Puertos
Duración
Fecha
IP
Nmap scan report for tryhackme.com (104.22.54.228) Host is up (0.00099s latency). Other addresses for tryhackme.com (not scanned): 2606:4700:10::6816:36e4 2606:4700:10::ac43:1b0a 2606:4700:10::6816:37e4 104.22.55.228 172.67.27.10 Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http Cloudflare http proxy |_http-title: Did not follow redirect to https://tryhackme.com/ |_http-server-header: cloudflare 443/tcp open ssl/http Cloudflare http proxy | http-robots.txt: 2 disallowed entries |_/voucher/ /r/voucher/ | ssl-cert: Subject: commonName=tryhackme.com | Subject Alternative Name: DNS:insights-proxy-worker.tryhackme.com, DNS:tryhackme.com | Not valid before: 2024-05-20T14:10:21 |_Not valid after: 2024-08-18T14:10:20 |_http-trane-info: Problem with XML parsing of /evox/about |_http-title: TryHackMe | Cyber Security Training |_http-server-header: cloudflare 8080/tcp open http Cloudflare http proxy |_http-title: Did not follow redirect to https://tryhackme.com/ |_http-server-header: cloudflare 8443/tcp open ssl/http Cloudflare http proxy |_http-server-header: cloudflare |_http-trane-info: Problem with XML parsing of /evox/about | http-robots.txt: 2 disallowed entries |_/voucher/ /r/voucher/ |_http-title: TryHackMe | Cyber Security Training | ssl-cert: Subject: commonName=tryhackme.com | Subject Alternative Name: DNS:insights-proxy-worker.tryhackme.com, DNS:tryhackme.com | Not valid before: 2024-05-20T14:10:21 |_Not valid after: 2024-08-18T14:10:20 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: FreeBSD 11.0-STABLE (88%), FreeBSD 11.1-STABLE (88%), Linux 3.1 (86%), Linux 3.2 (86%), Linux 3.2 - 3.5 (85%), FreeBSD 11.2-RELEASE - 11.3 RELEASE or 11.2-STABLE (85%), FreeBSD 12.0-RELEASE - 13.0-CURRENT (85%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (85%), Linux 4.15 - 5.6 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 7 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.21 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 1.28 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.67 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 4.39 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 1.05 ms ae-0.cloudflare.lsanca07.us.bb.gin.ntt.net (128.241.9.245) 6 9.73 ms 162.158.184.5 7 1.04 ms 104.22.54.228 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 25.08 seconds