Analyser le rapport pour "mrcrayfish.com"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

2

Durée

44.05seconde

Date

2024-12-25

IP

145.223.124.243

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A mrcrayfish.com)
Nmap scan report for mrcrayfish.com (145.223.124.243)
Host is up (0.074s latency).
Other addresses for mrcrayfish.com (not scanned): 2a02:4780:4a:2da2:1539:d5b8:2e38:e340
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http      hcdn
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 200 OK
|     Date: Wed, 25 Dec 2024 15:48:56 GMT
|     Content-Type: text/html
|     Content-Length: 9973
|     Connection: close
|     Vary: Accept-Encoding
|     Server: hcdn
|     alt-svc: h3=":443"; ma=86400
|     x-hcdn-request-id: f02150158a1482538b780ff8fab8e123-bos-edge1
|     Expires: Wed, 25 Dec 2024 15:48:55 GMT
|     Cache-Control: no-cache
|     Accept-Ranges: bytes
|     <!doctype html><title>Parked Domain name on Hostinger DNS system</title><meta charset=utf-8><meta content="IE=edge,chrome=1" http-equiv=X-UA-Compatible><meta content="Parked Domain name on Hostinger DNS system" name=description><meta content="width=device-width,initial-scale=1" name=viewport><link href=https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css rel=stylesheet><script src=https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js></script><script src=https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js></scri
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Wed, 25 Dec 2024 15:48:56 GMT
|     Content-Type: text/html
|     Content-Length: 148
|     Connection: close
|     Server: hcdn
|     alt-svc: h3=":443"; ma=86400
|     x-hcdn-request-id: c4fcdf52c299c96617ac2fe450292ef1-bos-edge1
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>hws</center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Date: Wed, 25 Dec 2024 15:48:56 GMT
|     Content-Type: text/html
|     Content-Length: 148
|     Connection: close
|     Server: hcdn
|     alt-svc: h3=":443"; ma=86400
|     x-hcdn-request-id: 90593508ae004d7d0906853eefed8404-bos-edge4
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>hws</center>
|     </body>
|_    </html>
|_http-title: Did not follow redirect to https://mrcrayfish.com/
|_http-server-header: hcdn
443/tcp open  ssl/https hcdn
| fingerprint-strings: 
|   GenericLines: 
|     HTTP/1.1 400 Bad Request
|     Date: Wed, 25 Dec 2024 15:49:03 GMT
|     Content-Type: text/html
|     Content-Length: 148
|     Connection: close
|     Server: hcdn
|     alt-svc: h3=":443"; ma=86400
|     x-hcdn-request-id: b9dc22d20181b31127bdae6983ef4d05-bos-edge1
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>hws</center>
|     </body>
|     </html>
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Date: Wed, 25 Dec 2024 15:49:04 GMT
|     Content-Type: text/html
|     Content-Length: 148
|     Connection: close
|     Server: hcdn
|     alt-svc: h3=":443"; ma=86400
|     x-hcdn-request-id: 6be7affef883cd083d4f2677628716db-bos-edge2
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>hws</center>
|     </body>
|     </html>
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Wed, 25 Dec 2024 15:49:03 GMT
|     Content-Type: text/html
|     Content-Length: 148
|     Connection: close
|     Server: hcdn
|     alt-svc: h3=":443"; ma=86400
|     x-hcdn-request-id: 8db56754ba7877a43e423b9f4954204c-bos-edge2
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>hws</center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Date: Wed, 25 Dec 2024 15:49:03 GMT
|     Content-Type: text/html
|     Content-Length: 148
|     Connection: close
|     Server: hcdn
|     alt-svc: h3=":443"; ma=86400
|     x-hcdn-request-id: 43e6838428d18b0d5645b9a9ff298353-bos-edge4
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>hws</center>
|     </body>
|_    </html>
|_http-trane-info: Problem with XML parsing of /evox/about
|_http-title: Home - MrCrayfish
|_http-server-header: hcdn
| ssl-cert: Subject: commonName=mrcrayfish.com
| Subject Alternative Name: DNS:mrcrayfish.com, DNS:www.mrcrayfish.com
| Not valid before: 2024-12-10T01:28:17
|_Not valid after:  2025-03-10T01:28:16
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=12/25%Time=676C2968%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,2848,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Wed,\x2025\x20Dec\
SF:x202024\x2015:48:56\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Len
SF:gth:\x209973\r\nConnection:\x20close\r\nVary:\x20Accept-Encoding\r\nSer
SF:ver:\x20hcdn\r\nalt-svc:\x20h3=\":443\";\x20ma=86400\r\nx-hcdn-request-
SF:id:\x20f02150158a1482538b780ff8fab8e123-bos-edge1\r\nExpires:\x20Wed,\x
SF:2025\x20Dec\x202024\x2015:48:55\x20GMT\r\nCache-Control:\x20no-cache\r\
SF:nAccept-Ranges:\x20bytes\r\n\r\n<!doctype\x20html><title>Parked\x20Doma
SF:in\x20name\x20on\x20Hostinger\x20DNS\x20system</title><meta\x20charset=
SF:utf-8><meta\x20content=\"IE=edge,chrome=1\"\x20http-equiv=X-UA-Compatib
SF:le><meta\x20content=\"Parked\x20Domain\x20name\x20on\x20Hostinger\x20DN
SF:S\x20system\"\x20name=description><meta\x20content=\"width=device-width
SF:,initial-scale=1\"\x20name=viewport><link\x20href=https://maxcdn\.boots
SF:trapcdn\.com/bootstrap/3\.3\.7/css/bootstrap\.min\.css\x20rel=styleshee
SF:t><script\x20src=https://ajax\.googleapis\.com/ajax/libs/jquery/3\.2\.1
SF:/jquery\.min\.js></script><script\x20src=https://maxcdn\.bootstrapcdn\.
SF:com/bootstrap/3\.3\.7/js/bootstrap\.min\.js></scri")%r(RTSPRequest,181,
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2025\x20Dec\x2020
SF:24\x2015:48:56\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\
SF:x20148\r\nConnection:\x20close\r\nServer:\x20hcdn\r\nalt-svc:\x20h3=\":
SF:443\";\x20ma=86400\r\nx-hcdn-request-id:\x20c4fcdf52c299c96617ac2fe4502
SF:92ef1-bos-edge1\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</ti
SF:tle></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center
SF:>\r\n<hr><center>hws</center>\r\n</body>\r\n</html>\r\n")%r(X11Probe,18
SF:1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2025\x20Dec\x20
SF:2024\x2015:48:56\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length
SF::\x20148\r\nConnection:\x20close\r\nServer:\x20hcdn\r\nalt-svc:\x20h3=\
SF:":443\";\x20ma=86400\r\nx-hcdn-request-id:\x2090593508ae004d7d0906853ee
SF:fed8404-bos-edge4\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</
SF:title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cent
SF:er>\r\n<hr><center>hws</center>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=12/25%Time=676C296F%P=x86_64-redhat-linu
SF:x-gnu%r(tor-versions,181,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x
SF:20Wed,\x2025\x20Dec\x202024\x2015:49:03\x20GMT\r\nContent-Type:\x20text
SF:/html\r\nContent-Length:\x20148\r\nConnection:\x20close\r\nServer:\x20h
SF:cdn\r\nalt-svc:\x20h3=\":443\";\x20ma=86400\r\nx-hcdn-request-id:\x2043
SF:e6838428d18b0d5645b9a9ff298353-bos-edge4\r\n\r\n<html>\r\n<head><title>
SF:400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Ba
SF:d\x20Request</h1></center>\r\n<hr><center>hws</center>\r\n</body>\r\n</
SF:html>\r\n")%r(GenericLines,181,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nD
SF:ate:\x20Wed,\x2025\x20Dec\x202024\x2015:49:03\x20GMT\r\nContent-Type:\x
SF:20text/html\r\nContent-Length:\x20148\r\nConnection:\x20close\r\nServer
SF::\x20hcdn\r\nalt-svc:\x20h3=\":443\";\x20ma=86400\r\nx-hcdn-request-id:
SF:\x20b9dc22d20181b31127bdae6983ef4d05-bos-edge1\r\n\r\n<html>\r\n<head><
SF:title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400
SF:\x20Bad\x20Request</h1></center>\r\n<hr><center>hws</center>\r\n</body>
SF:\r\n</html>\r\n")%r(RTSPRequest,181,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nDate:\x20Wed,\x2025\x20Dec\x202024\x2015:49:03\x20GMT\r\nContent-Ty
SF:pe:\x20text/html\r\nContent-Length:\x20148\r\nConnection:\x20close\r\nS
SF:erver:\x20hcdn\r\nalt-svc:\x20h3=\":443\";\x20ma=86400\r\nx-hcdn-reques
SF:t-id:\x208db56754ba7877a43e423b9f4954204c-bos-edge2\r\n\r\n<html>\r\n<h
SF:ead><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h
SF:1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>hws</center>\r\n</
SF:body>\r\n</html>\r\n")%r(RPCCheck,181,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\nDate:\x20Wed,\x2025\x20Dec\x202024\x2015:49:04\x20GMT\r\nContent-
SF:Type:\x20text/html\r\nContent-Length:\x20148\r\nConnection:\x20close\r\
SF:nServer:\x20hcdn\r\nalt-svc:\x20h3=\":443\";\x20ma=86400\r\nx-hcdn-requ
SF:est-id:\x206be7affef883cd083d4f2677628716db-bos-edge2\r\n\r\n<html>\r\n
SF:<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center>
SF:<h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>hws</center>\r\n
SF:</body>\r\n</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 4.15 - 5.6 (94%), Linux 4.10 (94%), Linux 5.0 - 5.4 (93%), Linux 5.0 - 5.3 (92%), Linux 5.4 (92%), Crestron XPanel control system (90%), Android 5.0 - 6.0.1 (Linux 3.4) (88%), Linux 2.6.32 (88%), Linux 3.10 (88%), Linux 3.10 - 4.11 (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   41.26 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.64 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   1.98 ms  r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   ...
5   12.48 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   21.82 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7   32.44 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8   46.74 ms be5024.ccr41.atl01.atlas.cogentco.com (154.54.163.41)
9   64.01 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
10  62.99 ms port-channel5042.ccr92.dca04.atlas.cogentco.com (154.54.162.221)
11  68.11 ms be4188.ccr42.jfk02.atlas.cogentco.com (154.54.30.122)
12  74.91 ms be3472.ccr32.bos01.atlas.cogentco.com (154.54.46.33)
13  73.49 ms be3663.agr21.bos01.atlas.cogentco.com (154.54.87.102)
14  74.40 ms te0-0-0-25.nr61.b024860-0.bos01.atlas.cogentco.com (154.24.64.18)
15  73.74 ms 38.140.156.234
16  74.54 ms 153.92.2.64
17  73.26 ms 153.92.2.45
18  73.64 ms 145.223.124.243

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 44.05 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
145.223.124.243
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est Pays-Bas
Pays-Bas
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 2 identifiés
Exécuter la commande
nmap -A mrcrayfish.com
Scan date
25 Dec 2024 10:49
API - Scan ID
Durée de l'analyse
44.05seconde
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: