Puertos
Duración
Fecha
IP
Nmap scan report for speedtest.internet314.com (65.19.130.182) Host is up (0.0083s latency). Not shown: 997 filtered ports PORT STATE SERVICE VERSION 443/tcp closed https 5060/tcp open ssl/sip? | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, SIPOptions: | HTTP/1.1 500 Internal Server Error | Connection: Close | GenericLines: | ERROR | ERROR | Help, LPDString: | ERROR | LDAPSearchReq: | \x91 | SSLSessionReq: |_ diRS | ssl-cert: Subject: commonName=speedtest.internet314.com | Subject Alternative Name: DNS:speedtest.internet314.com | Not valid before: 2021-03-27T20:10:39 |_Not valid after: 2021-06-25T20:10:39 |_ssl-date: TLS randomness does not represent time 8080/tcp open ssl/http-proxy | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, SIPOptions: | HTTP/1.1 500 Internal Server Error | Connection: Close | GenericLines: | ERROR | ERROR | Help, LPDString: | ERROR | LDAPSearchReq: | 2U\x8f | TLSSessionReq: |_ )00@J_ |_http-title: OoklaServer | ssl-cert: Subject: commonName=speedtest.internet314.com | Subject Alternative Name: DNS:speedtest.internet314.com | Not valid before: 2021-03-27T20:10:39 |_Not valid after: 2021-06-25T20:10:39 |_ssl-date: TLS randomness does not represent time 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port5060-TCP:V=7.70%T=SSL%I=7%D=11/26%Time=65631EE5%P=x86_64-redhat-lin SF:ux-gnu%r(GenericLines,C,"ERROR\nERROR\n")%r(GetRequest,39,"HTTP/1\.1\x2 SF:0500\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n")%r SF:(HTTPOptions,39,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nCon SF:nection:\x20Close\r\n\r\n")%r(RTSPRequest,39,"HTTP/1\.1\x20500\x20Inter SF:nal\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n")%r(Help,6,"ERRO SF:R\n")%r(SSLSessionReq,20,"\xc5\x96\x91\xdc\x0e\xcb\xed\xd4UV\xef\x0bj\x SF:06j\xbc\x1a\xc1\xa0\xd1\xa2I\xe3\xfe\xf0\x90diRS\x9a\n")%r(TLSSessionRe SF:q,3A,"\x8a\xcb\xe3qo\xf0\xe5\x10\x15\xee=\x85\xff@F\x17P\xce\xd6\xbb}\x SF:be1\xbf\x87\n\x11e\xce\xbd\x866m\xfd\x03R\x20\xaf,\xd8\x8dE\xd0r\x9b\?\ SF:xaf`\x8f-\xa6\x1c\xb4\?r\x91\\\n")%r(Kerberos,2B,"\xc6y\xb0j\xd1\x17\xa SF:6\"\x9f\xf7X\xf8\xa64\(\xae\xef\x0b\xaf%\x9d\x930\xd6\xd4\x81\x04'\x1c~ SF:\xef\x0b\xfb\xbf\t\x18\xbep\[\xd5\x98D\n")%r(FourOhFourRequest,39,"HTTP SF:/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\n SF:\r\n")%r(LPDString,6,"ERROR\n")%r(LDAPSearchReq,55,"\x9e\xe9e\x15\x06\x SF:f4\xdb\x8b\+v\xaeVyE\xda\xef\xf0j\xb3\x84\\S\x04D\x07\xdd\\\x91\xb6\xa1 SF:\xef\xf0\xa38\xb9\xae\x91\xef\x17\xc5\x8b\n\x89\]\xc3\x1f\xea\xd9\xcbG- SF:\xc7\xa2\xbb\xcdE\xe4\xa7\xfd\x1e\xed\x7f\x8e\xe0\x14\[5\xc5\xf1\xcbl\x SF:ab\x0b\[\x20b\x9e:8\x02u\x85\xe1q\n")%r(SIPOptions,39,"HTTP/1\.1\x20500 SF:\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8080-TCP:V=7.70%T=SSL%I=7%D=11/26%Time=65631EEA%P=x86_64-redhat-lin SF:ux-gnu%r(GenericLines,C,"ERROR\nERROR\n")%r(GetRequest,39,"HTTP/1\.1\x2 SF:0500\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n")%r SF:(HTTPOptions,39,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nCon SF:nection:\x20Close\r\n\r\n")%r(RTSPRequest,39,"HTTP/1\.1\x20500\x20Inter SF:nal\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n")%r(Help,6,"ERRO SF:R\n")%r(SSLSessionReq,1A,"\x8a\xcb\xe3qo\xf0\xe5\x10\x15\xee=\x85\xff@F SF:\x17\x025W~\xff\xcd\xe64n\n")%r(TLSSessionReq,47,"\xc6y\xb0j\xd1\x17\xa SF:6\"\x9f\xf7X\xf8\xa64\(\xae\xbcz;\xc8Y\x98\x8cq\xb4\|\|\xef\x0b\x8eC>\x SF:1b\xf5\x01=\xaf\xef\x0e\xc7\x07E\n\xa6PN\xa4\xaf\xd1J\x20\xfe\*I\xcc\x8 SF:1\*P\xf7\xb0\)00@J_\xef\x01\xc7\xe8\n")%r(Kerberos,1A,"\xd7&\xef\xf0\+\ SF:+\x0b\x12\xb9\x1c\x1e\xfc\xaaacc\x1c\x01\xc4\xd7\x99KJ=\xc6\n")%r(FourO SF:hFourRequest,39,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nCon SF:nection:\x20Close\r\n\r\n")%r(LPDString,6,"ERROR\n")%r(LDAPSearchReq,52 SF:,"\xd68\x11\xd4\x0fc\x18h\xd6\x80\x86\xb1\xe5\x04\xd3A\xfc\xa9\xbf\x9e% SF:\x96\x87/D\x11\xc7\x07Nk\?\x92\xa6\xfb\(v\xd93\x0e\xf8i\n\x9b'\$\x1a2U\ SF:\\x8f\xed0\x0b\xdfl\x0e\xecd\x1cU\xef\xf0\xfb\xb0\x1a\x85\xb31\xb8\.b\x SF:a5\xeb\xddtH\x13g\x89\xfef\n")%r(SIPOptions,39,"HTTP/1\.1\x20500\x20Int SF:ernal\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n"); Device type: general purpose Running: Linux 3.X|4.X OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 OS details: Linux 3.10 - 4.11 Network Distance: 8 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.67 ms 208.76.251.177 2 0.57 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.99 ms multacom.com (96.45.162.9) 4 ... 5 6 8.01 ms port-channel5.core6.fmt2.he.net (184.105.222.5) 7 20.14 ms port-channel1.core7.fmt2.he.net (184.104.188.174) 8 9.36 ms 65.19.130.182 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 208.33 seconds