This form allows you to contribute new operating system fingerprints to the Nmap database. Please do not fill this out unless you are certain what OS is running on the target machine you scanned. Incorrect entries can pollute the database. The connection between the source and target machines should be clean, with no port forwarding or network address translation (NAT) involved. For more information, see the OS detection chapter of Nmap Network Scanning. This form only accepts fingerprints generated by Nmap version 4.20 or later. By submitting fingerprints you are transferring any copyright interest in the data to the Nmap Project (Nmap Software LLC) so that they may modify it, relicense it, incorporate it into Nmap, etc.
Thanks for contributing!
The vendor is the company or organization which makes this OS or device. Examples are Apple, Cisco, Linux, Microsoft, Linksys, OpenBSD.
Next, paste the entire output from the following Nmap command (where [target] is replaced with the misidentified target host):
nmap -O -sV -T4 -d [target]
This form allows you to contribute new version/service scan fingerprints to the Nmap database. Please do not fill this out unless you are sure that you know what application is running on the machine you scanned. Incorrect entries can pollute the database. For more details on the submission process, see the Community Contributions section of the Service Detection chapter of Nmap Network Scanning. By submitting fingerprints you are transfering any copyright interest in the data to the Nmap Project (Nmap Software LLC).
Please submit only one fingerprint at a time on this page. If Nmap gave you more than one, you will have a chance to submit the rest one at a time after you press submit. If Nmap gave you more than one, they are separated by a line like this:
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
The name of the service you believe this is. Either select it from one of the dropdown lists or enter it manually if it isn't listed. If the Nmap "SERVICE" field is correct, just put that value. Examples are: smtp, pop3, http, domain, ssh, etc.
The name of the application that provides this service you believe this is. Enter it manually. If the Nmap "APPLICATION" field is correct, just put that value. Examples are: apache, bind, wu-ftpd, etc.
The version of the service you believe this is. Enter it manually. If the Nmap "VERSION" field is correct, just put that value. Examples are: 1.0, 2.3, 5a, 3-beta, etc.
The Operating System of the host running this service (if known). If the Operating System doesn't appear in the dropdown list, or you have more specific OS information you think might be useful, please put the information in the Notes field.
The Device Type of the host you scanned to get this fingerprint (if known). If the Device Type doesn't appear in the dropdown list, or you feel a special Device Type is necessary, please put the information in the Notes field.
Most devices are considered General Purpose.
Next, paste the entire output from the following Nmap command (where [port] and [target] are replaced with the port and target running the service to be corrected). Use this command for TCP services:
nmap -O -Pn -sSV -T4 -d --version-trace -p[port] [target]
nmap -O -Pn -sUV -T4 -d --version-trace -p[port] [target]