Analyser le rapport pour "nysiis-training.health.state.ny.us"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

1

Durée

2min 51.81seconde (171.81seconde)

Date

2024-03-27

IP

150.142.196.10

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A nysiis-training.health.state.ny.us)
Nmap scan report for nysiis-training.health.state.ny.us (150.142.196.10)
Host is up (0.069s latency).
Not shown: 999 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
443/tcp open  ssl/https
| ssl-cert: Subject: commonName=*.health.ny.gov/organizationName=New York State Department of Health/stateOrProvinceName=New York/countryName=US
| Subject Alternative Name: DNS:*.health.ny.gov, DNS:*.health.state.ny.us, DNS:health.ny.gov, DNS:health.state.ny.us
| Not valid before: 2023-08-08T00:00:00
|_Not valid after:  2024-09-07T23:59:59
| http-title: Submit Form
|_Requested resource was /relogin?dest=/
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.0 302 Processed
|     X-Backside-Transport: FAIL FAIL
|     Location: https:///hcs/index.html
|     Pragma: no-cache
|     Expires: -1
|     Cache-Control: max-age=0, no-cache, no-store
|     X-Frame-Options: SAMEORIGIN
|     Content-Security-Policy: frame-ancestors 'self';
|     Connection: close
|     Content-Length: 0
|     Strict-Transport-Security: max-age=31536000
|   RTSPRequest: 
|     HTTP/1.1 400 Invalid Request
|     Date: Wed, 27 Mar 2024 18:00:45 GMT
|     X-Frame-Options: SAMEORIGIN
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     Connection: close
|     Content-Length: 87
|     Content-Type: text/html
|     <html><head><title>400 Invalid Request</title></head><body>Invalid Request: ??</body>
|   SIPOptions: 
|     HTTP/1.1 400 Invalid Request
|     Date: Wed, 27 Mar 2024 18:01:55 GMT
|     X-Frame-Options: SAMEORIGIN
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     Connection: close
|     Content-Length: 87
|     Content-Type: text/html
|_    <html><head><title>400 Invalid Request</title></head><body>Invalid Request: ??</body>
|_http-trane-info: Problem with XML parsing of /evox/about
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=3/27%Time=66045EC1%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,14D,"HTTP/1\.0\x20302\x20Processed\r\nX-Backside-Tran
SF:sport:\x20FAIL\x20FAIL\r\nLocation:\x20https:///hcs/index\.html\r\nPrag
SF:ma:\x20no-cache\r\nExpires:\x20-1\r\nCache-Control:\x20max-age=0,\x20no
SF:-cache,\x20no-store\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Securi
SF:ty-Policy:\x20frame-ancestors\x20'self';\r\nConnection:\x20close\r\nCon
SF:tent-Length:\x200\r\nStrict-Transport-Security:\x20max-age=31536000\r\n
SF:\r\n")%r(HTTPOptions,14D,"HTTP/1\.0\x20302\x20Processed\r\nX-Backside-T
SF:ransport:\x20FAIL\x20FAIL\r\nLocation:\x20https:///hcs/index\.html\r\nP
SF:ragma:\x20no-cache\r\nExpires:\x20-1\r\nCache-Control:\x20max-age=0,\x2
SF:0no-cache,\x20no-store\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Sec
SF:urity-Policy:\x20frame-ancestors\x20'self';\r\nConnection:\x20close\r\n
SF:Content-Length:\x200\r\nStrict-Transport-Security:\x20max-age=31536000\
SF:r\n\r\n")%r(FourOhFourRequest,14D,"HTTP/1\.0\x20302\x20Processed\r\nX-B
SF:ackside-Transport:\x20FAIL\x20FAIL\r\nLocation:\x20https:///hcs/index\.
SF:html\r\nPragma:\x20no-cache\r\nExpires:\x20-1\r\nCache-Control:\x20max-
SF:age=0,\x20no-cache,\x20no-store\r\nX-Frame-Options:\x20SAMEORIGIN\r\nCo
SF:ntent-Security-Policy:\x20frame-ancestors\x20'self';\r\nConnection:\x20
SF:close\r\nContent-Length:\x200\r\nStrict-Transport-Security:\x20max-age=
SF:31536000\r\n\r\n")%r(RTSPRequest,13B,"HTTP/1\.1\x20400\x20Invalid\x20Re
SF:quest\r\nDate:\x20Wed,\x2027\x20Mar\x202024\x2018:00:45\x20GMT\r\nX-Fra
SF:me-Options:\x20SAMEORIGIN\r\nX-XSS-Protection:\x201;\x20mode=block\r\nX
SF:-Content-Type-Options:\x20nosniff\r\nConnection:\x20close\r\nContent-Le
SF:ngth:\x2087\r\nContent-Type:\x20text/html\r\n\r\n<html><head><title>400
SF:\x20Invalid\x20Request</title></head><body>Invalid\x20Request:\x20\?\?<
SF:/body>\r\n")%r(SIPOptions,13B,"HTTP/1\.1\x20400\x20Invalid\x20Request\r
SF:\nDate:\x20Wed,\x2027\x20Mar\x202024\x2018:01:55\x20GMT\r\nX-Frame-Opti
SF:ons:\x20SAMEORIGIN\r\nX-XSS-Protection:\x201;\x20mode=block\r\nX-Conten
SF:t-Type-Options:\x20nosniff\r\nConnection:\x20close\r\nContent-Length:\x
SF:2087\r\nContent-Type:\x20text/html\r\n\r\n<html><head><title>400\x20Inv
SF:alid\x20Request</title></head><body>Invalid\x20Request:\x20\?\?</body>\
SF:r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linksys BEFW11S4 WAP (87%), Synology RT1900ac router (86%), Linux 2.6.32 (86%), F5 3600 LTM load balancer (85%), Netgear WNDAP660 WAP (Linux 2.6.36) (85%), Ubiquiti WAP (Linux 2.6.32) (85%), Palo Alto PA-500 firewall (85%), HP P2000 MSA storage controller (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.23 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.54 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.64 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ... 5
6   53.73 ms port-channel20.core3.ash1.he.net (184.104.198.226)
7   59.69 ms port-channel9.core2.nyc5.he.net (184.105.213.218)
8   59.97 ms port-channel20.core3.nyc4.he.net (184.104.199.221)
9   60.20 ms 100ge0-36.core1.ewr2.he.net (184.104.196.82)
10  ...
11  68.52 ms be24.albynypscr1.ip.firstlight.net (66.152.97.42)
12  68.92 ms be1.albynypser2.ip.firstlight.net (66.109.52.58)
13  67.48 ms 216-107-192-102.static.firstlight.net (216.107.192.102)
14  69.15 ms 150.142.196.10

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 171.81 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
150.142.196.10
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 1 identifiés
Exécuter la commande
nmap -A nysiis-training.health.state.ny.us
Scan date
27 Mar 2024 14:03
Durée de l'analyse
2min 51.81seconde (171.81seconde)
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: