Intern Diskussion:Server: Unterschied zwischen den Versionen
Keine Bearbeitungszusammenfassung |
Neuer Abschnitt →Umzug zum Bereich an Adressen für IPv4 141.56.51.0/24 |
||
| Zeile 1.581: | Zeile 1.581: | ||
9.1.3. starte jail website | 9.1.3. starte jail website | ||
</pre> | </pre> | ||
== Umzug zum Bereich an Adressen für IPv4 141.56.51.0/24 == | |||
<code>nmap -sV -Pn 141.56.51.1-254</code> | |||
<!-- | |||
<pre> | |||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-08-28 13:18 CEST | |||
Nmap scan report for srs1.stura.htw-dresden.de (141.56.50.1) | |||
Host is up (0.00021s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd) | |||
443/tcp open ssl/http Zope httpd 2.13.24 (python 2.7.9, freebsd9; ZServer/1.1) | |||
8080/tcp open http Zope httpd 2.13.24 (python 2.7.9, freebsd9; ZServer/1.1) | |||
Nmap scan report for srs2.stura.htw-dresden.de (141.56.50.2) | |||
Host is up (0.00023s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
8080/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for srs3.stura.htw-dresden.de (141.56.50.3) | |||
Host is up (0.00025s latency). | |||
Not shown: 989 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.6 ((CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3.4 Python/2.7.5) | |||
88/tcp open kerberos-sec MIT Kerberos (server time: 2018-08-28 11:50:41Z) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
389/tcp open ldap (Anonymous bind OK) | |||
443/tcp open https Apache/2.4.6 (CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3 | |||
464/tcp open kpasswd5? | |||
636/tcp open ssl/ldap (Anonymous bind OK) | |||
749/tcp open rpcbind | |||
8080/tcp open http Apache Tomcat/Coyote JSP engine 1.1 | |||
8443/tcp open https-alt? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port8443-TCP:V=6.47%I=7%D=8/28%Time=5B853621%P=x86_64-pc-linux-gnu%r(SS | |||
SF:LSessionReq,7,"\x15\x03\x01\0\x02\x02\("); | |||
Service Info: Host: STURA.HTW-DRESDEN.DE | |||
Nmap scan report for 141.56.50.4 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.4 are filtered | |||
Nmap scan report for 141.56.50.5 | |||
Host is up (0.00025s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD) PHP/5.6.29) | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Nmap scan report for 141.56.50.6 | |||
Host is up (0.00030s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
5900/tcp open vnc VNC (protocol 3.7) | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port22-TCP:V=6.47%I=7%D=8/28%Time=5B85360D%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,29,"SSH-2\.0-OpenSSH_7\.2p2\x20Ubuntu-4ubuntu2\.4\r\n"); | |||
Nmap scan report for 141.56.50.7 | |||
Host is up (0.00050s latency). | |||
Not shown: 991 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Canon imageRUNNER C5185 smtpd | |||
80/tcp open ipp Canon printer http config 2.21 | |||
515/tcp open printer? | |||
631/tcp open ipp Canon printer http config 2.21 | |||
8000/tcp open http Catwalk 1.3.1 (Canon imageRUNNER C5000-series printer http config) | |||
9002/tcp open dynamid? | |||
9010/tcp open sdr? | |||
9011/tcp open unknown | |||
9100/tcp open jetdirect? | |||
Service Info: Device: printer; CPE: cpe:/h:canon:imagerunner_c5185, cpe:/h:canon:imagerunner_c5000 | |||
Nmap scan report for srs8.stura.htw-dresden.de (141.56.50.8) | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on srs8.stura.htw-dresden.de (141.56.50.8) are filtered | |||
Nmap scan report for srs9.stura.htw-dresden.de (141.56.50.9) | |||
Host is up (0.00044s latency). | |||
Not shown: 989 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | |||
25/tcp open smtp Postfix smtpd | |||
53/tcp open domain dnsmasq 2.76 | |||
80/tcp open http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16) | |||
143/tcp open imap Dovecot imapd | |||
443/tcp open ssl/http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16) | |||
465/tcp open ssl/smtp Postfix smtpd | |||
587/tcp open smtp Postfix smtpd | |||
993/tcp open ssl/imap Dovecot imapd | |||
5222/tcp open jabber ejabberd (Protocol 1.0) | |||
5280/tcp open ssl/xmpp-bosh? | |||
Service Info: Hosts: mail.stura-dresden.de, stura-dresden.de | |||
Nmap scan report for srs2342.stura.htw-dresden.de (141.56.50.10) | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on srs2342.stura.htw-dresden.de (141.56.50.10) are filtered | |||
Nmap scan report for srsw1.stura.htw-dresden.de (141.56.50.11) | |||
Host is up (0.019s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Web Server | |||
4242/tcp open vrml-multi-use? | |||
Nmap scan report for srs1337.stura.htw-dresden.de (141.56.50.12) | |||
Host is up (0.00018s latency). | |||
All 1000 scanned ports on srs1337.stura.htw-dresden.de (141.56.50.12) are closed | |||
Nmap scan report for srs13.stura.htw-dresden.de (141.56.50.13) | |||
Host is up (0.00016s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd | |||
443/tcp open ssl/http Apache httpd | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: localhost.localdomain; OS: Unix | |||
Nmap scan report for srs14.stura.htw-dresden.de (141.56.50.14) | |||
Host is up (0.00018s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Postfix smtpd | |||
80/tcp open http Apache httpd 2.4.29 ((FreeBSD)) | |||
Service Info: Host: mail.stura.htw-dresden.de | |||
Nmap scan report for srs15.stura.htw-dresden.de (141.56.50.15) | |||
Host is up (0.00023s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd Phusion_Passenger/5.0.30 mod_fastcgi/mod_fastcgi-SNAP-0910052141) | |||
443/tcp open ssl/http Apache httpd 2.4.25 ((FreeBSD) OpenSSL/0.9.8za-freebsd Phusion_Passenger/5.0.30 mod_fastcgi/mod_fastcgi-SNAP-0910052141) | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: localhost.localdomain; OS: Unix | |||
Nmap scan report for srs16.stura.htw-dresden.de (141.56.50.16) | |||
Host is up (0.00024s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.5.16) | |||
443/tcp open ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.5.16) | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
Service Info: Host: localhost.localdomain; OSs: FreeBSD, Unix; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for srs17.stura.htw-dresden.de (141.56.50.17) | |||
Host is up (0.00026s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2h PHP/5.5.16) | |||
443/tcp open ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2h PHP/5.5.16) | |||
Nmap scan report for srs18.stura.htw-dresden.de (141.56.50.18) | |||
Host is up (0.00026s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
Nmap scan report for srs19.stura.htw-dresden.de (141.56.50.19) | |||
Host is up (0.00025s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2d PHP/5.5.16) | |||
443/tcp open ssl/http Apache httpd 2.4.10 ((FreeBSD) OpenSSL/1.0.2d PHP/5.5.16) | |||
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for srs20.stura.htw-dresden.de (141.56.50.20) | |||
Host is up (0.00024s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
80/tcp open http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.24) | |||
443/tcp open ssl/http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.24) | |||
587/tcp open smtp Sendmail 8.14.9/8.14.9 | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: localhost.localdomain; OS: Unix | |||
Nmap scan report for 141.56.50.21 | |||
Host is up (0.00018s latency). | |||
All 1000 scanned ports on 141.56.50.21 are closed | |||
Nmap scan report for 141.56.50.22 | |||
Host is up (0.00017s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
9000/tcp open tcpwrapped | |||
Nmap scan report for 141.56.50.23 | |||
Host is up (0.00022s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
Nmap scan report for 141.56.50.24 | |||
Host is up (0.00017s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Postfix smtpd | |||
26/tcp open smtp Postfix smtpd | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
Service Info: Host: mail.kss-sachsen.de | |||
Nmap scan report for srs25.stura.htw-dresden.de (141.56.50.25) | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on srs25.stura.htw-dresden.de (141.56.50.25) are filtered | |||
Nmap scan report for 141.56.50.26 | |||
Host is up (0.00018s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx 1.10.2 | |||
443/tcp open http nginx 1.10.2 | |||
Nmap scan report for srs27.stura.htw-dresden.de (141.56.50.27) | |||
Host is up (0.00028s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD)) | |||
Nmap scan report for srs28.stura.htw-dresden.de (141.56.50.28) | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on srs28.stura.htw-dresden.de (141.56.50.28) are filtered | |||
Nmap scan report for srs29.stura.htw-dresden.de (141.56.50.29) | |||
Host is up (0.00083s latency). | |||
Not shown: 987 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u2 (protocol 2.0) | |||
25/tcp open smtp Postfix smtpd | |||
53/tcp open domain | |||
80/tcp open http Apache httpd 2.4.10 ((Debian)) | |||
110/tcp open pop3 Dovecot pop3d | |||
143/tcp open imap Dovecot imapd | |||
443/tcp open http Apache httpd 2.4.10 ((Debian)) | |||
587/tcp open smtp Postfix smtpd | |||
993/tcp open ssl/imap Dovecot imapd | |||
995/tcp open ssl/pop3 Dovecot pop3d | |||
8080/tcp open http Apache httpd 2.4.10 ((Debian)) | |||
8081/tcp open http Apache httpd 2.4.10 ((Debian)) | |||
10000/tcp closed snet-sensor-mgmt | |||
Service Info: Host: srs29.stura.htw-dresden.de; OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.30 | |||
Host is up (0.00022s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.26) | |||
443/tcp open ssl/http Apache httpd 2.4.23 ((FreeBSD) OpenSSL/0.9.8za-freebsd PHP/5.6.26) | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for 141.56.50.31 | |||
Host is up (0.00018s latency). | |||
All 1000 scanned ports on 141.56.50.31 are closed | |||
Nmap scan report for 141.56.50.32 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.32 are filtered | |||
Nmap scan report for 141.56.50.33 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.33 are filtered | |||
Nmap scan report for 141.56.50.34 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.34 are filtered | |||
Nmap scan report for 141.56.50.35 | |||
Host is up (0.00049s latency). | |||
Not shown: 999 filtered ports | |||
PORT STATE SERVICE VERSION | |||
3389/tcp open ms-wbt-server? | |||
Nmap scan report for 141.56.50.36 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.36 are filtered | |||
Nmap scan report for 141.56.50.37 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.37 are filtered | |||
Nmap scan report for 141.56.50.38 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.38 are filtered | |||
Nmap scan report for 141.56.50.39 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.39 are filtered | |||
Nmap scan report for 141.56.50.40 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.40 are filtered | |||
Nmap scan report for 141.56.50.41 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.41 are filtered | |||
Nmap scan report for 141.56.50.42 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.42 are filtered | |||
Nmap scan report for 141.56.50.43 | |||
Host is up (0.061s latency). | |||
All 1000 scanned ports on 141.56.50.43 are filtered | |||
Nmap scan report for 141.56.50.44 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.44 are filtered | |||
Nmap scan report for 141.56.50.45 | |||
Host is up (0.044s latency). | |||
All 1000 scanned ports on 141.56.50.45 are filtered | |||
Nmap scan report for 141.56.50.46 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.46 are filtered | |||
Nmap scan report for 141.56.50.47 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.47 are filtered | |||
Nmap scan report for 141.56.50.48 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.48 are filtered | |||
Nmap scan report for 141.56.50.49 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.49 are filtered | |||
Nmap scan report for 141.56.50.50 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.50 are filtered | |||
Nmap scan report for rbuch2.rz.htw-dresden.de (141.56.50.51) | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on rbuch2.rz.htw-dresden.de (141.56.50.51) are filtered | |||
Nmap scan report for 141.56.50.52 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.52 are filtered | |||
Nmap scan report for 141.56.50.53 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.53 are filtered | |||
Nmap scan report for 141.56.50.54 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.54 are filtered | |||
Nmap scan report for 141.56.50.55 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.55 are filtered | |||
Nmap scan report for 141.56.50.56 | |||
Host is up (2.0s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
135/tcp open msrpc? | |||
139/tcp open netbios-ssn? | |||
445/tcp open microsoft-ds? | |||
Nmap scan report for 141.56.50.57 | |||
Host is up (0.00019s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx | |||
6000/tcp open X11? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port6000-TCP:V=6.47%I=7%D=8/28%Time=5B85362C%P=x86_64-pc-linux-gnu%r(HT | |||
SF:TPOptions,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text | |||
SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20Fri,\x202 | |||
SF:0\x20Jul\x202018\x2018:37:55\x20GMT\r\nServer:\x20Python/3\.6\x20aiohtt | |||
SF:p/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(X11Probe,AA,"HTTP/1\.0\x20400 | |||
SF:\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nC | |||
SF:ontent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:37:55\ | |||
SF:x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Reque | |||
SF:st")%r(GetRequest,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type: | |||
SF:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20F | |||
SF:ri,\x2020\x20Jul\x202018\x2018:38:00\x20GMT\r\nServer:\x20Python/3\.6\x | |||
SF:20aiohttp/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(RTSPRequest,B6,"HTTP/ | |||
SF:1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset | |||
SF:=utf-8\r\nContent-Length:\x2023\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x | |||
SF:2018:38:00\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\ni | |||
SF:nvalid\x20constant\x20string")%r(RPCCheck,AA,"HTTP/1\.0\x20400\x20Bad\x | |||
SF:20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le | |||
SF:ngth:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:38:03\x20GMT\r\ | |||
SF:nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DN | |||
SF:SVersionBindReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\r\nDate:\x20Fr | |||
SF:i,\x2020\x20Jul\x202018\x2018:38:05\x20GMT\r\nServer:\x20Python/3\.6\x2 | |||
SF:0aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DNSStatusRequest,AA,"HTTP/1\ | |||
SF:.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=u | |||
SF:tf-8\r\nContent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x20 | |||
SF:18:38:08\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad | |||
SF:\x20Request")%r(SSLSessionReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ | |||
SF:nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\ | |||
SF:r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:38:14\x20GMT\r\nServer:\x20 | |||
SF:Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request"); | |||
Nmap scan report for 141.56.50.58 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.58 are filtered | |||
Nmap scan report for 141.56.50.59 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.59 are filtered | |||
Nmap scan report for 141.56.50.60 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.60 are filtered | |||
Nmap scan report for 141.56.50.61 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.61 are filtered | |||
Nmap scan report for 141.56.50.62 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.62 are filtered | |||
Nmap scan report for 141.56.50.63 | |||
Host is up (1.1s latency). | |||
All 1000 scanned ports on 141.56.50.63 are filtered | |||
Nmap scan report for 141.56.50.64 | |||
Host is up (0.019s latency). | |||
All 1000 scanned ports on 141.56.50.64 are filtered | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
Nmap scan report for 141.56.50.65 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.65 are filtered | |||
Nmap scan report for 141.56.50.66 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.66 are filtered | |||
Nmap scan report for 141.56.50.67 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.67 are filtered | |||
Nmap scan report for 141.56.50.68 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.68 are filtered | |||
Nmap scan report for 141.56.50.69 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.69 are filtered | |||
Nmap scan report for 141.56.50.70 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.70 are filtered | |||
Nmap scan report for 141.56.50.71 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.71 are filtered | |||
Nmap scan report for 141.56.50.72 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.72 are filtered | |||
Nmap scan report for 141.56.50.73 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.73 are filtered | |||
Nmap scan report for 141.56.50.74 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.74 are filtered | |||
Nmap scan report for 141.56.50.75 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.75 are filtered | |||
Nmap scan report for 141.56.50.76 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.76 are filtered | |||
Nmap scan report for 141.56.50.77 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.77 are filtered | |||
Nmap scan report for 141.56.50.78 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.78 are filtered | |||
Nmap scan report for 141.56.50.79 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.79 are filtered | |||
Nmap scan report for 141.56.50.80 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.80 are filtered | |||
Nmap scan report for 141.56.50.81 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.81 are filtered | |||
Nmap scan report for 141.56.50.82 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.82 are filtered | |||
Nmap scan report for 141.56.50.83 | |||
Host is up (0.00034s latency). | |||
Not shown: 993 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4 (protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.6 ((CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3.4 Python/2.7.5) | |||
88/tcp open kerberos-sec MIT Kerberos (server time: 2018-08-28 12:03:39Z) | |||
389/tcp open ldap (Anonymous bind OK) | |||
443/tcp open https Apache/2.4.6 (CentOS) mod_auth_gssapi/1.5.1 mod_nss/1.0.14 NSS/3.28.4 mod_wsgi/3 | |||
464/tcp open kerberos-sec MIT Kerberos (server time: 2018-08-28 12:03:39Z) | |||
636/tcp open ssl/ldap (Anonymous bind OK) | |||
Service Info: Host: STURA-DRESDEN.DE | |||
Nmap scan report for 141.56.50.84 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.84 are filtered | |||
Nmap scan report for 141.56.50.85 | |||
Host is up (1.4s latency). | |||
All 1000 scanned ports on 141.56.50.85 are filtered | |||
Nmap scan report for 141.56.50.86 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.86 are filtered | |||
Nmap scan report for 141.56.50.87 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.87 are filtered | |||
Nmap scan report for 141.56.50.88 | |||
Host is up. | |||
All 1000 scanned ports on 141.56.50.88 are filtered | |||
Nmap scan report for 141.56.50.89 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.89 are filtered | |||
Nmap scan report for 141.56.50.90 | |||
Host is up (0.00029s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Sendmail 8.14.5/8.14.5 | |||
80/tcp open http Apache httpd 2.2.27 ((FreeBSD) PHP/5.4.27 mod_ssl/2.2.27 OpenSSL/0.9.8q DAV/2) | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Service Info: Host: lrs0x016a.kss-sachsen.de; OS: Unix | |||
Nmap scan report for 141.56.50.91 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.91 are filtered | |||
Nmap scan report for 141.56.50.92 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.92 are filtered | |||
Nmap scan report for 141.56.50.93 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.93 are filtered | |||
Nmap scan report for 141.56.50.94 | |||
Host is up (0.00024s latency). | |||
All 1000 scanned ports on 141.56.50.94 are closed | |||
Nmap scan report for 141.56.50.95 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.95 are filtered | |||
Nmap scan report for 141.56.50.96 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.96 are filtered | |||
Nmap scan report for 141.56.50.97 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.50.97 are filtered | |||
Nmap scan report for 141.56.50.98 | |||
Host is up (0.12s latency). | |||
All 1000 scanned ports on 141.56.50.98 are filtered | |||
Nmap scan report for 141.56.50.99 | |||
Host is up (1.4s latency). | |||
All 1000 scanned ports on 141.56.50.99 are filtered | |||
Nmap scan report for 141.56.50.100 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.50.100 are filtered | |||
Nmap scan report for raar1.rz.htw-dresden.de (141.56.50.101) | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on raar1.rz.htw-dresden.de (141.56.50.101) are filtered | |||
Nmap scan report for 141.56.50.102 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.102 are filtered | |||
Nmap scan report for 141.56.50.103 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.103 are filtered | |||
Nmap scan report for 141.56.50.104 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.104 are filtered | |||
Nmap scan report for 141.56.50.105 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.50.105 are filtered | |||
Nmap scan report for 141.56.50.106 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.106 are filtered | |||
Nmap scan report for 141.56.50.107 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.107 are filtered | |||
Nmap scan report for 141.56.50.108 | |||
Host is up (0.0048s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http GoAhead-Webs httpd | |||
443/tcp open https GoAhead-Webs | |||
Nmap scan report for 141.56.50.109 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.109 are filtered | |||
Nmap scan report for 141.56.50.110 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.110 are filtered | |||
Nmap scan report for 141.56.50.111 | |||
Host is up (0.0031s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 4.2 (protocol 2.0) | |||
80/tcp open http? | |||
427/tcp open svrloc? | |||
443/tcp open https? | |||
5988/tcp open http sfcHttpd (SuperMicro IPMI Small Footprint CIM Broker) | |||
Nmap scan report for 141.56.50.112 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.112 are filtered | |||
Nmap scan report for 141.56.50.113 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.113 are filtered | |||
Nmap scan report for 141.56.50.114 | |||
Host is up (0.14s latency). | |||
All 1000 scanned ports on 141.56.50.114 are filtered | |||
Nmap scan report for 141.56.50.115 | |||
Host is up (0.14s latency). | |||
All 1000 scanned ports on 141.56.50.115 are filtered | |||
Nmap scan report for 141.56.50.116 | |||
Host is up (0.00095s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open tcpwrapped | |||
80/tcp open http? | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853918%P=x86_64-pc-linux-gnu%r(GetR | |||
SF:equest,3AA,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate:\x20Di | |||
SF:gest\x20realm=\"iRMC\x20S2@srs3006\",\x20qop=\"auth\",\x20nonce=\"15603 | |||
SF:e9b-00001550\",\x20opaque=\"1550\",\x20stale=\"FALSE\"\x20\r\nConnectio | |||
SF:n:\x20close\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nCon | |||
SF:tent-Type:\x20text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n | |||
SF:<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSI | |||
SF:TIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n< | |||
SF:HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE= | |||
SF:EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x2 | |||
SF:0http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http- | |||
SF:equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv | |||
SF:=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC | |||
SF:\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerVie | |||
SF:w\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20Server\x20Information | |||
SF::</h2>\n\x20\x20<h1\x20style=\"color:red\"></p>401 Unauthorized!</ | |||
SF:h1>\x20\x20<p>You\x20need\x20to\x20authenticate\x20yourself\x20with\x20 | |||
SF:a\x20valid\x20username\x20and\x20password\x20to\x20see\x20thi")%r(HTTPO | |||
SF:ptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue,\x202 | |||
SF:8\x20Aug\x202018\x2012:04:52\x20GMT\r\nServer:\x20iRMC\x20S2\x20Webserv | |||
SF:er\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=ut | |||
SF:f-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Len | |||
SF:gth:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x20404\x20Not\x2 | |||
SF:0Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:05:02\x20GMT\r\nServ | |||
SF:er:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma | |||
SF::\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\n<!DOCTYPE\ | |||
SF:x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN | |||
SF:\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x2 | |||
SF:0\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8 | |||
SF:\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equi | |||
SF:v=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Ex | |||
SF:pires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\ | |||
SF:">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20 | |||
SF:Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20S2\x20Web\x | |||
SF:20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:black\"></p | |||
SF:>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B853929%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,397,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@srs3006\",\x20qop=\"auth\",\x20nonce= | |||
SF:\"1560439d-00001551\",\x20opaque=\"1551\",\x20stale=\"FALSE\"\x20\r\nCa | |||
SF:che-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20tex | |||
SF:t/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20html | |||
SF:\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x20\ | |||
SF:"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x20<m | |||
SF:eta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x20/ | |||
SF:>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"Con | |||
SF:tent-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expires\" | |||
SF:>\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n\x2 | |||
SF:0\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20 | |||
SF:Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x20Ma | |||
SF:nagement\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20< | |||
SF:h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p>You | |||
SF:\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20use | |||
SF:rname\x20and\x20password\x20to\x20see\x20this\x20document\.</p></BO")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue | |||
SF:,\x2028\x20Aug\x202018\x2012:05:15\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:06:07\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.50.117 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.117 are filtered | |||
Nmap scan report for 141.56.50.118 | |||
Host is up (0.0057s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.2p2 (protocol 2.0) | |||
80/tcp open http? | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853922%P=x86_64-pc-linux-gnu%r(HTTP | |||
SF:Options,DE,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,POST,PUT,PATCH,DELE | |||
SF:TE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:03:58\x20G | |||
SF:MT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nExpires:\x20Mon,\x2027\x20A | |||
SF:ug\x202018\x2012:03:58\x20GMT\r\nContent-Type:\x20text/html\r\nContent- | |||
SF:Encoding:\x20\(null\)\r\n\r\n")%r(RTSPRequest,DE,"HTTP/1\.1\x20200\x20O | |||
SF:K\r\nAllow:\x20GET,POST,PUT,PATCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue, | |||
SF:\x2028\x20Aug\x202018\x2012:04:03\x20GMT\r\nServer:\x20iRMC\x20S4\x20We | |||
SF:bserver\r\nExpires:\x20Mon,\x2027\x20Aug\x202018\x2012:04:03\x20GMT\r\n | |||
SF:Content-Type:\x20text/html\r\nContent-Encoding:\x20\(null\)\r\n\r\n")%r | |||
SF:(SIPOptions,DE,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,POST,PUT,PATCH, | |||
SF:DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:05:05\ | |||
SF:x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nExpires:\x20Mon,\x2027\ | |||
SF:x20Aug\x202018\x2012:05:05\x20GMT\r\nContent-Type:\x20text/html\r\nCont | |||
SF:ent-Encoding:\x20\(null\)\r\n\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B85392D%P=x86_64-pc-linux-gnu | |||
SF:%r(HTTPOptions,104,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,POST,PUT,PA | |||
SF:TCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:04 | |||
SF::09\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-Transport-Se | |||
SF:curity:\x20max-age=0\r\nExpires:\x20Mon,\x2027\x20Aug\x202018\x2012:04: | |||
SF:09\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Encoding:\x20\(null\ | |||
SF:)\r\n\r\n")%r(RTSPRequest,104,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET, | |||
SF:POST,PUT,PATCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x20Aug\x2020 | |||
SF:18\x2012:04:14\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-T | |||
SF:ransport-Security:\x20max-age=0\r\nExpires:\x20Mon,\x2027\x20Aug\x20201 | |||
SF:8\x2012:04:14\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Encoding: | |||
SF:\x20\(null\)\r\n\r\n")%r(SIPOptions,104,"HTTP/1\.1\x20200\x20OK\r\nAllo | |||
SF:w:\x20GET,POST,PUT,PATCH,DELETE,OPTIONS,TRACE\r\nDate:\x20Tue,\x2028\x2 | |||
SF:0Aug\x202018\x2012:05:16\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r | |||
SF:\nStrict-Transport-Security:\x20max-age=0\r\nExpires:\x20Mon,\x2027\x20 | |||
SF:Aug\x202018\x2012:05:16\x20GMT\r\nContent-Type:\x20text/html\r\nContent | |||
SF:-Encoding:\x20\(null\)\r\n\r\n"); | |||
Nmap scan report for 141.56.50.119 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.119 are filtered | |||
Nmap scan report for 141.56.50.120 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.120 are filtered | |||
Nmap scan report for 141.56.50.121 | |||
Host is up (0.00032s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx | |||
6000/tcp open X11? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port6000-TCP:V=6.47%I=7%D=8/28%Time=5B853918%P=x86_64-pc-linux-gnu%r(HT | |||
SF:TPOptions,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text | |||
SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20Fri,\x202 | |||
SF:0\x20Jul\x202018\x2018:44:09\x20GMT\r\nServer:\x20Python/3\.6\x20aiohtt | |||
SF:p/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(X11Probe,AA,"HTTP/1\.0\x20400 | |||
SF:\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nC | |||
SF:ontent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:44:09\ | |||
SF:x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Reque | |||
SF:st")%r(GetRequest,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type: | |||
SF:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20F | |||
SF:ri,\x2020\x20Jul\x202018\x2018:44:14\x20GMT\r\nServer:\x20Python/3\.6\x | |||
SF:20aiohttp/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(RTSPRequest,B6,"HTTP/ | |||
SF:1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset | |||
SF:=utf-8\r\nContent-Length:\x2023\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x | |||
SF:2018:44:14\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\ni | |||
SF:nvalid\x20constant\x20string")%r(RPCCheck,AA,"HTTP/1\.0\x20400\x20Bad\x | |||
SF:20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le | |||
SF:ngth:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:44:16\x20GMT\r\ | |||
SF:nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DN | |||
SF:SVersionBindReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\r\nDate:\x20Fr | |||
SF:i,\x2020\x20Jul\x202018\x2018:44:19\x20GMT\r\nServer:\x20Python/3\.6\x2 | |||
SF:0aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DNSStatusRequest,AA,"HTTP/1\ | |||
SF:.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=u | |||
SF:tf-8\r\nContent-Length:\x2011\r\nDate:\x20Fri,\x2020\x20Jul\x202018\x20 | |||
SF:18:44:21\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad | |||
SF:\x20Request")%r(SSLSessionReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ | |||
SF:nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\ | |||
SF:r\nDate:\x20Fri,\x2020\x20Jul\x202018\x2018:44:27\x20GMT\r\nServer:\x20 | |||
SF:Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request"); | |||
Nmap scan report for 141.56.50.122 | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on 141.56.50.122 are filtered | |||
Nmap scan report for 141.56.50.123 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.50.123 are filtered | |||
Nmap scan report for 141.56.50.124 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.124 are filtered | |||
Nmap scan report for 141.56.50.125 | |||
Host is up (0.12s latency). | |||
All 1000 scanned ports on 141.56.50.125 are filtered | |||
Nmap scan report for 141.56.50.126 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.50.126 are filtered | |||
Nmap scan report for 141.56.50.127 | |||
Host is up (0.11s latency). | |||
All 1000 scanned ports on 141.56.50.127 are filtered | |||
Nmap scan report for 141.56.50.128 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.128 are filtered | |||
Nmap scan report for 141.56.50.129 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.129 are filtered | |||
Nmap scan report for 141.56.50.130 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.50.130 are filtered | |||
Nmap scan report for 141.56.50.131 | |||
Host is up (0.00022s latency). | |||
Not shown: 994 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD) PHP/5.6.29) | |||
135/tcp open msrpc Microsoft Windows RPC | |||
1024/tcp open msrpc Microsoft Windows RPC | |||
3306/tcp open mysql? | |||
5432/tcp open postgresql PostgreSQL DB | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port3306-TCP:V=6.47%I=7%D=8/28%Time=5B853F12%P=x86_64-pc-linux-gnu%r(NU | |||
SF:LL,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allow | |||
SF:ed\x20to\x20connect\x20to\x20this\x20MariaDB\x20server")%r(GenericLines | |||
SF:,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed | |||
SF:\x20to\x20connect\x20to\x20this\x20MariaDB\x20server")%r(GetRequest,4C, | |||
SF:"H\0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20 | |||
SF:to\x20connect\x20to\x20this\x20MariaDB\x20server")%r(HTTPOptions,4C,"H\ | |||
SF:0\0\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\ | |||
SF:x20connect\x20to\x20this\x20MariaDB\x20server")%r(RTSPRequest,4C,"H\0\0 | |||
SF:\0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20 | |||
SF:connect\x20to\x20this\x20MariaDB\x20server")%r(RPCCheck,4C,"H\0\0\0\xff | |||
SF:j\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connec | |||
SF:t\x20to\x20this\x20MariaDB\x20server")%r(DNSVersionBindReq,4C,"H\0\0\0\ | |||
SF:xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20con | |||
SF:nect\x20to\x20this\x20MariaDB\x20server")%r(DNSStatusRequest,4C,"H\0\0\ | |||
SF:0\xffj\x04Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20c | |||
SF:onnect\x20to\x20this\x20MariaDB\x20server")%r(Help,4C,"H\0\0\0\xffj\x04 | |||
SF:Host\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20 | |||
SF:to\x20this\x20MariaDB\x20server")%r(SSLSessionReq,4C,"H\0\0\0\xffj\x04H | |||
SF:ost\x20'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20t | |||
SF:o\x20this\x20MariaDB\x20server")%r(Kerberos,4C,"H\0\0\0\xffj\x04Host\x2 | |||
SF:0'141\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20t | |||
SF:his\x20MariaDB\x20server")%r(SMBProgNeg,4C,"H\0\0\0\xffj\x04Host\x20'14 | |||
SF:1\.56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\ | |||
SF:x20MariaDB\x20server")%r(X11Probe,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\ | |||
SF:.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\x20Mar | |||
SF:iaDB\x20server")%r(FourOhFourRequest,4C,"H\0\0\0\xffj\x04Host\x20'141\. | |||
SF:56\.50\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\x20 | |||
SF:MariaDB\x20server")%r(LPDString,4C,"H\0\0\0\xffj\x04Host\x20'141\.56\.5 | |||
SF:0\.181'\x20is\x20not\x20allowed\x20to\x20connect\x20to\x20this\x20Maria | |||
SF:DB\x20server"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port5432-TCP:V=6.47%I=7%D=8/28%Time=5B853F18%P=x86_64-pc-linux-gnu%r(SM | |||
SF:BProgNeg,85,"E\0\0\0\x84SFATAL\0C0A000\0Munsupported\x20frontend\x20pro | |||
SF:tocol\x2065363\.19778:\x20server\x20supports\x201\.0\x20to\x203\.0\0Fpo | |||
SF:stmaster\.c\0L1986\0RProcessStartupPacket\0\0"); | |||
Service Info: OSs: FreeBSD, Windows; CPE: cpe:/o:freebsd:freebsd, cpe:/o:microsoft:windows | |||
Nmap scan report for 141.56.50.132 | |||
Host is up (0.00031s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
21/tcp open ftp vsftpd 3.0.3 | |||
22/tcp open ssh OpenSSH 6.6.1_hpn13v11 (FreeBSD 20140420; protocol 2.0) | |||
80/tcp open http Apache httpd 2.4.23 ((FreeBSD) PHP/5.6.24) | |||
3306/tcp open mysql MySQL 5.5.5-10.0.26-MariaDB | |||
10000/tcp open http MiniServ 1.800 (Webmin httpd) | |||
Service Info: OSs: Unix, FreeBSD; CPE: cpe:/o:freebsd:freebsd | |||
Nmap scan report for 141.56.50.133 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.133 are filtered | |||
Nmap scan report for 141.56.50.134 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.134 are filtered | |||
Nmap scan report for 141.56.50.135 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.135 are filtered | |||
Nmap scan report for 141.56.50.136 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.50.136 are filtered | |||
Nmap scan report for 141.56.50.137 | |||
Host is up (0.00027s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
139/tcp open netbios-ssn Samba smbd | |||
445/tcp open netbios-ssn Samba smbd | |||
Nmap scan report for 141.56.50.138 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.138 are filtered | |||
Nmap scan report for 141.56.50.139 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.139 are filtered | |||
Nmap scan report for 141.56.50.140 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.140 are filtered | |||
Nmap scan report for 141.56.50.141 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.141 are filtered | |||
Nmap scan report for 141.56.50.142 | |||
Host is up (0.00027s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.25 ((FreeBSD)) | |||
3306/tcp open mysql MySQL (unauthorized) | |||
Nmap scan report for 141.56.50.143 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.143 are filtered | |||
Nmap scan report for 141.56.50.144 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.144 are filtered | |||
Nmap scan report for 141.56.50.145 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.145 are filtered | |||
Nmap scan report for 141.56.50.146 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.146 are filtered | |||
Nmap scan report for 141.56.50.147 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.147 are filtered | |||
Nmap scan report for 141.56.50.148 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.148 are filtered | |||
Nmap scan report for 141.56.50.149 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.149 are filtered | |||
Nmap scan report for 141.56.50.150 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.150 are filtered | |||
Nmap scan report for rwls1.rz.htw-dresden.de (141.56.50.151) | |||
Host is up (0.00034s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 5.1p1 Debian 5 (protocol 2.0) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for rwls2.rz.htw-dresden.de (141.56.50.152) | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on rwls2.rz.htw-dresden.de (141.56.50.152) are filtered | |||
Nmap scan report for rwls3.rz.htw-dresden.de (141.56.50.153) | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on rwls3.rz.htw-dresden.de (141.56.50.153) are filtered | |||
Nmap scan report for 141.56.50.154 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.154 are filtered | |||
Nmap scan report for 141.56.50.155 | |||
Host is up. | |||
All 1000 scanned ports on 141.56.50.155 are filtered | |||
Nmap scan report for 141.56.50.156 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.156 are filtered | |||
Nmap scan report for 141.56.50.157 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.157 are filtered | |||
Nmap scan report for 141.56.50.158 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.158 are filtered | |||
Nmap scan report for 141.56.50.159 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.159 are filtered | |||
Nmap scan report for 141.56.50.160 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.160 are filtered | |||
Nmap scan report for 141.56.50.161 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.161 are filtered | |||
Nmap scan report for 141.56.50.162 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.162 are filtered | |||
Nmap scan report for 141.56.50.163 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.163 are filtered | |||
Nmap scan report for 141.56.50.164 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.164 are filtered | |||
Nmap scan report for 141.56.50.165 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.165 are filtered | |||
Nmap scan report for 141.56.50.166 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.166 are filtered | |||
Nmap scan report for 141.56.50.167 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.167 are filtered | |||
Nmap scan report for 141.56.50.168 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.168 are filtered | |||
Nmap scan report for 141.56.50.169 | |||
Host is up (1.6s latency). | |||
All 1000 scanned ports on 141.56.50.169 are filtered | |||
Nmap scan report for 141.56.50.170 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.170 are filtered | |||
Nmap scan report for 141.56.50.171 | |||
Host is up (0.010s latency). | |||
All 1000 scanned ports on 141.56.50.171 are filtered | |||
Nmap scan report for 141.56.50.172 | |||
Host is up (0.00027s latency). | |||
All 1000 scanned ports on 141.56.50.172 are filtered (656) or closed (344) | |||
Nmap scan report for 141.56.50.173 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.173 are filtered | |||
Nmap scan report for 141.56.50.174 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.174 are filtered | |||
Nmap scan report for 141.56.50.175 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.175 are filtered | |||
Nmap scan report for 141.56.50.176 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.176 are filtered | |||
Nmap scan report for 141.56.50.177 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.177 are filtered | |||
Nmap scan report for 141.56.50.178 | |||
Host is up (0.0011s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open tcpwrapped | |||
80/tcp open http? | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853F18%P=x86_64-pc-linux-gnu%r(GetR | |||
SF:equest,3AD,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate:\x20Di | |||
SF:gest\x20realm=\"iRMC\x20S2@iRMC945BF6\",\x20qop=\"auth\",\x20nonce=\"15 | |||
SF:6257ef-00001899\",\x20opaque=\"1899\",\x20stale=\"FALSE\"\x20\r\nConnec | |||
SF:tion:\x20close\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Type:\x20text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\ | |||
SF:r\n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRA | |||
SF:NSITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML> | |||
SF:\n<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\" | |||
SF:IE=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\" | |||
SF:\x20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20ht | |||
SF:tp-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-eq | |||
SF:uiv=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20i | |||
SF:RMC\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>Server | |||
SF:View\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20Server\x20Informat | |||
SF:ion:</h2>\n\x20\x20<h1\x20style=\"color:red\"></p>401 Unauthorized | |||
SF:!</h1>\x20\x20<p>You\x20need\x20to\x20authenticate\x20yourself\x20with\ | |||
SF:x20a\x20valid\x20username\x20and\x20password\x20to\x20see\x20")%r(HTTPO | |||
SF:ptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue,\x202 | |||
SF:8\x20Aug\x202018\x2012:29:16\x20GMT\r\nServer:\x20iRMC\x20S2\x20Webserv | |||
SF:er\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=ut | |||
SF:f-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Len | |||
SF:gth:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x20404\x20Not\x2 | |||
SF:0Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:29:27\x20GMT\r\nServ | |||
SF:er:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma | |||
SF::\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\n<!DOCTYPE\ | |||
SF:x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN | |||
SF:\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x2 | |||
SF:0\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8 | |||
SF:\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equi | |||
SF:v=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Ex | |||
SF:pires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\ | |||
SF:">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20 | |||
SF:Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20S2\x20Web\x | |||
SF:20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:black\"></p | |||
SF:>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B853F2A%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,39A,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF6\",\x20qop=\"auth\",\x20non | |||
SF:ce=\"15625d31-00001900\",\x20opaque=\"1900\",\x20stale=\"FALSE\"\x20\r\ | |||
SF:nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20 | |||
SF:text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20h | |||
SF:tml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x | |||
SF:20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x2 | |||
SF:0<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x | |||
SF:20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\" | |||
SF:Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expire | |||
SF:s\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n | |||
SF:\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\ | |||
SF:x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x2 | |||
SF:0Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x | |||
SF:20<h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p> | |||
SF:You\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20 | |||
SF:username\x20and\x20password\x20to\x20see\x20this\x20document\.</p><")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue | |||
SF:,\x2028\x20Aug\x202018\x2012:29:40\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:30:33\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.50.179 | |||
Host is up (0.0010s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open tcpwrapped | |||
80/tcp open http? | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port80-TCP:V=6.47%I=7%D=8/28%Time=5B853F18%P=x86_64-pc-linux-gnu%r(GetR | |||
SF:equest,3AD,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate:\x20Di | |||
SF:gest\x20realm=\"iRMC\x20S2@iRMC945BF8\",\x20qop=\"auth\",\x20nonce=\"15 | |||
SF:4c72ae-00001739\",\x20opaque=\"1739\",\x20stale=\"FALSE\"\x20\r\nConnec | |||
SF:tion:\x20close\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Type:\x20text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\ | |||
SF:r\n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRA | |||
SF:NSITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML> | |||
SF:\n<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\" | |||
SF:IE=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\" | |||
SF:\x20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20ht | |||
SF:tp-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-eq | |||
SF:uiv=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20i | |||
SF:RMC\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>Server | |||
SF:View\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20Server\x20Informat | |||
SF:ion:</h2>\n\x20\x20<h1\x20style=\"color:red\"></p>401 Unauthorized | |||
SF:!</h1>\x20\x20<p>You\x20need\x20to\x20authenticate\x20yourself\x20with\ | |||
SF:x20a\x20valid\x20username\x20and\x20password\x20to\x20see\x20")%r(HTTPO | |||
SF:ptions,D9,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue,\x202 | |||
SF:8\x20Aug\x202018\x2012:29:16\x20GMT\r\nServer:\x20iRMC\x20S2\x20Webserv | |||
SF:er\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=ut | |||
SF:f-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Len | |||
SF:gth:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x20404\x20Not\x2 | |||
SF:0Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:29:26\x20GMT\r\nServ | |||
SF:er:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma | |||
SF::\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\n<!DOCTYPE\ | |||
SF:x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN | |||
SF:\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x2 | |||
SF:0\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8 | |||
SF:\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equi | |||
SF:v=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Ex | |||
SF:pires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\ | |||
SF:">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20 | |||
SF:Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20S2\x20Web\x | |||
SF:20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color:black\"></p | |||
SF:>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B853F2A%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,39A,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF8\",\x20qop=\"auth\",\x20non | |||
SF:ce=\"154c77f0-00001740\",\x20opaque=\"1740\",\x20stale=\"FALSE\"\x20\r\ | |||
SF:nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20 | |||
SF:text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20h | |||
SF:tml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x | |||
SF:20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x2 | |||
SF:0<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x | |||
SF:20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\" | |||
SF:Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expire | |||
SF:s\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n | |||
SF:\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\ | |||
SF:x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x2 | |||
SF:0Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x | |||
SF:20<h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p> | |||
SF:You\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20 | |||
SF:username\x20and\x20password\x20to\x20see\x20this\x20document\.</p><")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Tue | |||
SF:,\x2028\x20Aug\x202018\x2012:29:39\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:30:32\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.50.180 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.180 are filtered | |||
Nmap scan report for 141.56.50.181 | |||
Host is up (0.00033s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u5 (protocol 2.0) | |||
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD11) | |||
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD11) | |||
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.182 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.182 are filtered | |||
Nmap scan report for 141.56.50.183 | |||
Host is up (0.00040s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u4 (protocol 2.0) | |||
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.184 | |||
Host is up (0.00038s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u5 (protocol 2.0) | |||
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD14) | |||
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD14) | |||
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.185 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.185 are filtered | |||
Nmap scan report for 141.56.50.186 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.186 are filtered | |||
Nmap scan report for 141.56.50.187 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.187 are filtered | |||
Nmap scan report for 141.56.50.188 | |||
Host is up (0.00031s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u3 (protocol 2.0) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.189 | |||
Host is up (0.00017s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u3 (protocol 2.0) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.190 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.50.190 are filtered | |||
Nmap scan report for 141.56.50.191 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.191 are filtered | |||
Nmap scan report for 141.56.50.192 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.50.192 are filtered | |||
Nmap scan report for 141.56.50.193 | |||
Host is up (0.00020s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.33 ((FreeBSD)) | |||
Nmap scan report for 141.56.50.194 | |||
Host is up (0.00028s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
80/tcp open http nginx 1.10.3 (Ubuntu) | |||
443/tcp open http nginx 1.10.3 (Ubuntu) | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port22-TCP:V=6.47%I=7%D=8/28%Time=5B85427B%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,29,"SSH-2\.0-OpenSSH_7\.2p2\x20Ubuntu-4ubuntu2\.4\r\n"); | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.50.195 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.50.195 are filtered | |||
Nmap scan report for 141.56.50.196 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.196 are filtered | |||
Nmap scan report for 141.56.50.197 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.197 are filtered | |||
Nmap scan report for 141.56.50.198 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.198 are filtered | |||
Nmap scan report for 141.56.50.199 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.50.199 are filtered | |||
Nmap scan report for 141.56.50.200 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.200 are filtered | |||
Nmap scan report for 141.56.50.201 | |||
Host is up (0.00040s latency). | |||
Not shown: 993 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
443/tcp open ssl/https? | |||
444/tcp open tcpwrapped | |||
1000/tcp closed cadlock | |||
3128/tcp closed squid-http | |||
8080/tcp closed http-proxy | |||
16113/tcp open ssl/unknown | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port22-TCP:V=6.47%I=7%D=8/28%Time=5B85427B%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,12,"SSH-2\.0-CISCO_WLC\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=8/28%Time=5B854286%P=x86_64-pc-linux-gnu | |||
SF:%r(HTTPOptions,66,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Tue,\x2028\x20Aug | |||
SF:\x202018\x2012:43:54\x20GMT\r\nContent-Length:\x200\r\nAllow:\x20HEAD,\ | |||
SF:x20GET,\x20OPTIONS\r\n\r\n")%r(RTSPRequest,65,"HTTP/1\.1\x20400\x20Bad\ | |||
SF:x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:43:54\x20GMT\r\n | |||
SF:Content-Length:\x200\r\n\r\n400\x20Bad\x20Request\r\n")%r(Help,52,"HTTP | |||
SF:/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2 | |||
SF:012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(SSLSessionReq,52, | |||
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x2020 | |||
SF:18\x2012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(Kerberos,52, | |||
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x2020 | |||
SF:18\x2012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(SMBProgNeg,5 | |||
SF:2,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20Aug\x20 | |||
SF:2018\x2012:44:09\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(FourOhFour | |||
SF:Request,4E,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Tue,\x2028\x20 | |||
SF:Aug\x202018\x2012:44:14\x20GMT\r\n\r\n404\x20Not\x20Found\r\n")%r(LPDSt | |||
SF:ring,52,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x20A | |||
SF:ug\x202018\x2012:44:14\x20GMT\r\n\r\n400\x20Bad\x20Request\r\n")%r(SIPO | |||
SF:ptions,65,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2028\x2 | |||
SF:0Aug\x202018\x2012:44:19\x20GMT\r\nContent-Length:\x200\r\n\r\n400\x20B | |||
SF:ad\x20Request\r\n")%r(oracle-tns,52,"HTTP/1\.1\x20400\x20Bad\x20Request | |||
SF:\r\nDate:\x20Tue,\x2028\x20Aug\x202018\x2012:44:44\x20GMT\r\n\r\n400\x2 | |||
SF:0Bad\x20Request\r\n"); | |||
Nmap scan report for 141.56.50.202 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.202 are filtered | |||
Nmap scan report for 141.56.50.203 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.203 are filtered | |||
Nmap scan report for 141.56.50.204 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.204 are filtered | |||
Nmap scan report for 141.56.50.205 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.205 are filtered | |||
Nmap scan report for 141.56.50.206 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.206 are filtered | |||
Nmap scan report for 141.56.50.207 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.207 are filtered | |||
Nmap scan report for 141.56.50.208 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.208 are filtered | |||
Nmap scan report for 141.56.50.209 | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on 141.56.50.209 are filtered | |||
Nmap scan report for 141.56.50.210 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.210 are filtered | |||
Nmap scan report for 141.56.50.211 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.211 are filtered | |||
Nmap scan report for 141.56.50.212 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.212 are filtered | |||
Nmap scan report for 141.56.50.213 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.50.213 are filtered | |||
Nmap scan report for 141.56.50.214 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.214 are filtered | |||
Nmap scan report for 141.56.50.215 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.215 are filtered | |||
Nmap scan report for 141.56.50.216 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.216 are filtered | |||
Nmap scan report for 141.56.50.217 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.217 are filtered | |||
Nmap scan report for 141.56.50.218 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.218 are filtered | |||
Nmap scan report for 141.56.50.219 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.219 are filtered | |||
Nmap scan report for 141.56.50.220 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.220 are filtered | |||
Nmap scan report for 141.56.50.221 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.221 are filtered | |||
Nmap scan report for 141.56.50.222 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.222 are filtered | |||
Nmap scan report for 141.56.50.223 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.223 are filtered | |||
Nmap scan report for 141.56.50.224 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.50.224 are filtered | |||
Nmap scan report for 141.56.50.225 | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on 141.56.50.225 are filtered | |||
Nmap scan report for 141.56.50.226 | |||
Host is up (1.6s latency). | |||
All 1000 scanned ports on 141.56.50.226 are filtered | |||
Nmap scan report for 141.56.50.227 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.227 are filtered | |||
Nmap scan report for 141.56.50.228 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.228 are filtered | |||
Nmap scan report for 141.56.50.229 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.229 are filtered | |||
Nmap scan report for 141.56.50.230 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.230 are filtered | |||
Nmap scan report for 141.56.50.231 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.231 are filtered | |||
Nmap scan report for 141.56.50.232 | |||
Host is up (1.7s latency). | |||
All 1000 scanned ports on 141.56.50.232 are filtered | |||
Nmap scan report for 141.56.50.233 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.233 are filtered | |||
Nmap scan report for 141.56.50.234 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.50.234 are filtered | |||
Nmap scan report for 141.56.50.235 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.50.235 are filtered | |||
Nmap scan report for 141.56.50.236 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.236 are filtered | |||
Nmap scan report for 141.56.50.237 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.237 are filtered | |||
Nmap scan report for 141.56.50.238 | |||
Host is up (0.016s latency). | |||
All 1000 scanned ports on 141.56.50.238 are filtered | |||
Nmap scan report for 141.56.50.239 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.50.239 are filtered | |||
Nmap scan report for 141.56.50.240 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.240 are filtered | |||
Nmap scan report for 141.56.50.241 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.241 are filtered | |||
Nmap scan report for 141.56.50.242 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.242 are filtered | |||
Nmap scan report for 141.56.50.243 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.243 are filtered | |||
Nmap scan report for 141.56.50.244 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.244 are filtered | |||
Nmap scan report for 141.56.50.245 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.245 are filtered | |||
Nmap scan report for 141.56.50.246 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.50.246 are filtered | |||
Nmap scan report for 141.56.50.247 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.247 are filtered | |||
Nmap scan report for 141.56.50.248 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.50.248 are filtered | |||
Nmap scan report for 141.56.50.249 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.249 are filtered | |||
Nmap scan report for 141.56.50.250 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.250 are filtered | |||
Nmap scan report for 141.56.50.251 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.251 are filtered | |||
Nmap scan report for 141.56.50.252 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.50.252 are filtered | |||
Nmap scan report for 141.56.50.253 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.50.253 are filtered | |||
Nmap scan report for rou1.rz.htw-dresden.de (141.56.50.254) | |||
Host is up (0.0013s latency). | |||
All 1000 scanned ports on rou1.rz.htw-dresden.de (141.56.50.254) are closed | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 254 IP addresses (254 hosts up) scanned in 4895.14 seconds | |||
</pre> | |||
!--> | |||
Version vom 28. August 2018, 14:38 Uhr
srs19 ist vorhanden -- ich konnte jedoch nicht ihre Aufgabe erkennen. Schrift unlesbar. FrankHebold (Diskussion) 12:09, 4. Jun. 2013 (CEST)
"Services" und "Dienste"
Worin besteht der Unterschied zwischen der von mir kürzlich vorgeschlagenen Kategorie "Dienst" und der bereits genutzten (aber mir bis eben unbekannten) Kategorie "Services"? --Mr N (Diskussion) 20:00, 2. Jan. 2016 (CET)
Es gibt eine Kategorie:Dienst oder Kategorie:Services?
Meinerseits wurde doch nur erstmal die Begrifflichkeit Services als Überschrift verwendet.
Spontan würde ich sagen, dass das auch alles mit der Kategorie:Server versehen wird. Es könnte nur überlegt werden, ob die Artikel Server/Service/ oder so heißen.
Solltest du die meinen, so ist das schlicht die Kategorie für den Bereich Service des StuRa. (Also da geht es um wahren Service, nicht Dienste durch Server.)
BTW: Eine Kategorie für einen Service (Singular) mit Services (Plural) zu kategorisieren, fände ich "nicht schön".
--Paul 11:38, 4. Jan. 2016 (CET)
zu klärendes mit dem RZ
Zuschalten von Dosen für Netzwerk
Sehr geehrtes Rechenzentrum, lieber Herr Müller,
wie beim Gespräch im Februar besprochen, bitten wir um das Zuschalten der Dosen fürs Netzwerk. Im Übrigen bedauern wir, dass unsere Meldung so lange auf sich warten ließ. Die Vielzahl von unerwarteten Komplikationen forderte uns zeitlich arg.
Gern können Sie alle noch nicht im Betrieb befindliche Dosen "pauschal" freischalten.
Selbstverständlich haben wir uns zwischenzeitlich auch einen Übersicht zu den einzelnen uns zugeordneten Dosen verschafft.
Wenn die einzelnen Dosen benannt werden sollen, so wären das mindestens: Erdgeschoss
- D03-102-A03
- D01-104-A03
- D05-104-A03
- D01-105-A03
- D03-105-A03
- D05-105-A03
- D07-105-A03 (Raum A105/A106)
- D09-105-A03 (Raum A105/A106)
- D11-105-A03 (Raum A105/A106)
- D03-107-A03 (Raum A108)
- D05-107-A03 (Raum A108)
- D01-108-A03 (Raum A109)
Untergeschoss
- D01-007-A03
- D04-007-A03
- D05-007-A03
- D06-007-A03
- D01-008-A03
- D03-008-A03
- D04-008-A03
Den Raum A110 werden wir gemeinschaftlich mit der Hochschule für Beratungen nutzen.
- D01-109-A03
- D03-109-A03
Den Raum A103 nutzt Faranto.
- D01-103-A03
- D03-103-A03
Den Raum A107 nutzt der FSR ET.
- D01-107-A03
Den Raum A001 nutzt der FSR I/M.
- D01-001-A03
Den Raum A002 nutzt der FSR WiWi.
- D01-002-A03
Den Raum A004 nutzt der FSR MBau.
- D01-004-A03
Das Zuschalten der Dosen bei den FSRä kann als präventive Maßnahme zur Absicherung der Verfügbarkeit von Netzwerk verstanden werden. Langfristig ändert sich das vielleicht.
Mit besten Grüßen
IP-Adressen und Bereich an IP-Adressen
- "eigenes" Netz
- Anzahl von IP-Adressen
| Switch | (02 (+ 01)) * 2 | 006 |
|
| Server | (03 (+ 02)) * 4) | 020 |
|
| Desktop (GNU/Linux) | 04 (+ 06) | 010 |
|
| Desktop (UNIX) | 02 | 002 |
|
| Desktop (Windows) | 02 | 002 |
|
| Laptop | 03 * 0 | 000 |
|
| Drucker | 05 (+ 01) | 006 |
|
| Desktop (Faranto) | 03 (+ 01) | 004 |
|
| Drucker (Faranto) | 02 | 002 |
|
| Dienste | 15 (* 2) | 030 |
|
| Dienste KSS | 10 (* 2) | 020 |
|
| Summe | 102 | ||
| Sonstiges | 10? | 009 |
als Beispiele: |
| Summe | 111 |
Einträge für DNS
stura.htw-dresden.de DNS
- Siehe auch
- Domain#stura.htw-dresden.de DNS
stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen
| u | hinzufügen |
| entfernen | |
| entfernbar |
stura.htw-dresden.de DNS mittelfristig gewünschte Änderungen
Achtung! Dieser Abschnitt dient bisher nur als Grundlage für den zu erstellenden Entwurf! #stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen
| u | hinzufügen |
| entfernen | |
| entfernbar |
Vereinbarung für inhaltliche Verantwortlichkeit
Zertifikate für Dienste
anstehendes Treffen
- Ende März
Belegung vom Serverschrank
Konzept Belegung vom Serverschrank Frühjahr 2017
Achtung! Die Tabelle stellt noch nicht die Realität dar. Die Tabelle muss noch bearbeitet werden!
| Höhe | Ist | Soll |
|---|---|---|
| 001 |
| |
| o | ||
| - | ||
| 004 |
Switch | |
| o | ||
| - | ||
| 007 |
| |
| o | ||
| - | ||
| 010 | ||
| o | ||
| - | ||
| 013 | ||
| o | ||
| - | ||
| 017 |
| |
| o | ||
| - | ||
| 020 |
RX 300 | |
| o | ||
| - | ||
| 023 | ||
| o | ||
| - | ||
| 026 |
| |
| o | ||
| - | ||
| 029 |
RX 300 | |
| o | ||
| - | ||
| 032 | ||
| o | ||
| - | ||
| 035 |
| |
| o | ||
| - | ||
| 038 |
Switch | |
| o | ||
| - | ||
| 041 |
| |
| o | ||
| - | ||
| 044 | ||
| o | ||
| - | ||
| 047 |
| |
| o | ||
| - | ||
| 050 | ||
| o | ||
| - | ||
| 053 |
| |
| o | ||
| - | ||
| 056 | ||
| o | ||
| - | ||
| 059 |
| |
| o | ||
| - | ||
| 062 |
| |
| o | ||
| - | ||
| 065 |
| |
| o | ||
| - | ||
| 068 |
IBM X3550 | |
| o | ||
| - | ||
| 071 |
| |
| o | ||
| - | ||
| 074 |
HP DL160 G6 | |
| o | ||
| - | ||
| 077 |
| |
| o | ||
| - | ||
| 080 |
| |
| o | ||
| - | ||
| 083 | ||
| o | ||
| - | ||
| 086 |
| |
| o | ||
| - | ||
| 089 |
| |
| o | ||
| - | ||
| 092 | ||
| o | ||
| - | ||
| 095 |
| |
| o | ||
| - | ||
| 098 |
| |
| o | ||
| - | ||
| 101 |
| |
| o | ||
| - |
Konzept Belegung vom Serverschrank Sommer 2017
Achtung! Die Tabelle stellt noch nicht die Realität dar. Die Tabelle muss noch bearbeitet werden!
| Höhe | Ist | Soll |
|---|---|---|
| 001 |
| |
| o | ||
| - | ||
| 004 | ||
| o | ||
| - | ||
| 007 |
| |
| o | ||
| - | ||
| 010 | ||
| o | ||
| - | ||
| 013 |
| |
| o | ||
| - | ||
| 017 | ||
| o | ||
| - | ||
| 020 | ||
| o | ||
| - | ||
| 023 |
| |
| o | ||
| - | ||
| 026 | ||
| o | ||
| - | ||
| 029 | ||
| o | ||
| - | ||
| 032 |
| |
| o | ||
| - | ||
| 035 | ||
| o | ||
| - | ||
| 038 | ||
| o | ||
| - | ||
| 041 |
| |
| o | ||
| - | ||
| 044 | ||
| o | ||
| - | ||
| 047 | ||
| o | ||
| - | ||
| 050 |
| |
| o | ||
| - | ||
| 044 | ||
| o | ||
| - | ||
| 047 |
| |
| o | ||
| - | ||
| 050 | ||
| o | ||
| - | ||
| 053 |
| |
| o | ||
| - | ||
| 056 | ||
| o | ||
| - | ||
| 059 |
| |
| o | ||
| - | ||
| 062 | ||
| o | ||
| - | ||
| 065 |
| |
| o | ||
| - | ||
| 068 | ||
| o | ||
| - | ||
| 071 |
| |
| o | ||
| - | ||
| 074 |
HP DL160 G6 | |
| o | ||
| - | ||
| 077 |
| |
| o | ||
| - | ||
| 080 |
IBM X3550 | |
| o | ||
| - | ||
| 083 |
| |
| o | ||
| - | ||
| 086 |
| |
| o | ||
| - | ||
| 089 |
| |
| o | ||
| - | ||
| 092 | ||
| o | ||
| - | ||
| 095 |
| |
| o | ||
| - | ||
| 098 | ||
| o | ||
| - | ||
| 101 |
| |
| o | ||
| - |
gescheitertes
Umzug von Server/Jails/SRS1 Juni 2017
add jails
---------
* database
** 141.56.50.191
* semaphore
** 141.56.50.190
* git
** 141.56.50.192
* website
** 141.56.50.195
add storage
-----------
* /lega/storage/git/repos/ansible
* /lega/storage/semaphore/ansible
mount Storage
-------------
* git /lega/storage/git/repos /media/repos # XXX geht nicht
* semaphore /mnt/lega/jails/git/media/repos/ansible /media/repos read-only
* semaphore /lega/storage/semaphore/ansible /media/playbooks
Installationen
--------------
semaphore
* semaphore
* mariadb100-client
database
* mariadb100-server
git
* git
* neovim
Konfiguration
-------------
database:mariadb100-server
sysrc mysql_enable="YES"
'/usr/local/bin/mysqladmin' -u root password 'passwd'
mysql -u root -p
$ create database semaphore;
$ create user 'semaphore'@'141.56.50.190' identified by 'passwd';
$ grant all on semaphore.* to 'semaphore'@'141.56.50.190';
$ exit
website:ssh-access
mv semaphore.pub /root/.ssh/authorized_keys
$EDITOR /etc/ssh/sshd_config
PermitRootLogin without-password
service sshd onestart
semaphore:maraidb100 test
mysql -u semaphore -p -h 141.56.50.191 semaphore
semaphore:ssh-access test
ssh -i /root/.ssh/semaphore root@141.56.50.181
semaphore:semaphore setup
sysrc semaphore_enable="YES"
semaphore -setup
1. Set up configuration for a MySQL/MariaDB database
2. Set up a path for your playbooks (auto-created)
3. Run database Migrations
4. Set up initial seamphore user & password
> DB Hostname (default 127.0.0.1:3306): 141.56.50.191:3306
> DB User (default root): semaphore
> DB Password: passwd
> DB Name (default semaphore):
> Playbook path: /media/playbooks
Generated configuration:
{
"mysql": {
"host": "141.56.50.191:3306",
"user": "semaphore",
"pass": "passwd",
"name": "semaphore"
},
"port": "",
"bugsnag_key": "",
"tmp_path": "/media/playbooks",
"cookie_hash": "3tVjUpe+RbRU4uBDtcpFZN/m8a3yh2q81pvTNGRoNL8=",
"cookie_encryption": "g881D/r7T8aa8Q0tgKPm00kiFVj5oi/q0loJgYoN2Co="
}
> Is this correct? (yes/no): yes
Running: mkdir -p /media/playbooks..
Configuration written to /media/playbooks/semaphore_config.json..
Pinging database..
Running DB Migrations..
Creating migrations table
Executing migration v0.0.0 (at 2017-05-06 13:02:41.78052655 +0200 CEST)...
[11/11]
Executing migration v1.0.0 (at 2017-05-06 13:02:42.992311998 +0200 CEST)...
[7/7]
Executing migration v1.1.0 (at 2017-05-06 13:02:44.672359519 +0200 CEST)...
[1/1]
Executing migration v1.2.0 (at 2017-05-06 13:02:44.92682468 +0200 CEST)...
[1/1]
Executing migration v1.3.0 (at 2017-05-06 13:02:45.041572311 +0200 CEST)...
[3/3]
Executing migration v1.4.0 (at 2017-05-06 13:02:45.694122748 +0200 CEST)...
[2/2]
Executing migration v1.5.0 (at 2017-05-06 13:02:46.42319397 +0200 CEST)...
[1/1]
Executing migration v0.1.0 (at 2017-05-06 13:02:46.551490497 +0200 CEST)...
[6/6]
Executing migration v1.6.0 (at 2017-05-06 13:02:46.804356224 +0200 CEST)...
[4/4]
Executing migration v1.7.0 (at 2017-05-06 13:02:47.39476158 +0200 CEST)...
[1/1]
Executing migration v1.8.0 (at 2017-05-06 13:02:47.545875504 +0200 CEST)...
[2/2]
Executing migration v1.9.0 (at 2017-05-06 13:02:47.69541287 +0200 CEST)...
[2/2]
> Username: root
> Email: semaphore@stura.htw-dresden.de
> Your name: StuRa HTW Dresden
> Password: passwd
cp /media/playbooks/semaphore_config.json /usr/local/etc/semaphore/semaphore_config.json
semaphore:ssh-keygen
ssh-keygen -t ed25519
Generating public/private ed25519 key pair.
Enter file in which to save the key (/root/.ssh/id_ed25519): /root/.ssh/semaphore
Created directory '/root/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/semaphore.
Your public key has been saved in /root/.ssh/semaphore.pub.
The key fingerprint is:
SHA256:pfwPuz8FVoC5xY0NqbaeP7IhjVizjJEID8riFy6lHvk root@semaphore
The key's randomart image is:
+--[ED25519 256]--+
| +oB |
| o = + |
| o .+ . |
|.. + . o o+ o |
|o. oo o S. o . |
|o = . * *. . |
| * o o =.=. . |
|. = .+=o |
| . E +*+o |
+----[SHA256]-----+
semaphore:ansible roles
ansible-galaxy NetworkManager/
git:git init --bare
cd /media/repos/ansible/
git init --bare website.git
git:create playbooks
cd /tmp
git clone /media/repos/ansible/website.git
cd website
git config --global user.email "semaphore@stura.htw-dresden.de"
git config --global user.name "Administration Rechentechnik"
......
plone upgrade
-------------
1. srs3008
zfs create comp/migration
2. elke
/etc/rc.d/jail stop srs1
zfs snapshot -r primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20
/etc/rc.d/jail start srs1
zfs send primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20 | ssh root@141.56.50.128 zfs recv comp/migration/srs1
3. srs3008
zfs create -p comp/storage/website/plone/var/blobstorage
zfs create -p comp/storage/website/plone/var/filestorage
rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/filestorage/ /mnt/comp/storage/website/plone/var/filestorage/
rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/blobstorage/ /mnt/comp/storage/website/plone/var/blobstorage/
chown -R www:www /mnt/comp/storage/website/plone/var
zfs snapshot -r comp/storage/website/plone@AFTER_MIGRATION
4. srs3008/website
pkg install python2 sudo
adduser
Username: ansible
Full name:
Uid (Leave empty for default):
Login group [ansible]:
Login group is foo. Invite foo into other groups? []:
Login class [default]:
Shell (sh csh tcsh git-shell nologin) [sh]:
Home directory [/home/ansible]:
Home directory permissions (Leave empty for default):
Use password-based authentication? [yes]:
Use an empty password? (yes/no) [no]:
Use a random password? (yes/no) [no]: yes
Lock out the account after creation? [no]:
Username : ansible
Password : <random>
Full Name :
Uid : 1001
Class :
Groups : ansible
Home : /home/ansible
Home Mode :
Shell : /bin/sh
Locked : no
OK? (yes/no): yes
su ansible
cd; mkdir .ssh
echo 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN3eeZ3Wcxn9ixD039fSFNg2zpJ09YY45XKb3KMST8Da root@semaphore' > .ssh/authorized_keys
exit
vi /usr/local/etc/sudoers
ansible ALL=(ALL) NOPASSWD: ALL
service sshd onestart
5. browser
5.1. http://141.56.50.190:3000/project/1/templates
5.1.1. Anpassung Inventory plone
plone_neu ansible_host=141.56.50.195
myhost ansible_host=141.56.50.128 ansible_ssh_user=root
5.1.2. Anpassung Enviroment
"stura_nginx_server_name":"plone.htw.stura-dresden.de",
"myhost_tank":"comp"
5.1.3. run main
5.2. http://141.56.50.128/ > Jails -> Storage
5.2.1 Add Storage
Jail SRC DEST READ-ONLY CREATE DIRECTORY MOUNTED
website /mnt/comp/storage/website/plone/var/blobstorage /usr/local/www/website/var/blobstorage no no yes
website /mnt/comp/storage/website/plone/var/filestorage /usr/local/www/website/var/filestorage no no yes
6. srs3008/website
service zope213 start
7. browser
7.1. http://plone.htw.stura-dresden.de:8080/Plone/@@plone-upgrade
7.2. http://141.56.50.190:3000/project/1/templates
7.2.1 Anpassung Enviroment
"stura_nginx_server_name":"www.stura.htw-dresden.de",
7.2.2 run main
7.3. http://141.56.50.128/ > Jails
7.3.1. stoppe jail website
8. Elke
/etc/rc.d/jail stop srs1
TODO Ist die IP adresse weg vom interface?
9. browser
9.1. http://141.56.50.128/ > Jails
9.1.2. edit jail
IPv4 address: 141.56.50.1
9.1.3. starte jail website
Umzug zum Bereich an Adressen für IPv4 141.56.51.0/24
nmap -sV -Pn 141.56.51.1-254