Differences between revisions 13 and 18 (spanning 5 versions)
Revision 13 as of 2022-03-16 12:31:32
Size: 31328
Comment: 2022-03-16 oneliner + legge til linjeskift etter {{{ for å få formatering til å virke
Revision 18 as of 2023-10-02 13:29:36
Size: 27586
Editor: solbu
Comment:
Deletions are marked like this. Additions are marked like this.
Line 5: Line 5:
Denne siden ble generert med følgende kommando: Denne siden ble generert 2 oktober 2023 med følgende kommando i bash:
Line 8: Line 8:
$ for j in $(for i in 158.36.191.{1..255}; do echo "${i} $(host ${i})" ; done | grep -E 'nuug|skolelinux|frikanalen|reinholdtsen' | cut -d\ -f1); do echo "== $j aka $(host $j|rev|cut -d\ -f1 | rev) =="; echo -n "{{{" ; nmap -F -sV --version-intensity 5 $j; echo \}\}\} ; echo " " ; done $ for j in $(for i in 158.36.191.{128..255}; do echo "${i} $(host ${i})" ; done | grep -E 'nuug|skolelinux|reinholdtsen' | cut -d\ -f1); do echo "== $j aka $(host $j|rev|cut -d\ -f1 | rev) =="; echo "{{{" ; nmap -F -sV --version-intensity 5 $j; echo \}\}\} ; echo " " ; done
Line 14: Line 14:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:51 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.45 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:13 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 4.23 seconds
Line 21: Line 21:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:51 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.60 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:13 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.51 seconds
Line 28: Line 28:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:51 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:13 CEST
Line 30: Line 30:
Host is up (0.00087s latency).
Not shown: 94 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
80/tcp open http Apache httpd 2.4.25 ((Debian) OpenSSL/1.0.2u mod_wsgi/4.5.11 Python/2.7 mod_perl/2.0.10 Perl/v5.24.1)
111/tcp open rpcbind
Host is up (0.00098s latency).
Not shown: 95 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.4p1 (protocol 2.0)
25/tcp closed smtp
80/tcp open http Apache httpd 2.4.56
113/tcp open ident?
443/tcp open ssl/http Apache httpd 2.4.56 ((Debian))
Service Info: Host: bugs.skolelinux.no

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 24.41 seconds
}}}
 
== 158.36.191.138 aka tester.skolelinux.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.48 seconds
}}}
 
== 158.36.191.139 aka user.skolelinux.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Nmap scan report for user.skolelinux.no (158.36.191.139)
Host is up (0.0013s latency).
Not shown: 97 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 9.2p1 Debian 2 (protocol 2.0)
80/tcp open http Apache httpd
5666/tcp open tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.88 seconds
}}}
 
== 158.36.191.142 aka administrator.skolelinux.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Nmap scan report for administrator.skolelinux.no (158.36.191.142)
Host is up (0.0012s latency).
Not shown: 93 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD
22/tcp open ssh OpenSSH 8.4p1 (protocol 2.0)
80/tcp open http Apache httpd
Line 37: Line 78:
443/tcp open ssl/http Apache httpd 2.4.25 ((Debian) OpenSSL/1.0.2u mod_wsgi/4.5.11 Python/2.7 mod_perl/2.0.10 Perl/v5.24.1)
5666/tcp open tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 21.90 seconds
}}}
 
== 158.36.191.138 aka tester.skolelinux.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:52 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.47 seconds
}}}
 
== 158.36.191.139 aka user.skolelinux.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:52 CET
Nmap scan report for user.skolelinux.no (158.36.191.139)
Host is up (0.00062s latency).
Not shown: 96 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
80/tcp open http Apache httpd 2.4.25
111/tcp open rpcbind
5666/tcp open tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.64 seconds
}}}
 
== 158.36.191.142 aka administrator.skolelinux.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:52 CET
Nmap scan report for administrator.skolelinux.no (158.36.191.142)
Host is up (0.00080s latency).
Not shown: 92 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD 1.3.5b
22/tcp open ssh OpenSSH 7.4p1 (protocol 2.0)
80/tcp open http Apache httpd 2.4.25 ((Debian))
111/tcp open rpcbind
113/tcp open ident?
873/tcp open rsync (protocol version 31)
873/tcp open rsync (protocol version 31)
Line 83: Line 80:
5666/tcp open nrpe?
Service Info: OS: Unix


Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 70.83 seconds
5666/tcp open tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.13 seconds
Line 92: Line 88:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:53 CET
Nmap scan report for frikanalen-prod.nuug.no (158.36.191.145)
Host is up (0.00064s latency).
Not shown: 96 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0)
80/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
443/tcp open ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
9100/tcp filtered jetdirect
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.87 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.53 seconds
Line 109: Line 95:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:53 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.57 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.56 seconds
Line 116: Line 102:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:53 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Line 118: Line 104:
Host is up (0.00076s latency). Host is up (0.0011s latency).
Line 121: Line 107:
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
53/tcp open domain ISC BIND 9.11.5-P4-5.1+deb10u6 (Debian Linux)
80/tcp open http Apache httpd 2.4.38 ((Debian))
443/tcp open ssl/http Apache httpd 2.4.38 ((Debian))
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.81 seconds
22/tcp open ssh OpenSSH 9.2p1 Debian 2 (protocol 2.0)
53/tcp open domain ISC BIND 9.18.19-1~deb12u1 (Debian Linux)
80/tcp open http Apache httpd 2.4.57 ((Debian))
443/tcp open ssl/http Apache httpd 2.4.57 ((Debian))
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.08 seconds
Line 133: Line 119:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:54 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Line 135: Line 121:
Host is up (0.00065s latency). Host is up (0.0046s latency).
Line 138: Line 124:
22/tcp open ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 0.77 seconds
22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 3.17 seconds
Line 147: Line 133:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:54 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Line 149: Line 135:
Host is up (0.00085s latency). Host is up (0.0077s latency).
Line 152: Line 138:
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0) 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
Line 159: Line 145:
Nmap done: 1 IP address (1 host up) scanned in 11.61 seconds Nmap done: 1 IP address (1 host up) scanned in 13.41 seconds
Line 164: Line 150:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:54 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Line 166: Line 152:
Host is up (0.00084s latency). Host is up (0.0026s latency).
Line 169: Line 155:
22/tcp open ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0) 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
Line 171: Line 157:
80/tcp open http Apache httpd 2.4.52
111/tcp open rpcbind
443/tcp open ssl/http Apache httpd 2.4.52 ((Debian))
80/tcp open http Apache httpd
111/tcp open rpcbind
443/tcp open ssl/http Apache httpd
Line 178: Line 164:
Nmap done: 1 IP address (1 host up) scanned in 13.17 seconds
}}}
 
== 158.36.191.153 aka cserv.nuug.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:54 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.46 seconds
Nmap done: 1 IP address (1 host up) scanned in 13.47 seconds
}}}
 
== 158.36.191.153 aka git.nuug.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Nmap scan report for git.nuug.no (158.36.191.153)
Host is up (0.0011s latency).
Not shown: 95 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.4p1 (protocol 2.0)
80/tcp open http nginx
111/tcp open rpcbind
443/tcp open ssl/http nginx
5666/tcp open tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.91 seconds
Line 190: Line 186:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:54 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Line 192: Line 188:
Host is up (0.00083s latency). Host is up (0.00059s latency).
Line 195: Line 191:
22/tcp open ssh OpenSSH 7.9 (FreeBSD 20200214; protocol 2.0) 22/tcp open ssh OpenSSH 8.8 (FreeBSD 20211221; protocol 2.0)
Line 199: Line 195:
Nmap done: 1 IP address (1 host up) scanned in 0.85 seconds Nmap done: 1 IP address (1 host up) scanned in 0.75 seconds
Line 204: Line 200:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:54 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Line 206: Line 202:
Host is up (0.00061s latency). Host is up (0.00075s latency).
Line 209: Line 205:
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u3 (protocol 2.0)
Line 211: Line 207:
80/tcp open http Apache httpd 2.4.38
111/tcp open rpcbind
443/tcp open ssl/http Apache httpd 2.4.38
80/tcp open http Apache httpd
111/tcp open rpcbind
443/tcp open ssl/http Apache httpd
Line 218: Line 214:
Nmap done: 1 IP address (1 host up) scanned in 12.76 seconds
}}}
 
== 158.36.191.156 aka sp.nuug.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:54 CET
Nmap scan report for sp.nuug.no (158.36.191.156)
Host is up (0.00076s latency).
Not shown: 95 closed ports
PORT STATE SERVICE     VERSION
22/tcp open ssh     OpenSSH 7.9p1 Debian 10+deb10u1 (protocol 2.0)
80/tcp open http-proxy Varnish http accelerator
111/tcp open rpcbind
443/tcp open ssl/http-proxy Varnish http accelerator

5666/tcp open tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel


Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.21 seconds
Nmap done: 1 IP address (1 host up) scanned in 12.65 seconds
}}}
 
== 158.36.191.156 aka varnish.nuug.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Nmap scan report for varnish.nuug.no (158.36.191.156)
Host is up (0.0017s latency).
Not shown: 97 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 9.2p1 (protocol 2.0)
111/tcp open rpc
bind
5666/tcp open tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.65 seconds
Line 241: Line 234:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:55 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 4.14 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.44 seconds
Line 248: Line 241:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:55 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.90 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.60 seconds
Line 255: Line 248:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:55 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.88 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.57 seconds
Line 262: Line 255:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:55 CET
Nmap scan report for frikanalen.nuug.no (158.36.191.194)
Host is up (0.0040s latency).
Not shown: 97 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
80/tcp open http nginx 1.14.2
5666/tcp open tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 7.49 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.41 seconds
Line 278: Line 262:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:55 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Line 280: Line 264:
Host is up (0.00082s latency). Host is up (0.00077s latency).
Line 282: Line 266:
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
25/tcp open smtp       Postfix smtpd
80/tcp open http nginx 1.10.3
111/tcp open
rpcbind
443/tcp open ssl/http nginx
5666/tcp open tcpwrapped
Service Info: Host: alaveteli-dev.nuug.no; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.21 seconds
PORT STATE    SERVICE VERSION
22/tcp open    ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
25/tcp filtered smtp
80/tcp open    http nginx 1.18.0
111/tcp open
rpcbind
443/tcp open    ssl/http nginx
5666/tcp open    tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.04 seconds
Line 297: Line 281:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:55 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Line 299: Line 283:
Host is up (0.0013s latency).
Not shown: 95 closed ports
Host is up (0.00098s latency).
Not shown: 94 closed ports
Line 306: Line 290:
5666/tcp open tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.89 seconds
443/tcp open ssl/http nginx
5666/tcp open tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 32.91 seconds
Line 314: Line 299:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:55 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.95 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:17 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.56 seconds
Line 321: Line 306:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:55 CET
Nmap scan report for frikanalen-dev.nuug.no (158.36.191.211)
Host is up (0.00058s latency).
Not shown: 97 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u1 (protocol 2.0)
80/tcp open http nginx 1.14.2
443/tcp open ssl/http nginx 1.14.2
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.15 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:17 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.59 seconds
Line 337: Line 313:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:56 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:17 CEST
Line 339: Line 315:
Host is up (0.00093s latency).
Not shown: 90 closed ports
Host is up (0.033s latency).
Not shown: 91 filtered ports
Line 354: Line 330:
Nmap done: 1 IP address (1 host up) scanned in 22.64 seconds
}}}
 
== 158.36.191.214 aka manager.skolelinux.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:56 CET
Nmap scan report for manager.skolelinux.no (158.36.191.214)
Host is up (0.00071s latency).
Nmap done: 1 IP address (1 host up) scanned in 22.37 seconds
}}}
 
== 158.36.191.214 aka manager.nuug.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:17 CEST
Nmap scan report for manager.nuug.no (158.36.191.214)
Host is up (0.00087s latency).
Line 368: Line 344:
49153/tcp open rpcbind
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.25 seconds
}}}
 
== 158.36.191.215 aka gnashbuild0.skolelinux.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:56 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.78 seconds
}}}
 
== 158.36.191.216 aka gnashbuild1.skolelinux.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:56 CET
Note: Host seems do
wn. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.57 seconds
49154/tcp open rpcbind
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.82 seconds
}}}
 
== 158.36.191.215 aka docker1.nuug.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:17 CEST
Nmap scan report for docker1.nuug.no (158.36.191.215)
Host is up (0.0023s latency).
Not sh
own: 97 filtered ports
PORT STATE SERV
ICE VERSION
22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
80/tcp open http nginx
443/tcp open ssl/http nginx
Service In
fo: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report an
y incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.48 seconds
}}}
 
== 158.36.191.216 aka vert2.nuug.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Nmap scan report for vert2.nuug.no (158.3
6.191.216)
Host is up (0.00095s latency).
Not shown: 97 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.4p1 (protocol 2.0)
111/tcp open rpcbind
5666/tcp open tcpwrapped

Service detection per
formed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.81 seconds
Line 391: Line 384:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:56 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Line 393: Line 386:
Host is up (0.00078s latency).
Not shown: 97 closed ports
Host is up (0.00076s latency).
Not shown: 95 closed ports
Line 396: Line 389:
22/tcp open ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0)
80/tcp open http Apache httpd 2.4.52
443/tcp open ssl/http Apache httpd 2.4.52 ((Debian))
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.99 seconds
22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
25/tcp open smtp Postfix smtpd
80/tcp open http Apache httpd
111/tcp open rpcbind

443/tcp open ssl/http Apache httpd
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.34 seconds
Line 407: Line 402:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:57 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Line 409: Line 404:
Host is up (0.00056s latency). Host is up (0.00091s latency).
Line 416: Line 411:
49155/tcp open rpcbind
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.76 seconds
49156/tcp open rpcbind
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.71 seconds
Line 425: Line 420:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:57 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.48 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.57 seconds
Line 432: Line 427:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:57 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Line 434: Line 429:
Host is up (0.00085s latency). Host is up (0.0010s latency).
Line 437: Line 432:
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
80/tcp open http Icecast streaming media server 2.4.4
111/tcp open rpcbind
443/tcp open ssl/http nginx 1.14.2
22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u1 (protocol 2.0)
80/tcp open http nginx
111/tcp open rpcbind
443/tcp open ssl/http nginx
Line 451: Line 446:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:57 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.73 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.54 seconds
Line 458: Line 453:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:57 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.83 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.55 seconds
Line 465: Line 460:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:57 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Line 467: Line 462:
Host is up (0.0028s latency). Host is up (0.0012s latency).
Line 469: Line 464:
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
25/tcp open smtp       Postfix smtpd
80/tcp open http nginx 1.10.3
111/tcp open
rpcbind
443/tcp open ssl/http nginx
5666/tcp open tcpwrapped
Service Info: Host: alaveteli-prod.nuug.no; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.40 seconds
PORT STATE    SERVICE VERSION
22/tcp open    ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
25/tcp filtered smtp
80/tcp open    http nginx 1.18.0
111/tcp open
rpcbind
443/tcp open    ssl/http nginx
5666/tcp open    tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.97 seconds
Line 484: Line 479:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:57 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Line 486: Line 481:
Host is up (0.0044s latency). Host is up (0.0020s latency).
Line 489: Line 484:
22/tcp open ssh OpenSSH 8.8 (protocol 2.0)
25/tcp open smtp Exim smtpd 4.94.2
22/tcp open ssh OpenSSH 9.1 (protocol 2.0)
25/tcp open smtp Exim smtpd 4.96
Line 494: Line 489:
465/tcp open ssl/smtp Exim smtpd 4.94.2
587/tcp open smtp Exim smtpd 4.94.2
465/tcp open ssl/smtp Exim smtpd 4.96
587/tcp open smtp Exim smtpd 4.96
Line 498: Line 493:
SF-Port80-TCP:V=7.70%I=5%D=3/16%Time=6231C2B9%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,29C,"HTTP/1\.0\x20302\x20Found\r\nDate:\x20Wed,\x2016\x20Mar\x20
SF:2022\x2010:58:01\x20GMT\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:\x
SF-Port80-TCP:V=7.70%I=5%D=10/2%Time=651AB54C%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,29C,"HTTP/1\.0\x20302\x20Found\r\nDate:\x20Mon,\x2002\x20Oct\x20
SF:2023\x2012:19:24\x20GMT\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:\x
Line 512: Line 507:
SF:x20302\x20Found\r\nDate:\x20Wed,\x2016\x20Mar\x202022\x2010:58:01\x20GM SF:x20302\x20Found\r\nDate:\x20Mon,\x2002\x20Oct\x202023\x2012:19:24\x20GM
Line 524: Line 519:
SF:/body>\n</html>\n")%r(RTSPRequest,29C,"HTTP/1\.0\x20302\x20Found\r\nDat
SF:e:\x20Wed,
\x2016\x20Mar\x202022\x2010:58:01\x20GMT\r\nServer:\x20OpenBS
SF:
D\x20httpd\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nCon
SF:
tent-Length:\x20486\r\nLocation:\x20https://158\.36\.191\.225/\r\n\r\n<
SF:
!DOCTYPE\x20html>\n<html>\n<head>\n<meta\x20charset=\"utf-8\">\n<title>
SF:302\x20Fo
und</title>\n<style\x20type=\"text/css\"><!--\nbody\x20{\x20ba
SF:
ckground-color:\x20white;\x20color:\x20black;\x20font-family:\x20'Comic
SF:
\x20Sans\x20MS',\x20'Chalkboard\x20SE',\x20'Comic\x20Neue',\x20sans-ser
SF:
if;\x20}\nhr\x20{\x20border:\x200;\x20border-bottom:\x201px\x20dashed;\
SF:
x20}\n@media\x20\(prefers-color-scheme:\x20dark\)\x20{\nbody\x20{\x20ba
SF:
ckground-color:\x20#1E1F21;\x20color:\x20#EEEFF1;\x20}\na\x20{\x20color
SF:
:\x20#BAD7FF;\x20}\n}\n--></style>\n</head>\n<body>\n<h1>302\x20Found</
SF:
h1>\n<hr>\n<address>OpenBSD\x20httpd</address>\n</body>\n</html>\n");
SF:/body>\n</html>\n")%r(RTSPRequest,28B,"HTTP/1\.0\x20400\x20Bad\x20Reque
SF:st\r\nDate:\x20Mon,\x2002\x20Oct\x20202
3\x2012:19:24\x20GMT\r\nServer:\
SF:
x20OpenBSD\x20httpd\r\nConnection:\x20close\r\nContent-Type:\x20text/ht
SF:
ml\r\nContent-Length:\x20498\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<head>\
SF:
n<meta\x20charset=\"utf-8\">\n<title>400\x20Bad\x20Request</title>\n<st
SF:
yle\x20type=\"text/css\"><!--\nbody\x20{\x20background-color:\x20white;
SF:
\x20color:\x20black;\x20font-family:\x20'Comic\x20Sans\x20MS',\x20'Chal
SF:
kboard\x20SE',\x20'Comic\x20Neue',\x20sans-serif;\x20}\nhr\x20{\x20bord
SF:
er:\x200;\x20border-bottom:\x201px\x20dashed;\x20}\n@media\x20\(prefers
SF:
-color-scheme:\x20dark\)\x20{\nbody\x20{\x20background-color:\x20#1E1F2
SF:
1;\x20color:\x20#EEEFF1;\x20}\na\x20{\x20color:\x20#BAD7FF;\x20}\n}\n--
SF:
></style>\n</head>\n<body>\n<h1>400\x20Bad\x20Request</h1>\n<hr>\n<addr
SF:
ess>OpenBSD\x20httpd</address>\n</body>\n</html>\n");
Line 538: Line 533:
SF-Port443-TCP:V=7.70%T=SSL%I=5%D=3/16%Time=6231C2BF%P=x86_64-pc-linux-gnu SF-Port443-TCP:V=7.70%T=SSL%I=5%D=10/2%Time=651AB552%P=x86_64-pc-linux-gnu
Line 540: Line 535:
SF:ntent-Length:\x202259\r\nContent-Type:\x20text/html\r\nDate:\x20Wed,\x2
SF:016\x20Mar\x202022\x2010:58:07\x20GMT\r\nLast-Modified:\x20Wed,\x2013\x
SF:ntent-Length:\x202259\r\nContent-Type:\x20text/html\r\nDate:\x20Mon,\x2
SF:002\x20Oct\x202023\x2012:19:30\x20GMT\r\nLast-Modified:\x20Wed,\x2013\x
Line 558: Line 553:
SF:0Wed,\x2016\x20Mar\x202022\x2010:58:07\x20GMT\r\nServer:\x20OpenBSD\x20 SF:0Mon,\x2002\x20Oct\x202023\x2012:19:30\x20GMT\r\nServer:\x20OpenBSD\x20
Line 572: Line 567:
Nmap done: 1 IP address (1 host up) scanned in 22.93 seconds Nmap done: 1 IP address (1 host up) scanned in 22.24 seconds
Line 577: Line 572:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:58 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.76 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.56 seconds
Line 584: Line 579:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:58 CET
Nmap scan report for dugnadsnett.nuug.no (158.36.191.227)
Host is up (0.00070s latency).
Not shown: 96 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
25/tcp open smtp Exim smtpd 4.89
80/tcp open http nginx 1.10.3
5666/tcp open tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 7.15 seconds
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.55 seconds
Line 601: Line 586:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:58 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Line 603: Line 588:
Host is up (0.00070s latency).
Not shown: 96 closed ports
PORT STATE    SERVICE VERSION
22/tcp open    ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0)
80/tcp open http
Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
443/tcp open    ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
9100/tcp filtered jetdirect
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.36 seconds
Host is up (0.00071s latency).
Not shown: 94 closed ports
PORT STATE SERVICE  VERSION
22/tcp open ssh OpenSSH 9.2p1 Debian 2 (protocol 2.0)
80/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
111/tcp open rpcbind
179/tcp open tcpwrapped
443/tcp open ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
9100/tcp open jetdirect?
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.89 seconds
Line 618: Line 605:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:58 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Line 620: Line 607:
Host is up (0.0011s latency). Host is up (0.00092s latency).
Line 623: Line 610:
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
80/tcp open http nginx 1.14.2
22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
80/tcp open http nginx 1.18.0
Line 631: Line 618:
Nmap done: 1 IP address (1 host up) scanned in 13.29 seconds
}}}
 
== 158.36.191.230 aka simula.frikanalen.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:58 CET
Nmap scan report for simula.frikanalen.no (158.36.191.230)
Host is up (0.00086s latency).
Not shown: 96 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.4p1 Debian 5 (protocol 2.0)
80/tcp open http Apache httpd 2.4.52
443/tcp open ssl/ssl Apache httpd (SSL-only mode)
9100/tcp filtered jetdirect
Service Info: Host: frivillig.slmoslo.no; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 39.52 seconds
}}}
 
== 158.36.191.231 aka borch.frikanalen.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:59 CET
Nmap scan report for borch.frikanalen.no (158.36.191.231)
Host is up (0.00099s latency).
Not shown: 98 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.8 (FreeBSD 20180909; protocol 2.0)
9100/tcp filtered jetdirect
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 2.61 seconds
}}}
 
== 158.36.191.232 aka obe.frikanalen.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:59 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.63 seconds
Nmap done: 1 IP address (1 host up) scanned in 13.10 seconds
Line 675: Line 623:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:59 CET Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:20 CEST
Line 677: Line 625:
Host is up (0.0013s latency). Host is up (0.0021s latency).
Line 680: Line 628:
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 0.84 seconds
22/tcp open ssh OpenSSH 9.2p1 Debian 2 (protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1.02 seconds
Line 689: Line 637:
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:59 CET
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.50 seconds
}}}
 
== 158.36.191.235 aka filserver.frikanalen.no. ==
{{{
Starting Nmap 7.70 ( https://nmap.org ) at 2022-03-16 11:59 CET
Nmap scan report for filserver.frikanalen.no (158.36.191.235)
Host is up (0.00090s latency).
Not shown: 92 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)
80/tcp open http nginx 1.14.2
111/tcp open rpcbind
139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
443/tcp open ssl/http nginx 1.14.2
445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)
3000/tcp open http Gunicorn 19.9.0
5666/tcp open tcpwrapped
Service Info: Host: FILE01; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.90 seconds
}}}
Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:20 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.58 seconds
}}}
 

Oversikt over NUUGs IP-adresser (nuug.no)

Contents

  1. Oversikt over NUUGs IP-adresser (nuug.no)
  2. 158.36.191.135 aka nerdhaven.nuug.no.
  3. 158.36.191.136 aka olddeveloper.skolelinux.no.
  4. 158.36.191.137 aka maintainer.skolelinux.no.
  5. 158.36.191.138 aka tester.skolelinux.no.
  6. 158.36.191.139 aka user.skolelinux.no.
  7. 158.36.191.142 aka administrator.skolelinux.no.
  8. 158.36.191.145 aka frikanalen-prod.nuug.no.
  9. 158.36.191.146 aka ghost.skolelinux.no.
  10. 158.36.191.147 aka www.reinholdtsen.name.
  11. 158.36.191.148 aka db.reinholdtsen.name.
  12. 158.36.191.149 aka ldap.skolelinux.no.
  13. 158.36.191.152 aka rt.nuug.no.
  14. 158.36.191.153 aka git.nuug.no.
  15. 158.36.191.154 aka freebeast.nuug.no.
  16. 158.36.191.155 aka hotell.nuug.no.
  17. 158.36.191.156 aka varnish.nuug.no.
  18. 158.36.191.157 aka fiksgatami2-dev.nuug.no.
  19. 158.36.191.158 aka master2.nuug.no.
  20. 158.36.191.192 aka security.skolelinux.no.
  21. 158.36.191.194 aka frikanalen.nuug.no.
  22. 158.36.191.196 aka alaveteli-dev.nuug.no.
  23. 158.36.191.197 aka fiksgatami-prod.nuug.no.
  24. 158.36.191.198 aka fiksgatami-dev.nuug.no.
  25. 158.36.191.211 aka frikanalen-dev.nuug.no.
  26. 158.36.191.213 aka geekbay.nuug.no.
  27. 158.36.191.214 aka manager.nuug.no.
  28. 158.36.191.215 aka docker1.nuug.no.
  29. 158.36.191.216 aka vert2.nuug.no.
  30. 158.36.191.217 aka tjener.nuug.no.
  31. 158.36.191.218 aka vert.nuug.no.
  32. 158.36.191.219 aka fiksgatami2-prod.nuug.no.
  33. 158.36.191.220 aka video.nuug.no.
  34. 158.36.191.221 aka sqldb.nuug.no.
  35. 158.36.191.222 aka speaker.skolelinux.no.
  36. 158.36.191.224 aka alaveteli-prod.nuug.no.
  37. 158.36.191.225 aka portal.nuug.no.
  38. 158.36.191.226 aka scraper.nuug.no.
  39. 158.36.191.227 aka dugnadsnett.nuug.no.
  40. 158.36.191.228 aka archiver.nuug.no.
  41. 158.36.191.229 aka piwik.nuug.no.
  42. 158.36.191.233 aka minecraftserver.reinholdtsen.name.
  43. 158.36.191.234 aka frikanalen-lc.nuug.no.

Denne siden ble generert 2 oktober 2023 med følgende kommando i bash:

   1 $ for j in $(for i in 158.36.191.{128..255}; do echo "${i} $(host ${i})" ; done | grep -E 'nuug|skolelinux|reinholdtsen' | cut -d\  -f1); do echo "== $j aka $(host $j|rev|cut -d\  -f1 | rev) =="; echo "{{{" ; nmap -F -sV --version-intensity 5 $j; echo \}\}\} ; echo " " ; done

158.36.191.135 aka nerdhaven.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:13 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 4.23 seconds

158.36.191.136 aka olddeveloper.skolelinux.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:13 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.51 seconds

158.36.191.137 aka maintainer.skolelinux.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:13 CEST
Nmap scan report for maintainer.skolelinux.no (158.36.191.137)
Host is up (0.00098s latency).
Not shown: 95 filtered ports
PORT    STATE  SERVICE  VERSION
22/tcp  open   ssh      OpenSSH 8.4p1 (protocol 2.0)
25/tcp  closed smtp
80/tcp  open   http     Apache httpd 2.4.56
113/tcp open   ident?
443/tcp open   ssl/http Apache httpd 2.4.56 ((Debian))
Service Info: Host: bugs.skolelinux.no

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 24.41 seconds

158.36.191.138 aka tester.skolelinux.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.48 seconds

158.36.191.139 aka user.skolelinux.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Nmap scan report for user.skolelinux.no (158.36.191.139)
Host is up (0.0013s latency).
Not shown: 97 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 9.2p1 Debian 2 (protocol 2.0)
80/tcp   open  http       Apache httpd
5666/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.88 seconds

158.36.191.142 aka administrator.skolelinux.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Nmap scan report for administrator.skolelinux.no (158.36.191.142)
Host is up (0.0012s latency).
Not shown: 93 closed ports
PORT     STATE SERVICE    VERSION
21/tcp   open  ftp        ProFTPD
22/tcp   open  ssh        OpenSSH 8.4p1 (protocol 2.0)
80/tcp   open  http       Apache httpd
113/tcp  open  ident?
873/tcp  open  rsync      (protocol version 31)
2049/tcp open  rpcbind
5666/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.13 seconds

158.36.191.145 aka frikanalen-prod.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.53 seconds

158.36.191.146 aka ghost.skolelinux.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.56 seconds

158.36.191.147 aka www.reinholdtsen.name.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:14 CEST
Nmap scan report for www.reinholdtsen.name (158.36.191.147)
Host is up (0.0011s latency).
Not shown: 96 closed ports
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 9.2p1 Debian 2 (protocol 2.0)
53/tcp  open  domain   ISC BIND 9.18.19-1~deb12u1 (Debian Linux)
80/tcp  open  http     Apache httpd 2.4.57 ((Debian))
443/tcp open  ssl/http Apache httpd 2.4.57 ((Debian))
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.08 seconds

158.36.191.148 aka db.reinholdtsen.name.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Nmap scan report for db.reinholdtsen.name (158.36.191.148)
Host is up (0.0046s latency).
Not shown: 99 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 3.17 seconds

158.36.191.149 aka ldap.skolelinux.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Nmap scan report for ldap.skolelinux.no (158.36.191.149)
Host is up (0.0077s latency).
Not shown: 96 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
111/tcp  open  rpcbind
389/tcp  open  ldap       OpenLDAP 2.2.X - 2.3.X
5666/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.41 seconds

158.36.191.152 aka rt.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Nmap scan report for rt.nuug.no (158.36.191.152)
Host is up (0.0026s latency).
Not shown: 94 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
25/tcp   open  smtp       Postfix smtpd
80/tcp   open  http       Apache httpd
111/tcp  open  rpcbind
443/tcp  open  ssl/http   Apache httpd
5666/tcp open  tcpwrapped
Service Info: Host:  rt.nuug.no; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.47 seconds

158.36.191.153 aka git.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Nmap scan report for git.nuug.no (158.36.191.153)
Host is up (0.0011s latency).
Not shown: 95 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 8.4p1 (protocol 2.0)
80/tcp   open  http       nginx
111/tcp  open  rpcbind
443/tcp  open  ssl/http   nginx
5666/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.91 seconds

158.36.191.154 aka freebeast.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Nmap scan report for freebeast.nuug.no (158.36.191.154)
Host is up (0.00059s latency).
Not shown: 99 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.8 (FreeBSD 20211221; protocol 2.0)
Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 0.75 seconds

158.36.191.155 aka hotell.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:15 CEST
Nmap scan report for hotell.nuug.no (158.36.191.155)
Host is up (0.00075s latency).
Not shown: 94 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 7.9p1 Debian 10+deb10u3 (protocol 2.0)
25/tcp   open  smtp       Postfix smtpd
80/tcp   open  http       Apache httpd
111/tcp  open  rpcbind
443/tcp  open  ssl/http   Apache httpd
5666/tcp open  tcpwrapped
Service Info: Host:  hotell.nuug.no; OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.65 seconds

158.36.191.156 aka varnish.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Nmap scan report for varnish.nuug.no (158.36.191.156)
Host is up (0.0017s latency).
Not shown: 97 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 9.2p1 (protocol 2.0)
111/tcp  open  rpcbind
5666/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.65 seconds

158.36.191.157 aka fiksgatami2-dev.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.44 seconds

158.36.191.158 aka master2.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.60 seconds

158.36.191.192 aka security.skolelinux.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.57 seconds

158.36.191.194 aka frikanalen.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.41 seconds

158.36.191.196 aka alaveteli-dev.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Nmap scan report for alaveteli-dev.nuug.no (158.36.191.196)
Host is up (0.00077s latency).
Not shown: 94 closed ports
PORT     STATE    SERVICE    VERSION
22/tcp   open     ssh        OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
25/tcp   filtered smtp
80/tcp   open     http       nginx 1.18.0
111/tcp  open     rpcbind
443/tcp  open     ssl/http   nginx
5666/tcp open     tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.04 seconds

158.36.191.197 aka fiksgatami-prod.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:16 CEST
Nmap scan report for fiksgatami-prod.nuug.no (158.36.191.197)
Host is up (0.00098s latency).
Not shown: 94 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 8.4p1 (protocol 2.0)
25/tcp   open  smtp       Postfix smtpd
80/tcp   open  http       nginx
111/tcp  open  rpcbind
443/tcp  open  ssl/http   nginx
5666/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 32.91 seconds

158.36.191.198 aka fiksgatami-dev.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:17 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.56 seconds

158.36.191.211 aka frikanalen-dev.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:17 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.59 seconds

158.36.191.213 aka geekbay.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:17 CEST
Nmap scan report for geekbay.nuug.no (158.36.191.213)
Host is up (0.033s latency).
Not shown: 91 filtered ports
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 7.9p1 (protocol 2.0)
25/tcp  open  smtp     Postfix smtpd
53/tcp  open  domain   (unknown banner: You dont need to know.)
80/tcp  open  http     Apache httpd
113/tcp open  ident?
443/tcp open  ssl/http Apache httpd
465/tcp open  ssl/smtp Postfix smtpd
587/tcp open  smtp     Postfix smtpd
993/tcp open  ssl/imap Dovecot imapd
995/tcp open  ssl/pop3 Dovecot pop3d

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.37 seconds

158.36.191.214 aka manager.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:17 CEST
Nmap scan report for manager.nuug.no (158.36.191.214)
Host is up (0.00087s latency).
Not shown: 95 closed ports
PORT      STATE SERVICE    VERSION
22/tcp    open  ssh        OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
111/tcp   open  rpcbind
2049/tcp  open  rpcbind
5666/tcp  open  tcpwrapped
49154/tcp open  rpcbind
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.82 seconds

158.36.191.215 aka docker1.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:17 CEST
Nmap scan report for docker1.nuug.no (158.36.191.215)
Host is up (0.0023s latency).
Not shown: 97 filtered ports
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
80/tcp  open  http     nginx
443/tcp open  ssl/http nginx
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.48 seconds

158.36.191.216 aka vert2.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Nmap scan report for vert2.nuug.no (158.36.191.216)
Host is up (0.00095s latency).
Not shown: 97 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 8.4p1 (protocol 2.0)
111/tcp  open  rpcbind
5666/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.81 seconds

158.36.191.217 aka tjener.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Nmap scan report for tjener.nuug.no (158.36.191.217)
Host is up (0.00076s latency).
Not shown: 95 closed ports
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
25/tcp  open  smtp     Postfix smtpd
80/tcp  open  http     Apache httpd
111/tcp open  rpcbind
443/tcp open  ssl/http Apache httpd
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.34 seconds

158.36.191.218 aka vert.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Nmap scan report for vert.nuug.no (158.36.191.218)
Host is up (0.00091s latency).
Not shown: 95 closed ports
PORT      STATE SERVICE    VERSION
22/tcp    open  ssh        OpenSSH 7.4p1 Debian 10+deb9u7 (protocol 2.0)
111/tcp   open  rpcbind
2049/tcp  open  rpcbind
5666/tcp  open  tcpwrapped
49156/tcp open  rpcbind
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.71 seconds

158.36.191.219 aka fiksgatami2-prod.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.57 seconds

158.36.191.220 aka video.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Nmap scan report for video.nuug.no (158.36.191.220)
Host is up (0.0010s latency).
Not shown: 94 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 9.2p1 Debian 2+deb12u1 (protocol 2.0)
80/tcp   open  http       nginx
111/tcp  open  rpcbind
443/tcp  open  ssl/http   nginx
5666/tcp open  tcpwrapped
8000/tcp open  http       Icecast streaming media server 2.4.4
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.87 seconds

158.36.191.221 aka sqldb.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.54 seconds

158.36.191.222 aka speaker.skolelinux.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:18 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.55 seconds

158.36.191.224 aka alaveteli-prod.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Nmap scan report for alaveteli-prod.nuug.no (158.36.191.224)
Host is up (0.0012s latency).
Not shown: 94 closed ports
PORT     STATE    SERVICE    VERSION
22/tcp   open     ssh        OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
25/tcp   filtered smtp
80/tcp   open     http       nginx 1.18.0
111/tcp  open     rpcbind
443/tcp  open     ssl/http   nginx
5666/tcp open     tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.97 seconds

158.36.191.225 aka portal.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Nmap scan report for portal.nuug.no (158.36.191.225)
Host is up (0.0020s latency).
Not shown: 93 closed ports
PORT    STATE SERVICE    VERSION
22/tcp  open  ssh        OpenSSH 9.1 (protocol 2.0)
25/tcp  open  smtp       Exim smtpd 4.96
53/tcp  open  domain     (generic dns response: NOTIMP)
80/tcp  open  http?
443/tcp open  ssl/https?
465/tcp open  ssl/smtp   Exim smtpd 4.96
587/tcp open  smtp       Exim smtpd 4.96
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=5%D=10/2%Time=651AB54C%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,29C,"HTTP/1\.0\x20302\x20Found\r\nDate:\x20Mon,\x2002\x20Oct\x20
SF:2023\x2012:19:24\x20GMT\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:\x
SF:20close\r\nContent-Type:\x20text/html\r\nContent-Length:\x20486\r\nLoca
SF:tion:\x20https://158\.36\.191\.225/\r\n\r\n<!DOCTYPE\x20html>\n<html>\n
SF:<head>\n<meta\x20charset=\"utf-8\">\n<title>302\x20Found</title>\n<styl
SF:e\x20type=\"text/css\"><!--\nbody\x20{\x20background-color:\x20white;\x
SF:20color:\x20black;\x20font-family:\x20'Comic\x20Sans\x20MS',\x20'Chalkb
SF:oard\x20SE',\x20'Comic\x20Neue',\x20sans-serif;\x20}\nhr\x20{\x20border
SF::\x200;\x20border-bottom:\x201px\x20dashed;\x20}\n@media\x20\(prefers-c
SF:olor-scheme:\x20dark\)\x20{\nbody\x20{\x20background-color:\x20#1E1F21;
SF:\x20color:\x20#EEEFF1;\x20}\na\x20{\x20color:\x20#BAD7FF;\x20}\n}\n--><
SF:/style>\n</head>\n<body>\n<h1>302\x20Found</h1>\n<hr>\n<address>OpenBSD
SF:\x20httpd</address>\n</body>\n</html>\n")%r(HTTPOptions,29C,"HTTP/1\.0\
SF:x20302\x20Found\r\nDate:\x20Mon,\x2002\x20Oct\x202023\x2012:19:24\x20GM
SF:T\r\nServer:\x20OpenBSD\x20httpd\r\nConnection:\x20close\r\nContent-Typ
SF:e:\x20text/html\r\nContent-Length:\x20486\r\nLocation:\x20https://158\.
SF:36\.191\.225/\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<head>\n<meta\x20chars
SF:et=\"utf-8\">\n<title>302\x20Found</title>\n<style\x20type=\"text/css\"
SF:><!--\nbody\x20{\x20background-color:\x20white;\x20color:\x20black;\x20
SF:font-family:\x20'Comic\x20Sans\x20MS',\x20'Chalkboard\x20SE',\x20'Comic
SF:\x20Neue',\x20sans-serif;\x20}\nhr\x20{\x20border:\x200;\x20border-bott
SF:om:\x201px\x20dashed;\x20}\n@media\x20\(prefers-color-scheme:\x20dark\)
SF:\x20{\nbody\x20{\x20background-color:\x20#1E1F21;\x20color:\x20#EEEFF1;
SF:\x20}\na\x20{\x20color:\x20#BAD7FF;\x20}\n}\n--></style>\n</head>\n<bod
SF:y>\n<h1>302\x20Found</h1>\n<hr>\n<address>OpenBSD\x20httpd</address>\n<
SF:/body>\n</html>\n")%r(RTSPRequest,28B,"HTTP/1\.0\x20400\x20Bad\x20Reque
SF:st\r\nDate:\x20Mon,\x2002\x20Oct\x202023\x2012:19:24\x20GMT\r\nServer:\
SF:x20OpenBSD\x20httpd\r\nConnection:\x20close\r\nContent-Type:\x20text/ht
SF:ml\r\nContent-Length:\x20498\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<head>\
SF:n<meta\x20charset=\"utf-8\">\n<title>400\x20Bad\x20Request</title>\n<st
SF:yle\x20type=\"text/css\"><!--\nbody\x20{\x20background-color:\x20white;
SF:\x20color:\x20black;\x20font-family:\x20'Comic\x20Sans\x20MS',\x20'Chal
SF:kboard\x20SE',\x20'Comic\x20Neue',\x20sans-serif;\x20}\nhr\x20{\x20bord
SF:er:\x200;\x20border-bottom:\x201px\x20dashed;\x20}\n@media\x20\(prefers
SF:-color-scheme:\x20dark\)\x20{\nbody\x20{\x20background-color:\x20#1E1F2
SF:1;\x20color:\x20#EEEFF1;\x20}\na\x20{\x20color:\x20#BAD7FF;\x20}\n}\n--
SF:></style>\n</head>\n<body>\n<h1>400\x20Bad\x20Request</h1>\n<hr>\n<addr
SF:ess>OpenBSD\x20httpd</address>\n</body>\n</html>\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=5%D=10/2%Time=651AB552%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,992,"HTTP/1\.0\x20200\x20OK\r\nConnection:\x20close\r\nCo
SF:ntent-Length:\x202259\r\nContent-Type:\x20text/html\r\nDate:\x20Mon,\x2
SF:002\x20Oct\x202023\x2012:19:30\x20GMT\r\nLast-Modified:\x20Wed,\x2013\x
SF:20Mar\x202013\x2000:21:41\x20GMT\r\nServer:\x20OpenBSD\x20httpd\r\n\r\n
SF:<!doctype\x20html\x20public\x20\"-//W3C//DTD\x20HTML\x203\.2\x20Final//
SF:EN\">\n<html>\n<head>\n<title>Test\x20Page\x20for\x20Apache\x20Installa
SF:tion</title>\n</head>\n<body\x20bgcolor=\"#ffffff\">\n<table\x20width=\
SF:"100%\"\x20border=\"0\"\x20cellpadding=\"0\"\x20cellspacing=\"0\">\n<tr
SF:>\n\x20\x20\x20\x20<td\x20bgcolor=\"99ffff\">\n<a\x20href=\"http://www\
SF:.openbsd\.org/\"><img\x20alt=\"\[OpenBSD\]\"\x20border=\"0\"\x20height=
SF:30\x20width=141\x20SRC=\"smalltitle\.gif\"></a><br>\n<b><font\x20color=
SF:\"#ee0000\"\x20size=\"18\">&nbsp;Apache</font></b>\n\x20\x20\x20\x20</t
SF:d>\n</tr>\n<tr>\n\x20\x20\x20\x20<td\x20bgcolor=\"0000cc\">&nbsp;</td>\
SF:n</tr>\n</table>\n\n<h1\x20align=\"center\">It\x20Worked!</h1>\n<p>\n\x
SF:20\x20\x20\x20If\x20you\x20can\x20see\x20this\x20page,\x20then\x20the\x
SF:20people\x20who\x20own\x20this\x20host\x20have\x20just\n\x20\x20\x20\x2
SF:0activated\x20the\x20<a\x20href=\"http://httpd\.apache\.org/\">Apache\x
SF:20Web\x20server</a>\n\x20\x20\x20\x20software\x20included\x20wit")%r(HT
SF:TPOptions,2A0,"HTTP/1\.0\x20405\x20Method\x20Not\x20Allowed\r\nDate:\x2
SF:0Mon,\x2002\x20Oct\x202023\x2012:19:30\x20GMT\r\nServer:\x20OpenBSD\x20
SF:httpd\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nContent-
SF:Length:\x20512\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<head>\n<meta\x20char
SF:set=\"utf-8\">\n<title>405\x20Method\x20Not\x20Allowed</title>\n<style\
SF:x20type=\"text/css\"><!--\nbody\x20{\x20background-color:\x20white;\x20
SF:color:\x20black;\x20font-family:\x20'Comic\x20Sans\x20MS',\x20'Chalkboa
SF:rd\x20SE',\x20'Comic\x20Neue',\x20sans-serif;\x20}\nhr\x20{\x20border:\
SF:x200;\x20border-bottom:\x201px\x20dashed;\x20}\n@media\x20\(prefers-col
SF:or-scheme:\x20dark\)\x20{\nbody\x20{\x20background-color:\x20#1E1F21;\x
SF:20color:\x20#EEEFF1;\x20}\na\x20{\x20color:\x20#BAD7FF;\x20}\n}\n--></s
SF:tyle>\n</head>\n<body>\n<h1>405\x20Method\x20Not\x20Allowed</h1>\n<hr>\
SF:n<address>OpenBSD\x20httpd</address>\n</body>\n</html>\n");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.24 seconds

158.36.191.226 aka scraper.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.56 seconds

158.36.191.227 aka dugnadsnett.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.55 seconds

158.36.191.228 aka archiver.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Nmap scan report for archiver.nuug.no (158.36.191.228)
Host is up (0.00071s latency).
Not shown: 94 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 9.2p1 Debian 2 (protocol 2.0)
80/tcp   open  http       Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
111/tcp  open  rpcbind
179/tcp  open  tcpwrapped
443/tcp  open  ssl/http   Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
9100/tcp open  jetdirect?
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.89 seconds

158.36.191.229 aka piwik.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:19 CEST
Nmap scan report for piwik.nuug.no (158.36.191.229)
Host is up (0.00092s latency).
Not shown: 95 closed ports
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
80/tcp   open  http       nginx 1.18.0
111/tcp  open  rpcbind
443/tcp  open  ssl/http   nginx
5666/tcp open  tcpwrapped
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.10 seconds

158.36.191.233 aka minecraftserver.reinholdtsen.name.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:20 CEST
Nmap scan report for minecraftserver.reinholdtsen.name (158.36.191.233)
Host is up (0.0021s latency).
Not shown: 99 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2 (protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1.02 seconds

158.36.191.234 aka frikanalen-lc.nuug.no.

Starting Nmap 7.70 ( https://nmap.org ) at 2023-10-02 14:20 CEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.58 seconds

grupper/sysadmin/IpOversikt (last edited 2023-10-02 13:29:36 by solbu)