Analyser le rapport pour "static.attackiq.com"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A static.attackiq.com)
Nmap scan report for static.attackiq.com (13.226.228.108)
Host is up (0.00050s latency).
Other addresses for static.attackiq.com (not scanned): 2600:9000:2201:3c00:3:db6b:4ec0:93a1 2600:9000:2201:8000:3:db6b:4ec0:93a1 2600:9000:2201:5200:3:db6b:4ec0:93a1 2600:9000:2201:e800:3:db6b:4ec0:93a1 2600:9000:2201:6800:3:db6b:4ec0:93a1 2600:9000:2201:ae00:3:db6b:4ec0:93a1 2600:9000:2201:6400:3:db6b:4ec0:93a1 2600:9000:2201:fa00:3:db6b:4ec0:93a1 13.226.228.87 13.226.228.61 13.226.228.80
rDNS record for 13.226.228.108: server-13-226-228-108.lax50.r.cloudfront.net
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE  VERSION
80/tcp  open  http     Amazon CloudFront httpd
|_http-server-header: CloudFront
|_http-title: Site doesn't have a title (text/xml).
443/tcp open  ssl/http Amazon CloudFront httpd
|_http-server-header: CloudFront
|_http-title: Site doesn't have a title (text/xml).
| ssl-cert: Subject: commonName=*.attackiq.com
| Subject Alternative Name: DNS:*.attackiq.com
| Not valid before: 2023-07-21T00:00:00
|_Not valid after:  2024-08-19T23:59:59
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): FreeBSD 11.X (88%)
OS CPE: cpe:/o:freebsd:freebsd:11.0
Aggressive OS guesses: FreeBSD 11.0-RELEASE (88%), FreeBSD 11.0-STABLE (88%), FreeBSD 11.1-RELEASE (88%), FreeBSD 11.1-STABLE (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 20 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   0.20 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.54 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.89 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.94 ms  206.72.211.146.any2ix.coresite.com (206.72.211.146)
5   ... 6
7   0.81 ms  52.93.131.127
8   ... 12
13  15.51 ms 15.230.186.105
14  1.02 ms  150.222.232.39
15  ... 19
20  0.50 ms  server-13-226-228-108.lax50.r.cloudfront.net (13.226.228.108)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 30.78 seconds
Schéma de couleur
Cible
static.attackiq.com
IP cible
13.226.228.108
Pays cible
US
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A static.attackiq.com
Scan date
10 Jun 2024 11:57
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: