Ports
Durée
Date
IP
Nmap scan report for zmail.zoho.com (204.141.33.104) Host is up (0.033s latency). Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http ZGS |_http-title: Did not follow redirect to https://zmail.zoho.com/ | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, X11Probe: | HTTP/1.1 400 Bad Request | Server: ZGS | Date: Sun, 22 Dec 2024 22:34:55 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | zproxy: domain_not_configured | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Server: ZGS | Date: Sun, 22 Dec 2024 22:35:00 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | zproxy: domain_not_configured | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-server-header: ZGS 113/tcp closed ident 443/tcp open ssl/https ZGS |_http-title: Site doesn't have a title (text/html;charset=UTF-8). | http-robots.txt: 19 disallowed entries (15 shown) | / /biz/* /cpanel/* /zm/* /api/* /Autodiscover* | /GenerateCaptcha* /Unblock* /autodiscover* /bizApi.do* /customlogin* |_/home/* /jsp/* /login/* /logout* | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Server: ZGS | Date: Sun, 22 Dec 2024 22:35:01 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Strict-Transport-Security: max-age=63072000 | zproxy: domain_not_configured | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | RTSPRequest: | HTTP/1.1 400 Bad Request | Server: ZGS | Date: Sun, 22 Dec 2024 22:35:06 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Strict-Transport-Security: max-age=63072000 | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Server: ZGS | Date: Sun, 22 Dec 2024 22:35:01 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Strict-Transport-Security: max-age=63072000 | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-server-header: ZGS | ssl-cert: Subject: commonName=*.zoho.com | Subject Alternative Name: DNS:*.zoho.com, DNS:zoho.com | Not valid before: 2024-10-01T00:00:00 |_Not valid after: 2025-10-01T23:59:59 | tls-alpn: | h2 | http/1.1 | http/1.0 |_ http/0.9 |_ssl-date: TLS randomness does not represent time 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=12/22%Time=6768940F%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r SF:\nDate:\x20Sun,\x2022\x20Dec\x202024\x2022:34:55\x20GMT\r\nContent-Type SF::\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nzpr SF:oxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head><title>400\x20Bad\ SF:x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reques SF:t</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,128,"HTTP/1\. SF:1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2022\x20 SF:Dec\x202024\x2022:34:55\x20GMT\r\nContent-Type:\x20text/html\r\nContent SF:-Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_config SF:ured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head> SF:\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body SF:>\r\n</html>\r\n")%r(RTSPRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Reques SF:t\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2022\x20Dec\x202024\x2022:34:55\x SF:20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnec SF:tion:\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<he SF:ad><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1 SF:>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(X11P SF:robe,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate: SF:\x20Sun,\x2022\x20Dec\x202024\x2022:34:55\x20GMT\r\nContent-Type:\x20te SF:xt/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x2 SF:0domain_not_configured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Requ SF:est</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1>< SF:/center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,128,"HTTP/1\.1 SF:\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2022\x20D SF:ec\x202024\x2022:34:55\x20GMT\r\nContent-Type:\x20text/html\r\nContent- SF:Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configu SF:red\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\ SF:r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body> SF:\r\n</html>\r\n")%r(RPCCheck,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:nServer:\x20ZGS\r\nDate:\x20Sun,\x2022\x20Dec\x202024\x2022:35:00\x20GM SF:T\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection SF::\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head>< SF:title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400 SF:\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=12/22%Time=67689415%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,155,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x SF:20ZGS\r\nDate:\x20Sun,\x2022\x20Dec\x202024\x2022:35:01\x20GMT\r\nConte SF:nt-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close SF:\r\nStrict-Transport-Security:\x20max-age=63072000\r\nzproxy:\x20domain SF:_not_configured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</ti SF:tle></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center SF:>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,155,"HTTP/1\.1\x20400\x20Ba SF:d\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2022\x20Dec\x202024\x2 SF:022:35:01\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2012 SF:2\r\nConnection:\x20close\r\nStrict-Transport-Security:\x20max-age=6307 SF:2000\r\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head><title> SF:400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Ba SF:d\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequ SF:est,155,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\ SF:x20Sun,\x2022\x20Dec\x202024\x2022:35:01\x20GMT\r\nContent-Type:\x20tex SF:t/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nStrict-Tran SF:sport-Security:\x20max-age=63072000\r\nzproxy:\x20domain_not_configured SF:\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n SF:<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\ SF:n</html>\r\n")%r(tor-versions,136,"HTTP/1\.1\x20400\x20Bad\x20Request\r SF:\nServer:\x20ZGS\r\nDate:\x20Sun,\x2022\x20Dec\x202024\x2022:35:01\x20G SF:MT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnectio SF:n:\x20close\r\nStrict-Transport-Security:\x20max-age=63072000\r\n\r\n<h SF:tml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n SF:<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r SF:\n")%r(RTSPRequest,136,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x SF:20ZGS\r\nDate:\x20Sun,\x2022\x20Dec\x202024\x2022:35:06\x20GMT\r\nConte SF:nt-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close SF:\r\nStrict-Transport-Security:\x20max-age=63072000\r\n\r\n<html>\r\n<he SF:ad><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1 SF:>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n"); Device type: general purpose|phone Running (JUST GUESSING): FreeBSD 11.X (87%), Google Android 5.X (85%) OS CPE: cpe:/o:freebsd:freebsd:11.0 cpe:/o:google:android:5.0.1 Aggressive OS guesses: FreeBSD 11.0-STABLE or 11.0-RELEASE (87%), FreeBSD 11.0-RELEASE (86%), FreeBSD 11.2-STABLE (86%), Android 5.0.1 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 9 hops TRACEROUTE (using port 113/tcp) HOP RTT ADDRESS 1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.56 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.66 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 1.60 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.37 ms ae-3.r26.lsanca07.us.bb.gin.ntt.net (129.250.3.130) 6 32.66 ms ae-3.r22.dllstx14.us.bb.gin.ntt.net (129.250.7.68) 7 32.75 ms ae-22.a01.dllstx14.us.bb.gin.ntt.net (129.250.3.115) 8 33.23 ms xe-1-5-1-0.a01.dllstx14.us.ce.gin.ntt.net (129.250.198.106) 9 33.16 ms 204.141.33.104 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 39.69 seconds