NMAP (Notes)
Pemindaian Mendalam IP 172.20.10.1 dengan Nmap
IP 172.20.10.1 biasanya adalah gateway lokal (misalnya dari hotspot iPhone atau router tertentu). Jika ada masalah DROP-IN di Peplink, Anda bisa gunakan Nmap untuk memeriksa konektivitas, port terbuka, dan layanan yang berjalan.
Berikut perintah Nmap lengkap untuk eksplorasi IP tersebut:
1. Pemindaian Dasar (Port Terbuka & Layanan)
nmap -sV -T4 172.20.10.1
Penjelasan Opsi:
-sV: Deteksi versi layanan.-T4: Kecepatan tinggi (agresif, tapi mungkin terdeteksi firewall).
Output Contoh:
PORT STATE SERVICE VERSION
80/tcp open http LiteSpeed httpd
443/tcp open ssl/https LiteSpeed httpd
22/tcp filtered ssh # Di-filter firewall
2. Pemindaian Semua Port (1-65535)
nmap -p- -sV -T4 172.20.10.1
-p-: Periksa semua port (bisa lama, ~30 menit).
3. Deteksi OS dan Perangkat
nmap -O -T4 172.20.10.1
-O: Coba tebak sistem operasi perangkat.- Hasil mungkin menunjukkan:
Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:4
4. Pemindaian UDP (Jika Ada Layanan Khusus)
nmap -sU -T4 172.20.10.1 -p 53,67,68,161
-sU: Scan port UDP (DNS/DHCP/SNMP).- Port umum UDP:
53(DNS)67/68(DHCP)161(SNMP)
5. Cek Vulnerabilities (Script Nmap)
nmap --script vuln -T4 172.20.10.1
--script vuln: Gunakan script NSE (Nmap Scripting Engine) untuk deteksi kerentanan.- Contoh temuan:
http-sql-injection: Potensi SQL Injection di /admin/login.php.
6. Pemindaian Cepat (Hanya Port Umum)
nmap -F -T4 172.20.10.1
-F: Fast mode (hanya cek 100 port umum).
7. Simpan Hasil ke File
nmap -sV -T4 -oN hasil_scan.txt 172.20.10.1
-oN: Simpan hasil dalam format teks.- Opsi lain:
-oX hasil.xml(format XML).-oG hasil.grep(format grep-friendly).
8. Troubleshooting DROP-IN di Peplink
Jika IP 172.20.10.1 adalah perangkat Peplink, berikut yang perlu diperiksa:
a. Apakah Port Penting Terbuka?
- Port 80/443: Web admin panel Peplink.
- Port 22/23: SSH/Telnet (jika diaktifkan).
- Port 6060/6061: SpeedFusion VPN (jika dipakai).
b. Jika Tidak Responsif:
Cek Koneksi Fisik:
ping 172.20.10.1- Jika timeout, mungkin perangkat mati/terisolasi.
Cek Firewall/NAT:
- Pastikan tidak ada aturan yang memblokir traffic ke Peplink.
Log Peplink:
- Buka admin panel (
http://172.20.10.1) dan cek log DROP-IN di:
Status > System Log > Filter "DROP"
- Buka admin panel (
9. Contoh Kasus & Solusi
Masalah: DROP-IN SpeedFusion
- Penyebab:
- Firewall memblokir port 6060/6061.
- Salah konfigurasi NAT.
- Solusi:
bash nmap -p 6060,6061 -sV 172.20.10.1Jika port filtered, buka di firewall Peplink:
Network > Firewall > Allow TCP/UDP 6060-6061
10. Rekomendasi Tambahan
- Gunakan Wireshark untuk analisis traffic real-time jika Nmap kurang jelas.
- Reset Peplink jika ada konfigurasi salah:
bash curl -X POST http://172.20.10.1/api/reset_config --user admin:password
Kesimpulan
Dengan Nmap, Anda bisa:
🔍 Identifikasi port/layanan aktif di 172.20.10.1.
🛡️ Deteksi miskonfigurasi yang menyebabkan DROP-IN.
📊 Simpan bukti untuk analisis lebih lanjut.
NMAP Pepwave UBR LTE / UBR-LTE-E-T-PRM / 293B-4C4C-02D0
nmap -p 1-65535 -T4 -A -v 192.168.2.56
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-13 08:04 SE Asia Standard Time
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 08:04
Completed NSE at 08:04, 0.00s elapsed
Initiating NSE at 08:04
Completed NSE at 08:04, 0.00s elapsed
Initiating NSE at 08:04
Completed NSE at 08:04, 0.00s elapsed
Initiating ARP Ping Scan at 08:04
Scanning 192.168.2.56 [1 port]
Completed ARP Ping Scan at 08:04, 0.20s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:04
Completed Parallel DNS resolution of 1 host. at 08:05, 16.60s elapsed
Initiating SYN Stealth Scan at 08:05
Scanning 192.168.2.56 [65535 ports]
Discovered open port 443/tcp on 192.168.2.56
Discovered open port 80/tcp on 192.168.2.56
SYN Stealth Scan Timing: About 21.94% done; ETC: 08:07 (0:01:50 remaining)
SYN Stealth Scan Timing: About 55.05% done; ETC: 08:06 (0:00:50 remaining)
Completed SYN Stealth Scan at 08:06, 93.33s elapsed (65535 total ports)
Initiating Service scan at 08:06
Scanning 2 services on 192.168.2.56
Completed Service scan at 08:06, 12.23s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against 192.168.2.56
Retrying OS detection (try #2) against 192.168.2.56
NSE: Script scanning 192.168.2.56.
Initiating NSE at 08:06
Completed NSE at 08:06, 7.49s elapsed
Initiating NSE at 08:06
Completed NSE at 08:06, 1.64s elapsed
Initiating NSE at 08:06
Completed NSE at 08:06, 0.00s elapsed
Nmap scan report for 192.168.2.56
Host is up (0.0040s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http nginx
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to https://192.168.2.56/
443/tcp open ssl/http nginx
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2022-10-28T00:00:00
| Not valid after: 2023-10-28T23:59:59
| MD5: 4551:141f:ec54:c16f:2984:fb3c:2239:a0fc
|_SHA-1: 125a:b667:3330:eb1a:d782:83c1:5c0e:0768:d6d7:92db
| http-methods:
|_ Supported Methods: GET HEAD
|_http-title: 400 The plain HTTP request was sent to HTTPS port
MAC Address: A8:C0:EA:92:42:81 (Pepwave Limited)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: WAP|general purpose|specialized|storage-misc
Running (JUST GUESSING): Linux 2.4.X|2.6.X|3.X (89%), Linksys embedded (87%), Crestron 2-Series (86%), HP embedded (85%)
OS CPE: cpe:/o:linux:linux_kernel:2.4.30 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:linksys:wrv54g cpe:/o:crestron:2_series cpe:/o:linux:linux_kernel:2.4.18 cpe:/h:hp:p2000_g3
Aggressive OS guesses: OpenWrt White Russian 0.9 (Linux 2.4.30) (89%), Linux 2.6.32 - 3.10 (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (87%), Linksys WRV54G WAP (87%), Linux 2.6.23 (87%), Crestron XPanel control system (86%), Linux 2.4.18 (86%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), HP P2000 G3 NAS device (85%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 1.023 days (since Thu Jun 12 07:34:10 2025)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=201 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE
HOP RTT ADDRESS
1 3.96 ms 192.168.2.56
NSE: Script Post-scanning.
Initiating NSE at 08:06
Completed NSE at 08:06, 0.00s elapsed
Initiating NSE at 08:06
Completed NSE at 08:06, 0.00s elapsed
Initiating NSE at 08:06
Completed NSE at 08:06, 0.00s elapsed
Read data files from: D:\MyAPP\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 138.28 seconds
Raw packets sent: 131210 (5.777MB) | Rcvd: 188 (10.397KB)
Balance380 atas:
nmap -p 1-65535 -T4 -A -v 192.168.21.1
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-13 14:35 SE Asia Standard Time
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:35
Completed NSE at 14:35, 0.00s elapsed
Initiating NSE at 14:35
Completed NSE at 14:35, 0.00s elapsed
Initiating NSE at 14:35
Completed NSE at 14:35, 0.00s elapsed
Initiating Ping Scan at 14:35
Scanning 192.168.21.1 [4 ports]
Completed Ping Scan at 14:35, 0.06s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:35
Completed Parallel DNS resolution of 1 host. at 14:35, 0.04s elapsed
Initiating SYN Stealth Scan at 14:35
Scanning 192.168.21.1 [65535 ports]
Discovered open port 443/tcp on 192.168.21.1
Discovered open port 80/tcp on 192.168.21.1
Discovered open port 49001/tcp on 192.168.21.1
Discovered open port 11753/tcp on 192.168.21.1
Discovered open port 8008/tcp on 192.168.21.1
Discovered open port 11752/tcp on 192.168.21.1
Discovered open port 8183/tcp on 192.168.21.1
Discovered open port 49000/tcp on 192.168.21.1
Discovered open port 60660/tcp on 192.168.21.1
Discovered open port 8000/tcp on 192.168.21.1
Completed SYN Stealth Scan at 14:35, 18.01s elapsed (65535 total ports)
Initiating Service scan at 14:35
Scanning 10 services on 192.168.21.1
Completed Service scan at 14:38, 123.78s elapsed (10 services on 1 host)
Initiating OS detection (try #1) against 192.168.21.1
Retrying OS detection (try #2) against 192.168.21.1
Retrying OS detection (try #3) against 192.168.21.1
Retrying OS detection (try #4) against 192.168.21.1
Retrying OS detection (try #5) against 192.168.21.1
Initiating Traceroute at 14:38
Completed Traceroute at 14:38, 0.01s elapsed
Initiating Parallel DNS resolution of 1 host. at 14:38
Completed Parallel DNS resolution of 1 host. at 14:38, 11.04s elapsed
NSE: Script scanning 192.168.21.1.
Initiating NSE at 14:38
Completed NSE at 14:38, 14.48s elapsed
Initiating NSE at 14:38
Completed NSE at 14:38, 1.67s elapsed
Initiating NSE at 14:38
Completed NSE at 14:38, 0.00s elapsed
Nmap scan report for 192.168.21.1
Host is up (0.0019s latency).
Not shown: 65523 closed tcp ports (reset)
PORT STATE SERVICE VERSION
80/tcp open http nginx
|_http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to https://192.168.21.1/
443/tcp open ssl/http nginx
|_ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after: 2026-03-28T03:13:03
| MD5: 9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
|_http-title: Web Administration Interface
| http-methods:
|_ Supported Methods: GET HEAD
5000/tcp filtered upnp
8000/tcp open ssl/http nginx
|_ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after: 2026-03-28T03:13:03
| MD5: 9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
|_http-title: 403 Forbidden
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
8008/tcp open http nginx
|_http-title: 403 Forbidden
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
8183/tcp open http nginx
|_http-title: Blocked Site
|_Requested resource was redirect.cgi
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
11752/tcp open http nginx
| http-methods:
|_ Supported Methods: GET HEAD POST
|_http-title: 403 Forbidden
11753/tcp open ssl/http nginx
|_ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after: 2026-03-28T03:13:03
| MD5: 9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
| http-methods:
|_ Supported Methods: GET HEAD POST
44444/tcp filtered cognex-dataman
49000/tcp open matahari?
49001/tcp open ssl/http nginx
|_http-title: Site doesn't have a title (text/plain).
| ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after: 2026-03-28T03:13:03
| MD5: 9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
60660/tcp open echo
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.95%E=4%D=6/13%OT=80%CT=1%CU=39795%PV=Y%DS=1%DC=T%G=Y%TM=684BD58
OS:1%P=i686-pc-windows-windows)SEQ(SP=102%GCD=1%ISR=103%TI=Z%CI=Z%II=I%TS=A
OS:)SEQ(SP=102%GCD=1%ISR=109%TI=Z%CI=Z%II=I%TS=A)SEQ(SP=102%GCD=1%ISR=10B%T
OS:I=Z%CI=Z%II=I%TS=A)SEQ(SP=105%GCD=1%ISR=10A%TI=Z%CI=Z%II=I%TS=A)SEQ(SP=F
OS:9%GCD=1%ISR=10A%TI=Z%CI=Z%II=I%TS=A)OPS(O1=M2300ST11NW9%O2=M2300ST11NW9%
OS:O3=M2300NNT11NW9%O4=M2300ST11NW9%O5=M2300ST11NW9%O6=M2300ST11)WIN(W1=F4A
OS:C%W2=F4AC%W3=F4AC%W4=F4AC%W5=F4AC%W6=F4AC)ECN(R=Y%DF=Y%T=40%W=F500%O=M23
OS:00NNSNW9%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4
OS:(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%
OS:F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=N)U1(R=
OS:Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%
OS:T=40%CD=S)
Uptime guess: 32.545 days (since Mon May 12 01:34:10 2025)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 21/tcp)
HOP RTT ADDRESS
1 2.00 ms balance380-e7a5 (192.168.21.1)
NSE: Script Post-scanning.
Initiating NSE at 14:38
Completed NSE at 14:38, 0.00s elapsed
Initiating NSE at 14:38
Completed NSE at 14:38, 0.00s elapsed
Initiating NSE at 14:38
Completed NSE at 14:38, 0.00s elapsed
Read data files from: D:\MyAPP\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 182.98 seconds
Raw packets sent: 65859 (2.902MB) | Rcvd: 65693 (2.639MB)
SDX-D6E9-HUB Peplink SDX BPL-SDX 1926-99A3-D6E9
nmap -p 1-65535 -T4 -A -v 36.37.68.59
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-13 14:48 SE Asia Standard Time
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:48
Completed NSE at 14:48, 0.00s elapsed
Initiating NSE at 14:48
Completed NSE at 14:48, 0.00s elapsed
Initiating NSE at 14:48
Completed NSE at 14:48, 0.00s elapsed
Initiating Ping Scan at 14:48
Scanning 36.37.68.59 [4 ports]
Completed Ping Scan at 14:48, 0.07s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:48
Completed Parallel DNS resolution of 1 host. at 14:48, 16.54s elapsed
Initiating SYN Stealth Scan at 14:48
Scanning 36.37.68.59 [65535 ports]
Discovered open port 80/tcp on 36.37.68.59
Discovered open port 443/tcp on 36.37.68.59
SYN Stealth Scan Timing: About 21.65% done; ETC: 14:51 (0:01:52 remaining)
Discovered open port 32015/tcp on 36.37.68.59
SYN Stealth Scan Timing: About 49.56% done; ETC: 14:50 (0:01:02 remaining)
Completed SYN Stealth Scan at 14:50, 102.67s elapsed (65535 total ports)
Initiating Service scan at 14:50
Scanning 3 services on 36.37.68.59
Completed Service scan at 14:50, 12.88s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against 36.37.68.59
Retrying OS detection (try #2) against 36.37.68.59
Initiating Traceroute at 14:50
Completed Traceroute at 14:50, 3.03s elapsed
Initiating Parallel DNS resolution of 8 hosts. at 14:50
Completed Parallel DNS resolution of 8 hosts. at 14:50, 11.29s elapsed
NSE: Script scanning 36.37.68.59.
Initiating NSE at 14:50
Completed NSE at 14:50, 5.14s elapsed
Initiating NSE at 14:50
Completed NSE at 14:51, 1.28s elapsed
Initiating NSE at 14:51
Completed NSE at 14:51, 0.00s elapsed
Nmap scan report for 36.37.68.59
Host is up (0.0099s latency).
Not shown: 65532 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http nginx
|_http-title: Did not follow redirect to https://36.37.68.59/
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
443/tcp open ssl/http nginx
|_ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after: 2026-03-28T03:13:03
| MD5: 9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
|_http-title: Web Administration Interface
| http-methods:
|_ Supported Methods: GET HEAD
32015/tcp open ssl/unknown
| ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after: 2026-03-28T03:13:03
| MD5: 9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Uptime guess: 0.000 days (since Fri Jun 13 14:50:37 2025)
Network Distance: 10 hops
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 2.00 ms 192.168.2.1
2 2.00 ms 192.168.18.1
3 7.00 ms 36.83.226.1
4 ...
5 8.00 ms 180.252.1.181
6 8.00 ms 36.95.254.221
7 ...
8 7.00 ms 3048-tbs-x1.idola.net.id (36.37.77.82)
9 10.00 ms 3047-pkt-d3.idola.net.id (36.37.76.181)
10 10.00 ms 36.37.68.59
NSE: Script Post-scanning.
Initiating NSE at 14:51
Completed NSE at 14:51, 0.00s elapsed
Initiating NSE at 14:51
Completed NSE at 14:51, 0.00s elapsed
Initiating NSE at 14:51
Completed NSE at 14:51, 0.00s elapsed
Read data files from: D:\MyAPP\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 158.11 seconds
Raw packets sent: 131241 (5.778MB) | Rcvd: 425 (27.234KB)
SDX-B032-Remote Peplink SDX/BPL-SDX/1926-99CE-B032
Tentu, berikut adalah hasil dari perintah nmap yang Anda berikan, dirapikan menggunakan format Markdown:
nmap -p 1-65535 -T4 -A -v 36.37.68.58
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-13 14:55 SE Asia Standard Time
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:55
Completed NSE at 14:55, 0.00s elapsed
Initiating NSE at 14:55
Completed NSE at 14:55, 0.00s elapsed
Initiating NSE at 14:55
Completed NSE at 14:55, 0.00s elapsed
Initiating Ping Scan at 14:55
Scanning 36.37.68.58 [4 ports]
Completed Ping Scan at 14:55, 0.08s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:55
Completed Parallel DNS resolution of 1 host. at 14:55, 11.31s elapsed
Initiating SYN Stealth Scan at 14:55
Scanning 36.37.68.58 [65535 ports]
Discovered open port 80/tcp on 36.37.68.58
Discovered open port 443/tcp on 36.37.68.58
SYN Stealth Scan Timing: About 21.09% done; ETC: 14:57 (0:01:56 remaining)
Discovered open port 32015/tcp on 36.37.68.58
SYN Stealth Scan Timing: About 54.31% done; ETC: 14:57 (0:00:51 remaining)
Completed SYN Stealth Scan at 14:57, 101.56s elapsed (65535 total ports)
Initiating Service scan at 14:57
Scanning 3 services on 36.37.68.58
Completed Service scan at 14:57, 12.84s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against 36.37.68.58
Retrying OS detection (try #2) against 36.37.68.58
Initiating Traceroute at 14:57
Completed Traceroute at 14:57, 3.03s elapsed
Initiating Parallel DNS resolution of 6 hosts. at 14:57
Completed Parallel DNS resolution of 6 hosts. at 14:57, 11.21s elapsed
NSE: Script scanning 36.37.68.58.
Initiating NSE at 14:57
Completed NSE at 14:57, 5.12s elapsed
Initiating NSE at 14:57
Completed NSE at 14:57, 1.39s elapsed
Initiating NSE at 14:57
Completed NSE at 14:57, 0.00s elapsed
Nmap scan report for 36.37.68.58
Host is up (0.011s latency).
Not shown: 65532 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http nginx
|_http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to https://36.37.68.58/
443/tcp open ssl/http nginx
|_ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after: 2026-03-28T03:13:03
| MD5: 9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
|_http-title: Web Administration Interface
| http-methods:
|_ Supported Methods: GET HEAD
32015/tcp open ssl/unknown
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after: 2026-03-28T03:13:03
| MD5: 9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: specialized|phone|general purpose|storage-misc
Running (JUST GUESSING): Crestron 2-Series (86%), Google Android 10.X|8.X (86%), Linux 4.X|2.6.X|3.X|5.X (86%), HP embedded (85%)
OS CPE: cpe:/o:crestron:2_series cpe:/o:google:android:10 cpe:/o:linux:linux_kernel:4 cpe:/o:google:android:8 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:5 cpe:/h:hp:p2000_g3
Aggressive OS guesses: Crestron XPanel control system (86%), Android 9 - 10 (Linux 4.9 - 4.14) (86%), Android 8 - 9 (Linux 3.18 - 4.4) (86%), Linux 2.6.32 - 3.13 (86%), Linux 3.2 - 4.14 (86%), Linux 4.15 - 5.19 (86%), Linux 2.6.32 - 3.10 (85%), HP P2000 G3 NAS device (85%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 0.000 days (since Fri Jun 13 14:57:21 2025)
Network Distance: 10 hops
TCP Sequence Prediction: Difficulty=253 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 2.00 ms 192.168.2.1
2 2.00 ms 192.168.18.1
3 ...
4 4.00 ms 180.252.1.182
5 ...
6 9.00 ms 36.95.254.221
7 ...
8 11.00 ms 3047-pkt-d3.idola.net.id (36.37.76.181)
9 13.00 ms 3047-pkt-d3.idola.net.id (36.37.76.181)
10 14.00 ms 36.37.68.58
NSE: Script Post-scanning.
Initiating NSE at 14:57
Completed NSE at 14:57, 0.00s elapsed
Initiating NSE at 14:57
Completed NSE at 14:57, 0.00s elapsed
Initiating NSE at 14:57
Completed NSE at 14:57, 0.00s elapsed
Read data files from: D:\MyAPP\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 151.85 seconds
Raw packets sent: 131233 (5.778MB) | Rcvd: 434 (27.769KB)