Ports
Durée
Date
IP
Nmap scan report for ch-rcn.traps.paloaltonetworks.com (34.98.77.231) Host is up (0.00045s latency). Other addresses for ch-rcn.traps.paloaltonetworks.com (not scanned): 2600:1901:0:53f1:: rDNS record for 34.98.77.231: 231.77.98.34.bc.googleusercontent.com Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open tcpwrapped 443/tcp open ssl/https | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP: | HTTP/1.0 400 Bad Request | Content-Length: 54 | Content-Type: text/html; charset=UTF-8 | Date: Mon, 20 Nov 2023 16:29:32 GMT | <html><title>Error 400 (Bad Request)!!1</title></html> | FourOhFourRequest: | HTTP/1.0 404 Not Found | Cache-Control: no-cache | Content-Type: application/json | X-Tms: 1 | Date: Mon, 20 Nov 2023 16:29:22 GMT | Content-Length: 28 | Via: 1.1 google | Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000 | {"message":"page not found"} | GetRequest, HTTPOptions: | HTTP/1.0 200 OK | Date: Mon, 20 Nov 2023 16:29:22 GMT | Content-Length: 0 | Via: 1.1 google | Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000 | RTSPRequest: | HTTP/1.0 400 Bad Request | Content-Type: text/html; charset=UTF-8 | Referrer-Policy: no-referrer | Content-Length: 273 | Date: Mon, 20 Nov 2023 16:29:27 GMT | <html><head> | <meta http-equiv="content-type" content="text/html;charset=utf-8"> | <title>400 Bad Request</title> | </head> | <body text=#000000 bgcolor=#ffffff> | <h1>Error: Bad Request</h1> | <h2>Your client has issued a malformed or illegal request.</h2> | <h2></h2> | </body></html> | tor-versions: | HTTP/1.0 400 Bad Request | Content-Length: 54 | Content-Type: text/html; charset=UTF-8 | Date: Mon, 20 Nov 2023 16:29:22 GMT |_ <html><title>Error 400 (Bad Request)!!1</title></html> |_http-title: Site doesn't have a title. | ssl-cert: Subject: commonName=*.traps.paloaltonetworks.com | Subject Alternative Name: DNS:*.traps.paloaltonetworks.com, DNS:traps.paloaltonetworks.com | Not valid before: 2023-07-09T07:23:39 |_Not valid after: 2024-08-09T07:23:39 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655B8961%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,95,"HTTP/1\.0\x20200\x20OK\r\nDate:\x20Mon,\x2020\x2 SF:0Nov\x202023\x2016:29:22\x20GMT\r\nContent-Length:\x200\r\nVia:\x201\.1 SF:\x20google\r\nAlt-Svc:\x20h3=\":443\";\x20ma=2592000,h3-29=\":443\";\x2 SF:0ma=2592000\r\n\r\n")%r(HTTPOptions,95,"HTTP/1\.0\x20200\x20OK\r\nDate: SF:\x20Mon,\x2020\x20Nov\x202023\x2016:29:22\x20GMT\r\nContent-Length:\x20 SF:0\r\nVia:\x201\.1\x20google\r\nAlt-Svc:\x20h3=\":443\";\x20ma=2592000,h SF:3-29=\":443\";\x20ma=2592000\r\n\r\n")%r(FourOhFourRequest,FC,"HTTP/1\. SF:0\x20404\x20Not\x20Found\r\nCache-Control:\x20no-cache\r\nContent-Type: SF:\x20application/json\r\nX-Tms:\x201\r\nDate:\x20Mon,\x2020\x20Nov\x2020 SF:23\x2016:29:22\x20GMT\r\nContent-Length:\x2028\r\nVia:\x201\.1\x20googl SF:e\r\nAlt-Svc:\x20h3=\":443\";\x20ma=2592000,h3-29=\":443\";\x20ma=25920 SF:00\r\n\r\n{\"message\":\"page\x20not\x20found\"}")%r(tor-versions,B3,"H SF:TTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Length:\x2054\r\nContent-T SF:ype:\x20text/html;\x20charset=UTF-8\r\nDate:\x20Mon,\x2020\x20Nov\x2020 SF:23\x2016:29:22\x20GMT\r\n\r\n<html><title>Error\x20400\x20\(Bad\x20Requ SF:est\)!!1</title></html>")%r(RTSPRequest,1AD,"HTTP/1\.0\x20400\x20Bad\x2 SF:0Request\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nReferrer-Po SF:licy:\x20no-referrer\r\nContent-Length:\x20273\r\nDate:\x20Mon,\x2020\x SF:20Nov\x202023\x2016:29:27\x20GMT\r\n\r\n\n<html><head>\n<meta\x20http-e SF:quiv=\"content-type\"\x20content=\"text/html;charset=utf-8\">\n<title>4 SF:00\x20Bad\x20Request</title>\n</head>\n<body\x20text=#000000\x20bgcolor SF:=#ffffff>\n<h1>Error:\x20Bad\x20Request</h1>\n<h2>Your\x20client\x20has SF:\x20issued\x20a\x20malformed\x20or\x20illegal\x20request\.</h2>\n<h2></ SF:h2>\n</body></html>\n")%r(DNSVersionBindReqTCP,B3,"HTTP/1\.0\x20400\x20 SF:Bad\x20Request\r\nContent-Length:\x2054\r\nContent-Type:\x20text/html;\ SF:x20charset=UTF-8\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2016:29:32\x20G SF:MT\r\n\r\n<html><title>Error\x20400\x20\(Bad\x20Request\)!!1</title></h SF:tml>")%r(DNSStatusRequestTCP,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\n SF:Content-Length:\x2054\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r SF:\nDate:\x20Mon,\x2020\x20Nov\x202023\x2016:29:32\x20GMT\r\n\r\n<html><t SF:itle>Error\x20400\x20\(Bad\x20Request\)!!1</title></html>"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 7 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.22 ms 208.76.251.177 2 0.54 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.96 ms multacom.com (96.45.162.9) 4 0.43 ms 206.72.211.148.any2ix.coresite.com (206.72.211.148) 5 1.29 ms 108.170.247.193 6 0.29 ms 142.251.60.131 7 0.48 ms 231.77.98.34.bc.googleusercontent.com (34.98.77.231) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 99.05 seconds