Analyser le rapport pour "vgxge.icu"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

4

Durée

54.05seconde

Date

2024-09-19

IP

206.54.181.250

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A vgxge.icu)
Nmap scan report for vgxge.icu (206.54.181.250)
Host is up (0.14s latency).
rDNS record for 206.54.181.250: 1c2-14-d8685-250.webazilla.com
Not shown: 996 closed tcp ports (reset)
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 8.0 (protocol 2.0)
| ssh-hostkey: 
|   3072 a8:a3:75:3b:04:94:1c:1f:da:ce:8a:37:ff:1d:29:74 (RSA)
|   256 e7:dc:61:a5:5c:b8:91:8a:1d:ad:81:a2:05:68:78:c0 (ECDSA)
|_  256 ed:34:21:6c:1d:51:e3:bb:25:be:2e:58:ce:3f:3e:d1 (ED25519)
80/tcp   open  http
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LPDString, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Connection: close
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     cache-control: no-cache, no-store, must-revalidate
|     pragma: no-cache
|     expires: 0
|     date: Fri, 20 Sep 2024 02:46:53 GMT
|     connection: close
|     transfer-encoding: chunked
|     route: /nice%20ports%2C/Tri%6Eity.txt%2ebak
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     cache-control: no-cache, no-store, must-revalidate
|     pragma: no-cache
|     expires: 0
|     date: Fri, 20 Sep 2024 02:46:52 GMT
|     connection: close
|     transfer-encoding: chunked
|_    route: /
|_http-title: Site doesn't have a title.
443/tcp  open  ssl/https
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe, tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Connection: close
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     cache-control: no-cache, no-store, must-revalidate
|     pragma: no-cache
|     expires: 0
|     date: Fri, 20 Sep 2024 02:47:01 GMT
|     connection: close
|     transfer-encoding: chunked
|     route: /nice%20ports%2C/Tri%6Eity.txt%2ebak
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     cache-control: no-cache, no-store, must-revalidate
|     pragma: no-cache
|     expires: 0
|     date: Fri, 20 Sep 2024 02:46:59 GMT
|     connection: close
|     transfer-encoding: chunked
|_    route: /
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=*.vgxge.icu
| Subject Alternative Name: DNS:*.vgxge.icu, DNS:vgxge.icu
| Not valid before: 2024-08-29T09:43:48
|_Not valid after:  2024-11-27T09:43:47
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
5666/tcp open  tcpwrapped
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=9/19%Time=66ECE21C%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,D5,"HTTP/1\.1\x20404\x20Not\x20Found\r\ncache-control:\x20no
SF:-cache,\x20no-store,\x20must-revalidate\r\npragma:\x20no-cache\r\nexpir
SF:es:\x200\r\ndate:\x20Fri,\x2020\x20Sep\x202024\x2002:46:52\x20GMT\r\nco
SF:nnection:\x20close\r\ntransfer-encoding:\x20chunked\r\n\r\nb\r\nNo\x20r
SF:oute:\x20/\r\n0\r\n\r\n")%r(HTTPOptions,D5,"HTTP/1\.1\x20404\x20Not\x20
SF:Found\r\ncache-control:\x20no-cache,\x20no-store,\x20must-revalidate\r\
SF:npragma:\x20no-cache\r\nexpires:\x200\r\ndate:\x20Fri,\x2020\x20Sep\x20
SF:2024\x2002:46:52\x20GMT\r\nconnection:\x20close\r\ntransfer-encoding:\x
SF:20chunked\r\n\r\nb\r\nNo\x20route:\x20/\r\n0\r\n\r\n")%r(RTSPRequest,2F
SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%
SF:r(X11Probe,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20clo
SF:se\r\n\r\n")%r(FourOhFourRequest,F9,"HTTP/1\.1\x20404\x20Not\x20Found\r
SF:\ncache-control:\x20no-cache,\x20no-store,\x20must-revalidate\r\npragma
SF::\x20no-cache\r\nexpires:\x200\r\ndate:\x20Fri,\x2020\x20Sep\x202024\x2
SF:002:46:53\x20GMT\r\nconnection:\x20close\r\ntransfer-encoding:\x20chunk
SF:ed\r\n\r\n2e\r\nNo\x20route:\x20/nice%20ports%2C/Tri%6Eity\.txt%2ebak\r
SF:\n0\r\n\r\n")%r(RPCCheck,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConn
SF:ection:\x20close\r\n\r\n")%r(DNSVersionBindReqTCP,2F,"HTTP/1\.1\x20400\
SF:x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(DNSStatusRequestT
SF:CP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r
SF:\n")%r(Help,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20cl
SF:ose\r\n\r\n")%r(SSLSessionReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
SF:nConnection:\x20close\r\n\r\n")%r(TerminalServerCookie,2F,"HTTP/1\.1\x2
SF:0400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(TLSSessionRe
SF:q,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\
SF:n")%r(Kerberos,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x2
SF:0close\r\n\r\n")%r(SMBProgNeg,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
SF:nConnection:\x20close\r\n\r\n")%r(LPDString,2F,"HTTP/1\.1\x20400\x20Bad
SF:\x20Request\r\nConnection:\x20close\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/19%Time=66ECE222%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,D5,"HTTP/1\.1\x20404\x20Not\x20Found\r\ncache-control
SF::\x20no-cache,\x20no-store,\x20must-revalidate\r\npragma:\x20no-cache\r
SF:\nexpires:\x200\r\ndate:\x20Fri,\x2020\x20Sep\x202024\x2002:46:59\x20GM
SF:T\r\nconnection:\x20close\r\ntransfer-encoding:\x20chunked\r\n\r\nb\r\n
SF:No\x20route:\x20/\r\n0\r\n\r\n")%r(HTTPOptions,D5,"HTTP/1\.1\x20404\x20
SF:Not\x20Found\r\ncache-control:\x20no-cache,\x20no-store,\x20must-revali
SF:date\r\npragma:\x20no-cache\r\nexpires:\x200\r\ndate:\x20Fri,\x2020\x20
SF:Sep\x202024\x2002:46:59\x20GMT\r\nconnection:\x20close\r\ntransfer-enco
SF:ding:\x20chunked\r\n\r\nb\r\nNo\x20route:\x20/\r\n0\r\n\r\n")%r(FourOhF
SF:ourRequest,F9,"HTTP/1\.1\x20404\x20Not\x20Found\r\ncache-control:\x20no
SF:-cache,\x20no-store,\x20must-revalidate\r\npragma:\x20no-cache\r\nexpir
SF:es:\x200\r\ndate:\x20Fri,\x2020\x20Sep\x202024\x2002:47:01\x20GMT\r\nco
SF:nnection:\x20close\r\ntransfer-encoding:\x20chunked\r\n\r\n2e\r\nNo\x20
SF:route:\x20/nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\n0\r\n\r\n")%r(tor-ve
SF:rsions,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r
SF:\n\r\n")%r(RTSPRequest,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnec
SF:tion:\x20close\r\n\r\n")%r(RPCCheck,2F,"HTTP/1\.1\x20400\x20Bad\x20Requ
SF:est\r\nConnection:\x20close\r\n\r\n")%r(DNSVersionBindReqTCP,2F,"HTTP/1
SF:\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(DNSSta
SF:tusRequestTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20
SF:close\r\n\r\n")%r(Help,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnec
SF:tion:\x20close\r\n\r\n")%r(SSLSessionReq,2F,"HTTP/1\.1\x20400\x20Bad\x2
SF:0Request\r\nConnection:\x20close\r\n\r\n")%r(TerminalServerCookie,2F,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(T
SF:LSSessionReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20c
SF:lose\r\n\r\n")%r(Kerberos,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCon
SF:nection:\x20close\r\n\r\n")%r(SMBProgNeg,2F,"HTTP/1\.1\x20400\x20Bad\x2
SF:0Request\r\nConnection:\x20close\r\n\r\n")%r(X11Probe,2F,"HTTP/1\.1\x20
SF:400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n");
Aggressive OS guesses: Linux 2.6.32 (96%), Linux 3.2 - 4.9 (96%), Linux 2.6.32 - 3.10 (96%), Oracle VM Server 3.4.2 (Linux 4.1) (95%), Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), Linux 2.6.32 - 2.6.35 (94%), Linux 2.6.32 - 3.5 (94%), Linux 2.6.32 - 3.13 (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops

TRACEROUTE (using port 587/tcp)
HOP RTT       ADDRESS
1   3.08 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.60 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.65 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.48 ms   ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5   1.15 ms   ae-16.r25.lsanca07.us.bb.gin.ntt.net (129.250.3.80)
6   67.92 ms  ae-5.r25.asbnva02.us.bb.gin.ntt.net (129.250.3.188)
7   ...
8   134.51 ms ae-0.r22.londen12.uk.bb.gin.ntt.net (129.250.5.209)
9   145.54 ms ae-3.r22.amstnl07.nl.bb.gin.ntt.net (129.250.5.2)
10  134.85 ms ae-2.a01.amstnl07.nl.bb.gin.ntt.net (129.250.2.93)
11  144.47 ms ae-12-427.a01.amstnl07.nl.ce.gin.ntt.net (128.241.7.249)
12  139.69 ms 1c2-14-d8685-250.webazilla.com (206.54.181.250)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 54.05 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
206.54.181.250
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 4 identifiés
Exécuter la commande
nmap -A vgxge.icu
Scan date
19 Sep 2024 22:47
Durée de l'analyse
54.05seconde
Télécharger le rapport
Remove scan result
$
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: