2.7s latency).
All 1000 scanned ports on 141.56.51.246 are filtered
Nmap scan report for 141.56.51.247
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.247 are filtered
Nmap scan report for 141.56.51.248
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.248 are filtered
Nmap scan report for 141.56.51.249
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.249 are filtered
Nmap scan report for 141.56.51.250
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.250 are filtered
Nmap scan report for 141.56.51.251
Host is up (2.3s latency).
All 1000 scanned ports on 141.56.51.251 are filtered
Nmap scan report for 141.56.51.252
Host is up (2.5s latency).
All 1000 scanned ports on 141.56.51.252 are filtered
Nmap scan report for 141.56.51.253
Host is up (2.4s latency).
All 1000 scanned ports on 141.56.51.253 are filtered
Nmap scan report for rou1.rz.htw-dresden.de (141.56.51.254)
Host is up (0.0070s latency).
All 1000 scanned ports on rou1.rz.htw-dresden.de (141.56.51.254) are closed
Nmap scan report for 141.56.51.255
Host is up.
All 1000 scanned ports on 141.56.51.255 are filtered
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 55 IP addresses (55 hosts up) scanned in 884.81 seconds
</pre>
!-->
== mx stura.htw-dresden.de ==
; ab 2018-09-06:
<code>dig mx stura.htw-dresden.de</code>
<pre>
; <<>> DiG 9.9.5-9+deb8u16-Debian <<>> mx stura.htw-dresden.de
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65421
;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 8
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;stura.htw-dresden.de. IN MX
;; ANSWER SECTION:
stura.htw-dresden.de. 84695 IN MX 20 rmx6.rz.htw-dresden.de.
stura.htw-dresden.de. 84695 IN MX 10 srs14.stura.htw-dresden.de.
stura.htw-dresden.de. 84695 IN MX 12 srs9.stura.htw-dresden.de.
stura.htw-dresden.de. 84695 IN MX 14 srs25.stura.htw-dresden.de.
stura.htw-dresden.de. 84695 IN MX 15 srs28.stura.htw-dresden.de.
stura.htw-dresden.de. 84695 IN MX 20 rmx4.rz.htw-dresden.de.
stura.htw-dresden.de. 84695 IN MX 20 rmx5.rz.htw-dresden.de.
;; ADDITIONAL SECTION:
rmx6.rz.htw-dresden.de. 84689 IN A 141.56.16.136
srs14.stura.htw-dresden.de. 84717 IN A 141.56.51.14
srs9.stura.htw-dresden.de. 84695 IN A 141.56.51.9
srs25.stura.htw-dresden.de. 84695 IN A 141.56.51.25
srs28.stura.htw-dresden.de. 84695 IN A 141.56.51.28
rmx4.rz.htw-dresden.de. 84689 IN A 141.56.16.134
rmx5.rz.htw-dresden.de. 84689 IN A 141.56.16.135
;; Query time: 9 msec
;; SERVER: 141.56.1.1#53(141.56.1.1)
;; WHEN: Thu Sep 06 11:20:31 CEST 2018
;; MSG SIZE  rcvd: 314
</pre>
== Test internes Netz ==
FreeNAS
: <code>ifconfig bce0 172.16.10.11 netmask 255.255.255.0 alias</code>
LMDE
: <code>ip addr add 172.16.10.10/24 dev eno1</code>
: <code>ping 172.16.10.10</code>
: <code>ping -c 3 172.16.10.11</code>
<pre>
PING 172.16.10.11 (172.16.10.11) 56(84) bytes of data.                                                        64 bytes from 172.16.10.11: icmp_seq=1 ttl=64 time=0.153 ms
64 bytes from 172.16.10.11: icmp_seq=2 ttl=64 time=0.141 ms
64 bytes from 172.16.10.11: icmp_seq=3 ttl=64 time=0.163 ms
--- 172.16.10.11 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 45ms
rtt min/avg/max/mdev = 0.141/0.152/0.163/0.013 ms
</pre>
== Versorgung mit Strom ==
so redundant wie möglich :-D
--[[Benutzer:PaulRiegel|Paul]] 00:20, 15. Sep. 2021 (CEST)
{| class="wikitable"
|-
! Gerät
! 0 (weiß)
! 1 (rot)
|-
| Strom
| Steckdose Leiste (Wand rechts vorn)
|
----
|-
| Strom
| Steckdose Leiste (Wand rechts hinten)
|
----
|-
| Strom
|
----
| Steckdose Leiste (Wand rechts hinten) oben
|-
| Strom
|
----
| Steckdose Leiste (Wand rechts hinten) mitte
|-
| Strom
|
----
| Steckdose Leiste (Wand rechts hinten) unten
|-
| Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen
| (irgendeine) Steckdose
|
----
|-
| Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen
|
----
| (irgendeine) Steckdose
|-
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links
|
Verlängerungskabel vom der
: Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen
zu der
: Leiste für die Verteilung [[Serverschrank#schrarz]] hinten oben links
|
----
|-
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts
|
----
|
Verlängerungskabel vom der
: Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen
zu der
: Leiste für die Verteilung [[Serverschrank#schrarz]] hinten oben rechts
|-
| Switch 00 (Typ A klein)
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links
|
|-
| Switch 01 (Typ A groß)
|
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts
|-
| Switch 10  (Typ B klein)
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links
|
|-
| Switch 11 (Typ B groß)
|
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts
|-
| [[srs2110]]
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links
|
|-
| [[srs2111]]
|
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts
|-
| [[srs5100]]
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts
|-
| [[srs5110]]
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts
|-
| [[srs5111]]
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben links
| Leiste für Steckdosen [[Serverschrank#schrarz]] hinten oben rechts
|-
|}
== mac srd12 ==
ist noch im Artikel nachzutragen
00:23:24:3c:ad:cf
== [[Computer]] ==
ist noch im Artikel nachzutragen
[[srd16]] hat die IPv4 ….51.186 und steht in der [[A107]].
[[srd11]] hat die IPv4 ….51.181 und steht in der [[A107]].

Aktuelle Version vom 11. März 2022, 22:38 Uhr

"Services" und "Dienste"

[Bearbeiten]

Worin besteht der Unterschied zwischen der von mir kürzlich vorgeschlagenen Kategorie "Dienst" und der bereits genutzten (aber mir bis eben unbekannten) Kategorie "Services"? --Mr N (Diskussion) 20:00, 2. Jan. 2016 (CET)


Es gibt eine Kategorie:Dienst oder Kategorie:Services?

Meinerseits wurde doch nur erstmal die Begrifflichkeit Services als Überschrift verwendet.

Spontan würde ich sagen, dass das auch alles mit der Kategorie:Server versehen wird. Es könnte nur überlegt werden, ob die Artikel Server/Service/ oder so heißen.

Solltest du die meinen, so ist das schlicht die Kategorie für den Bereich Service des StuRa. (Also da geht es um wahren Service, nicht Dienste durch Server.)

BTW: Eine Kategorie für einen Service (Singular) mit Services (Plural) zu kategorisieren, fände ich "nicht schön".

--Paul 11:38, 4. Jan. 2016 (CET)

zu klärendes mit dem RZ

[Bearbeiten]

Zuschalten von Dosen für Netzwerk

[Bearbeiten]

Sehr geehrtes Rechenzentrum, lieber Herr Müller,

wie beim Gespräch im Februar besprochen, bitten wir um das Zuschalten der Dosen fürs Netzwerk. Im Übrigen bedauern wir, dass unsere Meldung so lange auf sich warten ließ. Die Vielzahl von unerwarteten Komplikationen forderte uns zeitlich arg.

Gern können Sie alle noch nicht im Betrieb befindliche Dosen "pauschal" freischalten.

Selbstverständlich haben wir uns zwischenzeitlich auch einen Übersicht zu den einzelnen uns zugeordneten Dosen verschafft.

Wenn die einzelnen Dosen benannt werden sollen, so wären das mindestens: Erdgeschoss

  • D03-102-A03
  • D01-104-A03
  • D05-104-A03
  • D01-105-A03
  • D03-105-A03
  • D05-105-A03
  • D07-105-A03 (Raum A105/A106)
  • D09-105-A03 (Raum A105/A106)
  • D11-105-A03 (Raum A105/A106)
  • D03-107-A03 (Raum A108)
  • D05-107-A03 (Raum A108)
  • D01-108-A03 (Raum A109)

Untergeschoss

  • D01-007-A03
  • D04-007-A03
  • D05-007-A03
  • D06-007-A03
  • D01-008-A03
  • D03-008-A03
  • D04-008-A03

Den Raum A110 werden wir gemeinschaftlich mit der Hochschule für Beratungen nutzen.

  • D01-109-A03
  • D03-109-A03

Den Raum A103 nutzt Faranto.

  • D01-103-A03
  • D03-103-A03

Den Raum A107 nutzt der FSR ET.

  • D01-107-A03

Den Raum A001 nutzt der FSR I/M.

  • D01-001-A03

Den Raum A002 nutzt der FSR WiWi.

  • D01-002-A03

Den Raum A004 nutzt der FSR MBau.

  • D01-004-A03

Das Zuschalten der Dosen bei den FSRä kann als präventive Maßnahme zur Absicherung der Verfügbarkeit von Netzwerk verstanden werden. Langfristig ändert sich das vielleicht.

Mit besten Grüßen

IP-Adressen und Bereich an IP-Adressen

[Bearbeiten]
  • "eigenes" Netz
  • Anzahl von IP-Adressen
Übersicht zum Bedarf an Adressen für IPv4 beim zentralen Organ der Studentinnen- und Studentenschaft (StuRa)
Switch (02 (+ 01)) * 2 006
  • Aktuell gibt es einen großen Switch (48).
  • Es sollen gerade zwei kleine Switches (24) - für die LAN-Party und Redundanz - angeschafft werden.
  • Jeder Switch soll 2 Adressen haben.
Server (03 (+ 02)) * 4) 020
  • Aktuell gibt es (dauerhaft) drei Server. Einer davon gehört der KSS.
  • Es sollen gerade zwei neuere Server angeschafft werden. (Gründe dafür sind "der entstanden Verschleiß" und fehlende Technologien der bisherigen Maschinen.)
  • Jeder Server soll entsprechend der Hardware und Software ausreichend viele (durchschnittlich) 4 Adressen haben.
    Praktisch gibt es Belange für mehrere Adressen je Maschinen, wie
    • mehrere Anschlüsse für das Netzwerk
    • mehrere Karten für das Netzwerk
    • eigenständige Karten für die Verwaltung (vom Server)
    • (möglichst) von Karten für das Netzwerk getrennte Adresse für die Oberfläche vom Betriebssystem
Desktop (GNU/Linux) 04 (+ 06) 010
  • Aktuell gibt es gerade noch nur vier Desktops.
  • Es werden gerade sechs zusätzliche Desktops angeschafft.
Desktop (UNIX) 02 002
  • Aktuell gibt es gerade noch zwei Desktops, die (gelegentlich) zu administrativen Belangen genutzt werden.
  • Gerade für diese Belange ist jeweils eine feste Adresse wünschenswert.
Desktop (Windows) 02 002
  • Aktuell gibt es gerade noch zwei Desktops für und mit Windows.
  • Die Desktops sind wegen notwendigen Diensten, die nur mit Windows verwendbar sind, da. (Mindestens einer der Desktops dient maßgeblich Angestellten.)
Laptop 03 * 0 000
  • Aktuell gibt es gerade noch drei Laptops.
  • Die Laptops brauchen (wohl hoffentlich) keine (fest zugeordnete) Adresse.
  • Eigentlich soll der Laptop genauso frei wie ein persönlicher Laptop genutzt werden können und soll demnach DHCP verwenden können.
Drucker 05 (+ 01) 006
  • Aktuell gibt es gerade
    • ein großes Multifunktionsgerät,
    • ein kleines Multifunktionsgerät,
    • zwei Farblaserdrucker,
    • einen Labeldrucker.
  • Es sollen bald ein weiteres großes Multifunktionsgerät geben.
Desktop (Faranto) 03 (+ 01) 004
  • Im kleinen Büro von Faranto stehen (tatsächlich) aktuell drei Rechner.
  • Und es soll (tatsächlich) noch ein weiterer (schon verfügbarer) Rechner angeschlossen werden.
Drucker (Faranto) 02 002
  • Aktuell gibt es gerade
    • einen Schwarzweißdrucker,
    • einen Farbdrucker.
Dienste 15 (* 2) 030
  • bestehendes Diensten, wie Mail, Website, Wiki, Umfragen, Dateiverwaltung, Mail-Verteiler, Aufgabenverwaltung usw.
  • Backup und Backup vom Backup
  • absehbar in Betrieb zu nehmende Dienst, wie Kontenverwaltung, Mitschriften, Mail-Konten, Chat, Präsentationen, Übertragung usw.
  • Dienste (gar Server) Anderer, wie etwa Website FSR ET, Dateiverwaltung FSR ET oder Testlauf für eine erste Instanz FSR I/M
  • Dienste bei einem "universellen" Dienst mit Konten, wie etwa eine Anwendung vom FSR B/A
  • weiteres wohl vielleicht noch Kommendes
Dienste KSS 10 (* 2) 020
  • bestehendes Diensten, wie Mail, Website, Wiki, Dateiverwaltung, Mail-Verteiler usw.
  • Dienste (gar Server) Anderer, wie etwa Wiki fzs (wobei auch Dienste bei einem "universellen" Dienst mit Konten, der beim StuRa läuft genutzt werden kann)
  • weiteres wohl vielleicht noch Kommendes, etwa Mail-Konten, Chat, Aufgabendarstellung, Mitschriften usw.
Summe 102
Sonstiges 10? 009

als Beispiele:

Summe 111

Einträge für DNS

[Bearbeiten]
stura.htw-dresden.de DNS
[Bearbeiten]
Siehe auch
Domain#stura.htw-dresden.de DNS
womöglich letzte Meldung beim RZ
ticket:403
stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen
[Bearbeiten]
u hinzufügen
s entfernen
su entfernbar

Name Type Content Priorty TTL
stura.htw-dresden.de MX srs14.stura.htw-dresden.de 10 3600
stura.htw-dresden.de MX srs9.stura.htw-dresden.de 12 3600
stura.htw-dresden.de MX srs25.stura.htw-dresden.de 14 3600
stura.htw-dresden.de MX srs28.stura.htw-dresden.de 15 3600
stura.htw-dresden.de MX rmx4.rz.htw-dresden.de 20 3600
stura.htw-dresden.de MX rmx5.rz.htw-dresden.de 20 3600
stura.htw-dresden.de MX rmx6.rz.htw-dresden.de 20 3600
srs1.stura.htw-dresden.de A 141.56.50.1 3600
stura.htw-dresden.de CNAME srs1.stura.htw-dresden.de 3600
www.stura.htw-dresden.de CNAME srs1.stura.htw-dresden.de 3600
srs2.stura.htw-dresden.de A 141.56.50.2 3600
srs2342.stura.htw-dresden.de A 141.56.50.10 3600
srsw1.stura.htw-dresden.de A 141.56.50.11 3600
srs1337.stura.htw-dresden.de A 141.56.50.12 3600
srs13.stura.htw-dresden.de A 141.56.50.13 3600
wiki.stura.htw-dresden.de CNAME srs13.stura.htw-dresden.de 3600
www.wiki.stura.htw-dresden.de CNAME srs13.stura.htw-dresden.de 3600
srs14.stura.htw-dresden.de A 141.56.50.14 3600
mail.stura.htw-dresden.de CNAME srs14.stura.htw-dresden.de 3600
lists.stura.htw-dresden.de CNAME srs14.stura.htw-dresden.de 3600
www.lists.stura.htw-dresden.de CNAME srs14.stura.htw-dresden.de 3600
srs15.stura.htw-dresden.de A 141.56.50.15 3600
pro.stura.htw-dresden.de CNAME srs15.stura.htw-dresden.de 3600
www.pro.stura.htw-dresden.de CNAME srs15.stura.htw-dresden.de 3600
srs16.stura.htw-dresden.de A 141.56.50.16 3600
cloud.stura.htw-dresden.de CNAME srs16.stura.htw-dresden.de 3600
www.cloud.stura.htw-dresden.de CNAME srs16.stura.htw-dresden.de 3600
srs17.stura.htw-dresden.de A 141.56.50.17 3600
srs18.stura.htw-dresden.de A 141.56.50.18 3600
www2.stura.htw-dresden.de CNAME srs18.stura.htw-dresden.de 3600
2010.www.stura.htw-dresden.de CNAME srs18.stura.htw-dresden.de 3600
srs19.stura.htw-dresden.de A 141.56.50.19 3600
srs20.stura.htw-dresden.de A 141.56.50.20 3600
umfragen.stura.htw-dresden.de CNAME srs20.stura.htw-dresden.de 3600
www.umfragen.stura.htw-dresden.de CNAME srs20.stura.htw-dresden.de 3600
srs9.stura.htw-dresden.de A 141.56.50.9 3600
bal.stura.htw-dresden.de CNAME srs9.stura.htw-dresden.de 3600
srs28.stura.htw-dresden.de A 141.56.50.28 3600
mta.stura.htw-dresden.de CNAME srs28.stura.htw-dresden.de 3600
srs25.stura.htw-dresden.de A 141.56.50.25 3600
amnesty.stura.htw-dresden.de CNAME srs25.stura.htw-dresden.de 3600
mda.stura.htw-dresden.de CNAME srs25.stura.htw-dresden.de 3600
srs29.stura.htw-dresden.de A 141.56.50.29 3600
con.stura.htw-dresden.de CNAME srs29.stura.htw-dresden.de 3600
www.con.stura.htw-dresden.de CNAME srs29.stura.htw-dresden.de 3600
srs8.stura.htw-dresden.de A 141.56.50.8 3600
mua.stura.htw-dresden.de CNAME srs8.stura.htw-dresden.de 3600
www.mua.stura.htw-dresden.de CNAME srs8.stura.htw-dresden.de 3600
www.mail.stura.htw-dresden.de CNAME srs8.stura.htw-dresden.de 3600
web.mail.stura.htw-dresden.de CNAME srs8.stura.htw-dresden.de 3600
srs27.stura.htw-dresden.de A 141.56.50.27 3600
www.chat.stura.htw-dresden.de CNAME srs27.stura.htw-dresden.de 3600
srs17.stura.htw-dresden.de A 141.56.50.17 3600
jab.stura.htw-dresden.de CNAME srs17.stura.htw-dresden.de 3600
srs3.stura.htw-dresden.de A 141.56.50.3 3600
acc.stura.htw-dresden.de CNAME srs3.stura.htw-dresden.de 3600

stura.htw-dresden.de DNS mittelfristig gewünschte Änderungen
[Bearbeiten]
Achtung!
Dieser Abschnitt dient bisher nur als Grundlage für den zu erstellenden Entwurf!
#stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen
u hinzufügen
s entfernen
su entfernbar

Vereinbarung für inhaltliche Verantwortlichkeit

[Bearbeiten]

Zertifikate für Dienste

[Bearbeiten]

anstehendes Treffen

[Bearbeiten]
Ende März

Belegung vom Serverschrank

[Bearbeiten]

Konzept Belegung vom Serverschrank Frühjahr 2017

[Bearbeiten]
Achtung!
Die Tabelle stellt noch nicht die Realität dar.
Die Tabelle muss noch bearbeitet werden! 
großer Serverschrank (32? Höheneinheiten)
Höhe Ist Soll
001
o
-
004

Switch

o
-
007
o
-
010

RX 300 S8

o
-
013
o
-
016
o
-
019

RX 300

o
-
022
o
-
025
o
-
028

RX 300

o
-
031
o
-
034
o
-
037

Switch

o
-
040
o
-
043

dicke Berta

o
-
046
o
-
049

fette Elke

o
-
052
o
-
055

mollige Dörte

o
-
058
o
-
061

Switch

o
-
064
o
-
067

IBM X3550
(vergleichbar dicke Berta)

o
-
070
o
-
073

HP DL160 G6
(vergleichbar mollige Dörte)

o
-
076
o
-
079

Lenovo
(in Anlehnung an dicke Berta)

o
-
082
o
-
085
o
-
088

Lenovo
(in Anlehnung an dicke Berta)

o
-
091
o
-
094
o
-
097

Switch

o
-
100
o
-

Konzept Belegung vom Serverschrank Sommer 2017

[Bearbeiten]
Achtung!
Die Tabelle stellt noch nicht die Realität dar.
Die Tabelle muss noch bearbeitet werden! 
großer Serverschrank (32? Höheneinheiten)
Höhe Ist Soll
001
o
-
004

Switch Cisco SG200-50

o
-
007
o
-
010

Switch Cisco SRW2048

o
-
013
o
-
017

Server/srs5100

o
-
020
o
-
023
o
-
026

Server/srs3008

o
-
029
o
-
032
o
-
035

Server/srs3006

o
-
038
o
-
041
o
-
044

Server/srs3005

o
-
047
o
-
050
o
-
044

Switch Cisco SG200-26

o
-
047
o
-
050

Switch Cisco SRW2024

o
-
053
o
-
056

mollige Dörte

o
-
059
o
-
062

fette Elke

o
-
065
o
-
068

dicke Berta

o
-
071
o
-
074

HP DL160 G6
(vergleichbar mollige Dörte)
known as nax

o
-
077
o
-
080

IBM X3550
(vergleichbar dicke Berta)
known as nox

o
-
083
o
-
086

Switch
unknown

o
-
089

Lenovo
(in Anlehnung an dicke Berta)
unknown

o
-
092
o
-
095

Lenovo
(in Anlehnung an dicke Berta)
unknown

o
-
098
o
-
101
o
-

gescheitertes

[Bearbeiten]

Umzug von Server/Jails/SRS1 Juni 2017

[Bearbeiten]
add jails
---------

* database
** 141.56.50.191
* semaphore
** 141.56.50.190
* git
** 141.56.50.192
* website
** 141.56.50.195


add storage
-----------

* /lega/storage/git/repos/ansible
* /lega/storage/semaphore/ansible

mount Storage
-------------

* git /lega/storage/git/repos /media/repos  # XXX geht nicht
* semaphore /mnt/lega/jails/git/media/repos/ansible /media/repos read-only
* semaphore /lega/storage/semaphore/ansible /media/playbooks

Installationen
--------------

semaphore

* semaphore
* mariadb100-client

database

* mariadb100-server

git

* git
* neovim


Konfiguration
-------------

database:mariadb100-server
sysrc mysql_enable="YES"
'/usr/local/bin/mysqladmin' -u root password 'passwd'
mysql -u root -p
$ create database semaphore;
$ create user 'semaphore'@'141.56.50.190' identified by 'passwd';
$ grant all on semaphore.* to 'semaphore'@'141.56.50.190';
$ exit


website:ssh-access

mv semaphore.pub /root/.ssh/authorized_keys

$EDITOR /etc/ssh/sshd_config
PermitRootLogin without-password

service sshd onestart



semaphore:maraidb100 test
mysql -u semaphore -p -h 141.56.50.191 semaphore


semaphore:ssh-access test
ssh -i /root/.ssh/semaphore root@141.56.50.181

semaphore:semaphore setup
sysrc semaphore_enable="YES"

semaphore -setup

 1. Set up configuration for a MySQL/MariaDB database
 2. Set up a path for your playbooks (auto-created)
 3. Run database Migrations
 4. Set up initial seamphore user & password

 > DB Hostname (default 127.0.0.1:3306): 141.56.50.191:3306
 > DB User (default root): semaphore
 > DB Password: passwd
 > DB Name (default semaphore):
 > Playbook path: /media/playbooks

 Generated configuration:
 {
        "mysql": {
                "host": "141.56.50.191:3306",
                "user": "semaphore",
                "pass": "passwd",
                "name": "semaphore"
        },
        "port": "",
        "bugsnag_key": "",
        "tmp_path": "/media/playbooks",
        "cookie_hash": "3tVjUpe+RbRU4uBDtcpFZN/m8a3yh2q81pvTNGRoNL8=",
        "cookie_encryption": "g881D/r7T8aa8Q0tgKPm00kiFVj5oi/q0loJgYoN2Co="
 }

 > Is this correct? (yes/no): yes
 Running: mkdir -p /media/playbooks..
 Configuration written to /media/playbooks/semaphore_config.json..
 Pinging database..

 Running DB Migrations..
Creating migrations table
Executing migration v0.0.0 (at 2017-05-06 13:02:41.78052655 +0200 CEST)...
 [11/11]
Executing migration v1.0.0 (at 2017-05-06 13:02:42.992311998 +0200 CEST)...
 [7/7]
Executing migration v1.1.0 (at 2017-05-06 13:02:44.672359519 +0200 CEST)...
 [1/1]
Executing migration v1.2.0 (at 2017-05-06 13:02:44.92682468 +0200 CEST)...
 [1/1]
Executing migration v1.3.0 (at 2017-05-06 13:02:45.041572311 +0200 CEST)...
 [3/3]
Executing migration v1.4.0 (at 2017-05-06 13:02:45.694122748 +0200 CEST)...
 [2/2]
Executing migration v1.5.0 (at 2017-05-06 13:02:46.42319397 +0200 CEST)...
 [1/1]
Executing migration v0.1.0 (at 2017-05-06 13:02:46.551490497 +0200 CEST)...
 [6/6]
Executing migration v1.6.0 (at 2017-05-06 13:02:46.804356224 +0200 CEST)...
 [4/4]
Executing migration v1.7.0 (at 2017-05-06 13:02:47.39476158 +0200 CEST)...
 [1/1]
Executing migration v1.8.0 (at 2017-05-06 13:02:47.545875504 +0200 CEST)...
 [2/2]
Executing migration v1.9.0 (at 2017-05-06 13:02:47.69541287 +0200 CEST)...
 [2/2]


 > Username: root
 > Email: semaphore@stura.htw-dresden.de
 > Your name: StuRa HTW Dresden
 > Password: passwd

cp /media/playbooks/semaphore_config.json /usr/local/etc/semaphore/semaphore_config.json


semaphore:ssh-keygen
ssh-keygen -t ed25519
Generating public/private ed25519 key pair.
Enter file in which to save the key (/root/.ssh/id_ed25519): /root/.ssh/semaphore
Created directory '/root/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/semaphore.
Your public key has been saved in /root/.ssh/semaphore.pub.
The key fingerprint is:
SHA256:pfwPuz8FVoC5xY0NqbaeP7IhjVizjJEID8riFy6lHvk root@semaphore
The key's randomart image is:
+--[ED25519 256]--+
|           +oB   |
|          o = +  |
|  o       .+ .   |
|.. + . o o+ o    |
|o. oo o S. o .   |
|o = .  * *.   .  |
| * o  o =.=. .   |
|. =      .+=o    |
| . E      +*+o   |
+----[SHA256]-----+

semaphore:ansible roles
ansible-galaxy NetworkManager/


git:git init --bare

cd  /media/repos/ansible/
git init --bare website.git


git:create playbooks

cd /tmp
git clone /media/repos/ansible/website.git
cd website
git config --global user.email "semaphore@stura.htw-dresden.de"
git config --global user.name "Administration Rechentechnik"

......


plone upgrade
-------------

1. srs3008
	zfs create comp/migration
	

2. elke

	/etc/rc.d/jail stop srs1
	zfs snapshot -r primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20
	/etc/rc.d/jail start srs1

	zfs send primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20 | ssh root@141.56.50.128 zfs recv comp/migration/srs1


3. srs3008
	zfs create -p comp/storage/website/plone/var/blobstorage
	zfs create -p comp/storage/website/plone/var/filestorage

	rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/filestorage/ /mnt/comp/storage/website/plone/var/filestorage/
	rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/blobstorage/ /mnt/comp/storage/website/plone/var/blobstorage/
	chown -R www:www /mnt/comp/storage/website/plone/var
	zfs snapshot -r comp/storage/website/plone@AFTER_MIGRATION
	

4. srs3008/website

	pkg install python2 sudo
	adduser
	Username: ansible
	Full name:
	Uid (Leave empty for default):
	Login group [ansible]:
	Login group is foo. Invite foo into other groups? []:
	Login class [default]:
	Shell (sh csh tcsh git-shell nologin) [sh]:
	Home directory [/home/ansible]:
	Home directory permissions (Leave empty for default):
	Use password-based authentication? [yes]:
	Use an empty password? (yes/no) [no]:
	Use a random password? (yes/no) [no]: yes
	Lock out the account after creation? [no]:
	Username   : ansible
	Password   : <random>
	Full Name  :
	Uid        : 1001
	Class      :
	Groups     : ansible
	Home       : /home/ansible
	Home Mode  :
	Shell      : /bin/sh
	Locked     : no
	OK? (yes/no): yes

	su ansible
	cd; mkdir .ssh
	echo 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN3eeZ3Wcxn9ixD039fSFNg2zpJ09YY45XKb3KMST8Da root@semaphore' > .ssh/authorized_keys
	exit
	vi /usr/local/etc/sudoers
		ansible ALL=(ALL) NOPASSWD: ALL

	service sshd onestart

5. browser
5.1.	http://141.56.50.190:3000/project/1/templates

5.1.1.	Anpassung Inventory plone
	plone_neu ansible_host=141.56.50.195
	myhost ansible_host=141.56.50.128  ansible_ssh_user=root
5.1.2.	Anpassung Enviroment
	"stura_nginx_server_name":"plone.htw.stura-dresden.de",
	"myhost_tank":"comp"
5.1.3.	run main

5.2.	http://141.56.50.128/ > Jails -> Storage
5.2.1	Add Storage
	Jail		SRC							DEST					READ-ONLY	CREATE DIRECTORY	MOUNTED	
	website		/mnt/comp/storage/website/plone/var/blobstorage		/usr/local/www/website/var/blobstorage	no		no			yes
	website		/mnt/comp/storage/website/plone/var/filestorage		/usr/local/www/website/var/filestorage	no		no			yes

6. srs3008/website

	service zope213 start

7. browser

7.1.	http://plone.htw.stura-dresden.de:8080/Plone/@@plone-upgrade
7.2.	http://141.56.50.190:3000/project/1/templates
7.2.1	Anpassung Enviroment
	"stura_nginx_server_name":"www.stura.htw-dresden.de",
7.2.2	run main
7.3.	http://141.56.50.128/ > Jails 
7.3.1.	stoppe jail website

8.	Elke
	/etc/rc.d/jail stop srs1
	TODO Ist die IP adresse weg vom interface?

9. browser
9.1.	http://141.56.50.128/ > Jails
9.1.2.	edit jail
	IPv4 address:	141.56.50.1
9.1.3.	starte jail website

Umzug zum Bereich an Adressen für IPv4 141.56.51.0/24

[Bearbeiten]

nmap -sV -Pn 141.56.50.1-254

nmap -sV -Pn 141.56.51.0-50

nmap -sV -Pn 141.56.51.51-101

nmap -sV -Pn 141.56.51.101-151

nmap -sV -Pn 141.56.51.151-201

nmap -sV -Pn 141.56.51.201-255

mx stura.htw-dresden.de

[Bearbeiten]
ab 2018-09-06

dig mx stura.htw-dresden.de


; <<>> DiG 9.9.5-9+deb8u16-Debian <<>> mx stura.htw-dresden.de
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65421
;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 8

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;stura.htw-dresden.de.		IN	MX

;; ANSWER SECTION:
stura.htw-dresden.de.	84695	IN	MX	20 rmx6.rz.htw-dresden.de.
stura.htw-dresden.de.	84695	IN	MX	10 srs14.stura.htw-dresden.de.
stura.htw-dresden.de.	84695	IN	MX	12 srs9.stura.htw-dresden.de.
stura.htw-dresden.de.	84695	IN	MX	14 srs25.stura.htw-dresden.de.
stura.htw-dresden.de.	84695	IN	MX	15 srs28.stura.htw-dresden.de.
stura.htw-dresden.de.	84695	IN	MX	20 rmx4.rz.htw-dresden.de.
stura.htw-dresden.de.	84695	IN	MX	20 rmx5.rz.htw-dresden.de.

;; ADDITIONAL SECTION:
rmx6.rz.htw-dresden.de.	84689	IN	A	141.56.16.136
srs14.stura.htw-dresden.de. 84717 IN	A	141.56.51.14
srs9.stura.htw-dresden.de. 84695 IN	A	141.56.51.9
srs25.stura.htw-dresden.de. 84695 IN	A	141.56.51.25
srs28.stura.htw-dresden.de. 84695 IN	A	141.56.51.28
rmx4.rz.htw-dresden.de.	84689	IN	A	141.56.16.134
rmx5.rz.htw-dresden.de.	84689	IN	A	141.56.16.135

;; Query time: 9 msec
;; SERVER: 141.56.1.1#53(141.56.1.1)
;; WHEN: Thu Sep 06 11:20:31 CEST 2018
;; MSG SIZE  rcvd: 314

Test internes Netz

[Bearbeiten]

FreeNAS

ifconfig bce0 172.16.10.11 netmask 255.255.255.0 alias

LMDE

ip addr add 172.16.10.10/24 dev eno1
ping 172.16.10.10
ping -c 3 172.16.10.11
PING 172.16.10.11 (172.16.10.11) 56(84) bytes of data.                                                         64 bytes from 172.16.10.11: icmp_seq=1 ttl=64 time=0.153 ms
64 bytes from 172.16.10.11: icmp_seq=2 ttl=64 time=0.141 ms
64 bytes from 172.16.10.11: icmp_seq=3 ttl=64 time=0.163 ms

--- 172.16.10.11 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 45ms
rtt min/avg/max/mdev = 0.141/0.152/0.163/0.013 ms

Versorgung mit Strom

[Bearbeiten]

so redundant wie möglich :-D

--Paul 00:20, 15. Sep. 2021 (CEST)

Gerät 0 (weiß) 1 (rot)
Strom Steckdose Leiste (Wand rechts vorn)
Strom Steckdose Leiste (Wand rechts hinten)
Strom
Steckdose Leiste (Wand rechts hinten) oben
Strom
Steckdose Leiste (Wand rechts hinten) mitte
Strom
Steckdose Leiste (Wand rechts hinten) unten
Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen (irgendeine) Steckdose
Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen
(irgendeine) Steckdose
Leiste für Steckdosen Serverschrank#schrarz hinten oben links

Verlängerungskabel vom der

Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen

zu der

Leiste für die Verteilung Serverschrank#schrarz hinten oben links

Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts

Verlängerungskabel vom der

Leiste für Verteilung vom Strom aus dem Kreis der Steckdosen

zu der

Leiste für die Verteilung Serverschrank#schrarz hinten oben rechts
Switch 00 (Typ A klein) Leiste für Steckdosen Serverschrank#schrarz hinten oben links
Switch 01 (Typ A groß) Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts
Switch 10 (Typ B klein) Leiste für Steckdosen Serverschrank#schrarz hinten oben links
Switch 11 (Typ B groß) Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts
srs2110 Leiste für Steckdosen Serverschrank#schrarz hinten oben links
srs2111 Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts
srs5100 Leiste für Steckdosen Serverschrank#schrarz hinten oben links Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts
srs5110 Leiste für Steckdosen Serverschrank#schrarz hinten oben links Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts
srs5111 Leiste für Steckdosen Serverschrank#schrarz hinten oben links Leiste für Steckdosen Serverschrank#schrarz hinten oben rechts

mac srd12

[Bearbeiten]
ist noch im Artikel nachzutragen

00:23:24:3c:ad:cf

ist noch im Artikel nachzutragen

srd16 hat die IPv4 ….51.186 und steht in der A107.

srd11 hat die IPv4 ….51.181 und steht in der A107.