Analyser le rapport pour "tk2.greedland.net"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

7

Durée

54.98seconde

Date

2024-06-14

IP

67.227.226.240

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A tk2.greedland.net)
Nmap scan report for tk2.greedland.net (67.227.226.240)
Host is up (0.072s latency).
rDNS record for 67.227.226.240: lb01.parklogic.com
Not shown: 993 closed tcp ports (reset)
PORT     STATE    SERVICE       VERSION
19/tcp   filtered chargen
22/tcp   open     ssh           OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 
|   2048 b6:5f:8c:4c:e9:04:4e:d4:47:4b:16:fc:89:4a:7e:3e (RSA)
|   256 05:d2:55:eb:c2:b6:7c:91:6f:60:2c:c4:1f:f7:49:5d (ECDSA)
|_  256 af:0d:59:1e:8a:d1:78:25:42:8b:1c:e7:bd:97:4d:a1 (ED25519)
80/tcp   open     http?
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, NotesRPC, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe: 
|     HTTP/1.0 400 Bad request
|     Content-Type: text/html
|_    <h2>Client sent a bad request.</h2>
| http-title: Site doesn't have a title (text/html; charset=utf-8).
|_Requested resource was http://ww7.greedland.net/?usid=16&utid=33240551346
|_http-trane-info: Problem with XML parsing of /evox/about
111/tcp  open     rpcbind       2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|_  100000  3,4          111/udp6  rpcbind
161/tcp  filtered snmp
427/tcp  filtered svrloc
1666/tcp filtered netview-aix-6
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=6/14%Time=666CC602%P=x86_64-redhat-linux-gnu%r(
SF:X11Probe,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nContent-Type:\x20tex
SF:t/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20request\.</h2>\n")%r(RP
SF:CCheck,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nContent-Type:\x20text/
SF:html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20request\.</h2>\n")%r(DNSV
SF:ersionBindReqTCP,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nContent-Type
SF::\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20request\.</h2>\
SF:n")%r(DNSStatusRequestTCP,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nCon
SF:tent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20reques
SF:t\.</h2>\n")%r(SSLSessionReq,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\n
SF:Content-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20req
SF:uest\.</h2>\n")%r(TerminalServerCookie,59,"HTTP/1\.0\x20400\x20Bad\x20r
SF:equest\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20
SF:bad\x20request\.</h2>\n")%r(TLSSessionReq,59,"HTTP/1\.0\x20400\x20Bad\x
SF:20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\
SF:x20bad\x20request\.</h2>\n")%r(Kerberos,59,"HTTP/1\.0\x20400\x20Bad\x20
SF:request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x2
SF:0bad\x20request\.</h2>\n")%r(SMBProgNeg,59,"HTTP/1\.0\x20400\x20Bad\x20
SF:request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x2
SF:0bad\x20request\.</h2>\n")%r(LPDString,59,"HTTP/1\.0\x20400\x20Bad\x20r
SF:equest\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20
SF:bad\x20request\.</h2>\n")%r(LDAPSearchReq,59,"HTTP/1\.0\x20400\x20Bad\x
SF:20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\
SF:x20bad\x20request\.</h2>\n")%r(LDAPBindReq,59,"HTTP/1\.0\x20400\x20Bad\
SF:x20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a
SF:\x20bad\x20request\.</h2>\n")%r(TerminalServer,59,"HTTP/1\.0\x20400\x20
SF:Bad\x20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\
SF:x20a\x20bad\x20request\.</h2>\n")%r(NotesRPC,59,"HTTP/1\.0\x20400\x20Ba
SF:d\x20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x2
SF:0a\x20bad\x20request\.</h2>\n");
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 14 hops

TRACEROUTE (using port 1025/tcp)
HOP RTT      ADDRESS
1   0.18 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.75 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.56 ms  r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   ...
5   12.30 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   20.96 ms be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218)
7   33.80 ms be2427.ccr21.den01.atlas.cogentco.com (154.54.87.22)
8   44.10 ms be3802.ccr31.oma02.atlas.cogentco.com (154.54.165.78)
9   52.25 ms be5215.ccr42.ord01.atlas.cogentco.com (154.54.165.138)
10  52.31 ms be2766.ccr41.ord03.atlas.cogentco.com (154.54.46.178)
11  52.45 ms cogent-lw-chi-border1-hu0-1-0-0.liquidweb.com (38.32.98.66)
12  73.00 ms lw-dc3-core2.rtr.liquidweb.com (209.59.157.50)
13  71.94 ms lw-dc3-dist13.rtr.liquidweb.com (209.59.157.223)
14  72.42 ms lb01.parklogic.com (67.227.226.240)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 54.98 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
67.227.226.240
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 7 identifiés
Exécuter la commande
nmap -A tk2.greedland.net
Scan date
14 Jun 2024 18:37
Durée de l'analyse
54.98seconde
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: