Puertos
Duración
Fecha
IP
Nmap scan report for info.factsmgt.com (3.92.120.28) Host is up (0.064s latency). Other addresses for info.factsmgt.com (not scanned): 52.54.96.194 3.215.172.219 34.237.219.119 18.208.125.13 rDNS record for 3.92.120.28: ec2-3-92-120-28.compute-1.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | http-robots.txt: 2 disallowed entries |_/webmail/ /shared/webmail/ | fingerprint-strings: | DNSVersionBindReqTCP, RPCCheck: | HTTP/1.1 400 Bad Request | Date: Thu, 04 Jul 2024 01:50:59 GMT | Content-Type: text/html | Content-Length: 154 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>openresty</center> | </body> | </html> | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Thu, 04 Jul 2024 01:50:54 GMT | Content-Length: 0 | Connection: close | X-Pardot-Route: e8229a0ff18ebffc83a98010d2521dd5 | GetRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Thu, 04 Jul 2024 01:50:53 GMT | Content-Length: 0 | Connection: close | X-Pardot-Route: e8229a0ff18ebffc83a98010d2521dd5 | RTSPRequest: | HTTP/1.1 400 Bad Request | Date: Thu, 04 Jul 2024 01:50:53 GMT | Content-Type: text/html | Content-Length: 154 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>openresty</center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Date: Thu, 04 Jul 2024 01:50:54 GMT | Content-Type: text/html | Content-Length: 154 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>openresty</center> | </body> |_ </html> |_http-title: Did not follow redirect to https://FACTSmgt.com 443/tcp open ssl/https | fingerprint-strings: | DNSVersionBindReqTCP, RPCCheck, RTSPRequest: | HTTP/1.1 400 Bad Request | Date: Thu, 04 Jul 2024 01:51:06 GMT | Content-Type: text/html | Content-Length: 154 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>openresty</center> | </body> | </html> | FourOhFourRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Thu, 04 Jul 2024 01:51:00 GMT | Content-Type: text/plain | Content-Length: 11 | Connection: close | X-Pardot-Route: e8229a0ff18ebffc83a98010d2521dd5 | Request | GetRequest: | HTTP/1.1 400 Bad Request | Date: Thu, 04 Jul 2024 01:50:59 GMT | Content-Type: text/plain | Content-Length: 11 | Connection: close | X-Pardot-Route: e8229a0ff18ebffc83a98010d2521dd5 | Request | tor-versions: | HTTP/1.1 400 Bad Request | Date: Thu, 04 Jul 2024 01:51:00 GMT | Content-Type: text/html | Content-Length: 154 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>openresty</center> | </body> |_ </html> |_http-title: Did not follow redirect to https://FACTSmgt.com | http-robots.txt: 2 disallowed entries |_/webmail/ /shared/webmail/ | ssl-cert: Subject: commonName=info.factsmgt.com | Subject Alternative Name: DNS:info.factsmgt.com | Not valid before: 2024-05-17T05:25:40 |_Not valid after: 2024-08-15T05:25:39 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=7/3%Time=6685FFFD%P=x86_64-redhat-linux-gnu%r(G SF:etRequest,99,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x2004 SF:\x20Jul\x202024\x2001:50:53\x20GMT\r\nContent-Length:\x200\r\nConnectio SF:n:\x20close\r\nX-Pardot-Route:\x20e8229a0ff18ebffc83a98010d2521dd5\r\n\ SF:r\n")%r(HTTPOptions,99,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20 SF:Thu,\x2004\x20Jul\x202024\x2001:50:53\x20GMT\r\nContent-Length:\x200\r\ SF:nConnection:\x20close\r\nX-Pardot-Route:\x20e8229a0ff18ebffc83a98010d25 SF:21dd5\r\n\r\n")%r(RTSPRequest,11C,"HTTP/1\.1\x20400\x20Bad\x20Request\r SF:\nDate:\x20Thu,\x2004\x20Jul\x202024\x2001:50:53\x20GMT\r\nContent-Type SF::\x20text/html\r\nContent-Length:\x20154\r\nConnection:\x20close\r\n\r\ SF:n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\ SF:r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>openr SF:esty</center>\r\n</body>\r\n</html>\r\n")%r(X11Probe,11C,"HTTP/1\.1\x20 SF:400\x20Bad\x20Request\r\nDate:\x20Thu,\x2004\x20Jul\x202024\x2001:50:54 SF:\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20154\r\nConn SF:ection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</t SF:itle></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cente SF:r>\r\n<hr><center>openresty</center>\r\n</body>\r\n</html>\r\n")%r(Four SF:OhFourRequest,99,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x SF:2004\x20Jul\x202024\x2001:50:54\x20GMT\r\nContent-Length:\x200\r\nConne SF:ction:\x20close\r\nX-Pardot-Route:\x20e8229a0ff18ebffc83a98010d2521dd5\ SF:r\n\r\n")%r(RPCCheck,11C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x SF:20Thu,\x2004\x20Jul\x202024\x2001:50:59\x20GMT\r\nContent-Type:\x20text SF:/html\r\nContent-Length:\x20154\r\nConnection:\x20close\r\n\r\n<html>\r SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cente SF:r><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>openresty</cen SF:ter>\r\n</body>\r\n</html>\r\n")%r(DNSVersionBindReqTCP,11C,"HTTP/1\.1\ SF:x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x2004\x20Jul\x202024\x2001:50 SF::59\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20154\r\nC SF:onnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request SF:</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></ce SF:nter>\r\n<hr><center>openresty</center>\r\n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=7/3%Time=66860003%P=x86_64-redhat-linux- SF:gnu%r(GetRequest,BF,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu SF:,\x2004\x20Jul\x202024\x2001:50:59\x20GMT\r\nContent-Type:\x20text/plai SF:n\r\nContent-Length:\x2011\r\nConnection:\x20close\r\nX-Pardot-Route:\x SF:20e8229a0ff18ebffc83a98010d2521dd5\r\n\r\nBad\x20Request")%r(HTTPOption SF:s,BF,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x2004\x20Jul\ SF:x202024\x2001:51:00\x20GMT\r\nContent-Type:\x20text/plain\r\nContent-Le SF:ngth:\x2011\r\nConnection:\x20close\r\nX-Pardot-Route:\x20e8229a0ff18eb SF:ffc83a98010d2521dd5\r\n\r\nBad\x20Request")%r(FourOhFourRequest,BF,"HTT SF:P/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x2004\x20Jul\x202024\x SF:2001:51:00\x20GMT\r\nContent-Type:\x20text/plain\r\nContent-Length:\x20 SF:11\r\nConnection:\x20close\r\nX-Pardot-Route:\x20e8229a0ff18ebffc83a980 SF:10d2521dd5\r\n\r\nBad\x20Request")%r(tor-versions,11C,"HTTP/1\.1\x20400 SF:\x20Bad\x20Request\r\nDate:\x20Thu,\x2004\x20Jul\x202024\x2001:51:00\x2 SF:0GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20154\r\nConnect SF:ion:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</titl SF:e></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\ SF:r\n<hr><center>openresty</center>\r\n</body>\r\n</html>\r\n")%r(RTSPReq SF:uest,11C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x2004\x20 SF:Jul\x202024\x2001:51:06\x20GMT\r\nContent-Type:\x20text/html\r\nContent SF:-Length:\x20154\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>4 SF:00\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad SF:\x20Request</h1></center>\r\n<hr><center>openresty</center>\r\n</body>\ SF:r\n</html>\r\n")%r(RPCCheck,11C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n SF:Date:\x20Thu,\x2004\x20Jul\x202024\x2001:51:06\x20GMT\r\nContent-Type:\ SF:x20text/html\r\nContent-Length:\x20154\r\nConnection:\x20close\r\n\r\n< SF:html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\ SF:n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>openres SF:ty</center>\r\n</body>\r\n</html>\r\n")%r(DNSVersionBindReqTCP,11C,"HTT SF:P/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x2004\x20Jul\x202024\x SF:2001:51:06\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x201 SF:54\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20 SF:Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</ SF:h1></center>\r\n<hr><center>openresty</center>\r\n</body>\r\n</html>\r\ SF:n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 17 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.54 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.56 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.57 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.53 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 ... 6 32.65 ms ae-3.r22.dllstx14.us.bb.gin.ntt.net (129.250.7.68) 7 36.62 ms ae-5.a00.dllstx14.us.bb.gin.ntt.net (129.250.3.117) 8 33.79 ms ae-2.amazon.dllstx14.us.bb.gin.ntt.net (129.250.201.10) 9 33.78 ms 15.230.130.139 10 33.16 ms 15.230.48.60 11 ... 16 17 64.57 ms ec2-3-92-120-28.compute-1.amazonaws.com (3.92.120.28) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 42.55 seconds