Analyser le rapport pour "shoptopia.com"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

2

Durée

28.5seconde

Date

2024-10-18

IP

208.94.36.64

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A shoptopia.com)
Nmap scan report for shoptopia.com (208.94.36.64)
Host is up (0.0066s latency).
rDNS record for 208.94.36.64: ip208-94-36-64.pbiaas.com
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE        VERSION
80/tcp  open  http-proxy     (bad gateway)
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 500 Internal Server Error
|     server: nginx/1.4.6 (Ubuntu)
|     date: Fri, 18 Oct 2024 06:25:51 GMT
|     content-type: text/html
|     content-length: 201
|     cache-control: public, max-age=3600;
|     x-privacy-ref: CCPA
|     x-country-ref: US
|     connection: close
|     <html>
|     <head><title>500 Internal Server Error</title></head>
|     <body bgcolor="white">
|     <center><h1>500 Internal Server Error</h1></center>
|     <hr><center>nginx/1.4.6 (Ubuntu)</center>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 502 Bad Gateway
|     server: nginx/1.4.6 (Ubuntu)
|     date: Fri, 18 Oct 2024 06:25:51 GMT
|     content-type: text/html
|     content-length: 181
|     cache-control: public, max-age=3600;
|     x-privacy-ref: CCPA
|     x-country-ref: US
|     connection: close
|     <html>
|     <head><title>502 Bad Gateway</title></head>
|     <body bgcolor="white">
|     <center><h1>502 Bad Gateway</h1></center>
|     <hr><center>nginx/1.4.6 (Ubuntu)</center>
|     </body>
|     </html>
|   HTTPOptions: 
|     HTTP/1.1 405 Not Allowed
|     server: nginx/1.4.6 (Ubuntu)
|     date: Fri, 18 Oct 2024 06:25:51 GMT
|     content-type: text/html
|     content-length: 181
|     cache-control: public, max-age=3600;
|     x-privacy-ref: CCPA
|     x-country-ref: US
|     connection: close
|     <html>
|     <head><title>405 Not Allowed</title></head>
|     <body bgcolor="white">
|     <center><h1>405 Not Allowed</h1></center>
|     <hr><center>nginx/1.4.6 (Ubuntu)</center>
|     </body>
|     </html>
|   Help: 
|     HTTP/1.0 400 Bad request
|     cache-control: no-cache
|     content-type: text/html
|     <html><body><h1>400 Bad request</h1>
|     Your browser sent an invalid request.
|     </body></html>
|   RTSPRequest: 
|     HTTP/1.0 502 Bad Gateway
|     cache-control: no-cache
|     content-type: text/html
|     <html><body><h1>502 Bad Gateway</h1>
|     server returned an invalid or incomplete response.
|_    </body></html>
|_http-title: Whoops!
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: nginx/1.4.6 (Ubuntu)
443/tcp open  ssl/http-proxy (bad gateway)
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 500 Internal Server Error
|     server: nginx/1.4.6 (Ubuntu)
|     date: Fri, 18 Oct 2024 06:25:57 GMT
|     content-type: text/html
|     content-length: 201
|     content-security-policy: upgrade-insecure-requests
|     x-content-type-options: nosniff
|     x-xss-protection: 1; mode=block
|     x-frame-options: SAMEORIGIN
|     strict-transport-security: max-age=31536000; includeSubDomains
|     referrer-policy: no-referrer-when-downgrade
|     cache-control: public, max-age=3600;
|     x-privacy-ref: CCPA
|     x-country-ref: US
|     connection: close
|     <html>
|     <head><title>500 Internal Server Error</title></head>
|     <body bgcolor="white">
|     <center><h1>500 Internal Server Error</h1></center>
|     <hr><center>nginx/1.4.6 (Ubuntu)</center>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 502 Bad Gateway
|     server: nginx/1.4.6 (Ubuntu)
|     date: Fri, 18 Oct 2024 06:25:57 GMT
|     content-type: text/html
|     content-length: 181
|     content-security-policy: upgrade-insecure-requests
|     x-content-type-options: nosniff
|     x-xss-protection: 1; mode=block
|     x-frame-options: SAMEORIGIN
|     strict-transport-security: max-age=31536000; includeSubDomains
|     referrer-policy: no-referrer-when-downgrade
|     cache-control: public, max-age=3600;
|     x-privacy-ref: CCPA
|     x-country-ref: US
|     connection: close
|     <html>
|     <head><title>502 Bad Gateway</title></head>
|     <body bgcolor="white">
|     <center><h1>502 Bad Gateway</h1></center>
|     <hr><center>nginx/1.4.6 (Ubuntu)</center>
|     </body>
|     </html>
|   HTTPOptions: 
|     HTTP/1.1 405 Not Allowed
|     server: nginx/1.4.6 (Ubuntu)
|     date: Fri, 18 Oct 2024 06:25:57 GMT
|     content-type: text/html
|     content-length: 181
|     content-security-policy: upgrade-insecure-requests
|     x-content-type-options: nosniff
|     x-xss-protection: 1; mode=block
|     x-frame-options: SAMEORIGIN
|     strict-transport-security: max-age=31536000; includeSubDomains
|     referrer-policy: no-referrer-when-downgrade
|     cache-control: public, max-age=3600;
|     x-privacy-ref: CCPA
|     x-country-ref: US
|     connection: close
|     <html>
|     <head><title>405 Not Allowed</title></head>
|     <body bgcolor="white">
|     <center><h1>405 Not Allowed</h1></center>
|     <hr><center>nginx/1.4.6 (Ubuntu)</center>
|     </body>
|_    </html>
|_http-title: Whoops!
| http-robots.txt: 1 disallowed entry 
|_/
| ssl-cert: Subject: commonName=www.shoptopia.com
| Subject Alternative Name: DNS:shoptopia.com, DNS:www.shoptopia.com
| Not valid before: 2024-08-19T06:14:06
|_Not valid after:  2024-11-17T06:14:05
|_http-server-header: nginx/1.4.6 (Ubuntu)
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=10/17%Time=6711FFAC%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,1A3,"HTTP/1\.1\x20502\x20Bad\x20Gateway\r\nserver:\x20nginx
SF:/1\.4\.6\x20\(Ubuntu\)\r\ndate:\x20Fri,\x2018\x20Oct\x202024\x2006:25:5
SF:1\x20GMT\r\ncontent-type:\x20text/html\r\ncontent-length:\x20181\r\ncac
SF:he-control:\x20public,\x20max-age=3600;\r\nx-privacy-ref:\x20CCPA\r\nx-
SF:country-ref:\x20US\r\nconnection:\x20close\r\n\r\n<html>\r\n<head><titl
SF:e>502\x20Bad\x20Gateway</title></head>\r\n<body\x20bgcolor=\"white\">\r
SF:\n<center><h1>502\x20Bad\x20Gateway</h1></center>\r\n<hr><center>nginx/
SF:1\.4\.6\x20\(Ubuntu\)</center>\r\n</body>\r\n</html>\r\n")%r(HTTPOption
SF:s,1A3,"HTTP/1\.1\x20405\x20Not\x20Allowed\r\nserver:\x20nginx/1\.4\.6\x
SF:20\(Ubuntu\)\r\ndate:\x20Fri,\x2018\x20Oct\x202024\x2006:25:51\x20GMT\r
SF:\ncontent-type:\x20text/html\r\ncontent-length:\x20181\r\ncache-control
SF::\x20public,\x20max-age=3600;\r\nx-privacy-ref:\x20CCPA\r\nx-country-re
SF:f:\x20US\r\nconnection:\x20close\r\n\r\n<html>\r\n<head><title>405\x20N
SF:ot\x20Allowed</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center>
SF:<h1>405\x20Not\x20Allowed</h1></center>\r\n<hr><center>nginx/1\.4\.6\x2
SF:0\(Ubuntu\)</center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,BA,"HTTP
SF:/1\.0\x20502\x20Bad\x20Gateway\r\ncache-control:\x20no-cache\r\ncontent
SF:-type:\x20text/html\r\n\r\n<html><body><h1>502\x20Bad\x20Gateway</h1>\n
SF:The\x20server\x20returned\x20an\x20invalid\x20or\x20incomplete\x20respo
SF:nse\.\n</body></html>\n\n")%r(FourOhFourRequest,1C1,"HTTP/1\.1\x20500\x
SF:20Internal\x20Server\x20Error\r\nserver:\x20nginx/1\.4\.6\x20\(Ubuntu\)
SF:\r\ndate:\x20Fri,\x2018\x20Oct\x202024\x2006:25:51\x20GMT\r\ncontent-ty
SF:pe:\x20text/html\r\ncontent-length:\x20201\r\ncache-control:\x20public,
SF:\x20max-age=3600;\r\nx-privacy-ref:\x20CCPA\r\nx-country-ref:\x20US\r\n
SF:connection:\x20close\r\n\r\n<html>\r\n<head><title>500\x20Internal\x20S
SF:erver\x20Error</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center
SF:><h1>500\x20Internal\x20Server\x20Error</h1></center>\r\n<hr><center>ng
SF:inx/1\.4\.6\x20\(Ubuntu\)</center>\r\n</body>\r\n</html>\r\n")%r(Help,A
SF:9,"HTTP/1\.0\x20400\x20Bad\x20request\r\ncache-control:\x20no-cache\r\n
SF:content-type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request
SF:</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></
SF:html>\n\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=10/17%Time=6711FFB2%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,2A3,"HTTP/1\.1\x20502\x20Bad\x20Gateway\r\nserver:\x
SF:20nginx/1\.4\.6\x20\(Ubuntu\)\r\ndate:\x20Fri,\x2018\x20Oct\x202024\x20
SF:06:25:57\x20GMT\r\ncontent-type:\x20text/html\r\ncontent-length:\x20181
SF:\r\ncontent-security-policy:\x20upgrade-insecure-requests\r\nx-content-
SF:type-options:\x20nosniff\r\nx-xss-protection:\x201;\x20mode=block\r\nx-
SF:frame-options:\x20SAMEORIGIN\r\nstrict-transport-security:\x20max-age=3
SF:1536000;\x20includeSubDomains\r\nreferrer-policy:\x20no-referrer-when-d
SF:owngrade\r\ncache-control:\x20public,\x20max-age=3600;\r\nx-privacy-ref
SF::\x20CCPA\r\nx-country-ref:\x20US\r\nconnection:\x20close\r\n\r\n<html>
SF:\r\n<head><title>502\x20Bad\x20Gateway</title></head>\r\n<body\x20bgcol
SF:or=\"white\">\r\n<center><h1>502\x20Bad\x20Gateway</h1></center>\r\n<hr
SF:><center>nginx/1\.4\.6\x20\(Ubuntu\)</center>\r\n</body>\r\n</html>\r\n
SF:")%r(HTTPOptions,2A3,"HTTP/1\.1\x20405\x20Not\x20Allowed\r\nserver:\x20
SF:nginx/1\.4\.6\x20\(Ubuntu\)\r\ndate:\x20Fri,\x2018\x20Oct\x202024\x2006
SF::25:57\x20GMT\r\ncontent-type:\x20text/html\r\ncontent-length:\x20181\r
SF:\ncontent-security-policy:\x20upgrade-insecure-requests\r\nx-content-ty
SF:pe-options:\x20nosniff\r\nx-xss-protection:\x201;\x20mode=block\r\nx-fr
SF:ame-options:\x20SAMEORIGIN\r\nstrict-transport-security:\x20max-age=315
SF:36000;\x20includeSubDomains\r\nreferrer-policy:\x20no-referrer-when-dow
SF:ngrade\r\ncache-control:\x20public,\x20max-age=3600;\r\nx-privacy-ref:\
SF:x20CCPA\r\nx-country-ref:\x20US\r\nconnection:\x20close\r\n\r\n<html>\r
SF:\n<head><title>405\x20Not\x20Allowed</title></head>\r\n<body\x20bgcolor
SF:=\"white\">\r\n<center><h1>405\x20Not\x20Allowed</h1></center>\r\n<hr><
SF:center>nginx/1\.4\.6\x20\(Ubuntu\)</center>\r\n</body>\r\n</html>\r\n")
SF:%r(FourOhFourRequest,2C1,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Err
SF:or\r\nserver:\x20nginx/1\.4\.6\x20\(Ubuntu\)\r\ndate:\x20Fri,\x2018\x20
SF:Oct\x202024\x2006:25:57\x20GMT\r\ncontent-type:\x20text/html\r\ncontent
SF:-length:\x20201\r\ncontent-security-policy:\x20upgrade-insecure-request
SF:s\r\nx-content-type-options:\x20nosniff\r\nx-xss-protection:\x201;\x20m
SF:ode=block\r\nx-frame-options:\x20SAMEORIGIN\r\nstrict-transport-securit
SF:y:\x20max-age=31536000;\x20includeSubDomains\r\nreferrer-policy:\x20no-
SF:referrer-when-downgrade\r\ncache-control:\x20public,\x20max-age=3600;\r
SF:\nx-privacy-ref:\x20CCPA\r\nx-country-ref:\x20US\r\nconnection:\x20clos
SF:e\r\n\r\n<html>\r\n<head><title>500\x20Internal\x20Server\x20Error</tit
SF:le></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>500\x20Interna
SF:l\x20Server\x20Error</h1></center>\r\n<hr><center>nginx/1\.4\.6\x20\(Ub
SF:untu\)</center>\r\n</body>\r\n</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.6
Network Distance: 11 hops

TRACEROUTE (using port 443/tcp)
HOP RTT     ADDRESS
1   0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.48 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.55 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   1.00 ms be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102)
6   ...
7   5.77 ms ae5.17.bar1.LasVegas1.net.lumen.tech (4.69.206.186)
8   6.00 ms 205.129.20.102
9   ... 10
11  6.23 ms ip208-94-36-64.pbiaas.com (208.94.36.64)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 28.50 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
208.94.36.64
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 2 identifiés
Exécuter la commande
nmap -A shoptopia.com
Scan date
18 Oct 2024 02:27
Durée de l'analyse
28.5seconde
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: