Analyser le rapport pour "www.myflvs.net"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

-

Durée

-

Date

2024-09-05

IP

69.48.154.23

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A www.myflvs.net)
Nmap scan report for www.myflvs.net (69.48.154.23)
Host is up (0.063s latency).
rDNS record for 69.48.154.23: server.myflvs.net
Not shown: 903 filtered tcp ports (no-response), 13 filtered tcp ports (port-unreach), 71 closed tcp ports (reset)
PORT     STATE SERVICE  VERSION
21/tcp   open  ftp      Pure-FTPd
25/tcp   open  smtp?
|_smtp-commands: Couldn't establish connection on port 25
53/tcp   open  domain   PowerDNS Authoritative Server 4.7.3
80/tcp   open  http     Apache httpd
|_http-server-header: imunify360-webshield/1.21
|_http-trane-info: Problem with XML parsing of /evox/about
|_http-title: One moment, please...
110/tcp  open  pop3     Dovecot pop3d
|_ssl-cert: ERROR: Script execution failed (use -d to debug)
|_ssl-date: ERROR: Script execution failed (use -d to debug)
|_tls-alpn: ERROR: Script execution failed (use -d to debug)
|_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug)
143/tcp  open  imap     Dovecot imapd
|_ssl-date: ERROR: Script execution failed (use -d to debug)
|_tls-alpn: ERROR: Script execution failed (use -d to debug)
|_ssl-cert: ERROR: Script execution failed (use -d to debug)
|_sslv2: ERROR: Script execution failed (use -d to debug)
|_imap-ntlm-info: ERROR: Script execution failed (use -d to debug)
|_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug)
443/tcp  open  ssl/http Apache httpd
|_http-trane-info: Problem with XML parsing of /evox/about
|_http-title: One moment, please...
|_http-server-header: imunify360-webshield/1.21
| ssl-cert: Subject: commonName=*.myflvs.net
| Subject Alternative Name: DNS:*.myflvs.net, DNS:myflvs.net
| Not valid before: 2024-08-12T20:08:41
|_Not valid after:  2024-11-10T20:08:40
| tls-alpn: 
|   h2
|   http/1.1
|   http/1.0
|_  http/0.9
|_ssl-date: TLS randomness does not represent time
465/tcp  open  ssl/smtp Exim smtpd 4.97.1
|_smtp-commands: Couldn't establish connection on port 465
587/tcp  open  smtp     Exim smtpd 4.97.1
|_smtp-commands: Couldn't establish connection on port 587
993/tcp  open  ssl/imap Dovecot imapd
995/tcp  open  ssl/pop3 Dovecot pop3d
2525/tcp open  smtp     Exim smtpd 4.97.1
|_smtp-commands: Couldn't establish connection on port 2525
3306/tcp open  mysql    MySQL (unauthorized)
|_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug)
|_ssl-cert: ERROR: Script execution failed (use -d to debug)
|_ssl-date: ERROR: Script execution failed (use -d to debug)
|_tls-alpn: ERROR: Script execution failed (use -d to debug)
|_sslv2: ERROR: Script execution failed (use -d to debug)
Aggressive OS guesses: Linux 3.2 - 4.9 (95%), Linux 3.16 (95%), Linux 3.18 (95%), ASUS RT-N56U WAP (Linux 3.4) (95%), Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), Linux 3.10 - 4.11 (93%), Android 4.1.1 (92%), Linux 4.10 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 16 hops

TRACEROUTE (using port 22/tcp)
HOP RTT      ADDRESS
1   1.74 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.60 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.69 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   12.32 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   21.54 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7   34.16 ms be2427.ccr21.den01.atlas.cogentco.com (154.54.87.22)
8   44.45 ms be3802.ccr31.oma02.atlas.cogentco.com (154.54.165.78)
9   52.45 ms be5214.ccr41.ord01.atlas.cogentco.com (154.54.165.134)
10  59.24 ms be2717.ccr21.cle04.atlas.cogentco.com (154.54.6.222)
11  61.57 ms be3744.rcr51.tol01.atlas.cogentco.com (154.54.0.146)
12  62.89 ms be2123.rcr21.dtw04.atlas.cogentco.com (154.54.82.138)
13  62.55 ms 38.142.132.58
14  63.15 ms e1-2.MI3-C1-E02.09-29.a2webhosting.com (190.92.147.5)
15  ...
16  62.66 ms server.myflvs.net (69.48.154.23)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 813.41 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
69.48.154.23
Statut d'hôte
DOWN
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Aucun port n'a été trouvé
Exécuter la commande
nmap -A www.myflvs.net
Scan date
05 Sep 2024 01:18
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: