Analyser le rapport pour "log-eb5c5b30.us.v2.we-stats.com"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

1

Durée

43.74seconde

Date

2024-11-19

IP

13.89.105.232

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A log-eb5c5b30.us.v2.we-stats.com)
Nmap scan report for log-eb5c5b30.us.v2.we-stats.com (13.89.105.232)
Host is up (0.037s latency).
Not shown: 999 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
443/tcp open  ssl/https nginx
|_http-server-header: nginx
| ssl-cert: Subject: commonName=*.us.v2.we-stats.com
| Subject Alternative Name: DNS:*.us.v2.we-stats.com, DNS:us.v2.we-stats.com
| Not valid before: 2024-06-30T06:53:50
|_Not valid after:  2025-08-01T06:53:50
|_ssl-date: TLS randomness does not represent time
|_http-title: Site doesn't have a title.
|_http-cors: GET POST OPTIONS
| fingerprint-strings: 
|   DNSVersionBindReqTCP, RPCCheck, RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Wed, 20 Nov 2024 03:39:39 GMT
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Content-Length: 12
|     request
|   FourOhFourRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Date: Wed, 20 Nov 2024 03:39:34 GMT
|     Content-Type: application/json; charset=utf-8
|     Connection: close
|     Content-Length: 52
|     Strict-Transport-Security: max-age=31536000; includeSubDomains
|     "message":"no Route matched with those values"
|   GetRequest: 
|     HTTP/1.1 404 Not Found
|     Date: Wed, 20 Nov 2024 03:39:33 GMT
|     Content-Type: application/json; charset=utf-8
|     Connection: close
|     Content-Length: 52
|     Strict-Transport-Security: max-age=31536000; includeSubDomains
|     "message":"no Route matched with those values"
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Date: Wed, 20 Nov 2024 03:39:34 GMT
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Content-Length: 12
|_    request
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=11/19%Time=673D59F5%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,109,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20We
SF:d,\x2020\x20Nov\x202024\x2003:39:33\x20GMT\r\nContent-Type:\x20applicat
SF:ion/json;\x20charset=utf-8\r\nConnection:\x20close\r\nContent-Length:\x
SF:2052\r\nStrict-Transport-Security:\x20max-age=31536000;\x20includeSubDo
SF:mains\r\n\r\n{\n\x20\x20\"message\":\"no\x20Route\x20matched\x20with\x2
SF:0those\x20values\"\n}")%r(HTTPOptions,109,"HTTP/1\.1\x20404\x20Not\x20F
SF:ound\r\nDate:\x20Wed,\x2020\x20Nov\x202024\x2003:39:34\x20GMT\r\nConten
SF:t-Type:\x20application/json;\x20charset=utf-8\r\nConnection:\x20close\r
SF:\nContent-Length:\x2052\r\nStrict-Transport-Security:\x20max-age=315360
SF:00;\x20includeSubDomains\r\n\r\n{\n\x20\x20\"message\":\"no\x20Route\x2
SF:0matched\x20with\x20those\x20values\"\n}")%r(FourOhFourRequest,109,"HTT
SF:P/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Wed,\x2020\x20Nov\x202024\x20
SF:03:39:34\x20GMT\r\nContent-Type:\x20application/json;\x20charset=utf-8\
SF:r\nConnection:\x20close\r\nContent-Length:\x2052\r\nStrict-Transport-Se
SF:curity:\x20max-age=31536000;\x20includeSubDomains\r\n\r\n{\n\x20\x20\"m
SF:essage\":\"no\x20Route\x20matched\x20with\x20those\x20values\"\n}")%r(t
SF:or-versions,9D,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x20
SF:20\x20Nov\x202024\x2003:39:34\x20GMT\r\nContent-Type:\x20text/plain;\x2
SF:0charset=utf-8\r\nConnection:\x20close\r\nContent-Length:\x2012\r\n\r\n
SF:Bad\x20request\n")%r(RTSPRequest,9D,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nDate:\x20Wed,\x2020\x20Nov\x202024\x2003:39:39\x20GMT\r\nContent-Ty
SF:pe:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\nContent-
SF:Length:\x2012\r\n\r\nBad\x20request\n")%r(RPCCheck,9D,"HTTP/1\.1\x20400
SF:\x20Bad\x20Request\r\nDate:\x20Wed,\x2020\x20Nov\x202024\x2003:39:39\x2
SF:0GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x2
SF:0close\r\nContent-Length:\x2012\r\n\r\nBad\x20request\n")%r(DNSVersionB
SF:indReqTCP,9D,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2020
SF:\x20Nov\x202024\x2003:39:39\x20GMT\r\nContent-Type:\x20text/plain;\x20c
SF:harset=utf-8\r\nConnection:\x20close\r\nContent-Length:\x2012\r\n\r\nBa
SF:d\x20request\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 21 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.20 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.74 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.85 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.60 ms  microsoft.as8075.any2ix.coresite.com (206.72.210.143)
5   0.95 ms  ae27-0.ear03.lax31.ntwk.msn.net (104.44.49.168)
6   37.62 ms be-21-0.ibr02.lax31.ntwk.msn.net (104.44.33.175)
7   97.44 ms be-10-0.ibr04.cys04.ntwk.msn.net (104.44.7.41)
8   ...
9   36.34 ms 104.44.55.6
10  40.13 ms 104.44.54.246
11  ... 20
21  37.63 ms 13.89.105.232

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 43.74 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
13.89.105.232
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 1 identifiés
Exécuter la commande
nmap -A log-eb5c5b30.us.v2.we-stats.com
Scan date
19 Nov 2024 22:39
API - Scan ID
Durée de l'analyse
43.74seconde
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: