Puertos
Duración
Fecha
IP
Nmap scan report for stanfordmedicine25.stanford.edu (54.165.36.126) Host is up (0.061s latency). Other addresses for stanfordmedicine25.stanford.edu (not scanned): 3.233.235.201 rDNS record for 54.165.36.126: ec2-54-165-36-126.compute-1.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http awselb/2.0 |_http-server-header: awselb/2.0 | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 301 Moved Permanently | Server: awselb/2.0 | Date: Wed, 13 Nov 2024 01:24:56 GMT | Content-Type: text/html | Content-Length: 134 | Connection: close | Location: https://internal-shc-extweb-prod-alb-1879165557.us-east-1.elb.amazonaws.com:443/nice%20ports%2C/Tri%6Eity.txt%2ebak | <html> | <head><title>301 Moved Permanently</title></head> | <body> | <center><h1>301 Moved Permanently</h1></center> | </body> | </html> | GetRequest: | HTTP/1.1 301 Moved Permanently | Server: awselb/2.0 | Date: Wed, 13 Nov 2024 01:24:55 GMT | Content-Type: text/html | Content-Length: 134 | Connection: close | Location: https://internal-shc-extweb-prod-alb-1879165557.us-east-1.elb.amazonaws.com:443/ | <html> | <head><title>301 Moved Permanently</title></head> | <body> | <center><h1>301 Moved Permanently</h1></center> | </body> | </html> | HTTPOptions: | HTTP/1.1 301 Moved Permanently | Server: awselb/2.0 | Date: Wed, 13 Nov 2024 01:24:56 GMT | Content-Type: text/html | Content-Length: 134 | Connection: close | Location: https://internal-shc-extweb-prod-alb-1879165557.us-east-1.elb.amazonaws.com:443/ | <html> | <head><title>301 Moved Permanently</title></head> | <body> | <center><h1>301 Moved Permanently</h1></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Wed, 13 Nov 2024 01:24:56 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-title: Did not follow redirect to https://stanfordmedicine25.stanford.edu:443/ 443/tcp open ssl/http Apache httpd 2.4.62 (() Communique/4.3.3) |_http-title: Bedside Medicine Exam Skills | Stanford Medicine 25 | Stanfor... |_ssl-date: TLS randomness does not represent time |_http-server-header: Apache/2.4.62 () Communique/4.3.3 | ssl-cert: Subject: commonName=content.medweb.stanford.edu/organizationName=Stanford University/stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:content.medweb.stanford.edu, DNS:anatomy.stanford.edu, DNS:author.medweb.stanford.edu, DNS:bigdata.stanford.edu, DNS:biodesign.stanford.edu, DNS:bmir.stanford.edu, DNS:bmt.stanford.edu, DNS:brcatool.stanford.edu, DNS:canarycenter.stanford.edu, DNS:cape.stanford.edu, DNS:cbis.stanford.edu, DNS:chartstudy.stanford.edu, DNS:childabuse.stanford.edu, DNS:cibsr.stanford.edu, DNS:cisl.stanford.edu, DNS:clinicaltrials.stanford.edu, DNS:conferencecenter.stanford.edu, DNS:content-author.medweb.stanford.edu, DNS:dbpeds.stanford.edu, DNS:domesticabuse.stanford.edu, DNS:dura.stanford.edu, DNS:dx.stanford.edu, DNS:elderabuse.stanford.edu, DNS:emed.stanford.edu, DNS:endocrinology.stanford.edu, DNS:epibio.stanford.edu, DNS:ether.stanford.edu, DNS:explore.stanford.edu, DNS:globalchildhealth.stanford.edu, DNS:goodmancenter.stanford.edu, DNS:healthlibrary.stanford.edu, DNS:hematology.stanford.edu, DNS:humantraffickingmed.stanford.edu, DNS:ibiis.stanford.edu, DNS:irthelp.stanford.edu, DNS:iti.stanford.edu, DNS:kidneycancer.stanford.edu, DNS:lifesciencealliance.stanford.edu, DNS:medicalgiving.stanford.edu, DNS:medicine.stanford.edu, DNS:microimmuno.stanford.edu, DNS:neonatology.stanford.edu, DNS:nephrology.stanford.edu, DNS:neurobiology.stanford.edu, DNS:obgyn.stanford.edu, DNS:oncology.stanford.edu, DNS:oralsurgery.stanford.edu, DNS:ortho.stanford.edu, DNS:pedhemonc.stanford.edu, DNS:pediatrics.stanford.edu, DNS:pediatricsurgery.stanford.edu, DNS:plasticsurgery.stanford.edu, DNS:pmr.stanford.edu, DNS:prevention.stanford.edu, DNS:radonc.stanford.edu, DNS:rise.stanford.edu, DNS:semper.stanford.edu, DNS:septris.stanford.edu, DNS:sgec.stanford.edu, DNS:shudo-lab.stanford.edu, DNS:simr.stanford.edu, DNS:sm.stanford.edu, DNS:snma.stanford.edu, DNS:stanfordmedicine25.stanford.edu, DNS:surgery.stanford.edu, DNS:svalz.stanford.edu, DNS:tdshelp.stanford.edu, DNS:tmil.stanford.edu, DNS:trackcovid.stanford.edu, DNS:transplantation.stanford.edu, DNS:urology.stanford.edu, DNS:vascular.stanford.edu, DNS:wellmd.stanford.edu | Not valid before: 2024-11-01T00:00:00 |_Not valid after: 2025-11-01T23:59:59 | tls-alpn: | h2 |_ http/1.1 | tls-nextprotoneg: | h2 |_ http/1.1 | http-methods: |_ Potentially risky methods: TRACE 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.92%I=7%D=11/12%Time=6733FFE7%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,17E,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x2 SF:0awselb/2\.0\r\nDate:\x20Wed,\x2013\x20Nov\x202024\x2001:24:55\x20GMT\r SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x SF:20close\r\nLocation:\x20https://internal-shc-extweb-prod-alb-1879165557 SF:\.us-east-1\.elb\.amazonaws\.com:443/\r\n\r\n<html>\r\n<head><title>301 SF:\x20Moved\x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\x2 SF:0Moved\x20Permanently</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPO SF:ptions,17E,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x20awse SF:lb/2\.0\r\nDate:\x20Wed,\x2013\x20Nov\x202024\x2001:24:56\x20GMT\r\nCon SF:tent-Type:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x20clo SF:se\r\nLocation:\x20https://internal-shc-extweb-prod-alb-1879165557\.us- SF:east-1\.elb\.amazonaws\.com:443/\r\n\r\n<html>\r\n<head><title>301\x20M SF:oved\x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\x20Move SF:d\x20Permanently</h1></center>\r\n</body>\r\n</html>\r\n")%r(RTSPReques SF:t,7A,"<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<b SF:ody>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n< SF:/html>\r\n")%r(X11Probe,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServ SF:er:\x20awselb/2\.0\r\nDate:\x20Wed,\x2013\x20Nov\x202024\x2001:24:56\x2 SF:0GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnect SF:ion:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</titl SF:e></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\ SF:r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,1A1,"HTTP/1\.1\x20301\x SF:20Moved\x20Permanently\r\nServer:\x20awselb/2\.0\r\nDate:\x20Wed,\x2013 SF:\x20Nov\x202024\x2001:24:56\x20GMT\r\nContent-Type:\x20text/html\r\nCon SF:tent-Length:\x20134\r\nConnection:\x20close\r\nLocation:\x20https://int SF:ernal-shc-extweb-prod-alb-1879165557\.us-east-1\.elb\.amazonaws\.com:44 SF:3/nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\n\r\n<html>\r\n<head><title>30 SF:1\x20Moved\x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\x SF:20Moved\x20Permanently</h1></center>\r\n</body>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 15 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.21 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.65 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.81 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 12.47 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 21.39 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 32.62 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 32.38 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74) 9 ... 14 15 59.22 ms ec2-54-165-36-126.compute-1.amazonaws.com (54.165.36.126) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 33.81 seconds