Analyser le rapport pour "maps.dish.com"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

2

Durée

35.77seconde

Date

2024-12-25

IP

159.60.130.57

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A maps.dish.com)
Nmap scan report for maps.dish.com (159.60.130.57)
Host is up (0.0089s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http      volt-adc
|_http-title: Did not follow redirect to https://maps.dish.com/
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, SSLSessionReq: 
|     HTTP/1.1 400 Bad Request
|     server: volt-adc
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 25 Dec 2024 15:04:56 GMT
|     connection: close
|     Request
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.0 400 Bad Request
|     server: volt-adc
|     date: Wed, 25 Dec 2024 15:04:51 GMT
|     connection: close
|     content-length: 0
|   RTSPRequest, X11Probe: 
|     HTTP/1.1 400 Bad Request
|     server: volt-adc
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 25 Dec 2024 15:04:51 GMT
|     connection: close
|_    Request
|_http-server-header: volt-adc
443/tcp open  ssl/https volt-adc
|_http-title: Site doesn't have a title.
|_ssl-date: TLS randomness does not represent time
| fingerprint-strings: 
|   DNSStatusRequestTCP: 
|     HTTP/1.1 400 Bad Request
|     server: volt-adc
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 25 Dec 2024 15:05:03 GMT
|     connection: close
|     Request
|   DNSVersionBindReqTCP, Help, RPCCheck, RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     server: volt-adc
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 25 Dec 2024 15:05:02 GMT
|     connection: close
|     Request
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.0 400 Bad Request
|     server: volt-adc
|     date: Wed, 25 Dec 2024 15:04:57 GMT
|     connection: close
|     content-length: 0
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     server: volt-adc
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 25 Dec 2024 15:04:57 GMT
|     connection: close
|_    Request
|_http-server-header: volt-adc
| ssl-cert: Subject: commonName=maps-p.dish.com/organizationName=DISH Network Corporation/stateOrProvinceName=Colorado/countryName=US
| Subject Alternative Name: DNS:maps-p.dish.com, DNS:maps.dish.com, DNS:maps-monitor.dish.com
| Not valid before: 2024-11-06T00:00:00
|_Not valid after:  2025-11-05T23:59:59
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=12/25%Time=676C1F13%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,79,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nserver:\x20volt-a
SF:dc\r\ndate:\x20Wed,\x2025\x20Dec\x202024\x2015:04:51\x20GMT\r\nconnecti
SF:on:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,79,"HTTP/1
SF:\.0\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ndate:\x20Wed,\x2
SF:025\x20Dec\x202024\x2015:04:51\x20GMT\r\nconnection:\x20close\r\nconten
SF:t-length:\x200\r\n\r\n")%r(RTSPRequest,9F,"HTTP/1\.1\x20400\x20Bad\x20R
SF:equest\r\nserver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:
SF:\x20text/plain\r\ndate:\x20Wed,\x2025\x20Dec\x202024\x2015:04:51\x20GMT
SF:\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9F,"HTTP/1\
SF:.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-length:\x
SF:2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2025\x20Dec\x2020
SF:24\x2015:04:51\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r
SF:(FourOhFourRequest,79,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nserver:\x2
SF:0volt-adc\r\ndate:\x20Wed,\x2025\x20Dec\x202024\x2015:04:51\x20GMT\r\nc
SF:onnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9F,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-leng
SF:th:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2025\x20Dec\
SF:x202024\x2015:04:56\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Reques
SF:t")%r(DNSVersionBindReqTCP,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nse
SF:rver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\x20text/pla
SF:in\r\ndate:\x20Wed,\x2025\x20Dec\x202024\x2015:04:56\x20GMT\r\nconnecti
SF:on:\x20close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9F,"HTTP/1\.
SF:1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-length:\x2
SF:011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2025\x20Dec\x20202
SF:4\x2015:04:56\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(
SF:Help,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\nc
SF:ontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2
SF:025\x20Dec\x202024\x2015:04:56\x20GMT\r\nconnection:\x20close\r\n\r\nBa
SF:d\x20Request")%r(SSLSessionReq,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r
SF:\nserver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\x20text
SF:/plain\r\ndate:\x20Wed,\x2025\x20Dec\x202024\x2015:04:56\x20GMT\r\nconn
SF:ection:\x20close\r\n\r\nBad\x20Request");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=12/25%Time=676C1F19%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,79,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nserver:\x2
SF:0volt-adc\r\ndate:\x20Wed,\x2025\x20Dec\x202024\x2015:04:57\x20GMT\r\nc
SF:onnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,79,
SF:"HTTP/1\.0\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ndate:\x20
SF:Wed,\x2025\x20Dec\x202024\x2015:04:57\x20GMT\r\nconnection:\x20close\r\
SF:ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,79,"HTTP/1\.0\x2040
SF:0\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ndate:\x20Wed,\x2025\x20De
SF:c\x202024\x2015:04:57\x20GMT\r\nconnection:\x20close\r\ncontent-length:
SF:\x200\r\n\r\n")%r(tor-versions,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r
SF:\nserver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\x20text
SF:/plain\r\ndate:\x20Wed,\x2025\x20Dec\x202024\x2015:04:57\x20GMT\r\nconn
SF:ection:\x20close\r\n\r\nBad\x20Request")%r(RTSPRequest,9F,"HTTP/1\.1\x2
SF:0400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-length:\x2011\
SF:r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2025\x20Dec\x202024\x2
SF:015:05:02\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(RPCC
SF:heck,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\nc
SF:ontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2
SF:025\x20Dec\x202024\x2015:05:02\x20GMT\r\nconnection:\x20close\r\n\r\nBa
SF:d\x20Request")%r(DNSVersionBindReqTCP,9F,"HTTP/1\.1\x20400\x20Bad\x20Re
SF:quest\r\nserver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\
SF:x20text/plain\r\ndate:\x20Wed,\x2025\x20Dec\x202024\x2015:05:02\x20GMT\
SF:r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9
SF:F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent
SF:-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2025\x2
SF:0Dec\x202024\x2015:05:03\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20R
SF:equest")%r(Help,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20vo
SF:lt-adc\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:
SF:\x20Wed,\x2025\x20Dec\x202024\x2015:05:02\x20GMT\r\nconnection:\x20clos
SF:e\r\n\r\nBad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 10 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.19 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.61 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   1.92 ms  r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   0.62 ms  ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5   0.38 ms  ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242)
6   10.88 ms ae-7.r26.snjsca04.us.bb.gin.ntt.net (129.250.4.150)
7   7.75 ms  ae-8.a04.snjsca04.us.bb.gin.ntt.net (129.250.5.209)
8   8.28 ms  ae-0.f5-networks.snjsca04.us.bb.gin.ntt.net (128.242.179.46)
9   ...
10  8.33 ms  159.60.130.57

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 35.77 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
159.60.130.57
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 2 identifiés
Exécuter la commande
nmap -A maps.dish.com
Scan date
25 Dec 2024 10:05
API - Scan ID
Durée de l'analyse
35.77seconde
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: