Analyser le rapport pour "trackbar.navigator.gmx.net"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A trackbar.navigator.gmx.net)
Nmap scan report for trackbar.navigator.gmx.net (217.72.199.27)
Host is up (0.14s latency).
rDNS record for 217.72.199.27: platform.pub.mam.dev
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE  SERVICE   VERSION
80/tcp  closed http
443/tcp open   ssl/https Apache
|_http-title: GMX
| fingerprint-strings: 
|   FourOhFourRequest, HTTPOptions: 
|     HTTP/1.0 421 Misdirected Request
|     Content-Type: text/plain; charset=utf-8
|     X-Content-Type-Options: nosniff
|     Date: Mon, 12 Feb 2024 22:37:51 GMT
|     Content-Length: 20
|     Misdirected Request
|   GenericLines, Help, Kerberos, LPDString, RTSPRequest, SSLSessionReq, TLSSessionReq, TerminalServerCookie: 
|     HTTP/1.1 400 Bad Request
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Request
|   GetRequest: 
|     HTTP/1.0 421 Misdirected Request
|     Content-Type: text/plain; charset=utf-8
|     X-Content-Type-Options: nosniff
|     Date: Mon, 12 Feb 2024 22:37:50 GMT
|     Content-Length: 20
|_    Misdirected Request
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: Apache
| ssl-cert: Subject: commonName=*.navigator.gmx.net/organizationName=1&1 Mail & Media GmbH/stateOrProvinceName=Rhineland-Palatinate/countryName=DE
| Subject Alternative Name: DNS:*.navigator.gmx.net
| Not valid before: 2023-06-20T09:50:44
|_Not valid after:  2024-06-24T23:59:59
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=2/12%Time=65CA9DE5%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,BB,"HTTP/1\.0\x20421\x20Misdirected\x20Request\r\nCon
SF:tent-Type:\x20text/plain;\x20charset=utf-8\r\nX-Content-Type-Options:\x
SF:20nosniff\r\nDate:\x20Mon,\x2012\x20Feb\x202024\x2022:37:50\x20GMT\r\nC
SF:ontent-Length:\x2020\r\n\r\nMisdirected\x20Request\n")%r(HTTPOptions,BB
SF:,"HTTP/1\.0\x20421\x20Misdirected\x20Request\r\nContent-Type:\x20text/p
SF:lain;\x20charset=utf-8\r\nX-Content-Type-Options:\x20nosniff\r\nDate:\x
SF:20Mon,\x2012\x20Feb\x202024\x2022:37:51\x20GMT\r\nContent-Length:\x2020
SF:\r\n\r\nMisdirected\x20Request\n")%r(FourOhFourRequest,BB,"HTTP/1\.0\x2
SF:0421\x20Misdirected\x20Request\r\nContent-Type:\x20text/plain;\x20chars
SF:et=utf-8\r\nX-Content-Type-Options:\x20nosniff\r\nDate:\x20Mon,\x2012\x
SF:20Feb\x202024\x2022:37:51\x20GMT\r\nContent-Length:\x2020\r\n\r\nMisdir
SF:ected\x20Request\n")%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Requ
SF:est\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20
SF:close\r\n\r\n400\x20Bad\x20Request")%r(RTSPRequest,67,"HTTP/1\.1\x20400
SF:\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\n
SF:Connection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.
SF:1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=u
SF:tf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SSLSessio
SF:nReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/pl
SF:ain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Requ
SF:est")%r(TerminalServerCookie,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n
SF:Content-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r
SF:\n\r\n400\x20Bad\x20Request")%r(TLSSessionReq,67,"HTTP/1\.1\x20400\x20B
SF:ad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConne
SF:ction:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Kerberos,67,"HTTP/1\.1
SF:\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=ut
SF:f-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(LPDString,
SF:67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\
SF:x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request");
Device type: load balancer|firewall
Running (JUST GUESSING): F5 Networks TMOS 11.6.X|11.4.X (88%)
OS CPE: cpe:/o:f5:tmos:11.6 cpe:/o:f5:tmos:11.4
Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (88%), F5 BIG-IP AFM firewall (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 15 hops

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   0.19 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.58 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.95 ms   r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   0.96 ms   be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   0.88 ms   be3360.ccr41.lax04.atlas.cogentco.com (154.54.25.150)
6   1.03 ms   lax-b22-link.ip.twelve99.net (80.239.160.64)
7   61.69 ms  ash-bb2-link.ip.twelve99.net (62.115.121.221)
8   61.67 ms  ash-bb2-link.ip.twelve99.net (62.115.121.221)
9   ... 10
11  146.69 ms ionos-ic-350360.ip.twelve99-cust.net (62.115.181.11)
12  152.68 ms lo-0.rc-b.bs.kae.de.net.ionos.com (212.227.117.207)
13  144.11 ms prs-bb1-link.ip.twelve99.net (62.115.112.243)
14  152.80 ms ffm-bb1-link.ip.twelve99.net (62.115.123.12)
15  152.01 ms platform.pub.mam.dev (217.72.199.27)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 136.96 seconds
Schéma de couleur
Cible
trackbar.navigator.gmx.net
IP cible
217.72.199.27
Pays cible
DE
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A trackbar.navigator.gmx.net
Scan date
12 Feb 2024 17:40
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Total scans
About 2 times
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: