Analyser le rapport pour "email.notifications.joinhandshake.com"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A email.notifications.joinhandshake.com)
Nmap scan report for email.notifications.joinhandshake.com (34.110.180.34)
Host is up (0.00041s latency).
rDNS record for 34.110.180.34: 34.180.110.34.bc.googleusercontent.com
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http      Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
443/tcp open  ssl/https
| fingerprint-strings: 
|   FourOhFourRequest, HTTPOptions: 
|     HTTP/1.0 404 Not Found
|     Content-Length: 19
|     Content-Type: text/plain; charset=utf-8
|     Date: Tue, 21 Nov 2023 14:13:57 GMT
|     X-Content-Type-Options: nosniff
|     page not found
|   GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SSLSessionReq, TLSSessionReq: 
|     HTTP/1.1 400 Bad Request
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Request
|   GetRequest: 
|     HTTP/1.0 404 Not Found
|     Content-Length: 19
|     Content-Type: text/plain; charset=utf-8
|     Date: Tue, 21 Nov 2023 14:13:56 GMT
|     X-Content-Type-Options: nosniff
|_    page not found
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
| ssl-cert: Subject: commonName=email.notifications.joinhandshake.com
| Subject Alternative Name: DNS:email.notifications.joinhandshake.com
| Not valid before: 2023-10-15T20:39:59
|_Not valid after:  2024-01-13T20:39:58
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655CBB24%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,B0,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Leng
SF:th:\x2019\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nDate:\x20
SF:Tue,\x2021\x20Nov\x202023\x2014:13:56\x20GMT\r\nX-Content-Type-Options:
SF:\x20nosniff\r\n\r\n404\x20page\x20not\x20found\n")%r(HTTPOptions,B0,"HT
SF:TP/1\.0\x20404\x20Not\x20Found\r\nContent-Length:\x2019\r\nContent-Type
SF::\x20text/plain;\x20charset=utf-8\r\nDate:\x20Tue,\x2021\x20Nov\x202023
SF:\x2014:13:57\x20GMT\r\nX-Content-Type-Options:\x20nosniff\r\n\r\n404\x2
SF:0page\x20not\x20found\n")%r(FourOhFourRequest,B0,"HTTP/1\.0\x20404\x20N
SF:ot\x20Found\r\nContent-Length:\x2019\r\nContent-Type:\x20text/plain;\x2
SF:0charset=utf-8\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2014:13:57\x20GMT
SF:\r\nX-Content-Type-Options:\x20nosniff\r\n\r\n404\x20page\x20not\x20fou
SF:nd\n")%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent
SF:-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n4
SF:00\x20Bad\x20Request")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad\x20Req
SF:uest\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x2
SF:0close\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.1\x20400\x20Ba
SF:d\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnec
SF:tion:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SSLSessionReq,67,"HTTP/
SF:1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charse
SF:t=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(TLSSes
SF:sionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text
SF:/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20R
SF:equest")%r(Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-T
SF:ype:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400
SF:\x20Bad\x20Request")%r(LPDString,67,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20clo
SF:se\r\n\r\n400\x20Bad\x20Request")%r(LDAPSearchReq,67,"HTTP/1\.1\x20400\
SF:x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nC
SF:onnection:\x20close\r\n\r\n400\x20Bad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 7 hops

TRACEROUTE (using port 80/tcp)
HOP RTT     ADDRESS
1   0.80 ms 208.76.251.177
2   0.53 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   1.12 ms multacom.com (96.45.162.9)
4   0.40 ms 206.72.211.148.any2ix.coresite.com (206.72.211.148)
5   0.37 ms 108.170.247.161
6   0.37 ms 142.251.60.133
7   0.36 ms 34.180.110.34.bc.googleusercontent.com (34.110.180.34)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 131.62 seconds
ults at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 123.64 seconds
Schéma de couleur
Cible
email.notifications.joinhandshake.com
IP cible
34.110.180.34
Pays cible
US
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A email.notifications.joinhandshake.com
Scan date
21 Nov 2023 09:15
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: