Analyser le rapport pour "adx-winners-ap-southeast-1-rtb.adroll.com"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A adx-winners-ap-southeast-1-rtb.adroll.com)
Nmap scan report for adx-winners-ap-southeast-1-rtb.adroll.com (13.213.135.117)
Host is up (0.18s latency).
Other addresses for adx-winners-ap-southeast-1-rtb.adroll.com (not scanned): 13.251.214.96
rDNS record for 13.213.135.117: ec2-13-213-135-117.ap-southeast-1.compute.amazonaws.com
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, NCP, NotesRPC, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, X11Probe: 
|     HTTP/1.1 400 BAD_REQUEST
|     Content-Length: 0
|     Connection: Close
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Content-Length: 9
|     Connection: Close
|_    Found
|_http-title: Site doesn't have a title.
443/tcp open  ssl/https
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, NCP, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, X11Probe, tor-versions: 
|     HTTP/1.1 400 BAD_REQUEST
|     Content-Length: 0
|     Connection: Close
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Content-Length: 9
|     Connection: Close
|_    Found
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=*.adroll.com
| Subject Alternative Name: DNS:*.adroll.com
| Not valid before: 2023-02-02T00:00:00
|_Not valid after:  2023-12-29T23:59:59
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/21%Time=655CD8C6%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,49,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x20
SF:9\r\nConnection:\x20Close\r\n\r\nNot\x20Found")%r(HTTPOptions,49,"HTTP/
SF:1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x209\r\nConnection:\x20C
SF:lose\r\n\r\nNot\x20Found")%r(RTSPRequest,42,"HTTP/1\.1\x20400\x20BAD_RE
SF:QUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(X11Pr
SF:obe,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConn
SF:ection:\x20Close\r\n\r\n")%r(FourOhFourRequest,49,"HTTP/1\.1\x20404\x20
SF:Not\x20Found\r\nContent-Length:\x209\r\nConnection:\x20Close\r\n\r\nNot
SF:\x20Found")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-L
SF:ength:\x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSVersionBindReqTCP,42
SF:,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection
SF::\x20Close\r\n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x20400\x20BAD_
SF:REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SSL
SF:SessionReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\
SF:r\nConnection:\x20Close\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\
SF:x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n"
SF:)%r(Kerberos,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x20
SF:0\r\nConnection:\x20Close\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x
SF:20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")
SF:%r(LDAPSearchReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:
SF:\x200\r\nConnection:\x20Close\r\n\r\n")%r(LDAPBindReq,42,"HTTP/1\.1\x20
SF:400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\
SF:r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Lengt
SF:h:\x200\r\nConnection:\x20Close\r\n\r\n")%r(LANDesk-RC,42,"HTTP/1\.1\x2
SF:0400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n
SF:\r\n")%r(TerminalServer,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-
SF:Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(NCP,42,"HTTP/1\.1\x204
SF:00\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r
SF:\n")%r(NotesRPC,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\
SF:x200\r\nConnection:\x20Close\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655CD8D1%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,49,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Leng
SF:th:\x209\r\nConnection:\x20Close\r\n\r\nNot\x20Found")%r(HTTPOptions,49
SF:,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x209\r\nConnectio
SF:n:\x20Close\r\n\r\nNot\x20Found")%r(FourOhFourRequest,49,"HTTP/1\.1\x20
SF:404\x20Not\x20Found\r\nContent-Length:\x209\r\nConnection:\x20Close\r\n
SF:\r\nNot\x20Found")%r(tor-versions,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r
SF:\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(RTSPRequest,
SF:42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnecti
SF:on:\x20Close\r\n\r\n")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r
SF:\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSVersionBi
SF:ndReqTCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\
SF:nConnection:\x20Close\r\n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x20
SF:400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\
SF:r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Le
SF:ngth:\x200\r\nConnection:\x20Close\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1
SF:\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clo
SF:se\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-
SF:Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\
SF:.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clos
SF:e\r\n\r\n")%r(X11Probe,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-L
SF:ength:\x200\r\nConnection:\x20Close\r\n\r\n")%r(LDAPSearchReq,42,"HTTP/
SF:1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Cl
SF:ose\r\n\r\n")%r(LDAPBindReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nCont
SF:ent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SIPOptions,42,"HTT
SF:P/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20
SF:Close\r\n\r\n")%r(LANDesk-RC,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nCon
SF:tent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(TerminalServer,42
SF:,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection
SF::\x20Close\r\n\r\n")%r(NCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nConte
SF:nt-Length:\x200\r\nConnection:\x20Close\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|PBX
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%), Vodavi embedded (87%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:vodavi:xts-ip
Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Vodavi XTS-IP PBX (87%), Linux 3.10 - 3.13 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 24 hops

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   0.21 ms   208.76.251.177
2   0.58 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.71 ms   multacom.com (96.45.162.9)
4   1.07 ms   ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5   ...
6   106.09 ms ae-5.r27.osakjp02.jp.bb.gin.ntt.net (129.250.2.177)
7   104.58 ms ae-2.r03.osakjp02.jp.bb.gin.ntt.net (129.250.7.33)
8   109.31 ms ae-1.amazon.osakjp02.jp.bb.gin.ntt.net (61.200.80.86)
9   ... 11
12  107.59 ms 54.239.53.12
13  ...
14  185.89 ms 52.93.8.68
15  174.99 ms 52.93.11.49
16  181.65 ms 52.93.11.46
17  178.18 ms 150.222.3.215
18  182.43 ms 150.222.3.222
19  ... 23
24  171.80 ms ec2-13-213-135-117.ap-southeast-1.compute.amazonaws.com (13.213.135.117)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 199.68 seconds
Schéma de couleur
Cible
adx-winners-ap-southeast-1-rtb.adroll.com
IP cible
13.213.135.117
Pays cible
SG
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A adx-winners-ap-southeast-1-rtb.adroll.com
Scan date
21 Nov 2023 11:23
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Total scans
About 2 times
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: