Analyser le rapport pour "mcms.ws"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A mcms.ws)
Nmap scan report for mcms.ws (62.212.239.135)
Host is up (0.21s latency).
rDNS record for 62.212.239.135: srv01.yer.az
Not shown: 985 closed ports
PORT     STATE    SERVICE  VERSION
21/tcp   open     ftp      Pure-FTPd
25/tcp   open     smtp     Exim smtpd 4.96
|_smtp-commands: Couldn't establish connection on port 25
26/tcp   open     smtp     Exim smtpd 4.96
|_smtp-commands: Couldn't establish connection on port 26
53/tcp   open     domain   ISC BIND 9.11.4-P2 (RedHat Enterprise Linux 7)
80/tcp   open     http     Apache httpd
|_http-server-header: imunify360-webshield/1.21
|_http-title: Site doesn't have a title (application/octet-stream).
110/tcp  open     pop3     Dovecot pop3d
111/tcp  open     rpcbind
143/tcp  open     imap     Dovecot imapd
|_imap-capabilities: LOGIN-REFERRALS SASL-IR post-login AUTH=LOGINA0001 AUTH=PLAIN IMAP4rev1 ID listed STARTTLS more LITERAL+ capabilities NAMESPACE have Pre-login ENABLE OK IDLE
179/tcp  filtered bgp
443/tcp  open     ssl/http Apache httpd
|_http-server-header: imunify360-webshield/1.21
|_http-title: Site doesn't have a title (application/octet-stream).
| ssl-cert: Subject: commonName=www.demo02.mcms.ws
| Subject Alternative Name: DNS:bbooks.mcms.ws, DNS:demo02.mcms.ws, DNS:demo03.mcms.ws, DNS:demo04.mcms.ws, DNS:mail.mcms.ws, DNS:mcms.ws, DNS:www.bbooks.mcms.ws, DNS:www.demo02.mcms.ws, DNS:www.demo03.mcms.ws, DNS:www.demo04.mcms.ws, DNS:www.mcms.ws
| Not valid before: 2023-06-03T10:03:40
|_Not valid after:  2023-09-01T10:03:39
|_ssl-date: TLS randomness does not represent time
465/tcp  open     ssl/smtp Exim smtpd 4.96
|_smtp-commands: Couldn't establish connection on port 465
587/tcp  open     smtp     Exim smtpd 4.96
|_smtp-commands: Couldn't establish connection on port 587
993/tcp  open     imaps?
995/tcp  open     pop3s?
3306/tcp open     mysql    MySQL (unauthorized)
Device type: general purpose|storage-misc|firewall
Running (JUST GUESSING): Linux 4.X|3.X|2.6.X (99%), Synology DiskStation Manager 5.X (91%), WatchGuard Fireware 11.X (90%)
OS CPE: cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8
Aggressive OS guesses: Linux 4.4 (99%), Linux 4.0 (97%), Linux 3.11 - 4.1 (96%), Linux 2.6.32 (96%), Linux 2.6.32 or 3.10 (95%), Linux 3.10 - 3.12 (94%), Linux 2.6.32 - 2.6.35 (94%), Linux 2.6.32 - 2.6.39 (94%), Linux 4.9 (93%), Linux 3.13 (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops
Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7

TRACEROUTE (using port 199/tcp)
HOP RTT       ADDRESS
1   1.01 ms   208.76.251.177
2   0.74 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.76 ms   1.162.45.96-dedicated.multacom.com (96.45.162.1)
4   0.83 ms   be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   12.51 ms  be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161)
6   20.87 ms  be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54)
7   36.88 ms  be3851.ccr42.iah01.atlas.cogentco.com (154.54.2.5)
8   153.07 ms be2690.ccr42.atl01.atlas.cogentco.com (154.54.28.129)
9   152.18 ms be2113.ccr42.dca01.atlas.cogentco.com (154.54.24.221)
10  154.36 ms be2807.ccr42.jfk02.atlas.cogentco.com (154.54.40.109)
11  153.20 ms be3628.ccr42.par01.atlas.cogentco.com (154.54.27.170)
12  152.24 ms be2800.ccr42.fra03.atlas.cogentco.com (154.54.58.237)
13  153.34 ms be2846.rcr22.fra06.atlas.cogentco.com (154.54.37.30)
14  153.77 ms be2340.nr71.b015761-2.fra06.atlas.cogentco.com (154.25.14.234)
15  153.27 ms 149.11.21.170
16  222.62 ms 10.50.10.109
17  224.61 ms 10.50.10.2
18  228.91 ms srv01.yer.az (62.212.239.135)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 262.82 seconds
Schéma de couleur
Cible
mcms.ws
IP cible
62.212.239.135
Pays cible
AZ
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A mcms.ws
Scan date
19 Jul 2023 09:04
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Total scans
About 5 times
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: