Puertos
Duración
Fecha
IP
Nmap scan report for h.holder.com.ua (91.198.36.35) Host is up (0.17s latency). Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: | HTTP/1.1 400 Bad Request | Content-Length: 0 |_ Connection: Close |_http-trane-info: Problem with XML parsing of /evox/about |_http-title: Site doesn't have a title. | http-robots.txt: 1 disallowed entry |_/ 110/tcp closed pop3 443/tcp open ssl/http nginx | http-robots.txt: 1 disallowed entry |_/ |_http-title: Site doesn't have a title. |_http-trane-info: Problem with XML parsing of /evox/about | ssl-cert: Subject: commonName=holder.com.ua | Subject Alternative Name: DNS:*.cdn.holder.com.ua, DNS:*.holder.com.ua, DNS:*.holder.ua, DNS:*.mediatraffic.com.ua, DNS:holder.com.ua, DNS:holder.ua | Not valid before: 2024-11-27T02:10:42 |_Not valid after: 2025-02-25T02:10:41 995/tcp closed pop3s 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.92%I=7%D=11/27%Time=6747BBA8%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x SF:200\r\nConnection:\x20Close\r\n\r\n")%r(HTTPOptions,42,"HTTP/1\.1\x2040 SF:0\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n SF:\r\n")%r(RTSPRequest,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent- SF:Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(X11Probe,42,"HTTP/1\.1 SF:\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20Clo SF:se\r\n\r\n")%r(FourOhFourRequest,42,"HTTP/1\.1\x20400\x20Bad\x20Request SF:\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(GenericLin SF:es,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nCo SF:nnection:\x20Close\r\n\r\n")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20Bad\x20 SF:Request\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(DNS SF:VersionBindReqTCP,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Len SF:gth:\x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSStatusRequestTCP,42,"H SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection SF::\x20Close\r\n\r\n")%r(Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nC SF:ontent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SSLSessionReq,4 SF:2,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnec SF:tion:\x20Close\r\n\r\n")%r(TerminalServerCookie,42,"HTTP/1\.1\x20400\x2 SF:0Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n SF:")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Le SF:ngth:\x200\r\nConnection:\x20Close\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x SF:20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20Close SF:\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConte SF:nt-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(LPDString,42,"HTTP/ SF:1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x2 SF:0Close\r\n\r\n")%r(LDAPSearchReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request SF:\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(LDAPBindRe SF:q,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nCon SF:nection:\x20Close\r\n\r\n"); Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.2 - 4.9 Network Distance: 14 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.54 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.70 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 11.00 ms hurricane-electric.as6939.any2ix.coresite.com (206.72.210.122) 5 0.77 ms port-channel14.core2.lax1.he.net (72.52.92.121) 6 ... 9 10 162.07 ms port-channel7.core3.kbp1.he.net (184.104.195.109) 11 161.16 ms port-channel2.core2.kbp1.he.net (184.104.192.166) 12 171.36 ms 216.66.94.130 13 171.30 ms 216.66.94.130 14 175.49 ms 91.198.36.35 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 48.93 seconds