Analyser le rapport pour "www.uww.edu"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

2

Durée

1min 57.48seconde (117.48seconde)

Date

2024-11-04

IP

140.146.22.212

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A www.uww.edu)
Nmap scan report for www.uww.edu (140.146.22.212)
Host is up (0.059s latency).
rDNS record for 140.146.22.212: web-ns-vip.uww.edu
Not shown: 998 closed tcp ports (reset)
PORT    STATE SERVICE   VERSION
80/tcp  open  http
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, SIPOptions: 
|     HTTP/1.0 400 Bad Request
|     Content-Type: text/html
|     <html><head><title>Error</title></head><body>
|     <h2>ERROR: </h2>
|     <br>
|_    </body></html>
|_http-title: Did not follow redirect to https://www.uww.edu/
443/tcp open  ssl/https Microsoft-IIS/10.0
| ssl-cert: Subject: commonName=*.uww.edu/organizationName=University of Wisconsin-Whitewater/stateOrProvinceName=Wisconsin/countryName=US
| Subject Alternative Name: DNS:*.uww.edu, DNS:uww.edu
| Not valid before: 2024-08-15T00:00:00
|_Not valid after:  2025-09-15T23:59:59
| tls-alpn: 
|_  http/1.1
|_http-title: University of Wisconsin-Whitewater
| http-robots.txt: 13 disallowed entries 
| /aspnet_client/ /cfide/ /cgi-bin/ /clickheat/ /common/ 
| /include/ /inc/ /ippdocs/ /iprint/ /mockups/ /privacy/ 
|_/phpmyadmin/ /webauth/
|_ssl-date: TLS randomness does not represent time
|_http-server-header: Microsoft-IIS/10.0
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, SIPOptions: 
|     HTTP/1.0 400 Bad Request
|     Content-Type: text/html
|     <html><head><title>Error</title></head><body>
|     <h2>ERROR: </h2>
|     <br>
|_    </body></html>
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=11/4%Time=6728B685%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,8A,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20t
SF:ext/html\r\n\r\n<html><head><title>Error</title></head><body>\r\n<h2>ER
SF:ROR:\x20</h2>\r\n<br>\r\n</body></html>")%r(HTTPOptions,8A,"HTTP/1\.0\x
SF:20400\x20Bad\x20Request\r\nContent-Type:\x20text/html\r\n\r\n<html><hea
SF:d><title>Error</title></head><body>\r\n<h2>ERROR:\x20</h2>\r\n<br>\r\n<
SF:/body></html>")%r(RTSPRequest,8A,"HTTP/1\.0\x20400\x20Bad\x20Request\r\
SF:nContent-Type:\x20text/html\r\n\r\n<html><head><title>Error</title></he
SF:ad><body>\r\n<h2>ERROR:\x20</h2>\r\n<br>\r\n</body></html>")%r(FourOhFo
SF:urRequest,8A,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20te
SF:xt/html\r\n\r\n<html><head><title>Error</title></head><body>\r\n<h2>ERR
SF:OR:\x20</h2>\r\n<br>\r\n</body></html>")%r(SIPOptions,8A,"HTTP/1\.0\x20
SF:400\x20Bad\x20Request\r\nContent-Type:\x20text/html\r\n\r\n<html><head>
SF:<title>Error</title></head><body>\r\n<h2>ERROR:\x20</h2>\r\n<br>\r\n</b
SF:ody></html>");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=11/4%Time=6728B68B%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,8A,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Typ
SF:e:\x20text/html\r\n\r\n<html><head><title>Error</title></head><body>\r\
SF:n<h2>ERROR:\x20</h2>\r\n<br>\r\n</body></html>")%r(HTTPOptions,8A,"HTTP
SF:/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html\r\n\r\n<ht
SF:ml><head><title>Error</title></head><body>\r\n<h2>ERROR:\x20</h2>\r\n<b
SF:r>\r\n</body></html>")%r(FourOhFourRequest,8A,"HTTP/1\.0\x20400\x20Bad\
SF:x20Request\r\nContent-Type:\x20text/html\r\n\r\n<html><head><title>Erro
SF:r</title></head><body>\r\n<h2>ERROR:\x20</h2>\r\n<br>\r\n</body></html>
SF:")%r(RTSPRequest,8A,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type
SF::\x20text/html\r\n\r\n<html><head><title>Error</title></head><body>\r\n
SF:<h2>ERROR:\x20</h2>\r\n<br>\r\n</body></html>")%r(SIPOptions,8A,"HTTP/1
SF:\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html\r\n\r\n<html
SF:><head><title>Error</title></head><body>\r\n<h2>ERROR:\x20</h2>\r\n<br>
SF:\r\n</body></html>");
Device type: load balancer|switch|router|firewall
Running (JUST GUESSING): Citrix embedded (93%), Cisco IOS 12.X|15.X (88%), Cisco PIX OS 6.X (85%)
OS CPE: cpe:/h:cisco:catalyst_2960 cpe:/o:cisco:ios:12.2 cpe:/h:cisco:880_router cpe:/o:cisco:ios:15.0 cpe:/h:cisco:6506_router cpe:/o:cisco:pix_os:6
Aggressive OS guesses: Citrix NetScaler load balancer (93%), Cisco C2960 switch (IOS 12.2) (88%), Cisco 880 router (IOS 15.0) or 3750 switch (IOS 12.2) (85%), Cisco 6506 router (IOS 12.2) (85%), Cisco ASA 5510 firewall (PIX OS 8.2) (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   0.22 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.56 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   2.07 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ... 5
6   36.83 ms port-channel8.core2.oma1.he.net (184.104.199.42)
7   ...
8   46.79 ms port-channel8.core1.chi1.he.net (184.105.81.151)
9   ... 10
11  53.29 ms r-chicago-600w-ae1-2253.uwsys.net (143.235.42.4)
12  57.29 ms r-chicago-710-ae0-3506.uwsys.net (143.235.33.177)
13  57.22 ms r-uwmilwaukee-ems-ae1-3473.uwsys.net (143.235.33.208)
14  55.11 ms r-uwwhitewater-goodhue-et-0-0-0-3408.uwsys.net (143.235.33.55)
15  56.89 ms r-uwwhitewater-mcgraw-et-0-0-1-3428.uwsys.net (143.235.33.24)
16  57.17 ms uwwhitewater-sitemanaged.uwsys.net (143.235.40.66)
17  57.78 ms 140.146.1.54
18  58.90 ms web-ns-vip.uww.edu (140.146.22.212)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 117.48 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
140.146.22.212
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 2 identifiés
Exécuter la commande
nmap -A www.uww.edu
Scan date
04 Nov 2024 06:58
API - Scan ID
Durée de l'analyse
1min 57.48seconde (117.48seconde)
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: