Ports
Durée
Date
IP
Nmap scan report for micropact.com (52.3.84.199) Host is up (0.068s latency). rDNS record for 52.3.84.199: ec2-52-3-84-199.compute-1.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, X11Probe: | HTTP/1.1 400 Bad request | content-length: 90 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | FourOhFourRequest: | HTTP/1.1 301 Moved Permanently | content-length: 0 | location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak | connection: close | GetRequest, HTTPOptions, RTSPRequest: | HTTP/1.1 301 Moved Permanently | content-length: 0 | location: https:/// |_ connection: close |_http-title: Did not follow redirect to https://micropact.com/ 443/tcp open ssl/https | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, tor-versions: | HTTP/1.1 400 Bad request | content-length: 90 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest: | HTTP/1.1 403 Forbidden | content-length: 93 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>403 Forbidden</h1> | Request forbidden by administrative rules. |_ </body></html> |_http-title: Did not follow redirect to https://www.tylertech.com | ssl-cert: Subject: commonName=*.micropact.com/organizationName=Tyler Technologies, Inc./stateOrProvinceName=Texas/countryName=US | Subject Alternative Name: DNS:*.micropact.com, DNS:micropact.com | Not valid before: 2023-08-01T14:53:23 |_Not valid after: 2024-09-01T14:53:23 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=4/8%Time=66140BA9%P=x86_64-redhat-linux-gnu%r(G SF:etRequest,5D,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\ncontent-lengt SF:h:\x200\r\nlocation:\x20https:///\r\nconnection:\x20close\r\n\r\n")%r(H SF:TTPOptions,5D,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\ncontent-leng SF:th:\x200\r\nlocation:\x20https:///\r\nconnection:\x20close\r\n\r\n")%r( SF:RTSPRequest,5D,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\ncontent-len SF:gth:\x200\r\nlocation:\x20https:///\r\nconnection:\x20close\r\n\r\n")%r SF:(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\ncontent-length:\x20 SF:90\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconne SF:ction:\x20close\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour SF:\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></html>\n")%r SF:(FourOhFourRequest,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\ncont SF:ent-length:\x200\r\nlocation:\x20https:///nice%20ports%2C/Tri%6Eity\.tx SF:t%2ebak\r\nconnection:\x20close\r\n\r\n")%r(RPCCheck,CF,"HTTP/1\.1\x204 SF:00\x20Bad\x20request\r\ncontent-length:\x2090\r\ncache-control:\x20no-c SF:ache\r\ncontent-type:\x20text/html\r\nconnection:\x20close\r\n\r\n<html SF:><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x2 SF:0invalid\x20request\.\n</body></html>\n")%r(DNSVersionBindReqTCP,CF,"HT SF:TP/1\.1\x20400\x20Bad\x20request\r\ncontent-length:\x2090\r\ncache-cont SF:rol:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnection:\x20close\ SF:r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20s SF:ent\x20an\x20invalid\x20request\.\n</body></html>\n")%r(DNSStatusReques SF:tTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\ncontent-length:\x2090\r\ SF:ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnection SF::\x20close\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20b SF:rowser\x20sent\x20an\x20invalid\x20request\.\n</body></html>\n")%r(Help SF:,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\ncontent-length:\x2090\r\ncac SF:he-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnection:\x2 SF:0close\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20brows SF:er\x20sent\x20an\x20invalid\x20request\.\n</body></html>\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=4/8%Time=66140BB0%P=x86_64-redhat-linux- SF:gnu%r(GetRequest,D0,"HTTP/1\.1\x20403\x20Forbidden\r\ncontent-length:\x SF:2093\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\ncon SF:nection:\x20close\r\n\r\n<html><body><h1>403\x20Forbidden</h1>\nRequest SF:\x20forbidden\x20by\x20administrative\x20rules\.\n</body></html>\n")%r( SF:HTTPOptions,D0,"HTTP/1\.1\x20403\x20Forbidden\r\ncontent-length:\x2093\ SF:r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnecti SF:on:\x20close\r\n\r\n<html><body><h1>403\x20Forbidden</h1>\nRequest\x20f SF:orbidden\x20by\x20administrative\x20rules\.\n</body></html>\n")%r(FourO SF:hFourRequest,D0,"HTTP/1\.1\x20403\x20Forbidden\r\ncontent-length:\x2093 SF:\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnect SF:ion:\x20close\r\n\r\n<html><body><h1>403\x20Forbidden</h1>\nRequest\x20 SF:forbidden\x20by\x20administrative\x20rules\.\n</body></html>\n")%r(tor- SF:versions,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\ncontent-length:\x209 SF:0\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnec SF:tion:\x20close\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\ SF:x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></html>\n")%r( SF:RTSPRequest,D0,"HTTP/1\.1\x20403\x20Forbidden\r\ncontent-length:\x2093\ SF:r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnecti SF:on:\x20close\r\n\r\n<html><body><h1>403\x20Forbidden</h1>\nRequest\x20f SF:orbidden\x20by\x20administrative\x20rules\.\n</body></html>\n")%r(RPCCh SF:eck,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\ncontent-length:\x2090\r\n SF:cache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnection: SF:\x20close\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20br SF:owser\x20sent\x20an\x20invalid\x20request\.\n</body></html>\n")%r(DNSVe SF:rsionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\ncontent-lengt SF:h:\x2090\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\ SF:nconnection:\x20close\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1> SF:\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></html> SF:\n")%r(DNSStatusRequestTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nco SF:ntent-length:\x2090\r\ncache-control:\x20no-cache\r\ncontent-type:\x20t SF:ext/html\r\nconnection:\x20close\r\n\r\n<html><body><h1>400\x20Bad\x20r SF:equest</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</b SF:ody></html>\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 4.X OS CPE: cpe:/o:linux:linux_kernel:4.4 OS details: Linux 4.4 Network Distance: 21 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.72 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.75 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 12.63 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 20.92 ms be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218) 7 36.89 ms be3850.ccr41.iah01.atlas.cogentco.com (154.54.0.53) 8 38.05 ms be2417.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.3.246) 9 37.20 ms 38.88.155.218 10 59.59 ms 52.93.254.215 11 37.65 ms 52.93.64.93 12 ... 20 21 68.19 ms ec2-52-3-84-199.compute-1.amazonaws.com (52.3.84.199) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 42.91 seconds