Ports
Durée
Date
IP
Nmap scan report for email.notifications.joinhandshake.com (34.110.180.34) Host is up (0.00041s latency). rDNS record for 34.110.180.34: 34.180.110.34.bc.googleusercontent.com Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) |_http-title: Site doesn't have a title (text/plain; charset=utf-8). 443/tcp open ssl/https | fingerprint-strings: | FourOhFourRequest, HTTPOptions: | HTTP/1.0 404 Not Found | Content-Length: 19 | Content-Type: text/plain; charset=utf-8 | Date: Tue, 21 Nov 2023 14:13:57 GMT | X-Content-Type-Options: nosniff | page not found | GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SSLSessionReq, TLSSessionReq: | HTTP/1.1 400 Bad Request | Content-Type: text/plain; charset=utf-8 | Connection: close | Request | GetRequest: | HTTP/1.0 404 Not Found | Content-Length: 19 | Content-Type: text/plain; charset=utf-8 | Date: Tue, 21 Nov 2023 14:13:56 GMT | X-Content-Type-Options: nosniff |_ page not found |_http-title: Site doesn't have a title (text/plain; charset=utf-8). | ssl-cert: Subject: commonName=email.notifications.joinhandshake.com | Subject Alternative Name: DNS:email.notifications.joinhandshake.com | Not valid before: 2023-10-15T20:39:59 |_Not valid after: 2024-01-13T20:39:58 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655CBB24%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,B0,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Leng SF:th:\x2019\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nDate:\x20 SF:Tue,\x2021\x20Nov\x202023\x2014:13:56\x20GMT\r\nX-Content-Type-Options: SF:\x20nosniff\r\n\r\n404\x20page\x20not\x20found\n")%r(HTTPOptions,B0,"HT SF:TP/1\.0\x20404\x20Not\x20Found\r\nContent-Length:\x2019\r\nContent-Type SF::\x20text/plain;\x20charset=utf-8\r\nDate:\x20Tue,\x2021\x20Nov\x202023 SF:\x2014:13:57\x20GMT\r\nX-Content-Type-Options:\x20nosniff\r\n\r\n404\x2 SF:0page\x20not\x20found\n")%r(FourOhFourRequest,B0,"HTTP/1\.0\x20404\x20N SF:ot\x20Found\r\nContent-Length:\x2019\r\nContent-Type:\x20text/plain;\x2 SF:0charset=utf-8\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2014:13:57\x20GMT SF:\r\nX-Content-Type-Options:\x20nosniff\r\n\r\n404\x20page\x20not\x20fou SF:nd\n")%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent SF:-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n4 SF:00\x20Bad\x20Request")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad\x20Req SF:uest\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x2 SF:0close\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.1\x20400\x20Ba SF:d\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnec SF:tion:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SSLSessionReq,67,"HTTP/ SF:1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charse SF:t=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(TLSSes SF:sionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text SF:/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20R SF:equest")%r(Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-T SF:ype:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400 SF:\x20Bad\x20Request")%r(LPDString,67,"HTTP/1\.1\x20400\x20Bad\x20Request SF:\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20clo SF:se\r\n\r\n400\x20Bad\x20Request")%r(LDAPSearchReq,67,"HTTP/1\.1\x20400\ SF:x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nC SF:onnection:\x20close\r\n\r\n400\x20Bad\x20Request"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 7 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.80 ms 208.76.251.177 2 0.53 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.12 ms multacom.com (96.45.162.9) 4 0.40 ms 206.72.211.148.any2ix.coresite.com (206.72.211.148) 5 0.37 ms 108.170.247.161 6 0.37 ms 142.251.60.133 7 0.36 ms 34.180.110.34.bc.googleusercontent.com (34.110.180.34) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 131.62 seconds ults at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 123.64 seconds