Analyser le rapport pour "api.flipboard.com"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A api.flipboard.com)
Nmap scan report for api.flipboard.com (13.33.21.39)
Host is up (0.00096s latency).
Other addresses for api.flipboard.com (not scanned): 13.33.21.105 13.33.21.19 13.33.21.76
rDNS record for 13.33.21.39: server-13-33-21-39.lax53.r.cloudfront.net
Not shown: 998 filtered ports
PORT    STATE SERVICE  VERSION
80/tcp  open  http     Amazon CloudFront httpd
|_http-server-header: CloudFront
|_http-title: Did not follow redirect to https://api.flipboard.com
443/tcp open  ssl/http Amazon CloudFront httpd
|_http-server-header: CloudFront
|_http-title: Site doesn't have a title (application/json;charset=utf-8).
| ssl-cert: Subject: commonName=*.flipboard.com
| Subject Alternative Name: DNS:*.flipboard.com, DNS:www.flipboard.com, DNS:flipboard.com
| Not valid before: 2023-05-15T00:00:00
|_Not valid after:  2024-06-12T23:59:59
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|PBX
Running (JUST GUESSING): FreeBSD 11.X (88%), Vodavi embedded (87%)
OS CPE: cpe:/o:freebsd:freebsd:11.0 cpe:/h:vodavi:xts-ip
Aggressive OS guesses: FreeBSD 11.0-RELEASE (88%), FreeBSD 11.0-STABLE (88%), Vodavi XTS-IP PBX (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops

TRACEROUTE (using port 80/tcp)
HOP RTT     ADDRESS
1   0.22 ms 208.76.251.177
2   0.63 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.86 ms multacom.com (96.45.162.9)
4   0.25 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146)
5   ... 10
11  1.17 ms 15.230.16.20
12  1.00 ms server-13-33-21-39.lax53.r.cloudfront.net (13.33.21.39)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 44.27 seconds
Schéma de couleur
Cible
api.flipboard.com
IP cible
13.33.21.39
Pays cible
US
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A api.flipboard.com
Scan date
20 Nov 2023 05:41
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Total scans
About 2 times
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: