Puertos
Duración
Fecha
IP
Nmap scan report for travelers-privacyrequests.my.onetrust.com (172.64.155.119) Host is up (0.0028s latency). Other addresses for travelers-privacyrequests.my.onetrust.com (not scanned): 2606:4700:4400::6812:2089 2606:4700:4400::ac40:9b77 104.18.32.137 Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http Cloudflare http proxy |_http-title: Did not follow redirect to https://travelers-privacyrequests.my.onetrust.com/ |_http-server-header: cloudflare 443/tcp open ssl/http Cloudflare http proxy |_http-server-header: cloudflare | http-methods: |_ Potentially risky methods: PUT PATCH DELETE | http-title: DS Portal |_Requested resource was https://travelers-privacyrequests.my.onetrust.com/ui/#/error |_http-trane-info: Problem with XML parsing of /evox/about | ssl-cert: Subject: commonName=onetrust.com | Subject Alternative Name: DNS:onetrust.com, DNS:*.ideas.onetrust.com, DNS:*.onetrust.com, DNS:*.wopi.onetrust.com, DNS:*.nats.onetrust.com, DNS:*.my.onetrust.com, DNS:*.redacted.onetrust.com, DNS:*.loki.onetrust.com, DNS:*.at.onetrust.com, DNS:*.argocd.onetrust.com, DNS:*.keycloak.redacted.onetrust.com | Not valid before: 2024-08-15T19:56:28 |_Not valid after: 2024-11-13T20:56:21 8080/tcp open http Cloudflare http proxy |_http-server-header: cloudflare |_http-title: Attention Required! | Cloudflare 8443/tcp open ssl/http Cloudflare http proxy |_http-server-header: cloudflare |_http-title: Attention Required! | Cloudflare | ssl-cert: Subject: commonName=onetrust.com | Subject Alternative Name: DNS:onetrust.com, DNS:*.ideas.onetrust.com, DNS:*.onetrust.com, DNS:*.wopi.onetrust.com, DNS:*.nats.onetrust.com, DNS:*.my.onetrust.com, DNS:*.redacted.onetrust.com, DNS:*.loki.onetrust.com, DNS:*.at.onetrust.com, DNS:*.argocd.onetrust.com, DNS:*.keycloak.redacted.onetrust.com | Not valid before: 2024-08-15T19:56:28 |_Not valid after: 2024-11-13T20:56:21 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: FreeBSD 11.0-STABLE (92%), FreeBSD 11.1-STABLE (92%), FreeBSD 11.0-RELEASE - 12.0-CURRENT (89%), FreeBSD 11.1-RELEASE or 11.2-STABLE (89%), FreeBSD 11.2-RELEASE - 11.3 RELEASE or 11.2-STABLE (89%), FreeBSD 12.0-RELEASE - 13.0-CURRENT (89%), FreeBSD 11.1-RELEASE (88%), FreeBSD 11.2-RELEASE - 11.3-RELEASE (88%), FreeBSD 12.0-RELEASE - 12.1-RELEASE or 12.0-STABLE (88%), FreeBSD 11.0-RELEASE (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 7 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 7.16 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 7.81 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 7.89 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 7.62 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 16.91 ms ae-0.cloudflare.lsanca07.us.bb.gin.ntt.net (128.241.9.245) 6 23.66 ms 141.101.72.27 7 8.15 ms 172.64.155.119 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 25.17 seconds