Puertos
Duración
Fecha
IP
Nmap scan report for 26963.mc.tritondigital.com (192.173.28.76) Host is up (0.028s latency). Not shown: 995 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http |_http-title: 400 Bad Request | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 400 Bad Request | expires: Thu, 01 Dec 2003 16:00:00 GMT | cache-control: no-cache, must-revalidate | pragma: no-cache | access-control-allow-headers: * | access-control-expose-headers: * | access-control-allow-methods: GET, HEAD | access-control-allow-origin: * | content-length: 105 | content-type: text/html | <html><head><title>400 Bad Request</title></head><body><h1>400 Bad Request</h1>Bad request</body></html> | GetRequest, HTTPOptions: | HTTP/1.0 400 Bad Request | expires: Thu, 01 Dec 2003 16:00:00 GMT | cache-control: no-cache, must-revalidate | pragma: no-cache | access-control-allow-headers: * | access-control-expose-headers: * | access-control-allow-methods: GET, HEAD | access-control-allow-origin: * | content-length: 109 | content-type: text/html | <html><head><title>400 Bad Request</title></head><body><h1>400 Bad Request</h1>Invalid request</body></html> | RTSPRequest, X11Probe: | HTTP/1.1 400 Bad request | Content-length: 90 | Cache-Control: no-cache | Connection: close | Content-Type: text/html | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. |_ </body></html> | http-robots.txt: 1 disallowed entry |_/ 443/tcp open ssl/https |_http-title: 400 Bad Request | http-robots.txt: 1 disallowed entry |_/ | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 400 Bad Request | expires: Thu, 01 Dec 2003 16:00:00 GMT | cache-control: no-cache, must-revalidate | pragma: no-cache | access-control-allow-headers: * | access-control-expose-headers: * | access-control-allow-methods: GET, HEAD | access-control-allow-origin: * | content-length: 105 | content-type: text/html | <html><head><title>400 Bad Request</title></head><body><h1>400 Bad Request</h1>Bad request</body></html> | GetRequest, HTTPOptions: | HTTP/1.0 400 Bad Request | expires: Thu, 01 Dec 2003 16:00:00 GMT | cache-control: no-cache, must-revalidate | pragma: no-cache | access-control-allow-headers: * | access-control-expose-headers: * | access-control-allow-methods: GET, HEAD | access-control-allow-origin: * | content-length: 109 | content-type: text/html | <html><head><title>400 Bad Request</title></head><body><h1>400 Bad Request</h1>Invalid request</body></html> | RTSPRequest, tor-versions: | HTTP/1.1 400 Bad request | Content-length: 90 | Cache-Control: no-cache | Connection: close | Content-Type: text/html | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. |_ </body></html> | ssl-cert: Subject: commonName=*.mc.tritondigital.com | Subject Alternative Name: DNS:*.mc.tritondigital.com, DNS:mc.tritondigital.com | Not valid before: 2024-07-02T11:23:58 |_Not valid after: 2025-08-03T11:23:58 |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 1935/tcp closed rtmp 3690/tcp closed svn 8000/tcp closed http-alt 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=11/29%Time=6749E172%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,1A7,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nexpires:\x20Thu, SF:\x2001\x20Dec\x202003\x2016:00:00\x20GMT\r\ncache-control:\x20no-cache, SF:\x20must-revalidate\r\npragma:\x20no-cache\r\naccess-control-allow-head SF:ers:\x20\*\r\naccess-control-expose-headers:\x20\*\r\naccess-control-al SF:low-methods:\x20GET,\x20HEAD\r\naccess-control-allow-origin:\x20\*\r\nc SF:ontent-length:\x20109\r\ncontent-type:\x20text/html\r\n\r\n<html><head> SF:<title>400\x20Bad\x20Request</title></head><body><h1>400\x20Bad\x20Requ SF:est</h1>Invalid\x20request</body></html>\n")%r(HTTPOptions,1A7,"HTTP/1\ SF:.0\x20400\x20Bad\x20Request\r\nexpires:\x20Thu,\x2001\x20Dec\x202003\x2 SF:016:00:00\x20GMT\r\ncache-control:\x20no-cache,\x20must-revalidate\r\np SF:ragma:\x20no-cache\r\naccess-control-allow-headers:\x20\*\r\naccess-con SF:trol-expose-headers:\x20\*\r\naccess-control-allow-methods:\x20GET,\x20 SF:HEAD\r\naccess-control-allow-origin:\x20\*\r\ncontent-length:\x20109\r\ SF:ncontent-type:\x20text/html\r\n\r\n<html><head><title>400\x20Bad\x20Req SF:uest</title></head><body><h1>400\x20Bad\x20Request</h1>Invalid\x20reque SF:st</body></html>\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20reque SF:st\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection SF::\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20 SF:Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20reques SF:t\.\n</body></html>\n")%r(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20reque SF:st\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection SF::\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20 SF:Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20reques SF:t\.\n</body></html>\n")%r(FourOhFourRequest,1A3,"HTTP/1\.0\x20400\x20Ba SF:d\x20Request\r\nexpires:\x20Thu,\x2001\x20Dec\x202003\x2016:00:00\x20GM SF:T\r\ncache-control:\x20no-cache,\x20must-revalidate\r\npragma:\x20no-ca SF:che\r\naccess-control-allow-headers:\x20\*\r\naccess-control-expose-hea SF:ders:\x20\*\r\naccess-control-allow-methods:\x20GET,\x20HEAD\r\naccess- SF:control-allow-origin:\x20\*\r\ncontent-length:\x20105\r\ncontent-type:\ SF:x20text/html\r\n\r\n<html><head><title>400\x20Bad\x20Request</title></h SF:ead><body><h1>400\x20Bad\x20Request</h1>Bad\x20request</body></html>\n" SF:); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=11/29%Time=6749E179%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,1A7,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nexpires:\ SF:x20Thu,\x2001\x20Dec\x202003\x2016:00:00\x20GMT\r\ncache-control:\x20no SF:-cache,\x20must-revalidate\r\npragma:\x20no-cache\r\naccess-control-all SF:ow-headers:\x20\*\r\naccess-control-expose-headers:\x20\*\r\naccess-con SF:trol-allow-methods:\x20GET,\x20HEAD\r\naccess-control-allow-origin:\x20 SF:\*\r\ncontent-length:\x20109\r\ncontent-type:\x20text/html\r\n\r\n<html SF:><head><title>400\x20Bad\x20Request</title></head><body><h1>400\x20Bad\ SF:x20Request</h1>Invalid\x20request</body></html>\n")%r(HTTPOptions,1A7," SF:HTTP/1\.0\x20400\x20Bad\x20Request\r\nexpires:\x20Thu,\x2001\x20Dec\x20 SF:2003\x2016:00:00\x20GMT\r\ncache-control:\x20no-cache,\x20must-revalida SF:te\r\npragma:\x20no-cache\r\naccess-control-allow-headers:\x20\*\r\nacc SF:ess-control-expose-headers:\x20\*\r\naccess-control-allow-methods:\x20G SF:ET,\x20HEAD\r\naccess-control-allow-origin:\x20\*\r\ncontent-length:\x2 SF:0109\r\ncontent-type:\x20text/html\r\n\r\n<html><head><title>400\x20Bad SF:\x20Request</title></head><body><h1>400\x20Bad\x20Request</h1>Invalid\x SF:20request</body></html>\n")%r(FourOhFourRequest,1A3,"HTTP/1\.0\x20400\x SF:20Bad\x20Request\r\nexpires:\x20Thu,\x2001\x20Dec\x202003\x2016:00:00\x SF:20GMT\r\ncache-control:\x20no-cache,\x20must-revalidate\r\npragma:\x20n SF:o-cache\r\naccess-control-allow-headers:\x20\*\r\naccess-control-expose SF:-headers:\x20\*\r\naccess-control-allow-methods:\x20GET,\x20HEAD\r\nacc SF:ess-control-allow-origin:\x20\*\r\ncontent-length:\x20105\r\ncontent-ty SF:pe:\x20text/html\r\n\r\n<html><head><title>400\x20Bad\x20Request</title SF:></head><body><h1>400\x20Bad\x20Request</h1>Bad\x20request</body></html SF:>\n")%r(tor-versions,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent- SF:length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n SF:Content-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request SF:</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></ SF:html>\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConte SF:nt-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\ SF:r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20requ SF:est</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body SF:></html>\n"); Aggressive OS guesses: Oracle VM Server 3.4.2 (Linux 4.1) (99%), Linux 3.2 (93%), Linux 3.1 (93%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (92%), CyanogenMod 11 (Android 4.4.4) (91%), Android 4 (91%), Linux 2.6.32 (91%), Linux 3.2 - 4.9 (91%), Linux 4.15 - 5.6 (91%), Netgear ReadyNAS 2100 (RAIDiator 4.2.24) (91%) No exact OS matches for host (test conditions non-ideal). Network Distance: 9 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 21.99 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.86 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 2.02 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.77 ms hurricane-electric.as6939.any2ix.coresite.com (206.72.210.122) 5 22.05 ms 100ge0-71.core2.pdx1.he.net (184.104.193.142) 6 27.87 ms port-channel2.core2.sea1.he.net (184.105.64.137) 7 28.58 ms port-channel2.core2.yvr1.he.net (184.104.196.222) 8 30.42 ms triton-digital-inc.10gigabitethernet1-1-28.switch2.yvr1.he.net (184.105.205.198) 9 29.33 ms 192.173.28.76 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 35.27 seconds