====== Oversikt over NUUGs IP-adresser ====== Denne siden ble generert 16 desember 2025 med følgende kommando i bash: $ for j in $(for i in 158.36.191.{128..255}; do echo "${i} $(host ${i})" ; done | grep -E 'nuug|skolelinux|reinholdtsen' | cut -d\ -f1); do echo "===== $j aka $(host $j|rev|cut -d\ -f1 | rev) ====="; echo "" ; nmap -F -sV --version-intensity 5 $j; echo "<\/code>" ; echo " " ; done ===== 158.36.191.153 aka git.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:25 CET Nmap scan report for git.nuug.no (158.36.191.153) Host is up (0.0020s latency). Not shown: 95 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 (protocol 2.0) 80/tcp open http nginx 111/tcp open rpcbind 443/tcp open ssl/http nginx 5666/tcp open tcpwrapped Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 12.59 seconds ===== 158.36.191.154 aka freebeast.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:26 CET Nmap scan report for freebeast.nuug.no (158.36.191.154) Host is up (0.00024s latency). Not shown: 99 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.9 (FreeBSD 20250219; protocol 2.0) Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds ===== 158.36.191.155 aka hotell.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:26 CET Nmap scan report for hotell.nuug.no (158.36.191.155) Host is up (0.00027s latency). Not shown: 94 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0) 25/tcp open smtp Postfix smtpd 80/tcp open http Apache httpd 2.4.65 111/tcp open rpcbind 443/tcp open ssl/http Apache httpd 2.4.65 ((Debian)) 5666/tcp open tcpwrapped Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 26.46 seconds ===== 158.36.191.156 aka varnish.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:26 CET Nmap scan report for varnish.nuug.no (158.36.191.156) Host is up (0.00051s latency). Not shown: 95 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0) 80/tcp open http? 111/tcp open rpcbind 443/tcp open ssl/https? 5666/tcp open tcpwrapped 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.93%I=5%D=12/16%Time=69415E10%P=x86_64-pc-linux-gnu%r(Get SF:Request,6A,"HTTP/1\.1\x20302\x20Found\r\ncontent-length:\x200\r\nlocati SF:on:\x20https:///\r\ncache-control:\x20no-cache\r\nconnection:\x20close\ SF:r\n\r\n")%r(HTTPOptions,6A,"HTTP/1\.1\x20302\x20Found\r\ncontent-length SF::\x200\r\nlocation:\x20https:///\r\ncache-control:\x20no-cache\r\nconne SF:ction:\x20close\r\n\r\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20 SF:request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConne SF:ction:\x20close\r\nContent-Type:\x20text/html\r\n\r\n

40 SF:0\x20Bad\x20request

\nYour\x20browser\x20sent\x20an\x20invalid\x20r SF:equest\.\n\n")%r(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20 SF:request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConne SF:ction:\x20close\r\nContent-Type:\x20text/html\r\n\r\n

40 SF:0\x20Bad\x20request

\nYour\x20browser\x20sent\x20an\x20invalid\x20r SF:equest\.\n\n")%r(FourOhFourRequest,8D,"HTTP/1\.1\x20302\x SF:20Found\r\ncontent-length:\x200\r\nlocation:\x20https:///nice%20ports%2 SF:C/Tri%6Eity\.txt%2ebak\r\ncache-control:\x20no-cache\r\nconnection:\x20 SF:close\r\n\r\n")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nCo SF:ntent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20clo SF:se\r\nContent-Type:\x20text/html\r\n\r\n

400\x20Bad\x20r SF:equest

\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20r SF:equest\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnec SF:tion:\x20close\r\nContent-Type:\x20text/html\r\n\r\n

400 SF:\x20Bad\x20request

\nYour\x20browser\x20sent\x20an\x20invalid\x20re SF:quest\.\n\n")%r(Help,CF,"HTTP/1\.1\x20400\x20Bad\x20reque SF:st\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection SF::\x20close\r\nContent-Type:\x20text/html\r\n\r\n

400\x20 SF:Bad\x20request

\nYour\x20browser\x20sent\x20an\x20invalid\x20reques SF:t\.\n\n")%r(SSLSessionReq,CF,"HTTP/1\.1\x20400\x20Bad\x20 SF:request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConne SF:ction:\x20close\r\nContent-Type:\x20text/html\r\n\r\n

40 SF:0\x20Bad\x20request

\nYour\x20browser\x20sent\x20an\x20invalid\x20r SF:equest\.\n\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.93%T=SSL%I=5%D=12/16%Time=69415E16%P=x86_64-pc-linux-gn SF:u%r(GetRequest,1BD,"HTTP/1\.1\x20308\x20Permanent\x20Redirect\r\ncache- SF:control:\x20public,\x20max-age=0,\x20must-revalidate\r\ncontent-type:\x SF:20text/plain\r\ndate:\x20Tue,\x2016\x20Dec\x202025\x2013:26:46\x20GMT\r SF:\nlocation:\x20https://vercel\.com/\r\nrefresh:\x200;url=https://vercel SF:\.com/\r\nserver:\x20Vercel\r\nstrict-transport-security:\x20max-age=63 SF:072000\r\nx-vercel-id:\x20arn1::59qjn-1765891606694-759a8cb2942b\r\nx-v SF:arnish:\x2015640598\r\nage:\x200\r\nvia:\x201\.1\x20varnish\x20\(Varnis SF:h/7\.6\)\r\ncontent-length:\x2015\r\nconnection:\x20close\r\n\r\nRedire SF:cting\.\.\.\n")%r(HTTPOptions,1BD,"HTTP/1\.1\x20308\x20Permanent\x20Red SF:irect\r\ncache-control:\x20public,\x20max-age=0,\x20must-revalidate\r\n SF:content-type:\x20text/plain\r\ndate:\x20Tue,\x2016\x20Dec\x202025\x2013 SF::26:46\x20GMT\r\nlocation:\x20https://vercel\.com/\r\nrefresh:\x200;url SF:=https://vercel\.com/\r\nserver:\x20Vercel\r\nstrict-transport-security SF::\x20max-age=63072000\r\nx-vercel-id:\x20arn1::jvn89-1765891606736-1f97 SF:d4204136\r\nx-varnish:\x2019147861\r\nage:\x200\r\nvia:\x201\.1\x20varn SF:ish\x20\(Varnish/7\.6\)\r\ncontent-length:\x2015\r\nconnection:\x20clos SF:e\r\n\r\nRedirecting\.\.\.\n")%r(FourOhFourRequest,1BD,"HTTP/1\.1\x2030 SF:8\x20Permanent\x20Redirect\r\ncache-control:\x20public,\x20max-age=0,\x SF:20must-revalidate\r\ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2016 SF:\x20Dec\x202025\x2013:26:46\x20GMT\r\nlocation:\x20https://vercel\.com/ SF:\r\nrefresh:\x200;url=https://vercel\.com/\r\nserver:\x20Vercel\r\nstri SF:ct-transport-security:\x20max-age=63072000\r\nx-vercel-id:\x20arn1::9qd SF:86-1765891606774-0491e63d50cf\r\nx-varnish:\x2015640601\r\nage:\x200\r\ SF:nvia:\x201\.1\x20varnish\x20\(Varnish/7\.6\)\r\ncontent-length:\x2015\r SF:\nconnection:\x20close\r\n\r\nRedirecting\.\.\.\n")%r(tor-versions,CF," SF:HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Co SF:ntrol:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/htm SF:l\r\n\r\n

400\x20Bad\x20request

\nYour\x20browser\x2 SF:0sent\x20an\x20invalid\x20request\.\n\n"); Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 17.66 seconds
===== 158.36.191.213 aka geekbay.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:26 CET Nmap scan report for geekbay.nuug.no (158.36.191.213) Host is up (0.00077s latency). Not shown: 88 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 (protocol 2.0) 25/tcp open smtp Postfix smtpd 53/tcp open domain (unknown banner: You dont need to know.) 80/tcp open http Apache httpd 111/tcp open rpcbind 113/tcp open ident? 443/tcp open ssl/http Apache httpd 465/tcp open ssl/smtp Postfix smtpd 587/tcp open smtp Postfix smtpd 993/tcp open ssl/imap Dovecot imapd 995/tcp open ssl/pop3 Dovecot pop3d 5666/tcp open tcpwrapped Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 32.77 seconds ===== 158.36.191.214 aka manager.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:27 CET Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn Nmap done: 1 IP address (0 hosts up) scanned in 3.27 seconds ===== 158.36.191.215 aka docker1.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:27 CET Nmap scan report for docker1.nuug.no (158.36.191.215) Host is up (0.0011s latency). Not shown: 96 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0) 80/tcp open http nginx 443/tcp open ssl/https? 8080/tcp open http-proxy? 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port8080-TCP:V=7.93%I=5%D=12/16%Time=69415E48%P=x86_64-pc-linux-gnu%r(G SF:etRequest,77,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Tue,\x2016\x SF:20Dec\x202025\x2013:27:36\x20GMT\r\nX-Frame-Options:\x20DENY\r\nX-Conte SF:nt-Type-Options:\x20nosniff\r\n\r\n")%r(HTTPOptions,77,"HTTP/1\.1\x2040 SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2016\x20Dec\x202025\x2013:27:36\x20 SF:GMT\r\nX-Frame-Options:\x20DENY\r\nX-Content-Type-Options:\x20nosniff\r SF:\n\r\n")%r(RTSPRequest,AD,"HTTP/1\.1\x20505\x20Unknown\x20Version\r\nCo SF:ntent-Type:\x20text/html;charset=iso-8859-1\r\nContent-Length:\x2058\r\ SF:nConnection:\x20close\r\n\r\n

Bad\x20Message\x20505

reason:
SF:\x20Unknown\x20Version
")%r(FourOhFourRequest,77,"HTTP/1\.1\x20404 SF:\x20Not\x20Found\r\nDate:\x20Tue,\x2016\x20Dec\x202025\x2013:27:36\x20G SF:MT\r\nX-Frame-Options:\x20DENY\r\nX-Content-Type-Options:\x20nosniff\r\ SF:n\r\n")%r(Socks5,C3,"HTTP/1\.1\x20400\x20Illegal\x20character\x20CNTL=0 SF:x5\r\nContent-Type:\x20text/html;charset=iso-8859-1\r\nContent-Length:\ SF:x2069\r\nConnection:\x20close\r\n\r\n

Bad\x20Message\x20400

reason:\x20Illegal\x20character\x20CNTL=0x5
")%r(Socks4,C3,"HTTP/ SF:1\.1\x20400\x20Illegal\x20character\x20CNTL=0x4\r\nContent-Type:\x20tex SF:t/html;charset=iso-8859-1\r\nContent-Length:\x2069\r\nConnection:\x20cl SF:ose\r\n\r\n

Bad\x20Message\x20400

reason:\x20Illegal\x20cha
SF:racter\x20CNTL=0x4
")%r(RPCCheck,C7,"HTTP/1\.1\x20400\x20Illegal\x SF:20character\x20OTEXT=0x80\r\nContent-Type:\x20text/html;charset=iso-885 SF:9-1\r\nContent-Length:\x2071\r\nConnection:\x20close\r\n\r\n

Bad\x20 SF:Message\x20400

reason:\x20Illegal\x20character\x20OTEXT=0x80")%r(DNSVersionBindReqTCP,C3,"HTTP/1\.1\x20400\x20Illegal\x20charac
SF:ter\x20CNTL=0x0\r\nContent-Type:\x20text/html;charset=iso-8859-1\r\nCon
SF:tent-Length:\x2069\r\nConnection:\x20close\r\n\r\n

Bad\x20Message\x2 SF:0400

reason:\x20Illegal\x20character\x20CNTL=0x0
")%r(Hel SF:p,9B,"HTTP/1\.1\x20400\x20No\x20URI\r\nContent-Type:\x20text/html;chars SF:et=iso-8859-1\r\nContent-Length:\x2049\r\nConnection:\x20close\r\n\r\n< SF:h1>Bad\x20Message\x20400
reason:\x20No\x20URI
"); Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 13.39 seconds
===== 158.36.191.216 aka vert2.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:27 CET Nmap scan report for vert2.nuug.no (158.36.191.216) Host is up (0.00028s latency). Not shown: 96 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 (protocol 2.0) 53/tcp open domain dnsmasq 2.90 111/tcp open rpcbind 5666/tcp open tcpwrapped Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 6.44 seconds ===== 158.36.191.217 aka tjener.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:27 CET Nmap scan report for tjener.nuug.no (158.36.191.217) Host is up (0.00058s latency). Not shown: 94 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0) 25/tcp open smtp Postfix smtpd 80/tcp open http Apache httpd 111/tcp open rpcbind 443/tcp open ssl/http Apache httpd 5666/tcp open tcpwrapped Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 26.48 seconds ===== 158.36.191.218 aka vert.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:28 CET Nmap scan report for vert.nuug.no (158.36.191.218) Host is up (0.00053s latency). Not shown: 96 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0) 111/tcp open rpcbind 2049/tcp open rpcbind 5666/tcp open tcpwrapped Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 6.47 seconds ===== 158.36.191.225 aka portal.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:28 CET Nmap scan report for portal.nuug.no (158.36.191.225) Host is up (0.0011s latency). Not shown: 94 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 10.2 (protocol 2.0) 25/tcp open smtp Exim smtpd 4.98.2 80/tcp open http? 443/tcp open ssl/https? 465/tcp open ssl/smtp Exim smtpd 4.98.2 587/tcp open smtp Exim smtpd 4.98.2 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.93%I=5%D=12/16%Time=69415E7B%P=x86_64-pc-linux-gnu%r(Get SF:Request,29C,"HTTP/1\.0\x20302\x20Found\r\nDate:\x20Tue,\x2016\x20Dec\x2 SF:02025\x2013:28:27\x20UTC\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:\ SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x20486\r\nLoc SF:ation:\x20https://158\.36\.191\.225/\r\n\r\n\n\ SF:n\n\n302\x20Found\n SF:\n\n\n

302\x20Found

\n
\n
OpenBS SF:D\x20httpd
\n\n\n")%r(HTTPOptions,29C,"HTTP/1\.0 SF:\x20302\x20Found\r\nDate:\x20Tue,\x2016\x20Dec\x202025\x2013:28:27\x20U SF:TC\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:\x20close\r\nContent-Ty SF:pe:\x20text/html\r\nContent-Length:\x20486\r\nLocation:\x20https://158\ SF:.36\.191\.225/\r\n\r\n\n\n\n\n302\x20Found\n\n\n\n

302\x20Found

\n
\n
OpenBSD\x20httpd
\n SF:\n\n")%r(RTSPRequest,28B,"HTTP/1\.0\x20400\x20Bad\x20Requ SF:est\r\nDate:\x20Tue,\x2016\x20Dec\x202025\x2013:28:27\x20UTC\r\nServer: SF:\x20OpenBSD\x20httpd\r\nConnection:\x20close\r\nContent-Type:\x20text/h SF:tml\r\nContent-Length:\x20498\r\n\r\n\n\n SF:\n\n400\x20Bad\x20Request\n\n\n\n

405\x20Method\x20Not\x20Allowed

\n
\n
OpenBSD\x2 SF:0httpd
\n\n\n")%r(FourOhFourRequest,285,"HTTP/1\ SF:.0\x20404\x20Not\x20Found\r\nDate:\x20Tue,\x2016\x20Dec\x202025\x2013:2 SF:8:34\x20UTC\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:\x20close\r\nC SF:ontent-Type:\x20text/html\r\nContent-Length:\x20494\r\n\r\n\n\n\n\n404\x20Not\ SF:x20Found\n\n\n\n

404\x20Not\x20Foun SF:d

\n
\n
OpenBSD\x20httpd
\n\n\n"); Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 21.61 seconds
===== 158.36.191.228 aka archiver.nuug.no. ===== Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:28 CET Nmap scan report for archiver.nuug.no (158.36.191.228) Host is up (0.00035s latency). Not shown: 98 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0) 9100/tcp open jetdirect? Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 0.69 seconds