Puertos
Duración
Fecha
IP
Nmap scan report for wondermerge.cleverappssg.com (162.55.242.173) Host is up (0.15s latency). rDNS record for 162.55.242.173: static.173.242.55.162.clients.your-server.de Not shown: 995 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 47:49:82:49:93:54:8d:6a:88:a3:82:7c:16:b5:e7:72 (RSA) | 256 5e:98:1b:94:c3:94:37:db:75:4c:6e:52:dc:b5:9c:b7 (ECDSA) |_ 256 ab:1c:8f:f8:11:8e:79:bf:d5:12:33:c6:4a:ac:42:f4 (ED25519) 80/tcp open http nginx |_http-title: 403 Forbidden 443/tcp open ssl/http nginx |_http-title: 403 Forbidden | tls-nextprotoneg: | h2 |_ http/1.1 | tls-alpn: | h2 |_ http/1.1 | ssl-cert: Subject: commonName=wondermerge.cleverappskorea.com | Subject Alternative Name: DNS:wondermerge.cleverappskorea.com, DNS:wondermerge.cleverappssg.com | Not valid before: 2024-11-18T09:21:36 |_Not valid after: 2025-02-16T09:21:35 |_ssl-date: TLS randomness does not represent time 3013/tcp open gilatskysurfer? | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: | HTTP/1.1 400 Bad Request | Connection: close | FourOhFourRequest: | HTTP/1.1 404 Not Found | Cache-Control: no-cache | Access-Control-Allow-Origin: * | Date: Fri, 29 Nov 2024 13:31:01 GMT | Connection: close | Found /nice%20ports%2C/Tri%6Eity.txt%2ebak | GetRequest: | HTTP/1.1 200 OK | Cache-Control: no-cache | Access-Control-Allow-Origin: * | Content-Type: application/json; charset=utf-8 | Content-Length: 10 | Date: Fri, 29 Nov 2024 13:30:57 GMT | Connection: close | "1.405.46" | HTTPOptions: | HTTP/1.1 204 No Content | Cache-Control: no-cache | Access-Control-Allow-Origin: * | Access-Control-Allow-Methods: GET,HEAD,PUT,PATCH,POST,DELETE | Vary: Access-Control-Request-Headers | Content-Length: 0 | Date: Fri, 29 Nov 2024 13:30:57 GMT | Connection: close | RTSPRequest: | HTTP/1.1 204 No Content | Cache-Control: no-cache | Access-Control-Allow-Origin: * | Access-Control-Allow-Methods: GET,HEAD,PUT,PATCH,POST,DELETE | Vary: Access-Control-Request-Headers | Content-Length: 0 | Date: Fri, 29 Nov 2024 13:30:58 GMT |_ Connection: close 3306/tcp open mysql MySQL (unauthorized) 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port3013-TCP:V=7.92%I=7%D=11/29%Time=6749C211%P=x86_64-redhat-linux-gnu SF:%r(GetRequest,D1,"HTTP/1\.1\x20200\x20OK\r\nCache-Control:\x20no-cache\ SF:r\nAccess-Control-Allow-Origin:\x20\*\r\nContent-Type:\x20application/j SF:son;\x20charset=utf-8\r\nContent-Length:\x2010\r\nDate:\x20Fri,\x2029\x SF:20Nov\x202024\x2013:30:57\x20GMT\r\nConnection:\x20close\r\n\r\n\"1\.40 SF:5\.46\"")%r(HTTPOptions,103,"HTTP/1\.1\x20204\x20No\x20Content\r\nCache SF:-Control:\x20no-cache\r\nAccess-Control-Allow-Origin:\x20\*\r\nAccess-C SF:ontrol-Allow-Methods:\x20GET,HEAD,PUT,PATCH,POST,DELETE\r\nVary:\x20Acc SF:ess-Control-Request-Headers\r\nContent-Length:\x200\r\nDate:\x20Fri,\x2 SF:029\x20Nov\x202024\x2013:30:57\x20GMT\r\nConnection:\x20close\r\n\r\n") SF:%r(RTSPRequest,103,"HTTP/1\.1\x20204\x20No\x20Content\r\nCache-Control: SF:\x20no-cache\r\nAccess-Control-Allow-Origin:\x20\*\r\nAccess-Control-Al SF:low-Methods:\x20GET,HEAD,PUT,PATCH,POST,DELETE\r\nVary:\x20Access-Contr SF:ol-Request-Headers\r\nContent-Length:\x200\r\nDate:\x20Fri,\x2029\x20No SF:v\x202024\x2013:30:58\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(RPCChe SF:ck,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r SF:\n")%r(DNSVersionBindReqTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nC SF:onnection:\x20close\r\n\r\n")%r(DNSStatusRequestTCP,2F,"HTTP/1\.1\x2040 SF:0\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(Help,2F,"HTTP/1 SF:\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SSLSes SF:sionReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\ SF:r\n\r\n")%r(TerminalServerCookie,2F,"HTTP/1\.1\x20400\x20Bad\x20Request SF:\r\nConnection:\x20close\r\n\r\n")%r(TLSSessionReq,2F,"HTTP/1\.1\x20400 SF:\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(Kerberos,2F,"HTT SF:P/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SMB SF:ProgNeg,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\ SF:r\n\r\n")%r(X11Probe,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnecti SF:on:\x20close\r\n\r\n")%r(FourOhFourRequest,B9,"HTTP/1\.1\x20404\x20Not\ SF:x20Found\r\nCache-Control:\x20no-cache\r\nAccess-Control-Allow-Origin:\ SF:x20\*\r\nDate:\x20Fri,\x2029\x20Nov\x202024\x2013:31:01\x20GMT\r\nConne SF:ction:\x20close\r\n\r\nNot\x20Found\x20/nice%20ports%2C/Tri%6Eity\.txt% SF:2ebak"); Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.6 Network Distance: 18 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 21/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.52 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.78 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 12.31 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 21.53 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 32.41 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 46.75 ms be5024.ccr41.atl01.atlas.cogentco.com (154.54.163.41) 9 63.36 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157) 10 139.17 ms be3095.ccr41.par01.atlas.cogentco.com (154.54.89.222) 11 148.62 ms be4975.ccr41.fra05.atlas.cogentco.com (154.54.63.69) 12 153.98 ms be5517.ccr22.muc03.atlas.cogentco.com (154.54.62.126) 13 156.33 ms be6038.rcr71.nue01.atlas.cogentco.com (154.54.72.94) 14 156.39 ms be6039.nr71.b040138-0.nue01.atlas.cogentco.com (154.25.1.193) 15 151.51 ms 149.6.158.186 16 150.87 ms core22.fsn1.hetzner.com (213.239.254.233) 17 152.20 ms ex9k2.dc18.fsn1.hetzner.com (213.239.254.246) 18 157.14 ms static.173.242.55.162.clients.your-server.de (162.55.242.173) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 37.80 seconds