• Willkommen im Linux Club - dem deutschsprachigen Supportforum für GNU/Linux. Registriere dich kostenlos, um alle Inhalte zu sehen und Fragen zu stellen.

[gelöst] Eine einzige Webseite nicht immer erreichbar

Hallo Forum,

mehrfach täglich ist eine Webseite für mich nicht erreichbar. Das Problem tritt ausschliesslich bei dieser Webseite auf. Es handelt sich dabei um ein Forum und auf meine Nachfrage dort hat keiner der anderen Nutzer ein ähnliches Problem berichtet. Ansonsten gibt es im Zusammenhang mit dem Internet keinerlei Probleme - keine.

Ich kann das seit ca. einem Jahr beobachten. Anfangs 2-3mal in der Woche, momentan geschätzt 10x am Tag.

Firefox meldet dann:

Seite wurde nicht gefunden
Die Verbindung mit dem Server forum.xxx.yyy schlug fehl.


dig und ping zeigen keine Auffälligkeiten.

mtr zeigt aber Paketverluste bei der Telekom und seit gestern auch bei Hetzner, wo die Seite gehostet wird.

Die Hops 1,2,3 und 9 habe ich editiert.

gw1 (Lancom) hängt am Telekom DSL-Anschluss.
gw2 ist auch ein HW-Router.
Hop 3 ist eine IP bei der Telekom (bei der mein Anschluß wohl aufläuft)

Code:
Start: Sun Mar 22 11:38:59 2020
HOST: WS-UB-03                                     Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                           0.0%     100     100      0        1.1   1.0   0.7   1.3
  2.|-- gw1                                           0.0%     100     100      0        2.5   2.4   2.1   2.7
  3.|--                                               0.0%     100     100      0       12.2  14.3  11.6  66.7
  4.|-- n-ea9-i.N.DE.NET.DTAG.DE (62.154.24.218)     93.0%     100       7     93       17.0  17.2  16.9  17.5
  5.|-- ???                                          100.0     100       0    100        0.0   0.0   0.0   0.0
  6.|-- 80.157.206.242                               81.0%     100      19     81       16.0  16.7  15.6  29.0
  7.|-- core21.fsn1.hetzner.com (213.239.252.222)     0.0%     100     100      0       19.4  19.8  18.9  53.3
  8.|-- ex9k2.dc4.fsn1.hetzner.com (213.239.229.130)  0.0%     100     100      0       19.3  19.7  18.9  30.1
  9.|-- Zielseite                                     0.0%     100     100      0       19.5  19.5  19.1  20.3
Start: Sun Mar 22 11:52:12 2020
HOST: WS-UB-03                                     Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                           0.0%     100     100      0        1.1   1.0   0.7   1.3
  2.|-- gw1                                           0.0%     100     100      0        2.5   2.4   2.1   2.7
  3.|--                                               0.0%     100     100      0       12.2  14.3  11.6  66.7
  4.|-- n-ea9-i.N.DE.NET.DTAG.DE (62.154.24.218)     68.0%     100      32     68       18.7  18.6  16.7  40.8
  5.|-- n-ea9-i.N.DE.NET.DTAG.DE (62.154.24.218)      0.0%     100     100      0       16.8  19.3  15.9  64.9
  6.|-- 80.157.206.242                               86.0%     100      14     86       16.8  16.1  15.6  17.7
  7.|-- core21.fsn1.hetzner.com (213.239.252.222)     0.0%     100     100      0       19.7  19.4  19.0  30.4
  8.|-- ex9k2.dc4.fsn1.hetzner.com (213.239.229.130)  0.0%     100     100      0       19.3  19.4  18.4  29.1
  9.|-- Zielseite                                     0.0%     100     100      0       19.5  19.5  19.1  20.3
Start: Sun Mar 22 12:09:57 2020
HOST: WS-UB-03                                     Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                           0.0%     100     100      0        1.1   1.0   0.7   1.3
  2.|-- gw1                                           0.0%     100     100      0        2.5   2.4   2.1   2.7
  3.|--                                               0.0%     100     100      0       12.2  14.3  11.6  66.7
  4.|-- ???                                          100.0     100       0    100        0.0   0.0   0.0   0.0
  5.|-- n-ea9-i.N.DE.NET.DTAG.DE (62.154.24.218)     59.0%     100      41     59       16.7  17.9  16.5  30.8
  6.|-- 80.157.206.242                               92.0%     100       8     92       15.7  16.1  15.6  17.4
  7.|-- core21.fsn1.hetzner.com (213.239.252.222)     0.0%     100     100      0       19.5  19.8  18.5  52.0
  8.|-- ex9k2.dc4.fsn1.hetzner.com (213.239.229.130)  0.0%     100     100      0       19.5  19.6  18.9  23.4
  9.|-- Zielseite                                     0.0%     100     100      0       19.5  19.5  19.1  20.3
Start: Sun Mar 22 14:26:54 2020
HOST: WS-UB-03                                     Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                           0.0%     100     100      0        1.1   1.0   0.7   1.3
  2.|-- gw1                                           0.0%     100     100      0        2.5   2.4   2.1   2.7
  3.|--                                               0.0%     100     100      0       12.2  14.3  11.6  66.7
  4.|-- ???                                          100.0     100       0    100        0.0   0.0   0.0   0.0
  5.|-- ???                                          100.0     100       0    100        0.0   0.0   0.0   0.0
  6.|-- 80.157.206.242                               94.0%     100       6     94       15.7  15.8  15.6  16.0
  7.|-- core21.fsn1.hetzner.com (213.239.252.222)     0.0%     100     100      0       19.3  19.7  19.0  43.8
  8.|-- ex9k2.dc4.fsn1.hetzner.com (213.239.229.130)  0.0%     100     100      0       19.3  19.4  18.6  27.4
  9.|-- Zielseite                                     0.0%     100     100      0       19.5  19.5  19.1  20.3
Start: Tue Mar 24 10:41:12 2020
HOST: WS-UB-03                                     Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                           0.0%     100     100      0        1.1   1.0   0.7   1.3
  2.|-- gw1                                           0.0%     100     100      0        2.5   2.4   2.1   2.7
  3.|--                                               0.0%     100     100      0       12.2  14.3  11.6  66.7
  4.|-- n-ea9-i.N.DE.NET.DTAG.DE (62.154.24.218)      0.0%     100     100      0       17.4  18.3  16.8  51.4
  5.|-- n-ea9-i.N.DE.NET.DTAG.DE (62.154.24.218)      0.0%     100     100      0       17.0  17.5  16.4  32.6
  6.|-- ???                                          100.0     100       0    100        0.0   0.0   0.0   0.0
  7.|-- core24.fsn1.hetzner.com (213.239.252.234)    84.0%     100      16     84       34.2  26.7  19.1  78.0
  8.|-- ex9k2.dc4.fsn1.hetzner.com (213.239.229.134)  0.0%     100     100      0       19.5  19.7  18.7  32.6
  9.|-- Zielseite                                     0.0%     100     100      0       19.5  19.5  19.1  20.3
Start: Tue Mar 24 11:07:45 2020
HOST: WS-UB-03                                     Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                           0.0%     100     100      0        1.1   1.0   0.7   1.3
  2.|-- gw1                                           0.0%     100     100      0        2.5   2.4   2.1   2.7
  3.|--                                               0.0%     100     100      0       12.2  14.3  11.6  66.7
  4.|-- n-ea9-i.N.DE.NET.DTAG.DE (62.154.24.218)     19.0%     100      81     19       17.3  19.1  16.5  76.1
  5.|-- n-ea9-i.N.DE.NET.DTAG.DE (62.154.24.218)     93.0%     100       7     93       16.9  17.3  16.5  19.8
  6.|-- 80.157.206.242                               42.0%     100      58     42       15.6  16.0  15.5  19.4
  7.|-- core24.fsn1.hetzner.com (213.239.252.234)    23.0%     100      77     23       19.5  20.3  18.8  45.1
  8.|-- ex9k2.dc4.fsn1.hetzner.com (213.239.229.134)  0.0%     100     100      0       19.1  19.7  19.0  29.9
  9.|-- Zielseite                                     0.0%     100     100      0       19.5  19.5  19.1  20.3

Ich bin mit meinem Latein am Ende und würde mich über Tipps freuen, wo ich denn noch nach Fehlern suchen kann.

Danke vorab.

Gruß,
Radiergummi
 

marce

Guru
Sofern Du am Netzwerkstack deines PCs, OS, Routers nicht herumgespielt hast - mach ein Ticket bei den betroffenen Providern auf.
 
OP
R

radiergummi

Member
Danke für Deine Antwort.

marce schrieb:
Sofern Du am Netzwerkstack deines PCs, OS, Routers nicht herumgespielt hast

Nein, nein. Das läuft alles wie out-of-the-box.

Mich irritiert halt, dass das nur bei einer einzigen Webseite auftritt, und dort bei offenbar keinem anderen Anwender.
Dass ein paar Pakete im Telekom-Netz verloren gehen scheint, wie ich gestern gelesen habe (Hinweise zu mtr), normal zu sein. Durch Redundanz gehen die Verbindungen dann doch noch durch.

An eine Störungsmeldung hatte ich auch schon gedacht. Aber was soll ich denn sagen? Die werden's auf die Webseite bzw. den Hoster schieben.

Gruß,
Radiergummi
 

marce

Guru
Wenn Du einen traceroute mit dem passenden packetloss hast können sie es ja nachvollziehen.

@gräfin: was sollte ein anderer Nameserver da ändern? Der TE sagt ja selbst, DNS ist ok - und wenn die IP erst mal ermittelt ist braucht man den Nameserver ja nicht mehr.
 
OP
R

radiergummi

Member
Danke für die Antworten.

@Gräfin Klara
das hat keinen Unterschied gemacht.
PS: Dein C-Programm läuft noch immer brav!

Um mal ein anderes Beispiel zu geben, habe ich hier das Log zu Euch.
Das sieht ganz anders aus:

Code:
Start: Tue Mar 24 15:14:58 2020
HOST: WS-UB-03                                           Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                                 0.0%     100     100      0        1.0   1.0   0.9   1.4
  2.|-- gw1                                                 0.0%     100     100      0        2.5   2.5   2.1   2.7
  3.|--                                                     0.0%     100     100      0       11.9  13.1  11.7  52.7
  4.|-- f-ee1-i.F.DE.NET.DTAG.DE (62.154.14.58)             0.0%     100     100      0       17.8  18.2  14.2  28.9
  5.|-- ae8.cr-nunki.sxb1.bb.godaddy.com (62.157.249.226)   0.0%     100     100      0       35.4  17.9  16.8  35.4
  6.|-- ae4.cr-vega.sxb1.bb.godaddy.com (87.230.114.66)     0.0%     100     100      0       29.5  29.8  29.1  40.8
  7.|-- ae7.cr-antares.fra10.bb.godaddy.com (87.230.115.2)  0.0%     100     100      0       19.2  19.5  18.3  44.8
  8.|-- ae2.cr-polaris.fra1.bb.godaddy.com (87.230.115.0)   0.0%     100     100      0       19.0  19.9  18.5  51.7
  9.|-- ae2.cr-pollux.cgn3.bb.godaddy.com (87.230.114.2)    0.0%     100     100      0       33.5  34.6  33.5  58.9
 10.|-- ae0.sr-apollo.cgn3.hosteurope.de (87.230.114.46)    0.0%     100     100      0       35.5  36.0  34.6  53.6
 11.|-- ???                                                100.0     100       0    100        0.0   0.0   0.0   0.0
 12.|-- wp349.webpack.hosteurope.de (5.35.226.118)          0.0%     100     100      0       35.2  35.6  34.8  52.4

100% loss bei Hop 11 stört gar nicht.

Die mtr-Logs für eine andere Seite, die auch bei Hetzner gehostet wird, sehen sehr wie die zu meinem eigentlichen Problem aus. Unterschied: es gibt in der Benutzung nicht das geringste Problem mit der Seite.

Code:
Start: Sun Mar 22 11:36:54 2020
HOST: WS-UB-03                                    Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                          0.0%     100     100      0        0.9   1.0   0.9   1.3
  2.|-- gw1                                          0.0%     100     100      0        2.5   2.5   2.2   2.9
  3.|--                                              0.0%     100     100      0       12.3  16.6  11.6  66.7
  4.|-- ???                                         100.0     100       0    100        0.0   0.0   0.0   0.0
  5.|-- ???                                         100.0     100       0    100        0.0   0.0   0.0   0.0
  6.|-- ???                                         100.0     100       0    100        0.0   0.0   0.0   0.0
  7.|-- core24.fsn1.hetzner.com (213.239.252.234)    1.0%     100      99      1       20.4  21.6  19.9  48.0
  8.|-- ex9k2.dc8.fsn1.hetzner.com (213.239.229.22)  0.0%     100     100      0       19.1  20.3  18.9  41.6
  9.|-- Zielseite2                                   0.0%     100     100      0       19.4  19.6  18.8  29.7
Start: Sun Mar 22 11:49:57 2020
HOST: WS-UB-03                                    Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                          0.0%     100     100      0        0.9   1.0   0.9   1.3
  2.|-- gw1                                          0.0%     100     100      0        2.5   2.5   2.2   2.9
  3.|--                                              0.0%     100     100      0       12.3  16.6  11.6  66.7
  4.|-- n-ea9-i.N.DE.NET.DTAG.DE (217.5.75.90)       0.0%     100     100      0       17.3  19.3  16.7  88.5
  5.|-- n-ea9-i.N.DE.NET.DTAG.DE (217.5.75.90)       0.0%     100     100      0       17.2  21.0  16.5  55.7
  6.|-- 80.157.206.242                              94.0%     100       6     94       16.8  16.9  16.5  17.2
  7.|-- core24.fsn1.hetzner.com (213.239.252.234)   38.0%     100      62     38       45.8  35.3  20.1  79.7
  8.|-- ex9k2.dc8.fsn1.hetzner.com (213.239.229.22)  0.0%     100     100      0       19.7  20.1  19.0  33.7
  9.|-- Zielseite2                                   0.0%     100     100      0       19.4  19.6  18.8  29.7
Start: Sun Mar 22 12:07:42 2020
HOST: WS-UB-03                                    Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                          0.0%     100     100      0        0.9   1.0   0.9   1.3
  2.|-- gw1                                          0.0%     100     100      0        2.5   2.5   2.2   2.9
  3.|--                                              0.0%     100     100      0       12.3  16.6  11.6  66.7
  4.|-- n-ea9-i.N.DE.NET.DTAG.DE (217.5.75.90)      54.0%     100      46     54       17.1  23.3  16.7  72.3
  5.|-- n-ea9-i.N.DE.NET.DTAG.DE (217.5.75.90)       0.0%     100     100      0       16.7  20.2  16.5  61.1
  6.|-- 80.157.206.242                              86.0%     100      14     86       17.2  17.1  16.5  18.4
  7.|-- ???                                         100.0     100       0    100        0.0   0.0   0.0   0.0
  8.|-- ex9k2.dc8.fsn1.hetzner.com (213.239.229.22)  0.0%     100     100      0       19.1  19.5  18.9  26.0
  9.|-- Zielseite2                                   0.0%     100     100      0       19.4  19.6  18.8  29.7
Start: Sun Mar 22 14:24:38 2020
HOST: WS-UB-03                                    Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                          0.0%     100     100      0        0.9   1.0   0.9   1.3
  2.|-- gw1                                          0.0%     100     100      0        2.5   2.5   2.2   2.9
  3.|--                                              0.0%     100     100      0       12.3  16.6  11.6  66.7
  4.|-- ???                                         100.0     100       0    100        0.0   0.0   0.0   0.0
  5.|-- ???                                         100.0     100       0    100        0.0   0.0   0.0   0.0
  6.|-- 80.157.206.242                              92.0%     100       8     92       17.2  17.2  16.7  18.0
  7.|-- ???                                         100.0     100       0    100        0.0   0.0   0.0   0.0
  8.|-- ex9k2.dc8.fsn1.hetzner.com (213.239.229.22)  0.0%     100     100      0       19.2  27.4  18.6 269.7
  9.|-- Zielseite2                                   0.0%     100     100      0       19.4  19.6  18.8  29.7


Daher bin ich mir nicht sicher, ob ich (wir) überhaupt an der richtigen Stelle suche(n).

Gruß,
Radiergummi
 
OP
R

radiergummi

Member
Hier bin ich jetzt wieder in einem Bereich, in dem ich nicht weiß was ich mache!
Ich musste das Log in etwa halbieren, da es 115.000 Zeilen hatte (max. 60.000 erlaubt). Ich hoffe Du kannst damit trotzdem etwas anfangen.

Beim "Beobachten" ist mir nur aufgefallen, dass die Scans unterschiedlich lange laufen.

Die meisten brauchen ca. 0.4s (einer mal 1.17s) und enden mit der Zeile "Request type: HEAD"
Code:
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:38:04 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:38:04 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:38:04 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:38:04 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=585cacfb75700debbbbba6d372c4d7db; expires=Thu, 23-Apr-2020 15:38:04 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:38:04 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

Einer war anders. Er brauchte 2.17s, er enthält eine Zeile "Transfer-Encoding: chunked" und endet mit der Zeile "Request type: GET"
Auch im zweiten Lauf den ich kurz darauf machte, kommt diese Variante nicht vor.

Code:
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:38:02 CET for 2s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:38:03 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:38:03 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:38:03 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=263af9e2f624dd1db1a6d2d6988b1cbf; expires=Thu, 23-Apr-2020 15:38:03 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:38:03 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Transfer-Encoding: chunked
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: GET)

Hier kommen die ersten Zeilen des ersten Laufs. Der zweite Lauf passt hier nicht mehr hin.

Code:
# nmap -Pn -sT -vvv -p https --script http-headers forum.zerspanungsbude.net
#########################
# Erster Versuch:
#########################
Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.22s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:52 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:52 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:52 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:52 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=501f23801217105019fe320ad3d7cee6; expires=Thu, 23-Apr-2020 15:37:52 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:52 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.40 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.22s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:52 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:52 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:52 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:52 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=55129aa65305f306bff7dadf924506ec; expires=Thu, 23-Apr-2020 15:37:52 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:52 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.40 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.99s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:53 CET for 1s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:54 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:54 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:54 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=0fd515df2f42477aad3003fe84bbf37b; expires=Thu, 23-Apr-2020 15:37:54 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:54 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 1.17 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.22s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:54 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:54 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:54 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:54 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=02243613fc7f6ba8277c1065938953da; expires=Thu, 23-Apr-2020 15:37:54 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:54 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.22s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:54 CET for 1s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:55 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:55 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:55 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=c0cf0dfde088082c1b96cc05a3b5284e; expires=Thu, 23-Apr-2020 15:37:55 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:55 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.23s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:55 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:55 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:55 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:55 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=d5cdffa0747df31c499fae13b7e36be7; expires=Thu, 23-Apr-2020 15:37:55 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:55 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.40 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.23s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:55 CET for 1s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:56 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:56 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:56 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=8c22ceede47d9ac7792ffdb1a6c70745; expires=Thu, 23-Apr-2020 15:37:56 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:56 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.40 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.21s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:56 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:56 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:56 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:56 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=aa051facb2b6b87871871abccac1e671; expires=Thu, 23-Apr-2020 15:37:56 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:56 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.22s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:56 CET for 1s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:57 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:57 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:57 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=bdaf94c028f231ef46620025958b7210; expires=Thu, 23-Apr-2020 15:37:57 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:57 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.21s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:57 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:57 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:57 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:57 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=57d9c2a214b4a37641397053f36076f7; expires=Thu, 23-Apr-2020 15:37:57 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:57 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.21s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:57 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:57 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:57 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:57 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=126e8e3eb580d6b8b916d129e15515e7; expires=Thu, 23-Apr-2020 15:37:57 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:57 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.22s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:58 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:58 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:58 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:58 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=007ca75645ced48b75d3042890008018; expires=Thu, 23-Apr-2020 15:37:58 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:58 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.22s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:58 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:58 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:58 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:58 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=9c3cca3c7716e494224b32d233ce3fd4; expires=Thu, 23-Apr-2020 15:37:58 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:58 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.42 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.22s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:59 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:59 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:59 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:59 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=3a433e575a70d38ebc1c086bd0fa6d76; expires=Thu, 23-Apr-2020 15:37:59 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:59 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.40 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:37
Completed Parallel DNS resolution of 1 host. at 16:37, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:37
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:37, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.22s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:37:59 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:37:59 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:37:59 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:37:59 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=8e1c3f490629da87827522920444b372; expires=Thu, 23-Apr-2020 15:37:59 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:37:59 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:37
Completed NSE at 16:37, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.40 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:37 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:38
Completed Parallel DNS resolution of 1 host. at 16:38, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:38
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:38, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.23s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:38:00 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:38:00 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:38:00 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:38:00 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=f2fdbcec97e7bf9b8c8e643ccb713804; expires=Thu, 23-Apr-2020 15:38:00 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:38:00 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.40 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:38 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:38
Completed Parallel DNS resolution of 1 host. at 16:38, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:38
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:38, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.21s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:38:00 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:38:00 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:38:00 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:38:00 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=f7ecdff7de1b77be45de808ed63855ca; expires=Thu, 23-Apr-2020 15:38:00 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:38:00 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.39 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:38 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:38
Completed Parallel DNS resolution of 1 host. at 16:38, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:38
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:38, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.36s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:38:00 CET for 1s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:38:01 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:38:01 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:38:01 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=6bd85549fdb82070e678c6139def55cd; expires=Thu, 23-Apr-2020 15:38:01 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:38:01 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.54 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:38 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:38
Completed Parallel DNS resolution of 1 host. at 16:38, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:38
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:38, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.23s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:38:01 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:38:01 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:38:01 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:38:01 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=9b5514bcbb59b52cff43be28bd42f3b7; expires=Thu, 23-Apr-2020 15:38:01 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:38:01 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.41 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:38 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:38
Completed Parallel DNS resolution of 1 host. at 16:38, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:38
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:38, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 2.00s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:38:02 CET for 2s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:38:03 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:38:03 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:38:03 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=263af9e2f624dd1db1a6d2d6988b1cbf; expires=Thu, 23-Apr-2020 15:38:03 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:38:03 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Transfer-Encoding: chunked
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: GET)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 2.17 seconds

Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 16:38 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 16:38
Completed Parallel DNS resolution of 1 host. at 16:38, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 16:38
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Discovered open port 443/tcp on 195.201.85.4
Completed Connect Scan at 16:38, 0.02s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.22s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 16:38:04 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 15:38:04 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Strict-Transport-Security: max-age=31536000
|   Set-Cookie: zBude_k3njt_u=1; expires=Thu, 23-Apr-2020 15:38:04 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_k=; expires=Thu, 23-Apr-2020 15:38:04 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Set-Cookie: zBude_k3njt_sid=585cacfb75700debbbbba6d372c4d7db; expires=Thu, 23-Apr-2020 15:38:04 GMT; path=/; domain=forum.zerspanungsbude.net; secure; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 15:38:04 GMT
|   Vary: Accept-Encoding
|   X-Content-Type-Options: nosniff
|   X-Frame-Options: sameorigin
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 16:38
Completed NSE at 16:38, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.42 seconds

Danke für die Mühe.

Gruß,
Radiergummi
 
OP
R

radiergummi

Member
Hier nochmal ein paar Ausgaben von Forumskollegen:

Nummer 1, auch Telekom
Code:
Start: Tue Mar 24 16:29:16 2020
HOST: xxxxxxxxxx                                   Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- ***********************                       0.0%     100     100      0       15.7  10.0   2.7  81.6
  2.|-- *************                                 0.0%     100     100      0        8.2   9.7   7.1  71.4
  3.|-- n-ea9-i.N.DE.NET.DTAG.DE (62.154.24.222)     33.0%     100      67     33       16.2  18.0  16.0  72.7
  4.|-- n-ea9-i.N.DE.NET.DTAG.DE (62.154.24.222)      0.0%     100     100      0       30.6  22.9  15.4 100.2
  5.|-- 80.157.206.242                               96.0%     100       4     96       16.3  16.4  15.9  16.9
  6.|-- ???                                          100.0     100       0    100        0.0   0.0   0.0   0.0
  7.|-- ex9k2.dc4.fsn1.hetzner.com (213.239.229.134)  0.0%     100     100      0       18.3  20.2  17.8 133.1
  8.|-- zerspanungsbude.net (195.201.85.4)            0.0%     100     100      0       18.8  19.4  18.4  56.8

Nummer 2, nicht bei der Telekom
Code:
Packets               Pings
 Host                             Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
 1. ****			   0.0%      82      82      0       12.3  11.3   0.7  33.8
    ****
 2. ****			   0.0%      82      82      0       49.0  13.0  10.4  49.0
 3. 62.214.38.5                    0.0%      82      82      0       10.3  10.2   9.2  18.9
 4. 62.214.37.134                  0.0%      82      82      0       10.4  10.9   9.5  31.0
 5. versatel-gw.hetzner.com        0.0%      82      82      0       11.9  15.2   9.6 125.2
 6. core4.fra.hetzner.com          0.0%      82      82      0       10.8  14.7  10.2  72.8
 7. core24.fsn1.hetzner.com       64.6%      82      29     53       15.4  25.0  15.2  68.4
 8. ex9k2.dc4.fsn1.hetzner.com     0.0%      81      81      0       15.0  15.5  14.8  32.4
 9. zerspanungsbude.net            0.0%      81      81      0       15.5  15.0  14.4  15.7

Nummer 3:
Code:
Start: 2020-03-24T17:38:43+0100
HOST: xxxxxxxxxxxxxx                               Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- _gateway xxxxxxxxxxxxx                        0.0%     100     100      0        3.1   8.5   1.4  90.4
  2.|-- xxxxxxxxxxxxxx                                0.0%     100     100      0       29.8  36.3  23.3 161.4
  3.|-- ???                                          100.0     100       0    100        0.0   0.0   0.0   0.0
  4.|-- ???                                          100.0     100       0    100        0.0   0.0   0.0   0.0
  5.|-- 80.157.206.242                               96.0%     100       4     96       42.4  44.0  41.9  47.1
  6.|-- core24.fsn1.hetzner.com (213.239.252.234)     3.0%     100      97      3       54.9  60.1  39.4 189.1
  7.|-- ex9k2.dc4.fsn1.hetzner.com (213.239.229.134)  0.0%     100     100      0       43.4  52.3  39.6 144.3
  8.|-- zerspanungsbude.net (195.201.85.4)            0.0%     100     100      0       41.7  47.5  39.5 126.9

Gruß und Danke,
Radiergummi
 
OP
R

radiergummi

Member
Eben konnte ich den nmap Befehl auch mal während einer Verbindungsstörung aufrufen.

Diesmal erscheint im Report eine Zeile
443/tcp filtered https no-response

Code:
Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 17:56 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 17:56
Completed NSE at 17:56, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 17:56
Completed Parallel DNS resolution of 1 host. at 17:56, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 17:56
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Completed Connect Scan at 17:56, 2.00s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 17:56
Completed NSE at 17:56, 0.00s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set.
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 17:56:08 CET for 2s
PORT    STATE    SERVICE REASON
443/tcp filtered https   no-response

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 17:56
Completed NSE at 17:56, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 2.17 seconds

Gruß,
Radiergummi
 
radiergummi schrieb:
Hier bin ich jetzt wieder in einem Bereich, in dem ich nicht weiß was ich mache!
Ich musste das Log in etwa halbieren, da es 115.000 Zeilen hatte (max. 60.000 erlaubt). Ich hoffe Du kannst damit trotzdem etwas anfangen.
Tut mir leid, ich habe leider sehr schlampig geschrieben.
>> Probier das in einer loop laufen zu lassen, ca. 4 Sek.
Damit meinte ich alle 4 Sek. einen Test, so dass man beim Kaffeetrinken zusehen kann.
Ein grobe Änderung des Musters fällt auf.

nmap scannt parallel in threads, deshalb ist es wichtig, dazwischen zu Pausieren. 2 Sek. wäre auch ok, aber nicht schneller.
Entlang der gesamten Strecke soll ja pro Scan alles ordentlich auf- und wieder abgebaut werden,
Das beobachtest du so lange, bis der Effekt "Der Fehler hätte schon längst auftreten sollen" eintritt.
Anders geht es nicht.
Damit hätten wir tcp/ip port 443 getestet. Sollte dabei kein offensichtlicher Fehler auftreten, testen wir ssl.
Funktioniert ssl auch, dann kann es nur noch irgendwo eine firewall sein, die das source port sperrt.
 
radiergummi schrieb:
Eben konnte ich den nmap Befehl auch mal während einer Verbindungsstörung aufrufen.

Diesmal erscheint im Report eine Zeile
443/tcp filtered https no-response

Das ist ok.
nmap wiederholt nicht, der Browser tut es in diesem Fall.
Wenn der Fehler auftritt, dann siehst du es. Der Fehler ist dann offensichtlich.
 
OP
R

radiergummi

Member
kein Problem.

Ich habe ein sleep 5 in die Schleife eingebaut und den Zoomfaktor der Konsole so eingestellt, dass das Bild von Ausgabe zu Ausgabe stabil bleibt - bis es sich ändert.

Die Ausgabe sieht dann so aus:
Code:
Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 18:33 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 18:33
Completed NSE at 18:33, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 18:33
Completed Parallel DNS resolution of 1 host. at 18:33, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 18:33
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Completed Connect Scan at 18:34, 2.00s elapsed (1 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 18:34
Completed NSE at 18:34, 0.00s elapsed
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set.
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-24 18:33:58 CET for 2s
PORT    STATE    SERVICE REASON
443/tcp filtered https   no-response

Die aktuelle Störung dauerte eben ca. 3 Minuten. Jetzt geht es mal wieder.

Gruß,
Radiergummi
 
OP
R

radiergummi

Member
Ich habe nmap in einer Schleife für ca. eine Stunde alle 5 Sekunden aufgerufen.
Wenn ich die fragliche Webseite nicht aufrufe, dann ändert sich am nmap-report nichts, außer dass alle paar Minuten ein Report die Zeile "Request type: GET" statt der üblichen Zeile "Request type: HEAD" zeigt.
Zu Abbrüchen oder der Zeile "443/tcp filtered https no-response" kam es dabei nie.

Sobald ich aber auf der Webseite herumklicke und bspw. den Beitragseditor aufrufe kommt es zuverlässig nach wenigen Klicks zum Hänger/Abbruch und nmap zeigt "443/tcp filtered https no-response" im Bericht. Aus diesem Zustand kommt die "Nicht-Verbindung" von selbst nicht heraus, auch nach über 7 Minuten nicht. Ich kann die nmap-Schleife beenden und nach kurzer Zeit wieder starten - es bleibt beim "443/tcp filtered https no-response". In diesem Zustand kann ich keine neue Verbindung zur Webseite herstellen.
Das parallel laufende mtr zeigt für die beiden "inneren" Telekom Hops 100% Paketverlust und für den Ausstiegsknoten (zu Hetzner) zwischen 90 und 100% Verlust.

Erst nachdem ich die nmap-Schleife abgebrochen und ca. eine Minute gewartet habe, kann ich die Webseite wieder aufrufen.


Kannst Du damit etwas anfangen?

Noch etwas: ein
Code:
traceroute forum.zerspanungsbude.net
bleibt nach dem dritten Hop stehen, obwohl ich im Browser die Startseite des Forums aufrufen kann.
Danach braucht es nur einen Aufruf des Beitragseditors und die Verbindung ist wieder tot.

Daraus werde mal einer schlau ...

Gruß,
Radiergummi
 
radiergummi schrieb:
Kannst Du damit etwas anfangen?
...
Noch nicht aber eine vager Verdacht ist vorhanden.
Du hast nun eine gewisse Erfahrung mit diesem Problem.
Kannst du dasselbe Handling mit diesem Forum durchführen? Auch das kann ssl.
Damit könntest du ein Systemproblem auf deiner Seite sicher ausschliessen.

p.s
Ich weiß, es geht dir nur um die eine Seite und mit keiner anderen hattest du je Probleme.
Aber manchmal sind die Ursachen seltsamer als man glaubt.
 
OP
R

radiergummi

Member
Gräfin Klara schrieb:
Kannst du dasselbe Handling mit diesem Forum durchführen?
Ha, leicht!

Euer Forum kann ich seit Jahren einwandfrei benutzen. Bis in diese Minute kann ich mich an keine Störung erinnern. Alles gut. Ich habe also hier im Forum herum geklickert, Beiträge aufgerufen und auch mal den Editor gestartet (aber nichts gespeichert) usw. Parallel dazu habe ich die folgenden Dinge wiederholt:

Traceroute: läuft durch

Code:
x@WS-UB-03:~$ traceroute linux-club.de
traceroute to linux-club.de (5.35.226.118), 64 hops max
  1                    1,186ms   0,939ms   0,941ms 
  2                    2,532ms   2,531ms   2,214ms 
  3                   12,245ms  11,763ms  12,986ms 
  4   62.154.14.54    14,044ms  16,094ms  16,241ms 
  5   62.157.249.226  16,797ms  15,408ms  15,505ms 
  6   87.230.114.66   27,921ms  27,153ms  27,928ms 
  7   87.230.115.2    17,121ms  16,974ms  18,992ms 
  8   87.230.115.0    17,475ms  17,537ms  16,589ms 
  9   87.230.114.2    32,260ms  31,821ms  31,990ms 
 10   87.230.114.46   44,054ms  32,268ms  32,912ms 
 11   *  *  * 
 12   5.35.226.118    32,985ms  33,243ms  32,468ms 
x@WS-UB-03:~$

mtr: keine Verluste
Code:
Start: Tue Mar 24 15:14:58 2020
HOST: WS-UB-03                                           Loss%     Snt     Rcv   Drop       Last   Avg  Best  Wrst
  1.|-- gw2                                                 0.0%     100     100      0        1.0   1.0   0.9   1.4
  2.|-- gw1                                                 0.0%     100     100      0        2.5   2.5   2.1   2.7
  3.|--                                                     0.0%     100     100      0       11.9  13.1  11.7  52.7
  4.|-- f-ee1-i.F.DE.NET.DTAG.DE (62.154.14.58)             0.0%     100     100      0       17.8  18.2  14.2  28.9
  5.|-- ae8.cr-nunki.sxb1.bb.godaddy.com (62.157.249.226)   0.0%     100     100      0       35.4  17.9  16.8  35.4
  6.|-- ae4.cr-vega.sxb1.bb.godaddy.com (87.230.114.66)     0.0%     100     100      0       29.5  29.8  29.1  40.8
  7.|-- ae7.cr-antares.fra10.bb.godaddy.com (87.230.115.2)  0.0%     100     100      0       19.2  19.5  18.3  44.8
  8.|-- ae2.cr-polaris.fra1.bb.godaddy.com (87.230.115.0)   0.0%     100     100      0       19.0  19.9  18.5  51.7
  9.|-- ae2.cr-pollux.cgn3.bb.godaddy.com (87.230.114.2)    0.0%     100     100      0       33.5  34.6  33.5  58.9
 10.|-- ae0.sr-apollo.cgn3.hosteurope.de (87.230.114.46)    0.0%     100     100      0       35.5  36.0  34.6  53.6
 11.|-- ???                                                100.0     100       0    100        0.0   0.0   0.0   0.0
 12.|-- wp349.webpack.hosteurope.de (5.35.226.118)          0.0%     100     100      0       35.2  35.6  34.8  52.4

Hop 11 liefert in beiden Fällen nichts

nmap: liefert nur eine Sorte von Ausgaben
Code:
Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-24 21:30 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 21:30
Completed NSE at 21:30, 0.00s elapsed
Warning: Hostname linux-club.de resolves to 2 IPs. Using 5.35.226.118.
Initiating Parallel DNS resolution of 1 host. at 21:30
Completed Parallel DNS resolution of 1 host. at 21:30, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 21:30
Scanning linux-club.de (5.35.226.118) [1 port]
Discovered open port 443/tcp on 5.35.226.118
Completed Connect Scan at 21:30, 0.03s elapsed (1 total ports)
NSE: Script scanning 5.35.226.118.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 21:30
Completed NSE at 21:30, 0.53s elapsed
Nmap scan report for linux-club.de (5.35.226.118)
Host is up, received user-set (0.034s latency).
Other addresses for linux-club.de (not scanned): 2a01:488:42:1000:50ed:8576:fffc:4168
rDNS record for 5.35.226.118: wp349.webpack.hosteurope.de
Scanned at 2020-03-24 21:30:01 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
| http-headers: 
|   Date: Tue, 24 Mar 2020 20:30:01 GMT
|   Content-Type: text/html; charset=UTF-8
|   Connection: close
|   Server: Apache
|   Set-Cookie: linuxclub_u=1; expires=Wed, 24-Mar-2021 20:30:01 GMT; path=/; HttpOnly
|   Set-Cookie: linuxclub_k=; expires=Wed, 24-Mar-2021 20:30:01 GMT; path=/; HttpOnly
|   Set-Cookie: linuxclub_sid=59b76d22d326648d9b56acac1775d175; expires=Wed, 24-Mar-2021 20:30:01 GMT; path=/; HttpOnly
|   Cache-Control: private, no-cache="set-cookie"
|   Expires: Tue, 24 Mar 2020 20:30:01 GMT
|   Referrer-Policy: strict-origin-when-cross-origin
|   Vary: Accept-Encoding
|   
|_  (Request type: HEAD)

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 21:30
Completed NSE at 21:30, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 0.72 seconds

Unterschiede, die mir aufgefallen sind:
Warning: Hostname linux-club.de resolves to 2 IPs. Using 5.35.226.118.

Other addresses for linux-club.de (not scanned): 2a01:488:42:1000:50ed:8576:fffc:4168

rDNS record for 5.35.226.118: wp349.webpack.hosteurope.de ### hier zeigt der entsprechende Eintrag für die Zerspanungsbude auf "forum.zerspanungsbude.net" und nicht auf eine Hoster-URL

Die zum Schluss folgenden http-headers sehen anders aus.


Hast Du das so gemeint? Reicht das so?

Danke und Gruß,
Radiergummi
 
radiergummi schrieb:
....
Unterschiede, die mir aufgefallen sind:
Warning: Hostname linux-club.de resolves to 2 IPs. Using 5.35.226.118.

Other addresses for linux-club.de (not scanned): 2a01:488:42:1000:50ed:8576:fffc:4168
linux-club.de hat IPv4 und IPv6
2a01:488:42:1000:50ed:8576:fffc:4168 hat den gültigen PTR "moenk.de"
alles ok

radiergummi schrieb:
DNS record for 5.35.226.118: wp349.webpack.hosteurope.de ### hier zeigt der entsprechende Eintrag für die Zerspanungsbude auf "forum.zerspanungsbude.net" und nicht auf eine Hoster-URL
wp349.webpack.hosteurope.de ist der PTR von IPv4 5.35.226.118
alles ok
radiergummi schrieb:
Die zum Schluss folgenden http-headers sehen anders aus.
Muss anders aussehen, anderer Server, andere Konfiguration, etc,
alles ok

radiergummi schrieb:
Hast Du das so gemeint? Reicht das so?
Perfekt.

Ich melde mich morgen wieder, muß weg sonst dreht da jemand durch.

Gruß
Gräfin Klara
 
radiergummi schrieb:
forum.zerspanungsbude.net
Die Ausgabe sieht dann so aus:

Hi
Was wir nun wissen.

Die folgenden Resultate stammen aus deinen Angaben und sind aufgenommen in dem Moment, als keine Kommunikation mehr möglich war.
Code:
Initiating Parallel DNS resolution of 1 host. at 18:33
Completed Parallel DNS resolution of 1 host. at 18:33, 0.00s elapsed
DNS funktioniert, d.h. das Problem mit der Kommunikation beschränkt sich auf TCP und auf den server zerspanungsbude.net

Code:
Initiating Connect Scan at 18:33
Scanning forum.zerspanungsbude.net (195.201.85.4) [1 port]
Completed Connect Scan at 18:34, 2.00s elapsed (1 total ports)
....
Host is up, received user-set.
Wir haben in der nmap Zeile ein -sT angegeben. Damit wollen wir vor der Abfrage des http headers ein echtes TCP Connect.
Dieses connect() ist bidirektional und funktioniert auch im Zustand des Problems.

Code:
Initiating NSE at 18:34
Completed NSE at 18:34, 0.00s elapsed
Nach dem erfolgreichen connect() startet die NSE (NSE = Nmap Script Engine) das script "http-headers"
Dieses script erzwingt ein weiteres connect() auf tcp_port 443 (https) und startet dann ein query des http headers.
Diese bidirektionale Kommunikation funktioniert einwandfrei, der server antwortet mit: "Achtung, ich sende jetzt den header", das script wartet.

Code:
PORT    STATE    SERVICE REASON
443/tcp filtered https   no-response
Leider vergeblich.
no-response kann auch dann passieren, wenn deine Abfrage den server nicht erreicht.
Was er nicht empfängt, kann er natürlich auch nicht beantworten.
In diesem Fall wissen wir aber, dass er alles empfangen hat aber die Antwort bei dir nicht ankommt.
Wir wissen auch, dass jede andere Kommunikation zum Zeitpunkt des Problems mit dem server funktioniert, nur diese nicht.
Antwortet der server nicht? Dann hätten alle das Problem, deshalb müssen wir das ausschließen.
D.h., dass seine Antwort unterwegs in deine Richtung von irgendeiner Instanz blockiert wird.

Das kann mit ssl zu tun haben oder auch nicht. Feststellen kannst du das, in dem du den Test nocheinmal fährst
aber mit http (Port 80) anstatt https. Siehe nmap Zeile. Die Antwort muß dann richtigerweise lauten "no-response", weil
zerspanungsbude.net https, also ssl fordert. Den header sendet er aber trotzdem. Blockiert auch http, dann siehst du es
daran, dass die header Daten fehlen. Wenn dieser Test nicht blockiert, dann liegt es an ssl und wir können die schuldige Stelle
ausfindig machen. Blockiert er auch mit http, dann braucht es einen anderen Plan.

Gruß
Gräfin Klara
 
OP
R

radiergummi

Member
Hallo,

Danke für Deine ausführlichen Erläuterungen!
Gräfin Klara schrieb:
[...] in dem du den Test nocheinmal fährst aber mit http (Port 80) anstatt https. [...] Wenn dieser Test nicht blockiert, dann liegt es an ssl und wir können die schuldige Stelle
ausfindig machen

Das habe ich wieder in einer Schleife alle 5 Sekunden ausgeführt.

Code:
nmap -Pn -sT -vvv -p http --script http-headers forum.zerspanungsbude.net

Der Test mit http liefert die Header-Informationen und blockiert nicht. Hier ein Beispiel ohne Kommunikation mit der Webseite.
Code:
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.020s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-25 15:27:06 CET for 1s
PORT     STATE    SERVICE REASON
80/tcp   open     http    syn-ack
| http-headers: 
|   Date: Wed, 25 Mar 2020 14:27:07 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Location: https://forum.zerspanungsbude.net/
|   Content-Length: 242
|   Connection: close
|   Content-Type: text/html; charset=iso-8859-1
|   
|_  (Request type: GET)
8008/tcp filtered http    no-response

und hier eines bei unterbrochener Kommunikation
Code:
Nmap scan report for forum.zerspanungsbude.net (195.201.85.4)
Host is up, received user-set (0.019s latency).
rDNS record for 195.201.85.4: zerspanungsbude.net
Scanned at 2020-03-25 15:33:43 CET for 1s
PORT     STATE    SERVICE REASON
80/tcp   open     http    syn-ack
| http-headers: 
|   Date: Wed, 25 Mar 2020 14:33:44 GMT
|   Server: Apache
|   X-XSS-Protection: 1; mode=block
|   X-Frame-Options: SAMEORIGIN
|   X-Content-Type-Options: nosniff
|   Referrer-Policy: unsafe-url
|   Location: https://forum.zerspanungsbude.net/
|   Content-Length: 242
|   Connection: close
|   Content-Type: text/html; charset=iso-8859-1
|   
|_  (Request type: GET)
8008/tcp filtered http    no-response

Kein Unterschied.

Die NSE-Zeilen hatte ich oben nicht mit einkopiert. So sehen sie aus:
Code:
Starting Nmap 7.01 ( https://nmap.org ) at 2020-03-25 15:33 CET
NSE: Loaded 1 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 15:33
Completed NSE at 15:33, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 15:33
Completed Parallel DNS resolution of 1 host. at 15:33, 0.00s elapsed
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 15:33
Scanning forum.zerspanungsbude.net (195.201.85.4) [2 ports]
Discovered open port 80/tcp on 195.201.85.4
Completed Connect Scan at 15:33, 1.20s elapsed (2 total ports)
NSE: Script scanning 195.201.85.4.
NSE: Starting runlevel 1 (of 1) scan.
Initiating NSE at 15:33
Completed NSE at 15:33, 0.08s elapsed

Tests von heute Vormittag:
Ca. um 8:00 Uhr konnte ich keinen Abbruch provozieren, mtr hat auch 0% Paketverluste gemeldet. Die Seite hat einwandfrei funktioniert.
Gegen 10:00 - 10:30 Uhr war es dann wieder vorbei. Zuerst haben nur die Hops bei der Telekom Pakete verloren, dann auch der erste Hetzner Knoten.
Ich habe auch einen anderen Client im gleichen Netz ausprobiert (18er Ubuntu LTS). Gleiches Verhalten: Webseite aufrufen geht noch, dann den Beitragseditor und tschüss.

Jetzt bin ich ja mal gespannt ...

Danke und Gruß,
Radiergummi
 
radiergummi schrieb:
..
Kein Unterschied.
Ja, in diesem Test mit http ist deutlich zu sehen, dass die unverschlüsselte Kommunikation einwandfrei funktioniert.
Die header sind auch im Problemfall komplett, das no-response ist im Fall http logisch korrekt.

Das zeigt aber, dass im vorhergehenden Test mit https das Problem genau dann auftaucht, wenn die verschlüsselte Kommunikation
beginnt. zerspanungsbude.net ist dieses Problem nicht anzulasten, das wissen wir schon. Der server arbeitet wie er soll.
Die Pakete gehen am Weg zu dir verloren oder werden blockiert, sobald eine
1. ssl Verbindung besteht oder aufgebaut wird
2. parallel dazu eine bestimmte Handlung getätigt wird, die eine entsprechende, verschlüsselte Kommunikation auslöst.

Für einen Provider - technisch gesehen - ist es völlig egal, ob eine Verbindung verschlüsselt ist oder nicht.
Alle Daten, die er für das routing braucht, stehen in jedem Datenpaket - auch in verschlüsselten - zur Verfügung.
Verschlüsselt werden Inhalte und keine Protokollinformationen. Dieses routing ist sein eigentlicher Job, mehr nicht.

Nun sehen wir aber in unseren Tests, dass das Problem genau dann beginnt, wenn es sich um verschlüsselte Inhalte dreht.
Alles unverschlüsselte geht ja parallel dazu problemlos an dieser Blockade vorbei.
Damit wir hier weiterkommen wäre nun abzuklären, ob Mitglieder von zerspanungsbude.net, die am selben Provider hängen
wie du, das Problem auch orten können. Oder du kennst jemanden, der am selben Provider angeschlossen ist wie du und
der den Test von seinem Rechner aus ermöglicht. Sollte dieser Test, obwohl aus dem selben VPN, auf anderen Rechnern keine
Probleme zeigen, dann wird die Sache spannend.

Gruß
Gräfin Klara
 
Oben