Puertos
Duración
Fecha
IP
Nmap scan report for c.la1-c1-yhu.salesforceliveagent.com (3.96.121.93) Host is up (0.079s latency). Other addresses for c.la1-c1-yhu.salesforceliveagent.com (not scanned): 3.97.95.115 35.183.88.173 rDNS record for 3.96.121.93: ec2-3-96-121-93.ca-central-1.compute.amazonaws.com Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp closed http 443/tcp open ssl/https envoy |_http-title: Site doesn't have a title (text/plain). | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LPDString, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe, tor-versions: | HTTP/1.1 400 Bad Request | content-length: 0 | connection: close | FourOhFourRequest: | HTTP/1.1 426 Upgrade Required | date: Fri, 10 May 2024 16:50:42 GMT | server: envoy | connection: close | content-length: 0 | GetRequest: | HTTP/1.1 426 Upgrade Required | date: Fri, 10 May 2024 16:50:39 GMT | server: envoy | connection: close | content-length: 0 | HTTPOptions: | HTTP/1.1 426 Upgrade Required | date: Fri, 10 May 2024 16:50:41 GMT | server: envoy | connection: close |_ content-length: 0 | ssl-cert: Subject: commonName=la1-core1.sfdc-58ktaz.salesforceliveagent.com/organizationName=salesforce.com, inc./stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:la1-core1.sfdc-58ktaz.salesforceliveagent.com, DNS:*.la1-core1.sfdc-58ktaz.salesforceliveagent.com, DNS:la1-c1-yhu.salesforceliveagent.com, DNS:*.la1-c1-yhu.salesforceliveagent.com, DNS:la1-c1cs-yhu.salesforceliveagent.com, DNS:*.la1-c1cs-yhu.salesforceliveagent.com, DNS:la1-c1-yul.salesforceliveagent.com, DNS:*.la1-c1-yul.salesforceliveagent.com, DNS:la1-c1cs-yul.salesforceliveagent.com, DNS:*.la1-c1cs-yul.salesforceliveagent.com | Not valid before: 2023-11-15T00:00:00 |_Not valid after: 2024-11-13T23:59:59 |_http-server-header: envoy |_ssl-date: TLS randomness does not represent time 8443/tcp open ssl/https-alt envoy |_http-title: Certificate Error | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LDAPSearchReq, LPDString, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: | HTTP/1.1 400 Bad Request | content-length: 0 | connection: close | FourOhFourRequest: | HTTP/1.1 426 Upgrade Required | date: Fri, 10 May 2024 16:50:42 GMT | server: envoy | connection: close | content-length: 0 | GetRequest: | HTTP/1.1 426 Upgrade Required | date: Fri, 10 May 2024 16:50:39 GMT | server: envoy | connection: close | content-length: 0 | HTTPOptions: | HTTP/1.1 426 Upgrade Required | date: Fri, 10 May 2024 16:50:40 GMT | server: envoy | connection: close |_ content-length: 0 |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=la1-core1.sfdc-58ktaz.salesforceliveagent.com/organizationName=salesforce.com, inc./stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:la1-core1.sfdc-58ktaz.salesforceliveagent.com, DNS:*.la1-core1.sfdc-58ktaz.salesforceliveagent.com, DNS:la1-c1-yhu.salesforceliveagent.com, DNS:*.la1-c1-yhu.salesforceliveagent.com, DNS:la1-c1cs-yhu.salesforceliveagent.com, DNS:*.la1-c1cs-yhu.salesforceliveagent.com, DNS:la1-c1-yul.salesforceliveagent.com, DNS:*.la1-c1-yul.salesforceliveagent.com, DNS:la1-c1cs-yul.salesforceliveagent.com, DNS:*.la1-c1cs-yul.salesforceliveagent.com | Not valid before: 2023-11-15T00:00:00 |_Not valid after: 2024-11-13T23:59:59 |_http-server-header: envoy 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=5/10%Time=663E5060%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\ SF:x20Fri,\x2010\x20May\x202024\x2016:50:39\x20GMT\r\nserver:\x20envoy\r\n SF:connection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,7B SF:,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Fri,\x2010\x20May SF:\x202024\x2016:50:41\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close SF:\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,7B,"HTTP/1\.1\x2 SF:0426\x20Upgrade\x20Required\r\ndate:\x20Fri,\x2010\x20May\x202024\x2016 SF::50:42\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\ncontent-le SF:ngth:\x200\r\n\r\n")%r(tor-versions,42,"HTTP/1\.1\x20400\x20Bad\x20Requ SF:est\r\ncontent-length:\x200\r\nconnection:\x20close\r\n\r\n")%r(RTSPReq SF:uest,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x200\r\n SF:connection:\x20close\r\n\r\n")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20Bad\x SF:20Request\r\ncontent-length:\x200\r\nconnection:\x20close\r\n\r\n")%r(D SF:NSVersionBindReqTCP,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-l SF:ength:\x200\r\nconnection:\x20close\r\n\r\n")%r(DNSStatusRequestTCP,42, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x200\r\nconnecti SF:on:\x20close\r\n\r\n")%r(Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:ncontent-length:\x200\r\nconnection:\x20close\r\n\r\n")%r(SSLSessionReq SF:,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x200\r\nconn SF:ection:\x20close\r\n\r\n")%r(TerminalServerCookie,42,"HTTP/1\.1\x20400\ SF:x20Bad\x20Request\r\ncontent-length:\x200\r\nconnection:\x20close\r\n\r SF:\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent- SF:length:\x200\r\nconnection:\x20close\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1 SF:\x20400\x20Bad\x20Request\r\ncontent-length:\x200\r\nconnection:\x20clo SF:se\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncon SF:tent-length:\x200\r\nconnection:\x20close\r\n\r\n")%r(X11Probe,42,"HTTP SF:/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x200\r\nconnection:\x SF:20close\r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:ncontent-length:\x200\r\nconnection:\x20close\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8443-TCP:V=7.92%T=SSL%I=7%D=5/10%Time=663E5060%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate: SF:\x20Fri,\x2010\x20May\x202024\x2016:50:39\x20GMT\r\nserver:\x20envoy\r\ SF:nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,7 SF:B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Fri,\x2010\x20Ma SF:y\x202024\x2016:50:40\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20clos SF:e\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,7B,"HTTP/1\.1\x SF:20426\x20Upgrade\x20Required\r\ndate:\x20Fri,\x2010\x20May\x202024\x201 SF:6:50:42\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\ncontent-l SF:ength:\x200\r\n\r\n")%r(RTSPRequest,42,"HTTP/1\.1\x20400\x20Bad\x20Requ SF:est\r\ncontent-length:\x200\r\nconnection:\x20close\r\n\r\n")%r(RPCChec SF:k,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x200\r\ncon SF:nection:\x20close\r\n\r\n")%r(DNSVersionBindReqTCP,42,"HTTP/1\.1\x20400 SF:\x20Bad\x20Request\r\ncontent-length:\x200\r\nconnection:\x20close\r\n\ SF:r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nc SF:ontent-length:\x200\r\nconnection:\x20close\r\n\r\n")%r(Help,42,"HTTP/1 SF:\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x200\r\nconnection:\x20 SF:close\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\ncontent-length:\x200\r\nconnection:\x20close\r\n\r\n")%r(TerminalSer SF:verCookie,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x20 SF:0\r\nconnection:\x20close\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x2040 SF:0\x20Bad\x20Request\r\ncontent-length:\x200\r\nconnection:\x20close\r\n SF:\r\n")%r(Kerberos,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-len SF:gth:\x200\r\nconnection:\x20close\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\ SF:x20400\x20Bad\x20Request\r\ncontent-length:\x200\r\nconnection:\x20clos SF:e\r\n\r\n")%r(X11Probe,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconten SF:t-length:\x200\r\nconnection:\x20close\r\n\r\n")%r(LPDString,42,"HTTP/1 SF:\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x200\r\nconnection:\x20 SF:close\r\n\r\n")%r(LDAPSearchReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\ncontent-length:\x200\r\nconnection:\x20close\r\n\r\n"); OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU No OS matches for host Network Distance: 24 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.56 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.58 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 12.24 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 21.09 ms be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218) 7 36.78 ms be3850.ccr41.iah01.atlas.cogentco.com (154.54.0.53) 8 37.88 ms be2417.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.3.246) 9 59.88 ms 38.88.155.218 10 38.12 ms 52.93.254.207 11 37.70 ms 52.93.64.127 12 ... 13 78.55 ms 52.94.81.214 14 78.56 ms 52.94.83.167 15 78.46 ms 52.94.83.176 16 81.37 ms 52.94.81.247 17 81.61 ms 52.94.81.0 18 ... 23 24 79.14 ms ec2-3-96-121-93.ca-central-1.compute.amazonaws.com (3.96.121.93) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 94.69 seconds