Escanear informe para "7s6qlatkdud7i2i55csqaa2j2.litix.io"

Nivel de membresía: Miembro gratuito
Escanea la información del sistema operativo y Traceroute (nmap -A 7s6qlatkdud7i2i55csqaa2j2.litix.io)
Nmap scan report for 7s6qlatkdud7i2i55csqaa2j2.litix.io (54.196.227.84)
Host is up (0.068s latency).
rDNS record for 54.196.227.84: ec2-54-196-227-84.compute-1.amazonaws.com
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http      envoy
| fingerprint-strings: 
|   DNSStatusRequestTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:31 GMT
|     server: envoy
|     connection: close
|     Request
|   DNSVersionBindReqTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:30 GMT
|     server: envoy
|     connection: close
|     Request
|   FourOhFourRequest: 
|     HTTP/1.1 426 Upgrade Required
|     date: Tue, 21 Nov 2023 05:19:23 GMT
|     server: envoy
|     connection: close
|     content-length: 0
|   GetRequest: 
|     HTTP/1.1 426 Upgrade Required
|     date: Tue, 21 Nov 2023 05:19:18 GMT
|     server: envoy
|     connection: close
|     content-length: 0
|   HTTPOptions: 
|     HTTP/1.1 426 Upgrade Required
|     date: Tue, 21 Nov 2023 05:19:19 GMT
|     server: envoy
|     connection: close
|     content-length: 0
|   Help: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:32 GMT
|     server: envoy
|     connection: close
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:29 GMT
|     server: envoy
|     connection: close
|     Request
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:20 GMT
|     server: envoy
|     connection: close
|     Request
|   SSLSessionReq: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:33 GMT
|     server: envoy
|     connection: close
|     Request
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:21 GMT
|     server: envoy
|     connection: close
|_    Request
|_http-cors: GET POST
|_http-server-header: envoy
|_http-title: Site doesn't have a title (image/gif).
443/tcp open  ssl/https envoy
| fingerprint-strings: 
|   DNSStatusRequestTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:39 GMT
|     server: envoy
|     connection: close
|     Request
|   DNSVersionBindReqTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:37 GMT
|     server: envoy
|     connection: close
|     Request
|   FourOhFourRequest: 
|     HTTP/1.1 426 Upgrade Required
|     date: Tue, 21 Nov 2023 05:19:27 GMT
|     server: envoy
|     connection: close
|     content-length: 0
|   GetRequest: 
|     HTTP/1.1 426 Upgrade Required
|     date: Tue, 21 Nov 2023 05:19:24 GMT
|     server: envoy
|     connection: close
|     content-length: 0
|   HTTPOptions: 
|     HTTP/1.1 426 Upgrade Required
|     date: Tue, 21 Nov 2023 05:19:25 GMT
|     server: envoy
|     connection: close
|     content-length: 0
|   Help: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:40 GMT
|     server: envoy
|     connection: close
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:36 GMT
|     server: envoy
|     connection: close
|     Request
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:35 GMT
|     server: envoy
|     connection: close
|     Request
|   SSLSessionReq: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:41 GMT
|     server: envoy
|     connection: close
|     Request
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 05:19:28 GMT
|     server: envoy
|     connection: close
|_    Request
|_http-cors: GET POST
|_http-server-header: envoy
|_http-title: Site doesn't have a title (image/gif).
| ssl-cert: Subject: commonName=*.litix.io
| Subject Alternative Name: DNS:*.litix.io, DNS:litix.io
| Not valid before: 2023-07-24T00:00:00
|_Not valid after:  2024-08-21T23:59:59
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/20%Time=655C3DD7%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Tue
SF:,\x2021\x20Nov\x202023\x2005:19:18\x20GMT\r\nserver:\x20envoy\r\nconnec
SF:tion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,7B,"HTTP
SF:/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Tue,\x2021\x20Nov\x2020
SF:23\x2005:19:19\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\nco
SF:ntent-length:\x200\r\n\r\n")%r(RTSPRequest,9C,"HTTP/1\.1\x20400\x20Bad\
SF:x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\nd
SF:ate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:20\x20GMT\r\nserver:\x20envo
SF:y\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9C,"HTTP/1
SF:\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\
SF:x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:21\x20GMT\
SF:r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(F
SF:ourOhFourRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x
SF:20Tue,\x2021\x20Nov\x202023\x2005:19:23\x20GMT\r\nserver:\x20envoy\r\nc
SF:onnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9C,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-ty
SF:pe:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:29\x20
SF:GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")
SF:%r(DNSVersionBindReqTCP,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconte
SF:nt-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\
SF:x20Nov\x202023\x2005:19:30\x20GMT\r\nserver:\x20envoy\r\nconnection:\x2
SF:0close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9C,"HTTP/1\.1\x204
SF:00\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/
SF:plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:31\x20GMT\r\nserve
SF:r:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(Help,91,"
SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-
SF:type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:32\x
SF:20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\n")%r(SSLSessio
SF:nReq,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\
SF:ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x200
SF:5:19:33\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x
SF:20Request");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655C3DDD%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:
SF:\x20Tue,\x2021\x20Nov\x202023\x2005:19:24\x20GMT\r\nserver:\x20envoy\r\
SF:nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,7
SF:B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Tue,\x2021\x20No
SF:v\x202023\x2005:19:25\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20clos
SF:e\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,7B,"HTTP/1\.1\x
SF:20426\x20Upgrade\x20Required\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x200
SF:5:19:27\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\ncontent-l
SF:ength:\x200\r\n\r\n")%r(tor-versions,9C,"HTTP/1\.1\x20400\x20Bad\x20Req
SF:uest\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x
SF:20Tue,\x2021\x20Nov\x202023\x2005:19:28\x20GMT\r\nserver:\x20envoy\r\nc
SF:onnection:\x20close\r\n\r\nBad\x20Request")%r(RTSPRequest,9C,"HTTP/1\.1
SF:\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20
SF:text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:35\x20GMT\r\n
SF:server:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(RPCC
SF:heck,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\
SF:ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x200
SF:5:19:36\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x
SF:20Request")%r(DNSVersionBindReqTCP,9C,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20
SF:Tue,\x2021\x20Nov\x202023\x2005:19:37\x20GMT\r\nserver:\x20envoy\r\ncon
SF:nection:\x20close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9C,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-typ
SF:e:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:39\x20G
SF:MT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")%
SF:r(Help,91,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\
SF:r\ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2
SF:005:19:40\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\n")%
SF:r(SSLSessionReq,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-lengt
SF:h:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x
SF:202023\x2005:19:41\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r
SF:\n\r\nBad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 17 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   0.20 ms  208.76.251.177
2   0.58 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.59 ms  1.162.45.96-dedicated.multacom.com (96.45.162.1)
4   0.92 ms  be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   12.68 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161)
6   20.91 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54)
7   36.80 ms be3851.ccr42.iah01.atlas.cogentco.com (154.54.2.5)
8   38.37 ms be2418.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.6.78)
9   38.21 ms 38.104.61.42
10  39.51 ms 52.93.254.209
11  37.87 ms 52.93.64.81
12  ... 16
17  67.36 ms ec2-54-196-227-84.compute-1.amazonaws.com (54.196.227.84)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 84.48 seconds
Esquema de color
Objetivo
7s6qlatkdud7i2i55csqaa2j2.litix.io
IP de destino
54.196.227.84
País de destino
US
Método de escaneo
Escanea la información del sistema operativo y Traceroute
Comando
nmap -A 7s6qlatkdud7i2i55csqaa2j2.litix.io
Fecha de escaneo
21 Nov 2023 00:20
Copiar resultado de escaneo
Descargar resultado
Eliminar resultado de escaneo
$
Escaneos totales
Unas 2 veces
Algunos cortafuegos bloquean los escaneos de puertos. Para obtener verdaderos resultados positivos, agregue las direcciones IP de portscanner.online (208.76.253.232-208.76.253.239 o CIDR 208.76.253.232/29) a la lista blanca
[scan_method]
Visibilidad:
Método de escaneo: