Analyser le rapport pour "www.pelicanparts.com"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

3

Durée

48.42seconde

Date

2024-08-21

IP

23.251.218.5

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A www.pelicanparts.com)
Nmap scan report for www.pelicanparts.com (23.251.218.5)
Host is up (0.0080s latency).
Not shown: 996 filtered tcp ports (no-response), 1 filtered tcp ports (admin-prohibited)
PORT     STATE SERVICE        VERSION
80/tcp   open  upnp           Microsoft IIS httpd
|_http-title: Did not follow redirect to https://www.pelicanparts.com/
443/tcp  open  ssl/https
| ssl-cert: Subject: commonName=*.pelicanparts.com
| Subject Alternative Name: DNS:*.pelicanparts.com, DNS:pelicanparts.com
| Not valid before: 2024-01-30T10:48:19
|_Not valid after:  2025-03-02T10:48:19
|_http-title: Pelican Parts - Porsche, BMW, MINI, Mercedes, Audi, Volkswagen...
| http-robots.txt: 33 disallowed entries (15 shown)
| /cgi-bin/ksearch/ /cgi-bin/dbsql/db.cgi 
| /cgi-bin/smart/S-mart.cgi /cgi-bin/smart/s-mart.cgi 
| /cgi-bin/smart/SuperCart-2014.cgi /cgi-bin/smart/oboe/track_lookup.pl 
| /cgi-bin/smart/oboe/track.pl /cgi-bin/smart/SuperCart-Track.cgi /cgi-bin/pmpre/ 
| /cgi-bin/PerlDesk/ /cgi-bin/SuperCat/ /cgi-bin/tell_friend/ 
|_/cgi-bin/Wizards/ /cgi-bin/register/ /cgi-bin/webadverts/
| http-methods: 
|_  Potentially risky methods: TRACE
3389/tcp open  ms-wbt-server?
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest: 
|     HTTP/1.0 302 Found
|     Content-type: text/html
|     X-Content-Type-Options: nosniff
|     Location: https://sonicwall-internal.pelicanparts.com/dynPolLoginRedirect.html?cid=-1
|     <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
|     <html>
|     <head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
|     <title>Policy Jump</title>
|     <meta name="id" content="policyJump" >
|     <meta http-equiv="Expires" content="0">
|     </head>
|     <BODY>This document has moved <A href="https://sonicwall-internal.pelicanparts.com/dynPolLoginRedirect.html?cid=-1">here</A></BODY>
|_    </html>
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port3389-TCP:V=7.92%I=7%D=8/21%Time=66C66DE4%P=x86_64-redhat-linux-gnu%
SF:r(GetRequest,243,"HTTP/1\.0\x20302\x20Found\r\nContent-type:\x20text/ht
SF:ml\r\nX-Content-Type-Options:\x20nosniff\r\nLocation:\x20https://sonicw
SF:all-internal\.pelicanparts\.com/dynPolLoginRedirect\.html\?cid=-1\r\n\r
SF:\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.0\x20Trans
SF:itional//EN\">\r\n<html>\r\n<head><meta\x20http-equiv=\"Content-Type\"\
SF:x20content=\"text/html;\x20charset=utf-8\">\r\n\r\n\t<title>Policy\x20J
SF:ump</title>\r\n\t<meta\x20name=\"id\"\x20content=\"policyJump\"\x20>\r\
SF:n\t<meta\x20http-equiv=\"Expires\"\x20content=\"0\">\r\n</head>\r\n<BOD
SF:Y>This\x20document\x20has\x20moved\x20<A\x20href=\"https://sonicwall-in
SF:ternal\.pelicanparts\.com/dynPolLoginRedirect\.html\?cid=-1\">here</A><
SF:/BODY>\r\n</html>\r\n")%r(FourOhFourRequest,243,"HTTP/1\.0\x20302\x20Fo
SF:und\r\nContent-type:\x20text/html\r\nX-Content-Type-Options:\x20nosniff
SF:\r\nLocation:\x20https://sonicwall-internal\.pelicanparts\.com/dynPolLo
SF:ginRedirect\.html\?cid=-1\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3
SF:C//DTD\x20HTML\x204\.0\x20Transitional//EN\">\r\n<html>\r\n<head><meta\
SF:x20http-equiv=\"Content-Type\"\x20content=\"text/html;\x20charset=utf-8
SF:\">\r\n\r\n\t<title>Policy\x20Jump</title>\r\n\t<meta\x20name=\"id\"\x2
SF:0content=\"policyJump\"\x20>\r\n\t<meta\x20http-equiv=\"Expires\"\x20co
SF:ntent=\"0\">\r\n</head>\r\n<BODY>This\x20document\x20has\x20moved\x20<A
SF:\x20href=\"https://sonicwall-internal\.pelicanparts\.com/dynPolLoginRed
SF:irect\.html\?cid=-1\">here</A></BODY>\r\n</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|specialized
Running (JUST GUESSING): FreeBSD 6.X (87%), AVtech embedded (87%)
OS CPE: cpe:/o:freebsd:freebsd:6.2
Aggressive OS guesses: FreeBSD 6.2-RELEASE (87%), AVtech Room Alert 26W environmental monitor (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 10 hops

TRACEROUTE (using port 443/tcp)
HOP RTT       ADDRESS
1   0.17 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   293.19 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.60 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   0.79 ms   be3243.ccr41.lax05.atlas.cogentco.com (154.54.27.118)
6   0.72 ms   38.19.140.106
7   1.97 ms   66-81-211-140.static-ip.telepacific.net (66.81.211.140)
8   ...
9   7.64 ms   192-208-239-114.static-ip.telepacific.net (192.208.239.114)
10  8.33 ms   www.pelicanparts.com (23.251.218.5)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 48.42 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
23.251.218.5
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 3 identifiés
Exécuter la commande
nmap -A www.pelicanparts.com
Scan date
21 Aug 2024 18:45
Durée de l'analyse
48.42seconde
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: