Analyser le rapport pour "buypgwautoglass.com"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

5

Durée

49.47seconde

Date

2024-12-26

IP

52.185.108.215

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A buypgwautoglass.com)
Nmap scan report for buypgwautoglass.com (52.185.108.215)
Host is up (0.038s latency).
Not shown: 995 filtered tcp ports (no-response)
PORT     STATE  SERVICE       VERSION
80/tcp   open   http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 302 Move
|     Content-Type: text/html
|     Cache-Control: no-cache
|     Location: https://172.16.9.14/nice%20ports%2C/Trinity.txt.bak
|     Content-Length: 0
|   GetRequest, HTTPOptions: 
|     HTTP/1.0 302 Move
|     Content-Type: text/html
|     Cache-Control: no-cache
|     Location: https://172.16.9.14/
|_    Content-Length: 0
|_http-title: Did not follow redirect to https://buypgwautoglass.com/
113/tcp  closed ident
179/tcp  open   tcpwrapped
443/tcp  open   ssl/http      Microsoft IIS httpd 10.0
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-title: PGW Auto Glass
| ssl-cert: Subject: commonName=*.buypgwautoglass.com
| Subject Alternative Name: DNS:*.buypgwautoglass.com, DNS:buypgwautoglass.com
| Not valid before: 2024-03-07T19:19:01
|_Not valid after:  2025-04-08T19:19:01
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   http/1.1
|_  h2
|_http-server-header: Microsoft-IIS/10.0
8443/tcp open   ssl/https-alt
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 400 Bad Request
|     Date: Thu, 26 Dec 2024 06:37:00 GMT
|     Connection: close
|     Content-Type: text/html; charset=utf-8
|     X-Frame-Options: SAMEORIGIN
|     Content-Security-Policy: frame-ancestors 'self'; object-src 'self'; script-src 'self' https: 'unsafe-eval' 'unsafe-inline' blob:;
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     Strict-Transport-Security: max-age=31536000
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <HTML><HEAD>
|     <TITLE>400 Bad Request</TITLE>
|     </HEAD><BODY>
|     <H1>Bad Request</H1>
|     Your browser sent a request that this server could not understand.<P>
|     </BODY></HTML>
|   GetRequest: 
|     HTTP/1.0 400 Bad Request
|     Date: Thu, 26 Dec 2024 06:36:59 GMT
|     Connection: close
|     Content-Type: text/html; charset=utf-8
|     X-Frame-Options: SAMEORIGIN
|     Content-Security-Policy: frame-ancestors 'self'; object-src 'self'; script-src 'self' https: 'unsafe-eval' 'unsafe-inline' blob:;
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     Strict-Transport-Security: max-age=31536000
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <HTML><HEAD>
|     <TITLE>400 Bad Request</TITLE>
|     </HEAD><BODY>
|     <H1>Bad Request</H1>
|     Your browser sent a request that this server could not understand.<P>
|     </BODY></HTML>
|   HTTPOptions: 
|     HTTP/1.0 405 Method Not Allowed
|     Date: Thu, 26 Dec 2024 06:36:59 GMT
|     Allow: 
|     Connection: close
|     Content-Type: text/html; charset=utf-8
|     X-Frame-Options: SAMEORIGIN
|     Content-Security-Policy: frame-ancestors 'self'; object-src 'self'; script-src 'self' https: 'unsafe-eval' 'unsafe-inline' blob:;
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     Strict-Transport-Security: max-age=31536000
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <HTML><HEAD>
|     <TITLE>405 Method Not Allowed</TITLE>
|     </HEAD><BODY>
|     <H1>Method Not Allowed</H1>
|     requested method OPTIONS is not allowed for the URL /.<P>
|_    </BODY></HTML>
| ssl-cert: Subject: commonName=FGVMSLTM22004678/organizationName=Fortinet/stateOrProvinceName=California/countryName=US
| Not valid before: 2022-11-10T22:56:03
|_Not valid after:  2056-01-19T03:14:07
|_http-title: Site doesn't have a title (text/html).
| http-methods: 
|_  Potentially risky methods: 
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=12/25%Time=676CF984%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,7A,"HTTP/1\.0\x20302\x20Move\r\nContent-Type:\x20text/html\
SF:r\nCache-Control:\x20no-cache\r\nLocation:\x20https://172\.16\.9\.14/\r
SF:\nContent-Length:\x200\r\n\r\n")%r(HTTPOptions,7A,"HTTP/1\.0\x20302\x20
SF:Move\r\nContent-Type:\x20text/html\r\nCache-Control:\x20no-cache\r\nLoc
SF:ation:\x20https://172\.16\.9\.14/\r\nContent-Length:\x200\r\n\r\n")%r(F
SF:ourOhFourRequest,99,"HTTP/1\.0\x20302\x20Move\r\nContent-Type:\x20text/
SF:html\r\nCache-Control:\x20no-cache\r\nLocation:\x20https://172\.16\.9\.
SF:14/nice%20ports%2C/Trinity\.txt\.bak\r\nContent-Length:\x200\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8443-TCP:V=7.92%T=SSL%I=7%D=12/25%Time=676CF98A%P=x86_64-redhat-lin
SF:ux-gnu%r(GetRequest,263,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nDate:\x2
SF:0Thu,\x2026\x20Dec\x202024\x2006:36:59\x20GMT\r\nConnection:\x20close\r
SF:\nContent-Type:\x20text/html;\x20charset=utf-8\r\nX-Frame-Options:\x20S
SF:AMEORIGIN\r\nContent-Security-Policy:\x20frame-ancestors\x20'self';\x20
SF:object-src\x20'self';\x20script-src\x20'self'\x20https:\x20\x20'unsafe-
SF:eval'\x20'unsafe-inline'\x20blob:;\r\nX-XSS-Protection:\x201;\x20mode=b
SF:lock\r\nX-Content-Type-Options:\x20nosniff\r\nStrict-Transport-Security
SF::\x20max-age=31536000\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//
SF:DTD\x20HTML\x202\.0//EN\">\n<HTML><HEAD>\n<TITLE>400\x20Bad\x20Request<
SF:/TITLE>\n</HEAD><BODY>\n<H1>Bad\x20Request</H1>\nYour\x20browser\x20sen
SF:t\x20a\x20request\x20that\x20this\x20server\x20could\x20not\x20understa
SF:nd\.<P>\n</BODY></HTML>\n")%r(HTTPOptions,279,"HTTP/1\.0\x20405\x20Meth
SF:od\x20Not\x20Allowed\r\nDate:\x20Thu,\x2026\x20Dec\x202024\x2006:36:59\
SF:x20GMT\r\nAllow:\x20\r\nConnection:\x20close\r\nContent-Type:\x20text/h
SF:tml;\x20charset=utf-8\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Secu
SF:rity-Policy:\x20frame-ancestors\x20'self';\x20object-src\x20'self';\x20
SF:script-src\x20'self'\x20https:\x20\x20'unsafe-eval'\x20'unsafe-inline'\
SF:x20blob:;\r\nX-XSS-Protection:\x201;\x20mode=block\r\nX-Content-Type-Op
SF:tions:\x20nosniff\r\nStrict-Transport-Security:\x20max-age=31536000\r\n
SF:\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\"
SF:>\n<HTML><HEAD>\n<TITLE>405\x20Method\x20Not\x20Allowed</TITLE>\n</HEAD
SF:><BODY>\n<H1>Method\x20Not\x20Allowed</H1>\nThe\x20requested\x20method\
SF:x20OPTIONS\x20is\x20not\x20allowed\x20for\x20the\x20URL\x20/\.<P>\n</BO
SF:DY></HTML>\n")%r(FourOhFourRequest,263,"HTTP/1\.0\x20400\x20Bad\x20Requ
SF:est\r\nDate:\x20Thu,\x2026\x20Dec\x202024\x2006:37:00\x20GMT\r\nConnect
SF:ion:\x20close\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nX-Fram
SF:e-Options:\x20SAMEORIGIN\r\nContent-Security-Policy:\x20frame-ancestors
SF:\x20'self';\x20object-src\x20'self';\x20script-src\x20'self'\x20https:\
SF:x20\x20'unsafe-eval'\x20'unsafe-inline'\x20blob:;\r\nX-XSS-Protection:\
SF:x201;\x20mode=block\r\nX-Content-Type-Options:\x20nosniff\r\nStrict-Tra
SF:nsport-Security:\x20max-age=31536000\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC
SF:\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\n<HTML><HEAD>\n<TITLE>400\x20
SF:Bad\x20Request</TITLE>\n</HEAD><BODY>\n<H1>Bad\x20Request</H1>\nYour\x2
SF:0browser\x20sent\x20a\x20request\x20that\x20this\x20server\x20could\x20
SF:not\x20understand\.<P>\n</BODY></HTML>\n");
Device type: general purpose|storage-misc|firewall
Running (JUST GUESSING): Linux 4.X|3.X|2.6.X (92%), Synology DiskStation Manager 5.X (86%), FreeBSD 6.X (85%), WatchGuard Fireware 11.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:4.0 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:freebsd:freebsd:6.2 cpe:/o:watchguard:fireware:11.8
Aggressive OS guesses: Linux 4.0 (92%), Linux 3.10 - 3.12 (92%), Linux 4.4 (92%), Linux 3.10 - 3.16 (91%), Linux 3.10 (90%), Linux 4.9 (89%), Linux 3.11 - 4.1 (87%), Linux 2.6.32 (87%), Linux 3.4 (86%), Linux 3.5 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 22 hops
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

TRACEROUTE (using port 113/tcp)
HOP RTT      ADDRESS
1   0.20 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.63 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.61 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.54 ms  microsoft.as8075.any2ix.coresite.com (206.72.210.143)
5   1.05 ms  ae27-0.ear03.lax31.ntwk.msn.net (104.44.49.168)
6   37.12 ms be-22-0.ibr01.lax31.ntwk.msn.net (104.44.33.177)
7   37.50 ms be-9-0.ibr03.cys04.ntwk.msn.net (104.44.16.227)
8   37.05 ms be-8-0.ibr04.dsm05.ntwk.msn.net (104.44.28.254)
9   38.01 ms 51.10.16.145
10  39.62 ms 104.44.54.254
11  ... 21
22  36.88 ms 52.185.108.215

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 49.47 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
52.185.108.215
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 5 identifiés
Exécuter la commande
nmap -A buypgwautoglass.com
Scan date
26 Dec 2024 01:37
API - Scan ID
Durée de l'analyse
49.47seconde
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: