Analyser le rapport pour "supervisor-production.benchmarkuniverse.com"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A supervisor-production.benchmarkuniverse.com)
Nmap scan report for supervisor-production.benchmarkuniverse.com (34.210.225.202)
Host is up (0.026s latency).
Other addresses for supervisor-production.benchmarkuniverse.com (not scanned): 52.41.248.87 52.38.51.88
rDNS record for 34.210.225.202: ec2-34-210-225-202.us-west-2.compute.amazonaws.com
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http      awselb/2.0
| fingerprint-strings: 
|   DNSVersionBindReqTCP, RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Tue, 21 Nov 2023 21:36:21 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.1 503 Service Temporarily Unavailable
|     Server: awselb/2.0
|     Date: Tue, 21 Nov 2023 21:36:16 GMT
|     Content-Type: text/plain; charset=utf-8
|     Content-Length: 0
|     Connection: close
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Tue, 21 Nov 2023 21:36:16 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-cors: GET POST PUT DELETE OPTIONS
| http-server-header: 
|   Apache
|_  awselb/2.0
|_http-title: Site doesn't have a title (application/json).
443/tcp open  ssl/https awselb/2.0
| fingerprint-strings: 
|   DNSVersionBindReqTCP, RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Tue, 21 Nov 2023 21:36:28 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.1 503 Service Temporarily Unavailable
|     Server: awselb/2.0
|     Date: Tue, 21 Nov 2023 21:36:22 GMT
|     Content-Type: text/plain; charset=utf-8
|     Content-Length: 0
|     Connection: close
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Tue, 21 Nov 2023 21:36:23 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-cors: GET POST PUT DELETE OPTIONS
| http-server-header: 
|   Apache
|_  awselb/2.0
|_http-title: Site doesn't have a title (application/json).
| ssl-cert: Subject: commonName=benchmarkuniverse.com
| Subject Alternative Name: DNS:benchmarkuniverse.com, DNS:*.benchmarkuniverse.com
| Not valid before: 2023-02-27T00:00:00
|_Not valid after:  2024-03-28T23:59:59
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/21%Time=655D22D0%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,B8,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Unavailab
SF:le\r\nServer:\x20awselb/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x202
SF:1:36:16\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nCont
SF:ent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(HTTPOptions,B8,"HT
SF:TP/1\.1\x20503\x20Service\x20Temporarily\x20Unavailable\r\nServer:\x20a
SF:wselb/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2021:36:16\x20GMT\r\n
SF:Content-Type:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x200\r
SF:\nConnection:\x20close\r\n\r\n")%r(RTSPRequest,7A,"<html>\r\n<head><tit
SF:le>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x2
SF:0Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(X11Probe,11
SF:0,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate
SF::\x20Tue,\x2021\x20Nov\x202023\x2021:36:16\x20GMT\r\nContent-Type:\x20t
SF:ext/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html
SF:>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<ce
SF:nter><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n"
SF:)%r(FourOhFourRequest,B8,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x2
SF:0Unavailable\r\nServer:\x20awselb/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x2
SF:02023\x2021:36:16\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf
SF:-8\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(RPCCheck
SF:,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nD
SF:ate:\x20Tue,\x2021\x20Nov\x202023\x2021:36:21\x20GMT\r\nContent-Type:\x
SF:20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<h
SF:tml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n
SF:<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r
SF:\n")%r(DNSVersionBindReqTCP,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n
SF:Server:\x20awselb/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2021:36:2
SF:1\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nCon
SF:nection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</
SF:title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cent
SF:er>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655D22D6%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,B8,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Un
SF:available\r\nServer:\x20awselb/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x2020
SF:23\x2021:36:22\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\
SF:r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(HTTPOptions
SF:,B8,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Unavailable\r\nServe
SF:r:\x20awselb/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2021:36:22\x20
SF:GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nContent-Length:
SF:\x200\r\nConnection:\x20close\r\n\r\n")%r(FourOhFourRequest,B8,"HTTP/1\
SF:.1\x20503\x20Service\x20Temporarily\x20Unavailable\r\nServer:\x20awselb
SF:/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2021:36:22\x20GMT\r\nConte
SF:nt-Type:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x200\r\nCon
SF:nection:\x20close\r\n\r\n")%r(tor-versions,110,"HTTP/1\.1\x20400\x20Bad
SF:\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x20
SF:2023\x2021:36:23\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length
SF::\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20B
SF:ad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Req
SF:uest</h1></center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<html>
SF:\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cen
SF:ter><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")
SF:%r(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awsel
SF:b/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2021:36:28\x20GMT\r\nCont
SF:ent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20clos
SF:e\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\
SF:n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r
SF:\n</html>\r\n")%r(DNSVersionBindReqTCP,110,"HTTP/1\.1\x20400\x20Bad\x20
SF:Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x202023
SF:\x2021:36:28\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2
SF:0122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x
SF:20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request
SF:</h1></center>\r\n</body>\r\n</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|PBX
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%), Vodavi embedded (87%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:vodavi:xts-ip
Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Vodavi XTS-IP PBX (87%), Linux 3.10 - 3.13 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.24 ms  208.76.251.177
2   2.54 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.76 ms  multacom.com (96.45.162.9)
4   0.28 ms  206.72.211.146.any2ix.coresite.com (206.72.211.146)
5   ... 12
13  27.61 ms 108.166.240.9
14  ...
15  23.42 ms 108.166.240.62
16  ...
17  26.21 ms ec2-34-210-225-202.us-west-2.compute.amazonaws.com (34.210.225.202)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 48.43 seconds
Schéma de couleur
Cible
supervisor-production.benchmarkuniverse.com
IP cible
34.210.225.202
Pays cible
US
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A supervisor-production.benchmarkuniverse.com
Scan date
21 Nov 2023 16:36
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: