Brukerverktøy

Nettstedverktøy


drift:ipoversikt

Dette er en gammel utgave av dokumentet!


Oversikt over NUUGs IP-adresser

Denne siden ble generert 16 desember 2025 med følgende kommando i bash:

$ for j in $(for i in 158.36.191.{128..255}; do echo "${i} $(host ${i})" ; done | grep -E 'nuug|skolelinux|reinholdtsen' | cut -d\  -f1); do echo "===== $j aka $(host $j|rev|cut -d\  -f1 | rev) ====="; echo "<code>" ; nmap -F -sV --version-intensity 5 $j; echo "<\/code>" ; echo " " ; done

158.36.191.153 aka git.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:25 CET
Nmap scan report for git.nuug.no (158.36.191.153)
Host is up (0.0020s latency).
Not shown: 95 closed tcp ports (conn-refused)
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 8.4p1 (protocol 2.0)
80/tcp   open  http       nginx
111/tcp  open  rpcbind
443/tcp  open  ssl/http   nginx
5666/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.59 seconds

158.36.191.154 aka freebeast.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:26 CET
Nmap scan report for freebeast.nuug.no (158.36.191.154)
Host is up (0.00024s latency).
Not shown: 99 closed tcp ports (conn-refused)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.9 (FreeBSD 20250219; protocol 2.0)
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds

158.36.191.155 aka hotell.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:26 CET
Nmap scan report for hotell.nuug.no (158.36.191.155)
Host is up (0.00027s latency).
Not shown: 94 closed tcp ports (conn-refused)
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0)
25/tcp   open  smtp       Postfix smtpd
80/tcp   open  http       Apache httpd 2.4.65
111/tcp  open  rpcbind
443/tcp  open  ssl/http   Apache httpd 2.4.65 ((Debian))
5666/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 26.46 seconds

158.36.191.156 aka varnish.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:26 CET
Nmap scan report for varnish.nuug.no (158.36.191.156)
Host is up (0.00051s latency).
Not shown: 95 closed tcp ports (conn-refused)
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0)
80/tcp   open  http?
111/tcp  open  rpcbind
443/tcp  open  ssl/https?
5666/tcp open  tcpwrapped
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.93%I=5%D=12/16%Time=69415E10%P=x86_64-pc-linux-gnu%r(Get
SF:Request,6A,"HTTP/1\.1\x20302\x20Found\r\ncontent-length:\x200\r\nlocati
SF:on:\x20https:///\r\ncache-control:\x20no-cache\r\nconnection:\x20close\
SF:r\n\r\n")%r(HTTPOptions,6A,"HTTP/1\.1\x20302\x20Found\r\ncontent-length
SF::\x200\r\nlocation:\x20https:///\r\ncache-control:\x20no-cache\r\nconne
SF:ction:\x20close\r\n\r\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20
SF:request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConne
SF:ction:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>40
SF:0\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20r
SF:equest\.\n</body></html>\n")%r(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20
SF:request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConne
SF:ction:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>40
SF:0\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20r
SF:equest\.\n</body></html>\n")%r(FourOhFourRequest,8D,"HTTP/1\.1\x20302\x
SF:20Found\r\ncontent-length:\x200\r\nlocation:\x20https:///nice%20ports%2
SF:C/Tri%6Eity\.txt%2ebak\r\ncache-control:\x20no-cache\r\nconnection:\x20
SF:close\r\n\r\n")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nCo
SF:ntent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20clo
SF:se\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20r
SF:equest</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</b
SF:ody></html>\n")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20r
SF:equest\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnec
SF:tion:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400
SF:\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20re
SF:quest\.\n</body></html>\n")%r(Help,CF,"HTTP/1\.1\x20400\x20Bad\x20reque
SF:st\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection
SF::\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20
SF:Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20reques
SF:t\.\n</body></html>\n")%r(SSLSessionReq,CF,"HTTP/1\.1\x20400\x20Bad\x20
SF:request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConne
SF:ction:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>40
SF:0\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20r
SF:equest\.\n</body></html>\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.93%T=SSL%I=5%D=12/16%Time=69415E16%P=x86_64-pc-linux-gn
SF:u%r(GetRequest,1BD,"HTTP/1\.1\x20308\x20Permanent\x20Redirect\r\ncache-
SF:control:\x20public,\x20max-age=0,\x20must-revalidate\r\ncontent-type:\x
SF:20text/plain\r\ndate:\x20Tue,\x2016\x20Dec\x202025\x2013:26:46\x20GMT\r
SF:\nlocation:\x20https://vercel\.com/\r\nrefresh:\x200;url=https://vercel
SF:\.com/\r\nserver:\x20Vercel\r\nstrict-transport-security:\x20max-age=63
SF:072000\r\nx-vercel-id:\x20arn1::59qjn-1765891606694-759a8cb2942b\r\nx-v
SF:arnish:\x2015640598\r\nage:\x200\r\nvia:\x201\.1\x20varnish\x20\(Varnis
SF:h/7\.6\)\r\ncontent-length:\x2015\r\nconnection:\x20close\r\n\r\nRedire
SF:cting\.\.\.\n")%r(HTTPOptions,1BD,"HTTP/1\.1\x20308\x20Permanent\x20Red
SF:irect\r\ncache-control:\x20public,\x20max-age=0,\x20must-revalidate\r\n
SF:content-type:\x20text/plain\r\ndate:\x20Tue,\x2016\x20Dec\x202025\x2013
SF::26:46\x20GMT\r\nlocation:\x20https://vercel\.com/\r\nrefresh:\x200;url
SF:=https://vercel\.com/\r\nserver:\x20Vercel\r\nstrict-transport-security
SF::\x20max-age=63072000\r\nx-vercel-id:\x20arn1::jvn89-1765891606736-1f97
SF:d4204136\r\nx-varnish:\x2019147861\r\nage:\x200\r\nvia:\x201\.1\x20varn
SF:ish\x20\(Varnish/7\.6\)\r\ncontent-length:\x2015\r\nconnection:\x20clos
SF:e\r\n\r\nRedirecting\.\.\.\n")%r(FourOhFourRequest,1BD,"HTTP/1\.1\x2030
SF:8\x20Permanent\x20Redirect\r\ncache-control:\x20public,\x20max-age=0,\x
SF:20must-revalidate\r\ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2016
SF:\x20Dec\x202025\x2013:26:46\x20GMT\r\nlocation:\x20https://vercel\.com/
SF:\r\nrefresh:\x200;url=https://vercel\.com/\r\nserver:\x20Vercel\r\nstri
SF:ct-transport-security:\x20max-age=63072000\r\nx-vercel-id:\x20arn1::9qd
SF:86-1765891606774-0491e63d50cf\r\nx-varnish:\x2015640601\r\nage:\x200\r\
SF:nvia:\x201\.1\x20varnish\x20\(Varnish/7\.6\)\r\ncontent-length:\x2015\r
SF:\nconnection:\x20close\r\n\r\nRedirecting\.\.\.\n")%r(tor-versions,CF,"
SF:HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Co
SF:ntrol:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/htm
SF:l\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x2
SF:0sent\x20an\x20invalid\x20request\.\n</body></html>\n");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 17.66 seconds

158.36.191.213 aka geekbay.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:26 CET
Nmap scan report for geekbay.nuug.no (158.36.191.213)
Host is up (0.00077s latency).
Not shown: 88 closed tcp ports (conn-refused)
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 9.2p1 (protocol 2.0)
25/tcp   open  smtp       Postfix smtpd
53/tcp   open  domain     (unknown banner: You dont need to know.)
80/tcp   open  http       Apache httpd
111/tcp  open  rpcbind
113/tcp  open  ident?
443/tcp  open  ssl/http   Apache httpd
465/tcp  open  ssl/smtp   Postfix smtpd
587/tcp  open  smtp       Postfix smtpd
993/tcp  open  ssl/imap   Dovecot imapd
995/tcp  open  ssl/pop3   Dovecot pop3d
5666/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 32.77 seconds

158.36.191.214 aka manager.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:27 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.27 seconds

158.36.191.215 aka docker1.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:27 CET
Nmap scan report for docker1.nuug.no (158.36.191.215)
Host is up (0.0011s latency).
Not shown: 96 filtered tcp ports (no-response)
PORT     STATE SERVICE     VERSION
22/tcp   open  ssh         OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0)
80/tcp   open  http        nginx
443/tcp  open  ssl/https?
8080/tcp open  http-proxy?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port8080-TCP:V=7.93%I=5%D=12/16%Time=69415E48%P=x86_64-pc-linux-gnu%r(G
SF:etRequest,77,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Tue,\x2016\x
SF:20Dec\x202025\x2013:27:36\x20GMT\r\nX-Frame-Options:\x20DENY\r\nX-Conte
SF:nt-Type-Options:\x20nosniff\r\n\r\n")%r(HTTPOptions,77,"HTTP/1\.1\x2040
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2016\x20Dec\x202025\x2013:27:36\x20
SF:GMT\r\nX-Frame-Options:\x20DENY\r\nX-Content-Type-Options:\x20nosniff\r
SF:\n\r\n")%r(RTSPRequest,AD,"HTTP/1\.1\x20505\x20Unknown\x20Version\r\nCo
SF:ntent-Type:\x20text/html;charset=iso-8859-1\r\nContent-Length:\x2058\r\
SF:nConnection:\x20close\r\n\r\n<h1>Bad\x20Message\x20505</h1><pre>reason:
SF:\x20Unknown\x20Version</pre>")%r(FourOhFourRequest,77,"HTTP/1\.1\x20404
SF:\x20Not\x20Found\r\nDate:\x20Tue,\x2016\x20Dec\x202025\x2013:27:36\x20G
SF:MT\r\nX-Frame-Options:\x20DENY\r\nX-Content-Type-Options:\x20nosniff\r\
SF:n\r\n")%r(Socks5,C3,"HTTP/1\.1\x20400\x20Illegal\x20character\x20CNTL=0
SF:x5\r\nContent-Type:\x20text/html;charset=iso-8859-1\r\nContent-Length:\
SF:x2069\r\nConnection:\x20close\r\n\r\n<h1>Bad\x20Message\x20400</h1><pre
SF:>reason:\x20Illegal\x20character\x20CNTL=0x5</pre>")%r(Socks4,C3,"HTTP/
SF:1\.1\x20400\x20Illegal\x20character\x20CNTL=0x4\r\nContent-Type:\x20tex
SF:t/html;charset=iso-8859-1\r\nContent-Length:\x2069\r\nConnection:\x20cl
SF:ose\r\n\r\n<h1>Bad\x20Message\x20400</h1><pre>reason:\x20Illegal\x20cha
SF:racter\x20CNTL=0x4</pre>")%r(RPCCheck,C7,"HTTP/1\.1\x20400\x20Illegal\x
SF:20character\x20OTEXT=0x80\r\nContent-Type:\x20text/html;charset=iso-885
SF:9-1\r\nContent-Length:\x2071\r\nConnection:\x20close\r\n\r\n<h1>Bad\x20
SF:Message\x20400</h1><pre>reason:\x20Illegal\x20character\x20OTEXT=0x80</
SF:pre>")%r(DNSVersionBindReqTCP,C3,"HTTP/1\.1\x20400\x20Illegal\x20charac
SF:ter\x20CNTL=0x0\r\nContent-Type:\x20text/html;charset=iso-8859-1\r\nCon
SF:tent-Length:\x2069\r\nConnection:\x20close\r\n\r\n<h1>Bad\x20Message\x2
SF:0400</h1><pre>reason:\x20Illegal\x20character\x20CNTL=0x0</pre>")%r(Hel
SF:p,9B,"HTTP/1\.1\x20400\x20No\x20URI\r\nContent-Type:\x20text/html;chars
SF:et=iso-8859-1\r\nContent-Length:\x2049\r\nConnection:\x20close\r\n\r\n<
SF:h1>Bad\x20Message\x20400</h1><pre>reason:\x20No\x20URI</pre>");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.39 seconds

158.36.191.216 aka vert2.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:27 CET
Nmap scan report for vert2.nuug.no (158.36.191.216)
Host is up (0.00028s latency).
Not shown: 96 closed tcp ports (conn-refused)
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0)
53/tcp   open  domain     dnsmasq 2.90
111/tcp  open  rpcbind
5666/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.44 seconds

158.36.191.217 aka tjener.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:27 CET
Nmap scan report for tjener.nuug.no (158.36.191.217)
Host is up (0.00058s latency).
Not shown: 94 closed tcp ports (conn-refused)
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0)
25/tcp   open  smtp       Postfix smtpd
80/tcp   open  http       Apache httpd
111/tcp  open  rpcbind
443/tcp  open  ssl/http   Apache httpd
5666/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 26.48 seconds

158.36.191.218 aka vert.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:28 CET
Nmap scan report for vert.nuug.no (158.36.191.218)
Host is up (0.00053s latency).
Not shown: 96 closed tcp ports (conn-refused)
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
111/tcp  open  rpcbind
2049/tcp open  rpcbind
5666/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.47 seconds

158.36.191.225 aka portal.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:28 CET
Nmap scan report for portal.nuug.no (158.36.191.225)
Host is up (0.0011s latency).
Not shown: 94 closed tcp ports (conn-refused)
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 10.2 (protocol 2.0)
25/tcp  open  smtp       Exim smtpd 4.98.2
80/tcp  open  http?
443/tcp open  ssl/https?
465/tcp open  ssl/smtp   Exim smtpd 4.98.2
587/tcp open  smtp       Exim smtpd 4.98.2
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.93%I=5%D=12/16%Time=69415E7B%P=x86_64-pc-linux-gnu%r(Get
SF:Request,29C,"HTTP/1\.0\x20302\x20Found\r\nDate:\x20Tue,\x2016\x20Dec\x2
SF:02025\x2013:28:27\x20UTC\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:\
SF:x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x20486\r\nLoc
SF:ation:\x20https://158\.36\.191\.225/\r\n\r\n<!DOCTYPE\x20html>\n<html>\
SF:n<head>\n<meta\x20charset=\"utf-8\">\n<title>302\x20Found</title>\n<sty
SF:le\x20type=\"text/css\"><!--\nbody\x20{\x20background-color:\x20white;\
SF:x20color:\x20black;\x20font-family:\x20'Comic\x20Sans\x20MS',\x20'Chalk
SF:board\x20SE',\x20'Comic\x20Neue',\x20sans-serif;\x20}\nhr\x20{\x20borde
SF:r:\x200;\x20border-bottom:\x201px\x20dashed;\x20}\n@media\x20\(prefers-
SF:color-scheme:\x20dark\)\x20{\nbody\x20{\x20background-color:\x20#1E1F21
SF:;\x20color:\x20#EEEFF1;\x20}\na\x20{\x20color:\x20#BAD7FF;\x20}\n}\n-->
SF:</style>\n</head>\n<body>\n<h1>302\x20Found</h1>\n<hr>\n<address>OpenBS
SF:D\x20httpd</address>\n</body>\n</html>\n")%r(HTTPOptions,29C,"HTTP/1\.0
SF:\x20302\x20Found\r\nDate:\x20Tue,\x2016\x20Dec\x202025\x2013:28:27\x20U
SF:TC\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:\x20close\r\nContent-Ty
SF:pe:\x20text/html\r\nContent-Length:\x20486\r\nLocation:\x20https://158\
SF:.36\.191\.225/\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<head>\n<meta\x20char
SF:set=\"utf-8\">\n<title>302\x20Found</title>\n<style\x20type=\"text/css\
SF:"><!--\nbody\x20{\x20background-color:\x20white;\x20color:\x20black;\x2
SF:0font-family:\x20'Comic\x20Sans\x20MS',\x20'Chalkboard\x20SE',\x20'Comi
SF:c\x20Neue',\x20sans-serif;\x20}\nhr\x20{\x20border:\x200;\x20border-bot
SF:tom:\x201px\x20dashed;\x20}\n@media\x20\(prefers-color-scheme:\x20dark\
SF:)\x20{\nbody\x20{\x20background-color:\x20#1E1F21;\x20color:\x20#EEEFF1
SF:;\x20}\na\x20{\x20color:\x20#BAD7FF;\x20}\n}\n--></style>\n</head>\n<bo
SF:dy>\n<h1>302\x20Found</h1>\n<hr>\n<address>OpenBSD\x20httpd</address>\n
SF:</body>\n</html>\n")%r(RTSPRequest,28B,"HTTP/1\.0\x20400\x20Bad\x20Requ
SF:est\r\nDate:\x20Tue,\x2016\x20Dec\x202025\x2013:28:27\x20UTC\r\nServer:
SF:\x20OpenBSD\x20httpd\r\nConnection:\x20close\r\nContent-Type:\x20text/h
SF:tml\r\nContent-Length:\x20498\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<head>
SF:\n<meta\x20charset=\"utf-8\">\n<title>400\x20Bad\x20Request</title>\n<s
SF:tyle\x20type=\"text/css\"><!--\nbody\x20{\x20background-color:\x20white
SF:;\x20color:\x20black;\x20font-family:\x20'Comic\x20Sans\x20MS',\x20'Cha
SF:lkboard\x20SE',\x20'Comic\x20Neue',\x20sans-serif;\x20}\nhr\x20{\x20bor
SF:der:\x200;\x20border-bottom:\x201px\x20dashed;\x20}\n@media\x20\(prefer
SF:s-color-scheme:\x20dark\)\x20{\nbody\x20{\x20background-color:\x20#1E1F
SF:21;\x20color:\x20#EEEFF1;\x20}\na\x20{\x20color:\x20#BAD7FF;\x20}\n}\n-
SF:-></style>\n</head>\n<body>\n<h1>400\x20Bad\x20Request</h1>\n<hr>\n<add
SF:ress>OpenBSD\x20httpd</address>\n</body>\n</html>\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.93%T=SSL%I=5%D=12/16%Time=69415E82%P=x86_64-pc-linux-gn
SF:u%r(GetRequest,20A,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\r\nC
SF:ontent-Length:\x20332\r\nContent-Type:\x20text/html\r\nDate:\x20Tue,\x2
SF:016\x20Dec\x202025\x2013:28:34\x20UTC\r\nLast-Modified:\x20Tue,\x2026\x
SF:20Aug\x202025\x2018:16:08\x20UTC\r\nServer:\x20OpenBSD\x20httpd\r\n\r\n
SF:<!DOCTYPE\x20html>\n<html\x20dir=\"ltr\"\x20class=\"\">\n\x20\x20<head>
SF:\n<style>\n\x20\x20\x20\x20body\x20{\n\x20\x20font-family:\x20sans-seri
SF:f;\n\x20\x20font-size:\x201\.1rem;\n\x20\x20line-height:\x201\.2;\n\x20
SF:\x20max-width:\x2060em;\n}\n</style>\n\x20\x20\x20\x20<meta\x20http-equ
SF:iv=\"Content-Type\"\x20content=\"text/html;\x20charset=UTF-8\"/>\n\x20\
SF:x20\x20\x20<title>hello</title>\n</head>\n<body>\n<h1>Not\x20404</h1>\n
SF:\n<p>\nNot\x20404\.\n<p>\n</body>\n</html>\n")%r(HTTPOptions,2A0,"HTTP/
SF:1\.0\x20405\x20Method\x20Not\x20Allowed\r\nDate:\x20Tue,\x2016\x20Dec\x
SF:202025\x2013:28:34\x20UTC\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:
SF:\x20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x20512\r\n\r
SF:\n<!DOCTYPE\x20html>\n<html>\n<head>\n<meta\x20charset=\"utf-8\">\n<tit
SF:le>405\x20Method\x20Not\x20Allowed</title>\n<style\x20type=\"text/css\"
SF:><!--\nbody\x20{\x20background-color:\x20white;\x20color:\x20black;\x20
SF:font-family:\x20'Comic\x20Sans\x20MS',\x20'Chalkboard\x20SE',\x20'Comic
SF:\x20Neue',\x20sans-serif;\x20}\nhr\x20{\x20border:\x200;\x20border-bott
SF:om:\x201px\x20dashed;\x20}\n@media\x20\(prefers-color-scheme:\x20dark\)
SF:\x20{\nbody\x20{\x20background-color:\x20#1E1F21;\x20color:\x20#EEEFF1;
SF:\x20}\na\x20{\x20color:\x20#BAD7FF;\x20}\n}\n--></style>\n</head>\n<bod
SF:y>\n<h1>405\x20Method\x20Not\x20Allowed</h1>\n<hr>\n<address>OpenBSD\x2
SF:0httpd</address>\n</body>\n</html>\n")%r(FourOhFourRequest,285,"HTTP/1\
SF:.0\x20404\x20Not\x20Found\r\nDate:\x20Tue,\x2016\x20Dec\x202025\x2013:2
SF:8:34\x20UTC\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:\x20close\r\nC
SF:ontent-Type:\x20text/html\r\nContent-Length:\x20494\r\n\r\n<!DOCTYPE\x2
SF:0html>\n<html>\n<head>\n<meta\x20charset=\"utf-8\">\n<title>404\x20Not\
SF:x20Found</title>\n<style\x20type=\"text/css\"><!--\nbody\x20{\x20backgr
SF:ound-color:\x20white;\x20color:\x20black;\x20font-family:\x20'Comic\x20
SF:Sans\x20MS',\x20'Chalkboard\x20SE',\x20'Comic\x20Neue',\x20sans-serif;\
SF:x20}\nhr\x20{\x20border:\x200;\x20border-bottom:\x201px\x20dashed;\x20}
SF:\n@media\x20\(prefers-color-scheme:\x20dark\)\x20{\nbody\x20{\x20backgr
SF:ound-color:\x20#1E1F21;\x20color:\x20#EEEFF1;\x20}\na\x20{\x20color:\x2
SF:0#BAD7FF;\x20}\n}\n--></style>\n</head>\n<body>\n<h1>404\x20Not\x20Foun
SF:d</h1>\n<hr>\n<address>OpenBSD\x20httpd</address>\n</body>\n</html>\n");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 21.61 seconds

158.36.191.228 aka archiver.nuug.no.

Starting Nmap 7.93 ( https://nmap.org ) at 2025-12-16 14:28 CET
Nmap scan report for archiver.nuug.no (158.36.191.228)
Host is up (0.00035s latency).
Not shown: 98 closed tcp ports (conn-refused)
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 9.2p1 Debian 2+deb12u5 (protocol 2.0)
9100/tcp open  jetdirect?
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 0.69 seconds
drift/ipoversikt.1765972635.txt.gz · Sist endret: 2025/12/17 11:57 av solbu