Analyser le rapport pour "pingan.com"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A pingan.com)
Nmap scan report for pingan.com (27.36.113.150)
Host is up (0.20s latency).
Not shown: 998 filtered ports
PORT    STATE SERVICE    VERSION
80/tcp  open  http       loading
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 404 NOT FOUND
|     Content-Type: text/html; charset=UTF-8
|     Cache-Control: no-cache
|     Pragma: no-cache
|     Expires: 0
|     Connection: close
|     <!DOCTYPE html>
|     <html>
|     <head>
|     <meta charset='UTF-8'>
|     <meta name="viewport" content="width=device-width,initial-scale=1.0,maximum-scale=1.0,user-scalable=0">
|     <meta http-equiv="X-UA-Compatible" content="ie=edge">
|     <title>
|     </title>
|     <style>
|     html,body,button,div,a{
|     padding:0;margin:0;
|     -moz-appearance:none;
|     -ms-progress-appearance:none;
|     -webkit-appearance:none;
|     appearance:none;
|     -webkit-tap-highlight-color:transparent;
|     #box{
|     margin-top:100px;
|     text-align:center
|     .img-404{
|     width:600px
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 301 Moved Permanently
|     Server: loading
|     Date: Sun, 19 Nov 2023 08:21:57 GMT
|     Content-Type: text/html
|     Content-Length: 164
|     Connection: close
|     Location: https://www.pingan.com/
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     <hr><center>loading</center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>loading</center>
|     </body>
|_    </html>
|_http-server-header: loading
|_http-title: Did not follow redirect to https://www.pingan.com/
443/tcp open  ssl/https?
|_ssl-date: TLS randomness does not represent time
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=6559C5A5%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,160,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x2
SF:0loading\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2008:21:57\x20GMT\r\nCo
SF:ntent-Type:\x20text/html\r\nContent-Length:\x20164\r\nConnection:\x20cl
SF:ose\r\nLocation:\x20https://www\.pingan\.com/\r\n\r\n<html>\r\n<head><t
SF:itle>301\x20Moved\x20Permanently</title></head>\r\n<body>\r\n<center><h
SF:1>301\x20Moved\x20Permanently</h1></center>\r\n<hr><center>loading</cen
SF:ter>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,160,"HTTP/1\.1\x20301\x2
SF:0Moved\x20Permanently\r\nServer:\x20loading\r\nDate:\x20Sun,\x2019\x20N
SF:ov\x202023\x2008:21:57\x20GMT\r\nContent-Type:\x20text/html\r\nContent-
SF:Length:\x20164\r\nConnection:\x20close\r\nLocation:\x20https://www\.pin
SF:gan\.com/\r\n\r\n<html>\r\n<head><title>301\x20Moved\x20Permanently</ti
SF:tle></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20Permanently</h1></
SF:center>\r\n<hr><center>loading</center>\r\n</body>\r\n</html>\r\n")%r(R
SF:TSPRequest,98,"<html>\r\n<head><title>400\x20Bad\x20Request</title></he
SF:ad>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr
SF:><center>loading</center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourReque
SF:st,D27,"HTTP/1\.0\x20404\x20NOT\x20FOUND\r\nContent-Type:\x20text/html;
SF:\x20charset=UTF-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\
SF:r\nExpires:\x200\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20html>\n<ht
SF:ml>\n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20c
SF:harset='UTF-8'>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20name=\"viewpo
SF:rt\"\x20content=\"width=device-width,initial-scale=1\.0,maximum-scale=1
SF:\.0,user-scalable=0\">\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20http-e
SF:quiv=\"X-UA-Compatible\"\x20content=\"ie=edge\">\n\x20\x20\x20\x20\x20\
SF:x20\x20\x20<title>\xe9\xa1\xb5\xe9\x9d\xa2\xe6\x9c\xaa\xe6\x89\xbe\xe5\
SF:x88\xb0</title>\n\x20\x20\x20\x20\x20\x20\x20\x20<style>\n\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20html,body,button,div,a{\n\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20padding:0;margin:0;\n\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20-moz-app
SF:earance:none;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20
SF:\x20\x20-ms-progress-appearance:none;\n\x20\x20\x20\x20\x20\x20\x20\x20
SF:\x20\x20\x20\x20\x20\x20\x20\x20-webkit-appearance:none;\n\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20appearance:none;\n\x
SF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20-webkit-t
SF:ap-highlight-color:transparent;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20\x20\x20}\x20\x20\x20\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20#box{\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20margin-top:100px;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20\x20\x20\x20text-align:center\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20\x20\x20}\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\.img-404{
SF:\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20width
SF::600px\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20}");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: load balancer|firewall
Running (JUST GUESSING): F5 Networks TMOS 11.6.X|11.4.X (98%)
OS CPE: cpe:/o:f5:tmos:11.6 cpe:/o:f5:tmos:11.4
Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (98%), F5 BIG-IP AFM firewall (93%), F5 BIG-IP load balancer (TMOS 11.4) (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 21 hops

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   0.19 ms   208.76.251.177
2   0.52 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.82 ms   multacom.com (96.45.162.9)
4   0.30 ms   182.54.129.90
5   11.71 ms  10.31.0.238
6   157.48 ms 219.158.33.77
7   178.71 ms 219.158.96.41
8   182.49 ms 219.158.16.77
9   ... 10
11  191.85 ms 112.91.0.210
12  211.58 ms 120.83.180.2
13  ... 15
16  202.51 ms 27.36.224.198
17  ... 20
21  195.04 ms 27.36.113.150

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 234.81 seconds
Schéma de couleur
Cible
pingan.com
IP cible
27.36.113.150
Pays cible
CN
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A pingan.com
Scan date
19 Nov 2023 03:25
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Total scans
About 4 times
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: