Parmi Notes Random short any article

NMAP (Notes)

Pemindaian Mendalam IP 172.20.10.1 dengan Nmap

IP 172.20.10.1 biasanya adalah gateway lokal (misalnya dari hotspot iPhone atau router tertentu). Jika ada masalah DROP-IN di Peplink, Anda bisa gunakan Nmap untuk memeriksa konektivitas, port terbuka, dan layanan yang berjalan.

Berikut perintah Nmap lengkap untuk eksplorasi IP tersebut:


1. Pemindaian Dasar (Port Terbuka & Layanan)

nmap -sV -T4 172.20.10.1

Penjelasan Opsi:

  • -sV: Deteksi versi layanan.
  • -T4: Kecepatan tinggi (agresif, tapi mungkin terdeteksi firewall).

Output Contoh:

PORT     STATE    SERVICE       VERSION
80/tcp   open     http          LiteSpeed httpd
443/tcp  open     ssl/https     LiteSpeed httpd
22/tcp   filtered ssh           # Di-filter firewall

2. Pemindaian Semua Port (1-65535)

nmap -p- -sV -T4 172.20.10.1
  • -p-: Periksa semua port (bisa lama, ~30 menit).

3. Deteksi OS dan Perangkat

nmap -O -T4 172.20.10.1
  • -O: Coba tebak sistem operasi perangkat.
  • Hasil mungkin menunjukkan:
    Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:4

4. Pemindaian UDP (Jika Ada Layanan Khusus)

nmap -sU -T4 172.20.10.1 -p 53,67,68,161
  • -sU: Scan port UDP (DNS/DHCP/SNMP).
  • Port umum UDP:
    • 53 (DNS)
    • 67/68 (DHCP)
    • 161 (SNMP)

5. Cek Vulnerabilities (Script Nmap)

nmap --script vuln -T4 172.20.10.1
  • --script vuln: Gunakan script NSE (Nmap Scripting Engine) untuk deteksi kerentanan.
  • Contoh temuan:
    http-sql-injection: Potensi SQL Injection di /admin/login.php.

6. Pemindaian Cepat (Hanya Port Umum)

nmap -F -T4 172.20.10.1
  • -F: Fast mode (hanya cek 100 port umum).

7. Simpan Hasil ke File

nmap -sV -T4 -oN hasil_scan.txt 172.20.10.1
  • -oN: Simpan hasil dalam format teks.
  • Opsi lain:
    • -oX hasil.xml (format XML).
    • -oG hasil.grep (format grep-friendly).

8. Troubleshooting DROP-IN di Peplink

Jika IP 172.20.10.1 adalah perangkat Peplink, berikut yang perlu diperiksa:

a. Apakah Port Penting Terbuka?

  • Port 80/443: Web admin panel Peplink.
  • Port 22/23: SSH/Telnet (jika diaktifkan).
  • Port 6060/6061: SpeedFusion VPN (jika dipakai).

b. Jika Tidak Responsif:

  1. Cek Koneksi Fisik:

    ping 172.20.10.1
    
    • Jika timeout, mungkin perangkat mati/terisolasi.
  2. Cek Firewall/NAT:

    • Pastikan tidak ada aturan yang memblokir traffic ke Peplink.
  3. Log Peplink:

    • Buka admin panel (http://172.20.10.1) dan cek log DROP-IN di:
      Status > System Log > Filter "DROP"

9. Contoh Kasus & Solusi

Masalah: DROP-IN SpeedFusion

  • Penyebab:
    • Firewall memblokir port 6060/6061.
    • Salah konfigurasi NAT.
  • Solusi:
    bash nmap -p 6060,6061 -sV 172.20.10.1 Jika port filtered, buka di firewall Peplink:
    Network > Firewall > Allow TCP/UDP 6060-6061

10. Rekomendasi Tambahan

  • Gunakan Wireshark untuk analisis traffic real-time jika Nmap kurang jelas.
  • Reset Peplink jika ada konfigurasi salah:
    bash curl -X POST http://172.20.10.1/api/reset_config --user admin:password

Kesimpulan

Dengan Nmap, Anda bisa:
🔍 Identifikasi port/layanan aktif di 172.20.10.1.
🛡️ Deteksi miskonfigurasi yang menyebabkan DROP-IN.
📊 Simpan bukti untuk analisis lebih lanjut.


NMAP Pepwave UBR LTE / UBR-LTE-E-T-PRM / 293B-4C4C-02D0

nmap -p 1-65535 -T4 -A -v 192.168.2.56
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-13 08:04 SE Asia Standard Time
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 08:04
Completed NSE at 08:04, 0.00s elapsed
Initiating NSE at 08:04
Completed NSE at 08:04, 0.00s elapsed
Initiating NSE at 08:04
Completed NSE at 08:04, 0.00s elapsed
Initiating ARP Ping Scan at 08:04
Scanning 192.168.2.56 [1 port]
Completed ARP Ping Scan at 08:04, 0.20s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 08:04
Completed Parallel DNS resolution of 1 host. at 08:05, 16.60s elapsed
Initiating SYN Stealth Scan at 08:05
Scanning 192.168.2.56 [65535 ports]
Discovered open port 443/tcp on 192.168.2.56
Discovered open port 80/tcp on 192.168.2.56
SYN Stealth Scan Timing: About 21.94% done; ETC: 08:07 (0:01:50 remaining)
SYN Stealth Scan Timing: About 55.05% done; ETC: 08:06 (0:00:50 remaining)
Completed SYN Stealth Scan at 08:06, 93.33s elapsed (65535 total ports)
Initiating Service scan at 08:06
Scanning 2 services on 192.168.2.56
Completed Service scan at 08:06, 12.23s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against 192.168.2.56
Retrying OS detection (try #2) against 192.168.2.56
NSE: Script scanning 192.168.2.56.
Initiating NSE at 08:06
Completed NSE at 08:06, 7.49s elapsed
Initiating NSE at 08:06
Completed NSE at 08:06, 1.64s elapsed
Initiating NSE at 08:06
Completed NSE at 08:06, 0.00s elapsed
Nmap scan report for 192.168.2.56
Host is up (0.0040s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT     STATE SERVICE  VERSION
80/tcp   open  http     nginx
| http-methods:
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to https://192.168.2.56/
443/tcp  open  ssl/http nginx
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2022-10-28T00:00:00
| Not valid after:  2023-10-28T23:59:59
| MD5:    4551:141f:ec54:c16f:2984:fb3c:2239:a0fc
|_SHA-1: 125a:b667:3330:eb1a:d782:83c1:5c0e:0768:d6d7:92db
| http-methods:
|_  Supported Methods: GET HEAD
|_http-title: 400 The plain HTTP request was sent to HTTPS port
MAC Address: A8:C0:EA:92:42:81 (Pepwave Limited)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: WAP|general purpose|specialized|storage-misc
Running (JUST GUESSING): Linux 2.4.X|2.6.X|3.X (89%), Linksys embedded (87%), Crestron 2-Series (86%), HP embedded (85%)
OS CPE: cpe:/o:linux:linux_kernel:2.4.30 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:linksys:wrv54g cpe:/o:crestron:2_series cpe:/o:linux:linux_kernel:2.4.18 cpe:/h:hp:p2000_g3
Aggressive OS guesses: OpenWrt White Russian 0.9 (Linux 2.4.30) (89%), Linux 2.6.32 - 3.10 (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (87%), Linksys WRV54G WAP (87%), Linux 2.6.23 (87%), Crestron XPanel control system (86%), Linux 2.4.18 (86%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), HP P2000 G3 NAS device (85%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 1.023 days (since Thu Jun 12 07:34:10 2025)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=201 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE
HOP RTT     ADDRESS
1   3.96 ms 192.168.2.56

NSE: Script Post-scanning.
Initiating NSE at 08:06
Completed NSE at 08:06, 0.00s elapsed
Initiating NSE at 08:06
Completed NSE at 08:06, 0.00s elapsed
Initiating NSE at 08:06
Completed NSE at 08:06, 0.00s elapsed
Read data files from: D:\MyAPP\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 138.28 seconds
         Raw packets sent: 131210 (5.777MB) | Rcvd: 188 (10.397KB)

Balance380 atas:

nmap -p 1-65535 -T4 -A -v 192.168.21.1
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-13 14:35 SE Asia Standard Time
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:35
Completed NSE at 14:35, 0.00s elapsed
Initiating NSE at 14:35
Completed NSE at 14:35, 0.00s elapsed
Initiating NSE at 14:35
Completed NSE at 14:35, 0.00s elapsed
Initiating Ping Scan at 14:35
Scanning 192.168.21.1 [4 ports]
Completed Ping Scan at 14:35, 0.06s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:35
Completed Parallel DNS resolution of 1 host. at 14:35, 0.04s elapsed
Initiating SYN Stealth Scan at 14:35
Scanning 192.168.21.1 [65535 ports]
Discovered open port 443/tcp on 192.168.21.1
Discovered open port 80/tcp on 192.168.21.1
Discovered open port 49001/tcp on 192.168.21.1
Discovered open port 11753/tcp on 192.168.21.1
Discovered open port 8008/tcp on 192.168.21.1
Discovered open port 11752/tcp on 192.168.21.1
Discovered open port 8183/tcp on 192.168.21.1
Discovered open port 49000/tcp on 192.168.21.1
Discovered open port 60660/tcp on 192.168.21.1
Discovered open port 8000/tcp on 192.168.21.1
Completed SYN Stealth Scan at 14:35, 18.01s elapsed (65535 total ports)
Initiating Service scan at 14:35
Scanning 10 services on 192.168.21.1
Completed Service scan at 14:38, 123.78s elapsed (10 services on 1 host)
Initiating OS detection (try #1) against 192.168.21.1
Retrying OS detection (try #2) against 192.168.21.1
Retrying OS detection (try #3) against 192.168.21.1
Retrying OS detection (try #4) against 192.168.21.1
Retrying OS detection (try #5) against 192.168.21.1
Initiating Traceroute at 14:38
Completed Traceroute at 14:38, 0.01s elapsed
Initiating Parallel DNS resolution of 1 host. at 14:38
Completed Parallel DNS resolution of 1 host. at 14:38, 11.04s elapsed
NSE: Script scanning 192.168.21.1.
Initiating NSE at 14:38
Completed NSE at 14:38, 14.48s elapsed
Initiating NSE at 14:38
Completed NSE at 14:38, 1.67s elapsed
Initiating NSE at 14:38
Completed NSE at 14:38, 0.00s elapsed
Nmap scan report for 192.168.21.1
Host is up (0.0019s latency).
Not shown: 65523 closed tcp ports (reset)
PORT      STATE    SERVICE     VERSION
80/tcp    open     http        nginx
|_http-methods:
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to https://192.168.21.1/
443/tcp   open     ssl/http    nginx
|_ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after:  2026-03-28T03:13:03
| MD5:    9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
|_http-title: Web Administration Interface
| http-methods:
|_  Supported Methods: GET HEAD
5000/tcp  filtered upnp
8000/tcp  open     ssl/http    nginx
|_ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after:  2026-03-28T03:13:03
| MD5:    9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
|_http-title: 403 Forbidden
| http-methods:
|_  Supported Methods: GET HEAD POST OPTIONS
8008/tcp  open     http        nginx
|_http-title: 403 Forbidden
| http-methods:
|_  Supported Methods: GET HEAD POST OPTIONS
8183/tcp  open     http        nginx
|_http-title: Blocked Site
|_Requested resource was redirect.cgi
| http-methods:
|_  Supported Methods: GET HEAD POST OPTIONS
11752/tcp open     http        nginx
| http-methods:
|_  Supported Methods: GET HEAD POST
|_http-title: 403 Forbidden
11753/tcp open     ssl/http    nginx
|_ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after:  2026-03-28T03:13:03
| MD5:    9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
| http-methods:
|_  Supported Methods: GET HEAD POST
44444/tcp filtered cognex-dataman
49000/tcp open     matahari?
49001/tcp open     ssl/http    nginx
|_http-title: Site doesn't have a title (text/plain).
| ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after:  2026-03-28T03:13:03
| MD5:    9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
60660/tcp open     echo
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.95%E=4%D=6/13%OT=80%CT=1%CU=39795%PV=Y%DS=1%DC=T%G=Y%TM=684BD58
OS:1%P=i686-pc-windows-windows)SEQ(SP=102%GCD=1%ISR=103%TI=Z%CI=Z%II=I%TS=A
OS:)SEQ(SP=102%GCD=1%ISR=109%TI=Z%CI=Z%II=I%TS=A)SEQ(SP=102%GCD=1%ISR=10B%T
OS:I=Z%CI=Z%II=I%TS=A)SEQ(SP=105%GCD=1%ISR=10A%TI=Z%CI=Z%II=I%TS=A)SEQ(SP=F
OS:9%GCD=1%ISR=10A%TI=Z%CI=Z%II=I%TS=A)OPS(O1=M2300ST11NW9%O2=M2300ST11NW9%
OS:O3=M2300NNT11NW9%O4=M2300ST11NW9%O5=M2300ST11NW9%O6=M2300ST11)WIN(W1=F4A
OS:C%W2=F4AC%W3=F4AC%W4=F4AC%W5=F4AC%W6=F4AC)ECN(R=Y%DF=Y%T=40%W=F500%O=M23
OS:00NNSNW9%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4
OS:(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%
OS:F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=N)U1(R=
OS:Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%
OS:T=40%CD=S)

Uptime guess: 32.545 days (since Mon May 12 01:34:10 2025)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=261 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE (using port 21/tcp)
HOP RTT     ADDRESS
1   2.00 ms balance380-e7a5 (192.168.21.1)

NSE: Script Post-scanning.
Initiating NSE at 14:38
Completed NSE at 14:38, 0.00s elapsed
Initiating NSE at 14:38
Completed NSE at 14:38, 0.00s elapsed
Initiating NSE at 14:38
Completed NSE at 14:38, 0.00s elapsed
Read data files from: D:\MyAPP\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 182.98 seconds
         Raw packets sent: 65859 (2.902MB) | Rcvd: 65693 (2.639MB)

SDX-D6E9-HUB Peplink SDX BPL-SDX 1926-99A3-D6E9

nmap -p 1-65535 -T4 -A -v 36.37.68.59
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-13 14:48 SE Asia Standard Time
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:48
Completed NSE at 14:48, 0.00s elapsed
Initiating NSE at 14:48
Completed NSE at 14:48, 0.00s elapsed
Initiating NSE at 14:48
Completed NSE at 14:48, 0.00s elapsed
Initiating Ping Scan at 14:48
Scanning 36.37.68.59 [4 ports]
Completed Ping Scan at 14:48, 0.07s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:48
Completed Parallel DNS resolution of 1 host. at 14:48, 16.54s elapsed
Initiating SYN Stealth Scan at 14:48
Scanning 36.37.68.59 [65535 ports]
Discovered open port 80/tcp on 36.37.68.59
Discovered open port 443/tcp on 36.37.68.59
SYN Stealth Scan Timing: About 21.65% done; ETC: 14:51 (0:01:52 remaining)
Discovered open port 32015/tcp on 36.37.68.59
SYN Stealth Scan Timing: About 49.56% done; ETC: 14:50 (0:01:02 remaining)
Completed SYN Stealth Scan at 14:50, 102.67s elapsed (65535 total ports)
Initiating Service scan at 14:50
Scanning 3 services on 36.37.68.59
Completed Service scan at 14:50, 12.88s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against 36.37.68.59
Retrying OS detection (try #2) against 36.37.68.59
Initiating Traceroute at 14:50
Completed Traceroute at 14:50, 3.03s elapsed
Initiating Parallel DNS resolution of 8 hosts. at 14:50
Completed Parallel DNS resolution of 8 hosts. at 14:50, 11.29s elapsed
NSE: Script scanning 36.37.68.59.
Initiating NSE at 14:50
Completed NSE at 14:50, 5.14s elapsed
Initiating NSE at 14:50
Completed NSE at 14:51, 1.28s elapsed
Initiating NSE at 14:51
Completed NSE at 14:51, 0.00s elapsed
Nmap scan report for 36.37.68.59
Host is up (0.0099s latency).
Not shown: 65532 filtered tcp ports (no-response)
PORT      STATE SERVICE   VERSION
80/tcp    open  http        nginx
|_http-title: Did not follow redirect to https://36.37.68.59/
| http-methods:
|_  Supported Methods: GET HEAD POST OPTIONS
443/tcp   open  ssl/http    nginx
|_ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after:  2026-03-28T03:13:03
| MD5:    9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
|_http-title: Web Administration Interface
| http-methods:
|_  Supported Methods: GET HEAD
32015/tcp open  ssl/unknown
| ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after:  2026-03-28T03:13:03
| MD5:    9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Uptime guess: 0.000 days (since Fri Jun 13 14:50:37 2025)
Network Distance: 10 hops
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   2.00 ms  192.168.2.1
2   2.00 ms  192.168.18.1
3   7.00 ms  36.83.226.1
4   ...
5   8.00 ms  180.252.1.181
6   8.00 ms  36.95.254.221
7   ...
8   7.00 ms  3048-tbs-x1.idola.net.id (36.37.77.82)
9   10.00 ms 3047-pkt-d3.idola.net.id (36.37.76.181)
10  10.00 ms 36.37.68.59

NSE: Script Post-scanning.
Initiating NSE at 14:51
Completed NSE at 14:51, 0.00s elapsed
Initiating NSE at 14:51
Completed NSE at 14:51, 0.00s elapsed
Initiating NSE at 14:51
Completed NSE at 14:51, 0.00s elapsed
Read data files from: D:\MyAPP\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 158.11 seconds
         Raw packets sent: 131241 (5.778MB) | Rcvd: 425 (27.234KB)

SDX-B032-Remote Peplink SDX/BPL-SDX/1926-99CE-B032

Tentu, berikut adalah hasil dari perintah nmap yang Anda berikan, dirapikan menggunakan format Markdown:

nmap -p 1-65535 -T4 -A -v 36.37.68.58
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-13 14:55 SE Asia Standard Time
NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 14:55
Completed NSE at 14:55, 0.00s elapsed
Initiating NSE at 14:55
Completed NSE at 14:55, 0.00s elapsed
Initiating NSE at 14:55
Completed NSE at 14:55, 0.00s elapsed
Initiating Ping Scan at 14:55
Scanning 36.37.68.58 [4 ports]
Completed Ping Scan at 14:55, 0.08s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 14:55
Completed Parallel DNS resolution of 1 host. at 14:55, 11.31s elapsed
Initiating SYN Stealth Scan at 14:55
Scanning 36.37.68.58 [65535 ports]
Discovered open port 80/tcp on 36.37.68.58
Discovered open port 443/tcp on 36.37.68.58
SYN Stealth Scan Timing: About 21.09% done; ETC: 14:57 (0:01:56 remaining)
Discovered open port 32015/tcp on 36.37.68.58
SYN Stealth Scan Timing: About 54.31% done; ETC: 14:57 (0:00:51 remaining)
Completed SYN Stealth Scan at 14:57, 101.56s elapsed (65535 total ports)
Initiating Service scan at 14:57
Scanning 3 services on 36.37.68.58
Completed Service scan at 14:57, 12.84s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against 36.37.68.58
Retrying OS detection (try #2) against 36.37.68.58
Initiating Traceroute at 14:57
Completed Traceroute at 14:57, 3.03s elapsed
Initiating Parallel DNS resolution of 6 hosts. at 14:57
Completed Parallel DNS resolution of 6 hosts. at 14:57, 11.21s elapsed
NSE: Script scanning 36.37.68.58.
Initiating NSE at 14:57
Completed NSE at 14:57, 5.12s elapsed
Initiating NSE at 14:57
Completed NSE at 14:57, 1.39s elapsed
Initiating NSE at 14:57
Completed NSE at 14:57, 0.00s elapsed
Nmap scan report for 36.37.68.58
Host is up (0.011s latency).
Not shown: 65532 filtered tcp ports (no-response)
PORT      STATE    SERVICE   VERSION
80/tcp    open     http        nginx
|_http-methods:
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to https://36.37.68.58/
443/tcp   open     ssl/http    nginx
|_ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after:  2026-03-28T03:13:03
| MD5:    9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
|_ssl-date: TLS randomness does not represent time
|_http-title: Web Administration Interface
| http-methods:
|_  Supported Methods: GET HEAD
32015/tcp open     ssl/unknown
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=captive-portal.peplink.com
| Subject Alternative Name: DNS:captive-portal.peplink.com, DNS:www.captive-portal.peplink.com
| Issuer: commonName=Go Daddy Secure Certificate Authority - G2/organizationName=GoDaddy.com, Inc./stateOrProvinceName=Arizona/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-03-28T03:13:03
| Not valid after:  2026-03-28T03:13:03
| MD5:    9901:7ff1:f459:d469:e3b9:c15a:61a8:998c
|_SHA-1: e82c:01f9:5e45:28a1:487e:135b:b040:9935:2712:5ff7
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: specialized|phone|general purpose|storage-misc
Running (JUST GUESSING): Crestron 2-Series (86%), Google Android 10.X|8.X (86%), Linux 4.X|2.6.X|3.X|5.X (86%), HP embedded (85%)
OS CPE: cpe:/o:crestron:2_series cpe:/o:google:android:10 cpe:/o:linux:linux_kernel:4 cpe:/o:google:android:8 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:5 cpe:/h:hp:p2000_g3
Aggressive OS guesses: Crestron XPanel control system (86%), Android 9 - 10 (Linux 4.9 - 4.14) (86%), Android 8 - 9 (Linux 3.18 - 4.4) (86%), Linux 2.6.32 - 3.13 (86%), Linux 3.2 - 4.14 (86%), Linux 4.15 - 5.19 (86%), Linux 2.6.32 - 3.10 (85%), HP P2000 G3 NAS device (85%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 0.000 days (since Fri Jun 13 14:57:21 2025)
Network Distance: 10 hops
TCP Sequence Prediction: Difficulty=253 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   2.00 ms  192.168.2.1
2   2.00 ms  192.168.18.1
3   ...
4   4.00 ms  180.252.1.182
5   ...
6   9.00 ms  36.95.254.221
7   ...
8   11.00 ms 3047-pkt-d3.idola.net.id (36.37.76.181)
9   13.00 ms 3047-pkt-d3.idola.net.id (36.37.76.181)
10  14.00 ms 36.37.68.58

NSE: Script Post-scanning.
Initiating NSE at 14:57
Completed NSE at 14:57, 0.00s elapsed
Initiating NSE at 14:57
Completed NSE at 14:57, 0.00s elapsed
Initiating NSE at 14:57
Completed NSE at 14:57, 0.00s elapsed
Read data files from: D:\MyAPP\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 151.85 seconds
         Raw packets sent: 131233 (5.778MB) | Rcvd: 434 (27.769KB)