Analyser le rapport pour "xvideo.tube"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

7

Durée

54.77seconde

Date

2024-10-19

IP

72.52.178.23

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A xvideo.tube)
Nmap scan report for xvideo.tube (72.52.178.23)
Host is up (0.081s latency).
rDNS record for 72.52.178.23: lb01.parklogic.com
Not shown: 993 closed tcp ports (reset)
PORT     STATE    SERVICE       VERSION
19/tcp   filtered chargen
22/tcp   filtered ssh
80/tcp   open     http?
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, NotesRPC, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe: 
|     HTTP/1.0 400 Bad request
|     Content-Type: text/html
|_    <h2>Client sent a bad request.</h2>
|_http-title: Did not follow redirect to http://ww1.xvideo.tube/?usid=15&utid=30831990345
111/tcp  open     rpcbind       2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|_  100000  3,4          111/udp6  rpcbind
161/tcp  filtered snmp
427/tcp  filtered svrloc
1666/tcp filtered netview-aix-6
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=10/19%Time=67136195%P=x86_64-redhat-linux-gnu%r
SF:(X11Probe,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nContent-Type:\x20te
SF:xt/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20request\.</h2>\n")%r(R
SF:PCCheck,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nContent-Type:\x20text
SF:/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20request\.</h2>\n")%r(DNS
SF:VersionBindReqTCP,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nContent-Typ
SF:e:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20request\.</h2>
SF:\n")%r(DNSStatusRequestTCP,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nCo
SF:ntent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20reque
SF:st\.</h2>\n")%r(SSLSessionReq,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\
SF:nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20re
SF:quest\.</h2>\n")%r(TerminalServerCookie,59,"HTTP/1\.0\x20400\x20Bad\x20
SF:request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x2
SF:0bad\x20request\.</h2>\n")%r(TLSSessionReq,59,"HTTP/1\.0\x20400\x20Bad\
SF:x20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a
SF:\x20bad\x20request\.</h2>\n")%r(Kerberos,59,"HTTP/1\.0\x20400\x20Bad\x2
SF:0request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x
SF:20bad\x20request\.</h2>\n")%r(SMBProgNeg,59,"HTTP/1\.0\x20400\x20Bad\x2
SF:0request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x
SF:20bad\x20request\.</h2>\n")%r(LPDString,59,"HTTP/1\.0\x20400\x20Bad\x20
SF:request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x2
SF:0bad\x20request\.</h2>\n")%r(LDAPSearchReq,59,"HTTP/1\.0\x20400\x20Bad\
SF:x20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a
SF:\x20bad\x20request\.</h2>\n")%r(LDAPBindReq,59,"HTTP/1\.0\x20400\x20Bad
SF:\x20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20
SF:a\x20bad\x20request\.</h2>\n")%r(TerminalServer,59,"HTTP/1\.0\x20400\x2
SF:0Bad\x20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent
SF:\x20a\x20bad\x20request\.</h2>\n")%r(NotesRPC,59,"HTTP/1\.0\x20400\x20B
SF:ad\x20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x
SF:20a\x20bad\x20request\.</h2>\n");
Aggressive OS guesses: Linux 3.13 - 3.16 (95%), Linux 3.2 - 4.9 (95%), Linux 4.4 (95%), Linux 2.6.32 - 3.10 (95%), Crestron XPanel control system (93%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (93%), Linux 2.6.18 (93%), AXIS 211A Network Camera (Linux 2.6.20) (93%), Linux 2.6.16 (92%), Linux 4.5 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 15 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   0.88 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.68 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.74 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   12.29 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   21.31 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7   34.54 ms be2427.ccr21.den01.atlas.cogentco.com (154.54.87.22)
8   44.47 ms be3802.ccr31.oma02.atlas.cogentco.com (154.54.165.78)
9   52.82 ms be5214.ccr41.ord01.atlas.cogentco.com (154.54.165.134)
10  52.93 ms be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18)
11  52.91 ms cogent-lw-chi-border1-hu0-1-0-0.liquidweb.com (38.32.98.66)
12  58.05 ms lw-dc2-core1-nexus-eth3-19.rtr.liquidweb.com (209.59.157.224)
13  71.85 ms lw-dc3-core1-eth2-21.rtr.liquidweb.com (209.59.157.105)
14  71.43 ms lw-dc3-dist13.rtr.liquidweb.com (209.59.157.223)
15  87.67 ms lb01.parklogic.com (72.52.178.23)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 54.77 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
72.52.178.23
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 7 identifiés
Exécuter la commande
nmap -A xvideo.tube
Scan date
19 Oct 2024 03:37
Durée de l'analyse
54.77seconde
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: