Analyser le rapport pour "wrufer.com"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A wrufer.com)
Nmap scan report for wrufer.com (18.154.132.19)
Host is up (0.00051s latency).
Other addresses for wrufer.com (not scanned): 18.154.132.86 18.154.132.6 18.154.132.28
rDNS record for 18.154.132.19: server-18-154-132-19.lax50.r.cloudfront.net
Not shown: 998 filtered ports
PORT    STATE SERVICE  VERSION
80/tcp  open  http     Amazon CloudFront httpd
|_http-cors: HEAD GET POST PUT DELETE OPTIONS PATCH
|_http-server-header: CloudFront
|_http-title: Did not follow redirect to https://wrufer.com/
443/tcp open  ssl/http Amazon CloudFront httpd
|_http-cors: HEAD GET POST PUT DELETE OPTIONS PATCH
| http-server-header: 
|   AmazonS3
|_  CloudFront
|_http-title: Site doesn't have a title (application/xml).
| ssl-cert: Subject: commonName=wrufer.com
| Subject Alternative Name: DNS:wrufer.com, DNS:*.wrufer.com
| Not valid before: 2023-04-05T00:00:00
|_Not valid after:  2024-05-03T23:59:59
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: PBX
Running (JUST GUESSING): Vodavi embedded (87%)
OS CPE: cpe:/h:vodavi:xts-ip
Aggressive OS guesses: Vodavi XTS-IP PBX (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops

TRACEROUTE (using port 443/tcp)
HOP RTT     ADDRESS
1   0.21 ms 208.76.251.177
2   0.55 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.58 ms multacom.com (96.45.162.9)
4   1.12 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146)
5   ... 6
7   1.06 ms 150.222.255.239
8   ... 17
18  0.50 ms server-18-154-132-19.lax50.r.cloudfront.net (18.154.132.19)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 52.53 seconds
Schéma de couleur
Cible
wrufer.com
IP cible
18.154.132.19
Pays cible
US
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A wrufer.com
Scan date
19 Nov 2023 07:19
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: