Puertos
Duración
Fecha
IP
Nmap scan report for 104.16.53.111 Host is up (0.0010s latency). Not shown: 996 filtered ports PORT STATE SERVICE VERSION 80/tcp open http cloudflare | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 18:18:54 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb5edbafb031011-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 18:18:54 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb5edbacd042f08-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 18:18:54 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb5edbad9842ee1-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 23 Jul 2023 18:18:59 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 23 Jul 2023 18:18:54 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> |_ </html> |_http-server-header: cloudflare |_http-title: Site doesn't have a title (text/plain; charset=UTF-8). 443/tcp open ssl/https cloudflare |_http-server-header: cloudflare |_http-title: 400 The plain HTTP request was sent to HTTPS port 8080/tcp open http-proxy cloudflare | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 18:18:54 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb5edbae8880feb-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 18:18:54 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb5edbacc562ec6-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 18:18:54 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb5edbada317ba7-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | Socks4, Socks5: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 23 Jul 2023 18:18:54 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> |_ </html> |_http-server-header: cloudflare |_http-title: Site doesn't have a title (text/plain; charset=UTF-8). 8443/tcp open ssl/https-alt cloudflare |_http-server-header: cloudflare |_http-title: 400 The plain HTTP request was sent to HTTPS port 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=7/23%Time=64BD6F0E%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x20 SF:23\x20Jul\x202023\x2018:18:54\x20GMT\r\nContent-Type:\x20text/html\r\nC SF:ontent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x20cloudflare\ SF:r\nCF-RAY:\x207eb5edbacd042f08-LAX\r\n\r\n<html>\r\n<head><title>400\x2 SF:0Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20R SF:equest</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n< SF:/html>\r\n")%r(HTTPOptions,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nD SF:ate:\x20Sun,\x2023\x20Jul\x202023\x2018:18:54\x20GMT\r\nContent-Type:\x SF:20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServer SF::\x20cloudflare\r\nCF-RAY:\x207eb5edbad9842ee1-LAX\r\n\r\n<html>\r\n<he SF:ad><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1 SF:>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center> SF:\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>4 SF:00\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad SF:\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body> SF:\r\n</html>\r\n")%r(X11Probe,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:nServer:\x20cloudflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2018:18:5 SF:4\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nCon SF:nection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20 SF:Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Re SF:quest</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</ SF:html>\r\n")%r(FourOhFourRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request SF:\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2018:18:54\x20GMT\r\nContent-Ty SF:pe:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nS SF:erver:\x20cloudflare\r\nCF-RAY:\x207eb5edbafb031011-LAX\r\n\r\n<html>\r SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cente SF:r><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</ce SF:nter>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,13C,"HTTP/1\.1\x20400\x20B SF:ad\x20Request\r\nServer:\x20cloudflare\r\nDate:\x20Sun,\x2023\x20Jul\x2 SF:02023\x2018:18:59\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Lengt SF:h:\x20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<hea SF:d><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1> SF:400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\ SF:r\n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8080-TCP:V=7.70%I=7%D=7/23%Time=64BD6F0E%P=x86_64-redhat-linux-gnu% SF:r(GetRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x SF:2023\x20Jul\x202023\x2018:18:54\x20GMT\r\nContent-Type:\x20text/html\r\ SF:nContent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x20cloudflar SF:e\r\nCF-RAY:\x207eb5edbacc562ec6-LAX\r\n\r\n<html>\r\n<head><title>400\ SF:x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x2 SF:0Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\ SF:n</html>\r\n")%r(HTTPOptions,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:nDate:\x20Sun,\x2023\x20Jul\x202023\x2018:18:54\x20GMT\r\nContent-Type: SF:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServ SF:er:\x20cloudflare\r\nCF-RAY:\x207eb5edbada317ba7-LAX\r\n\r\n<html>\r\n< SF:head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center>< SF:h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</cente SF:r>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title SF:>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20B SF:ad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</bod SF:y>\r\n</html>\r\n")%r(FourOhFourRequest,14F,"HTTP/1\.1\x20400\x20Bad\x2 SF:0Request\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2018:18:54\x20GMT\r\nCo SF:ntent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20cl SF:ose\r\nServer:\x20cloudflare\r\nCF-RAY:\x207eb5edbae8880feb-LAX\r\n\r\n SF:<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r SF:\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudf SF:lare</center>\r\n</body>\r\n</html>\r\n")%r(Socks5,13C,"HTTP/1\.1\x2040 SF:0\x20Bad\x20Request\r\nServer:\x20cloudflare\r\nDate:\x20Sun,\x2023\x20 SF:Jul\x202023\x2018:18:54\x20GMT\r\nContent-Type:\x20text/html\r\nContent SF:-Length:\x20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cente SF:r><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</ce SF:nter>\r\n</body>\r\n</html>\r\n")%r(Socks4,13C,"HTTP/1\.1\x20400\x20Bad SF:\x20Request\r\nServer:\x20cloudflare\r\nDate:\x20Sun,\x2023\x20Jul\x202 SF:023\x2018:18:54\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length: SF:\x20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head> SF:<title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>40 SF:0\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\ SF:n</body>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 3.1 (91%), Linux 3.2 (91%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (91%), Crestron XPanel control system (88%), ASUS RT-N56U WAP (Linux 3.4) (88%), Linux 3.16 (88%), Linux 2.6.32 (87%), FreeBSD 11.0-STABLE (87%), Linux 4.10 (87%), Vodavi XTS-IP PBX (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 8 hops TRACEROUTE (using port 8080/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177 2 0.57 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.75 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1) 4 0.92 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57) 5 0.96 ms be3359.ccr41.lax05.atlas.cogentco.com (154.54.3.70) 6 0.91 ms 38.104.83.170 7 4.46 ms 172.70.208.4 8 0.85 ms 104.16.53.111 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 229.83 seconds