Analyser le rapport pour "5b17d0ba29814.streamlock.net"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

13

Durée

3min 22.8seconde (202.80seconde)

Date

2024-12-24

IP

67.213.220.48

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A 5b17d0ba29814.streamlock.net)
Nmap scan report for 5b17d0ba29814.streamlock.net (67.213.220.48)
Host is up (0.069s latency).
Not shown: 977 filtered tcp ports (no-response), 10 filtered tcp ports (host-prohibited)
PORT      STATE  SERVICE           VERSION
21/tcp    open   ftp               ProFTPD or KnFTPD
22/tcp    open   ssh               OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 
|   2048 37:9e:32:c6:83:6d:68:e3:01:48:1c:22:fb:ca:ec:76 (RSA)
|   256 63:42:c7:c8:8a:4e:85:31:96:ba:13:ae:91:a3:26:11 (ECDSA)
|_  256 f7:47:38:93:2e:4d:c6:52:00:bd:81:2f:c8:ea:9b:b0 (ED25519)
80/tcp    open   http              Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/8.2.11)
|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/8.2.11
|_http-title: Did not follow redirect to https://www.surfchex.com/
443/tcp   open   ssl/http          Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/8.2.11)
|_http-title: Did not follow redirect to https://www.surfchex.com/
|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/8.2.11
| ssl-cert: Subject: commonName=surfchex.com
| Subject Alternative Name: DNS:surfchex.com
| Not valid before: 2024-11-17T04:42:42
|_Not valid after:  2025-02-15T04:42:41
554/tcp   closed rtsp
1935/tcp  open   rtsp
|_rtsp-methods: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, OPTIONS, ANNOUNCE, RECORD, GET_PARAMETER
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest: 
|     HTTP/1.0 404 Not Found
|     Cache-Control: no-cache
|     Connection: close
|     Content-Type: text/html
|     Content-Length: 0
|   HTTPOptions: 
|     HTTP/1.0 200 OK
|     Access-Control-Expose-Headers: Date, Server, Content-Type, Content-Length, ETag
|     Access-Control-Allow-Origin: *
|     Access-Control-Allow-Credentials: true
|     Access-Control-Allow-Methods: OPTIONS, GET, POST, HEAD
|     Connection: Keep-Alive
|     Access-Control-Max-Age: 60
|     Content-Length: 0
|     Access-Control-Allow-Headers: Content-Type, User-Agent, If-Modified-Since, Cache-Control, Range
|   RTSPRequest: 
|     RTSP/1.0 200 OK
|     CSeq: 0
|     Server: Wowza Streaming Engine 4.9.0+3 build20241007144114
|     Cache-Control: no-cache
|     Public: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, OPTIONS, ANNOUNCE, RECORD, GET_PARAMETER
|     Supported: play.basic, con.persistent
|   SIPOptions: 
|     SIP/2.0 403 Forbidden
|     Call-ID: 50000
|     User-Agent: Wowza Streaming Engine 4.9.0+3 build20241007144114
|     From: <sip:nm@nm>;tag=root
|     <sip:nm2@nm2>
|     Cseq: 42 OPTIONS
|     Via: SIP/2.0/TCP nm;branch=foo
|_    Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY
3306/tcp  open   mysql             MariaDB (unauthorized)
5555/tcp  closed freeciv
8086/tcp  open   rtsp
|_rtsp-methods: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, OPTIONS, ANNOUNCE, RECORD, GET_PARAMETER
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest: 
|     HTTP/1.0 404 Not Found
|     Cache-Control: no-cache
|     Connection: close
|     Content-Type: text/html
|     Content-Length: 0
|   HTTPOptions: 
|     HTTP/1.0 200 OK
|     Access-Control-Expose-Headers: Date, Server, Content-Type, Content-Length, ETag
|     Access-Control-Allow-Origin: *
|     Access-Control-Allow-Credentials: true
|     Access-Control-Allow-Methods: OPTIONS, GET, POST, HEAD
|     Connection: Keep-Alive
|     Access-Control-Max-Age: 60
|     Content-Length: 0
|     Access-Control-Allow-Headers: Content-Type, User-Agent, If-Modified-Since, Cache-Control, Range
|   RTSPRequest: 
|     RTSP/1.0 200 OK
|     CSeq: 0
|     Server: Wowza Streaming Engine 4.9.0+3 build20241007144114
|     Cache-Control: no-cache
|     Public: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, OPTIONS, ANNOUNCE, RECORD, GET_PARAMETER
|     Supported: play.basic, con.persistent
|   SIPOptions: 
|     SIP/2.0 403 Forbidden
|     Call-ID: 50000
|     User-Agent: Wowza Streaming Engine 4.9.0+3 build20241007144114
|     From: <sip:nm@nm>;tag=root
|     <sip:nm2@nm2>
|     Cseq: 42 OPTIONS
|     Via: SIP/2.0/TCP nm;branch=foo
|_    Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY
8087/tcp  open   http              Restlet Java web framework 2.4.4
|_http-cors: GET POST PUT DELETE OPTIONS
|_http-server-header: Restlet-Framework/2.4.4
| http-auth: 
| HTTP/1.1 401 Unauthorized\x0D
|_  Basic realm=Wowza Authentication
|_http-title: Site doesn't have a title (application/xml).
8088/tcp  open   radan-http
|_http-trane-info: Problem with XML parsing of /evox/about
| http-title: Wowza Streaming Engine Manager
|_Requested resource was /enginemanager/ftu/welcome.htm
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 302 
|     Set-Cookie: JSESSIONID=46C2A92100948571830CE6981D956757; Path=/; HttpOnly
|     Location: http://localhost:8088/enginemanager
|     Content-Type: text/html
|     Content-Length: 0
|     Date: Wed, 25 Dec 2024 03:06:53 GMT
|     Connection: close
|   HTTPOptions: 
|     HTTP/1.1 200 
|     Allow: GET, HEAD, POST, OPTIONS
|     Content-Length: 0
|     Date: Wed, 25 Dec 2024 03:06:59 GMT
|     Connection: close
|   Socks4, Socks5: 
|     HTTP/1.1 400 
|     Content-Type: text/html;charset=utf-8
|     Content-Language: en
|     Content-Length: 435
|     Date: Wed, 25 Dec 2024 03:06:53 GMT
|     Connection: close
|     <!doctype html><html lang="en"><head><title>HTTP Status 400 
|     Request</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 400 
|_    Request</h1></body></html>
8888/tcp  open   http              Node.js Express framework
| http-methods: 
|_  Potentially risky methods: 
|_http-title: Site doesn't have a title (text/plain).
10000/tcp open   snet-sensor-mgmt?
3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port1935-TCP:V=7.92%I=7%D=12/24%Time=676B76D8%P=x86_64-redhat-linux-gnu
SF:%r(GetRequest,72,"HTTP/1\.0\x20404\x20Not\x20Found\r\nCache-Control:\x2
SF:0no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nCont
SF:ent-Length:\x200\r\n\r\n")%r(HTTPOptions,18C,"HTTP/1\.0\x20200\x20OK\r\
SF:nAccess-Control-Expose-Headers:\x20Date,\x20Server,\x20Content-Type,\x2
SF:0Content-Length,\x20ETag\r\nAccess-Control-Allow-Origin:\x20\*\r\nAcces
SF:s-Control-Allow-Credentials:\x20true\r\nAccess-Control-Allow-Methods:\x
SF:20OPTIONS,\x20GET,\x20POST,\x20HEAD\r\nConnection:\x20Keep-Alive\r\nAcc
SF:ess-Control-Max-Age:\x2060\r\nContent-Length:\x200\r\nAccess-Control-Al
SF:low-Headers:\x20Content-Type,\x20User-Agent,\x20If-Modified-Since,\x20C
SF:ache-Control,\x20Range\r\n\r\n")%r(RTSPRequest,F2,"RTSP/1\.0\x20200\x20
SF:OK\r\nCSeq:\x200\r\nServer:\x20Wowza\x20Streaming\x20Engine\x204\.9\.0\
SF:+3\x20build20241007144114\r\nCache-Control:\x20no-cache\r\nPublic:\x20D
SF:ESCRIBE,\x20SETUP,\x20TEARDOWN,\x20PLAY,\x20PAUSE,\x20OPTIONS,\x20ANNOU
SF:NCE,\x20RECORD,\x20GET_PARAMETER\r\nSupported:\x20play\.basic,\x20con\.
SF:persistent\r\n\r\n")%r(FourOhFourRequest,72,"HTTP/1\.0\x20404\x20Not\x2
SF:0Found\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x200\r\n\r\n")%r(SIPOptions,10E,
SF:"SIP/2\.0\x20403\x20Forbidden\r\nCall-ID:\x2050000\r\nUser-Agent:\x20Wo
SF:wza\x20Streaming\x20Engine\x204\.9\.0\+3\x20build20241007144114\r\nFrom
SF::\x20<sip:nm@nm>;tag=root\r\nTo:\x20<sip:nm2@nm2>\r\nCseq:\x2042\x20OPT
SF:IONS\r\nVia:\x20SIP/2\.0/TCP\x20nm;branch=foo\r\nAllow:\x20INVITE,\x20A
SF:CK,\x20CANCEL,\x20OPTIONS,\x20BYE,\x20REFER,\x20SUBSCRIBE,\x20NOTIFY\r\
SF:n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8086-TCP:V=7.92%I=7%D=12/24%Time=676B76D3%P=x86_64-redhat-linux-gnu
SF:%r(GetRequest,72,"HTTP/1\.0\x20404\x20Not\x20Found\r\nCache-Control:\x2
SF:0no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nCont
SF:ent-Length:\x200\r\n\r\n")%r(HTTPOptions,18C,"HTTP/1\.0\x20200\x20OK\r\
SF:nAccess-Control-Expose-Headers:\x20Date,\x20Server,\x20Content-Type,\x2
SF:0Content-Length,\x20ETag\r\nAccess-Control-Allow-Origin:\x20\*\r\nAcces
SF:s-Control-Allow-Credentials:\x20true\r\nAccess-Control-Allow-Methods:\x
SF:20OPTIONS,\x20GET,\x20POST,\x20HEAD\r\nConnection:\x20Keep-Alive\r\nAcc
SF:ess-Control-Max-Age:\x2060\r\nContent-Length:\x200\r\nAccess-Control-Al
SF:low-Headers:\x20Content-Type,\x20User-Agent,\x20If-Modified-Since,\x20C
SF:ache-Control,\x20Range\r\n\r\n")%r(RTSPRequest,F2,"RTSP/1\.0\x20200\x20
SF:OK\r\nCSeq:\x200\r\nServer:\x20Wowza\x20Streaming\x20Engine\x204\.9\.0\
SF:+3\x20build20241007144114\r\nCache-Control:\x20no-cache\r\nPublic:\x20D
SF:ESCRIBE,\x20SETUP,\x20TEARDOWN,\x20PLAY,\x20PAUSE,\x20OPTIONS,\x20ANNOU
SF:NCE,\x20RECORD,\x20GET_PARAMETER\r\nSupported:\x20play\.basic,\x20con\.
SF:persistent\r\n\r\n")%r(FourOhFourRequest,72,"HTTP/1\.0\x20404\x20Not\x2
SF:0Found\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x200\r\n\r\n")%r(SIPOptions,10E,
SF:"SIP/2\.0\x20403\x20Forbidden\r\nCall-ID:\x2050000\r\nUser-Agent:\x20Wo
SF:wza\x20Streaming\x20Engine\x204\.9\.0\+3\x20build20241007144114\r\nFrom
SF::\x20<sip:nm@nm>;tag=root\r\nTo:\x20<sip:nm2@nm2>\r\nCseq:\x2042\x20OPT
SF:IONS\r\nVia:\x20SIP/2\.0/TCP\x20nm;branch=foo\r\nAllow:\x20INVITE,\x20A
SF:CK,\x20CANCEL,\x20OPTIONS,\x20BYE,\x20REFER,\x20SUBSCRIBE,\x20NOTIFY\r\
SF:n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8088-TCP:V=7.92%I=7%D=12/24%Time=676B76CD%P=x86_64-redhat-linux-gnu
SF:%r(GetRequest,EF,"HTTP/1\.1\x20302\x20\r\nSet-Cookie:\x20JSESSIONID=46C
SF:2A92100948571830CE6981D956757;\x20Path=/;\x20HttpOnly\r\nLocation:\x20h
SF:ttp://localhost:8088/enginemanager\r\nContent-Type:\x20text/html\r\nCon
SF:tent-Length:\x200\r\nDate:\x20Wed,\x2025\x20Dec\x202024\x2003:06:53\x20
SF:GMT\r\nConnection:\x20close\r\n\r\n")%r(Socks5,24E,"HTTP/1\.1\x20400\x2
SF:0\r\nContent-Type:\x20text/html;charset=utf-8\r\nContent-Language:\x20e
SF:n\r\nContent-Length:\x20435\r\nDate:\x20Wed,\x2025\x20Dec\x202024\x2003
SF::06:53\x20GMT\r\nConnection:\x20close\r\n\r\n<!doctype\x20html><html\x2
SF:0lang=\"en\"><head><title>HTTP\x20Status\x20400\x20\xe2\x80\x93\x20Bad\
SF:x20Request</title><style\x20type=\"text/css\">body\x20{font-family:Taho
SF:ma,Arial,sans-serif;}\x20h1,\x20h2,\x20h3,\x20b\x20{color:white;backgro
SF:und-color:#525D76;}\x20h1\x20{font-size:22px;}\x20h2\x20{font-size:16px
SF:;}\x20h3\x20{font-size:14px;}\x20p\x20{font-size:12px;}\x20a\x20{color:
SF:black;}\x20\.line\x20{height:1px;background-color:#525D76;border:none;}
SF:</style></head><body><h1>HTTP\x20Status\x20400\x20\xe2\x80\x93\x20Bad\x
SF:20Request</h1></body></html>")%r(Socks4,24E,"HTTP/1\.1\x20400\x20\r\nCo
SF:ntent-Type:\x20text/html;charset=utf-8\r\nContent-Language:\x20en\r\nCo
SF:ntent-Length:\x20435\r\nDate:\x20Wed,\x2025\x20Dec\x202024\x2003:06:53\
SF:x20GMT\r\nConnection:\x20close\r\n\r\n<!doctype\x20html><html\x20lang=\
SF:"en\"><head><title>HTTP\x20Status\x20400\x20\xe2\x80\x93\x20Bad\x20Requ
SF:est</title><style\x20type=\"text/css\">body\x20{font-family:Tahoma,Aria
SF:l,sans-serif;}\x20h1,\x20h2,\x20h3,\x20b\x20{color:white;background-col
SF:or:#525D76;}\x20h1\x20{font-size:22px;}\x20h2\x20{font-size:16px;}\x20h
SF:3\x20{font-size:14px;}\x20p\x20{font-size:12px;}\x20a\x20{color:black;}
SF:\x20\.line\x20{height:1px;background-color:#525D76;border:none;}</style
SF:></head><body><h1>HTTP\x20Status\x20400\x20\xe2\x80\x93\x20Bad\x20Reque
SF:st</h1></body></html>")%r(HTTPOptions,7D,"HTTP/1\.1\x20200\x20\r\nAllow
SF::\x20GET,\x20HEAD,\x20POST,\x20OPTIONS\r\nContent-Length:\x200\r\nDate:
SF:\x20Wed,\x2025\x20Dec\x202024\x2003:06:59\x20GMT\r\nConnection:\x20clos
SF:e\r\n\r\n");
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.10 - 4.11
Network Distance: 17 hops
Service Info: OS: Unix

TRACEROUTE (using port 554/tcp)
HOP RTT      ADDRESS
1   0.22 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.60 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.62 ms  r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   ...
5   12.39 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   21.26 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7   32.47 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8   46.94 ms be5024.ccr41.atl01.atlas.cogentco.com (154.54.163.41)
9   63.70 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
10  62.97 ms port-channel5042.ccr92.dca04.atlas.cogentco.com (154.54.162.221)
11  67.92 ms be4188.ccr42.jfk02.atlas.cogentco.com (154.54.30.122)
12  67.87 ms be2262.rcr21.ewr03.atlas.cogentco.com (154.54.47.122)
13  68.61 ms 38.140.116.218
14  69.30 ms ae1.bdr1-ewr2.us.as13213.net (98.158.181.194)
15  69.13 ms 67.213.222.129
16  69.21 ms 67.213.222.42
17  69.48 ms 67.213.220.48

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 202.80 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
67.213.220.48
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 13 identifiés
Exécuter la commande
nmap -A 5b17d0ba29814.streamlock.net
Scan date
24 Dec 2024 22:10
API - Scan ID
Durée de l'analyse
3min 22.8seconde (202.80seconde)
Télécharger le rapport
Remove scan result
$
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: