Analyser le rapport pour "apus.edu"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A apus.edu)
Nmap scan report for apus.edu (104.16.4.14)
Host is up (0.00093s latency).
Not shown: 996 filtered tcp ports (no-response)
PORT     STATE SERVICE  VERSION
80/tcp   open  http     Cloudflare http proxy
|_http-server-header: cloudflare
|_http-title: Did not follow redirect to https://apus.edu/
443/tcp  open  ssl/http Cloudflare http proxy
| ssl-cert: Subject: commonName=www.apus.edu
| Subject Alternative Name: DNS:www.hondros.edu, DNS:amu.apus.edu, DNS:www.apus.edu, DNS:apus.edu, DNS:master.apus.edu, DNS:nursing.hondros.edu, DNS:apu.apus.edu, DNS:hondros.edu, DNS:www.apu.apus.edu, DNS:www.nursing.hondros.edu, DNS:www.amu.apus.edu
| Not valid before: 2024-01-24T20:09:52
|_Not valid after:  2025-02-24T20:09:52
|_http-server-header: cloudflare
|_http-title: Did not follow redirect to https://www.apus.edu/
8080/tcp open  http     Cloudflare http proxy
|_http-server-header: cloudflare
|_http-title: Did not follow redirect to https://apus.edu/
8443/tcp open  ssl/http Cloudflare http proxy
|_http-server-header: cloudflare
| ssl-cert: Subject: commonName=www.apus.edu
| Subject Alternative Name: DNS:www.hondros.edu, DNS:amu.apus.edu, DNS:www.apus.edu, DNS:apus.edu, DNS:master.apus.edu, DNS:nursing.hondros.edu, DNS:apu.apus.edu, DNS:hondros.edu, DNS:www.apu.apus.edu, DNS:www.nursing.hondros.edu, DNS:www.amu.apus.edu
| Not valid before: 2024-01-24T20:09:52
|_Not valid after:  2025-02-24T20:09:52
|_http-title: Attention Required! | Cloudflare
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|webcam
Running (JUST GUESSING): FreeBSD 11.X (88%), Linux 3.X|4.X|5.X|2.6.X (86%), AXIS embedded (85%)
OS CPE: cpe:/o:freebsd:freebsd:11.0 cpe:/o:linux:linux_kernel:3.1 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:linux:linux_kernel:2.6.17 cpe:/h:axis:210a_network_camera cpe:/h:axis:211_network_camera cpe:/o:linux:linux_kernel:2.6.32
Aggressive OS guesses: FreeBSD 11.0-STABLE (88%), FreeBSD 11.1-STABLE (88%), Linux 3.1 (86%), Linux 3.2 (86%), Linux 4.15 - 5.6 (85%), Linux 3.2 - 3.5 (85%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (85%), Linux 5.3 - 5.4 (85%), Linux 2.6.32 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 8 hops

TRACEROUTE (using port 443/tcp)
HOP RTT     ADDRESS
1   0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.58 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.54 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   0.91 ms be3243.ccr41.lax05.atlas.cogentco.com (154.54.27.118)
6   3.08 ms 38.104.83.170
7   1.41 ms 172.70.212.2
8   0.83 ms 104.16.4.14

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 26.87 seconds
Schéma de couleur
Cible
apus.edu
IP cible
104.16.4.14
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A apus.edu
Scan date
03 Apr 2024 11:10
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Total scans
About 4 times
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: