Ports
Durée
Date
IP
Nmap scan report for api-netxselect.wallst.com (209.234.235.9) Host is up (0.062s latency). Not shown: 998 closed tcp ports (reset) PORT STATE SERVICE VERSION 80/tcp open http |_http-title: Did not follow redirect to https://api-netxselect.wallst.com/ | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 302 Moved Temporarily | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak | Connection: close | Content-Length: 0 | GetRequest, HTTPOptions, RTSPRequest: | HTTP/1.0 302 Moved Temporarily | Location: https:/// | Connection: close | Content-Length: 0 | SIPOptions: | HTTP/1.0 302 Moved Temporarily | Location: https://sip:nm | Connection: close | Content-Length: 0 | TerminalServerCookie: | HTTP/1.0 302 Moved Temporarily | Location: https://mstshash=nmap | Connection: close |_ Content-Length: 0 443/tcp open ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) | http-title: 404 - File or directory not found. |_Requested resource was /Login | ssl-cert: Subject: commonName=api-netxselect.wallst.com/organizationName=S&P Global Inc./stateOrProvinceName=New York/countryName=US | Subject Alternative Name: DNS:api-netxselect.wallst.com | Not valid before: 2023-09-13T00:00:00 |_Not valid after: 2024-09-12T23:59:59 |_ssl-date: TLS randomness does not represent time 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.92%I=7%D=8/14%Time=66BD3887%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,5D,"HTTP/1\.0\x20302\x20Moved\x20Temporarily\r\nLocation:\x2 SF:0https:///\r\nConnection:\x20close\r\nContent-Length:\x200\r\n\r\n")%r( SF:HTTPOptions,5D,"HTTP/1\.0\x20302\x20Moved\x20Temporarily\r\nLocation:\x SF:20https:///\r\nConnection:\x20close\r\nContent-Length:\x200\r\n\r\n")%r SF:(RTSPRequest,5D,"HTTP/1\.0\x20302\x20Moved\x20Temporarily\r\nLocation:\ SF:x20https:///\r\nConnection:\x20close\r\nContent-Length:\x200\r\n\r\n")% SF:r(FourOhFourRequest,80,"HTTP/1\.0\x20302\x20Moved\x20Temporarily\r\nLoc SF:ation:\x20https:///nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\nConnection:\ SF:x20close\r\nContent-Length:\x200\r\n\r\n")%r(TerminalServerCookie,69,"H SF:TTP/1\.0\x20302\x20Moved\x20Temporarily\r\nLocation:\x20https://mstshas SF:h=nmap\r\nConnection:\x20close\r\nContent-Length:\x200\r\n\r\n")%r(SIPO SF:ptions,62,"HTTP/1\.0\x20302\x20Moved\x20Temporarily\r\nLocation:\x20htt SF:ps://sip:nm\r\nConnection:\x20close\r\nContent-Length:\x200\r\n\r\n"); Device type: load balancer|firewall Running (JUST GUESSING): F5 Networks TMOS 11.6.X|11.4.X (88%) OS CPE: cpe:/o:f5:tmos:11.6 cpe:/o:f5:tmos:11.4 Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (88%), F5 BIG-IP AFM firewall (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 13 hops TRACEROUTE (using port 53/tcp) HOP RTT ADDRESS 1 0.24 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.55 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.75 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 16.28 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 1.67 ms ae-16.r24.lsanca07.us.bb.gin.ntt.net (129.250.3.78) 6 0.80 ms ae-1.a03.lsanca07.us.bb.gin.ntt.net (129.250.3.142) 7 ... 8 9 63.43 ms PEROT-SYSTE.bear2.Cincinnati1.Level3.net (4.59.42.94) 10 ... 12 13 61.50 ms 209.234.235.9 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 152.91 seconds