Analyser le rapport pour "www.ebcflex.com"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

19

Durée

2min 57.74seconde (177.74seconde)

Date

2024-08-08

IP

209.87.159.227

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A www.ebcflex.com)
Nmap scan report for www.ebcflex.com (209.87.159.227)
Host is up (0.062s latency).
rDNS record for 209.87.159.227: cloudhost-531071.us-midwest-1.nxcli.net
Not shown: 974 filtered tcp ports (no-response), 7 filtered tcp ports (port-unreach)
PORT      STATE  SERVICE     VERSION
21/tcp    open   ftp         ProFTPD (requires SSL)
| tls-nextprotoneg: 
|_  ftp
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=nxcli.net
| Subject Alternative Name: DNS:nxcli.net, DNS:*.au-south-1.nxcli.net, DNS:*.mynexcess.site, DNS:*.nl-west-1.nxcli.net, DNS:*.nxcli.io, DNS:*.nxcli.net, DNS:*.uk-south-2.nxcli.net, DNS:*.us-midwest-1.nxcli.net, DNS:*.us-midwest-2.nxcli.net, DNS:*.us-south-1.nxcli.net, DNS:*.us-west-1.nxcli.net, DNS:*.us-west-2.nxcli.net
| Not valid before: 2024-07-12T00:00:00
|_Not valid after:  2025-08-12T23:59:59
| tls-alpn: 
|_  ftp
22/tcp    open   ssh         OpenSSH 7.4 (protocol 2.0)
25/tcp    open   smtp        qmail smtpd
| ssl-cert: Subject: commonName=nxcli.net
| Subject Alternative Name: DNS:nxcli.net, DNS:*.au-south-1.nxcli.net, DNS:*.mynexcess.site, DNS:*.nl-west-1.nxcli.net, DNS:*.nxcli.io, DNS:*.nxcli.net, DNS:*.uk-south-2.nxcli.net, DNS:*.us-midwest-1.nxcli.net, DNS:*.us-midwest-2.nxcli.net, DNS:*.us-south-1.nxcli.net, DNS:*.us-west-1.nxcli.net, DNS:*.us-west-2.nxcli.net
| Not valid before: 2024-07-12T00:00:00
|_Not valid after:  2025-08-12T23:59:59
|_ssl-date: TLS randomness does not represent time
| smtp-commands: cloudhost-531071.us-midwest-1.nxcli.net InterWorx-CP SMTP Server, STARTTLS, SIZE 50971520, PIPELINING, 8BITMIME
|_ qmail home page: http://pobox.com/~djb/qmail.html
80/tcp    open   http        nginx
|_http-title: 400 Bad Request
443/tcp   open   ssl/http    nginx
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=a076820c10.nxcli.net
| Subject Alternative Name: DNS:a076820c10.nxcli.net, DNS:ebcflex.com, DNS:www.ebcflex.com
| Not valid before: 2024-07-06T06:28:12
|_Not valid after:  2024-10-04T06:28:11
|_http-title: 400 Bad Request
587/tcp   open   submission?
| ssl-cert: Subject: commonName=a076820c10.nxcli.net
| Subject Alternative Name: DNS:a076820c10.nxcli.net, DNS:ebcflex.com, DNS:www.ebcflex.com
| Not valid before: 2024-07-06T06:28:12
|_Not valid after:  2024-10-04T06:28:11
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck: 
|     220 cloudhost-531071.us-midwest-1.nxcli.net Dovecot ready.
|     5.5.2 Invalid command syntax
|   GenericLines, GetRequest, HTTPOptions, RTSPRequest: 
|     220 cloudhost-531071.us-midwest-1.nxcli.net Dovecot ready.
|     5.5.1 Unknown command
|     5.5.1 Unknown command
|   Hello: 
|     220 cloudhost-531071.us-midwest-1.nxcli.net Dovecot ready.
|     Missing hostname
|   Help: 
|     220 cloudhost-531071.us-midwest-1.nxcli.net Dovecot ready.
|     5.5.1 Unknown command
|   NULL: 
|     220 cloudhost-531071.us-midwest-1.nxcli.net Dovecot ready.
|   SSLSessionReq, TLSSessionReq, TerminalServerCookie: 
|     220 cloudhost-531071.us-midwest-1.nxcli.net Dovecot ready.
|     5.5.2 Invalid command syntax
|_    5.5.2 Invalid command syntax
|_smtp-commands: cloudhost-531071.us-midwest-1.nxcli.net, 8BITMIME, BURL imap, CHUNKING, ENHANCEDSTATUSCODES, SIZE, STARTTLS, PIPELINING
990/tcp   open   ftp         ProFTPD (requires SSL)
| tls-nextprotoneg: 
|_  ftp
| ssl-cert: Subject: commonName=nxcli.net
| Subject Alternative Name: DNS:nxcli.net, DNS:*.au-south-1.nxcli.net, DNS:*.mynexcess.site, DNS:*.nl-west-1.nxcli.net, DNS:*.nxcli.io, DNS:*.nxcli.net, DNS:*.uk-south-2.nxcli.net, DNS:*.us-midwest-1.nxcli.net, DNS:*.us-midwest-2.nxcli.net, DNS:*.us-south-1.nxcli.net, DNS:*.us-west-1.nxcli.net, DNS:*.us-west-2.nxcli.net
| Not valid before: 2024-07-12T00:00:00
|_Not valid after:  2025-08-12T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  ftp
993/tcp   open   imaps?
| ssl-cert: Subject: commonName=a076820c10.nxcli.net
| Subject Alternative Name: DNS:a076820c10.nxcli.net, DNS:ebcflex.com, DNS:www.ebcflex.com
| Not valid before: 2024-07-06T06:28:12
|_Not valid after:  2024-10-04T06:28:11
|_imap-capabilities: AUTH=PLAIN post-login ENABLE Pre-login more ID have IMAP4rev1 listed LOGIN-REFERRALS IDLE LITERAL+ SASL-IR capabilities AUTH=LOGINA0001 OK
995/tcp   open   pop3s?
| ssl-cert: Subject: commonName=a076820c10.nxcli.net
| Subject Alternative Name: DNS:a076820c10.nxcli.net, DNS:ebcflex.com, DNS:www.ebcflex.com
| Not valid before: 2024-07-06T06:28:12
|_Not valid after:  2024-10-04T06:28:11
|_pop3-capabilities: UIDL USER SASL(PLAIN LOGIN) AUTH-RESP-CODE PIPELINING TOP CAPA RESP-CODES
50000/tcp closed ibm-db2
50001/tcp closed unknown
50002/tcp closed iiimsf
50003/tcp closed unknown
50006/tcp closed unknown
50300/tcp closed unknown
50389/tcp closed unknown
50500/tcp closed unknown
50636/tcp closed unknown
50800/tcp closed unknown
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port587-TCP:V=7.92%I=7%D=8/8%Time=66B58C20%P=x86_64-redhat-linux-gnu%r(
SF:NULL,3C,"220\x20cloudhost-531071\.us-midwest-1\.nxcli\.net\x20Dovecot\x
SF:20ready\.\r\n")%r(GenericLines,72,"220\x20cloudhost-531071\.us-midwest-
SF:1\.nxcli\.net\x20Dovecot\x20ready\.\r\n500\x205\.5\.1\x20Unknown\x20com
SF:mand\r\n500\x205\.5\.1\x20Unknown\x20command\r\n")%r(Hello,52,"220\x20c
SF:loudhost-531071\.us-midwest-1\.nxcli\.net\x20Dovecot\x20ready\.\r\n501\
SF:x20Missing\x20hostname\r\n")%r(Help,57,"220\x20cloudhost-531071\.us-mid
SF:west-1\.nxcli\.net\x20Dovecot\x20ready\.\r\n500\x205\.5\.1\x20Unknown\x
SF:20command\r\n")%r(GetRequest,72,"220\x20cloudhost-531071\.us-midwest-1\
SF:.nxcli\.net\x20Dovecot\x20ready\.\r\n500\x205\.5\.1\x20Unknown\x20comma
SF:nd\r\n500\x205\.5\.1\x20Unknown\x20command\r\n")%r(HTTPOptions,72,"220\
SF:x20cloudhost-531071\.us-midwest-1\.nxcli\.net\x20Dovecot\x20ready\.\r\n
SF:500\x205\.5\.1\x20Unknown\x20command\r\n500\x205\.5\.1\x20Unknown\x20co
SF:mmand\r\n")%r(RTSPRequest,72,"220\x20cloudhost-531071\.us-midwest-1\.nx
SF:cli\.net\x20Dovecot\x20ready\.\r\n500\x205\.5\.1\x20Unknown\x20command\
SF:r\n500\x205\.5\.1\x20Unknown\x20command\r\n")%r(RPCCheck,5E,"220\x20clo
SF:udhost-531071\.us-midwest-1\.nxcli\.net\x20Dovecot\x20ready\.\r\n500\x2
SF:05\.5\.2\x20Invalid\x20command\x20syntax\r\n")%r(DNSVersionBindReqTCP,5
SF:E,"220\x20cloudhost-531071\.us-midwest-1\.nxcli\.net\x20Dovecot\x20read
SF:y\.\r\n500\x205\.5\.2\x20Invalid\x20command\x20syntax\r\n")%r(DNSStatus
SF:RequestTCP,5E,"220\x20cloudhost-531071\.us-midwest-1\.nxcli\.net\x20Dov
SF:ecot\x20ready\.\r\n500\x205\.5\.2\x20Invalid\x20command\x20syntax\r\n")
SF:%r(SSLSessionReq,80,"220\x20cloudhost-531071\.us-midwest-1\.nxcli\.net\
SF:x20Dovecot\x20ready\.\r\n500\x205\.5\.2\x20Invalid\x20command\x20syntax
SF:\r\n500\x205\.5\.2\x20Invalid\x20command\x20syntax\r\n")%r(TerminalServ
SF:erCookie,80,"220\x20cloudhost-531071\.us-midwest-1\.nxcli\.net\x20Dovec
SF:ot\x20ready\.\r\n500\x205\.5\.2\x20Invalid\x20command\x20syntax\r\n500\
SF:x205\.5\.2\x20Invalid\x20command\x20syntax\r\n")%r(TLSSessionReq,80,"22
SF:0\x20cloudhost-531071\.us-midwest-1\.nxcli\.net\x20Dovecot\x20ready\.\r
SF:\n500\x205\.5\.2\x20Invalid\x20command\x20syntax\r\n500\x205\.5\.2\x20I
SF:nvalid\x20command\x20syntax\r\n");
Aggressive OS guesses: OpenWrt Kamikaze 7.09 (Linux 2.6.22) (92%), Asus RT-AC66U router (Linux 2.6) (92%), Asus RT-N16 WAP (Linux 2.6) (92%), Asus RT-N66U WAP (Linux 2.6) (92%), Tomato 1.28 (Linux 2.6.22) (92%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (91%), OpenWrt White Russian 0.9 (Linux 2.4.30) (91%), Linux 2.6.18 (90%), Linux 2.4.18 (88%), Cisco UC320 PBX (Linux 2.6) (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops
Service Info: OS: Unix

TRACEROUTE (using port 50389/tcp)
HOP RTT       ADDRESS
1   0.24 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   196.89 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.53 ms   r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   ...
5   12.24 ms  be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   21.31 ms  be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7   34.48 ms  be2427.ccr21.den01.atlas.cogentco.com (154.54.87.22)
8   44.68 ms  be3802.ccr31.oma02.atlas.cogentco.com (154.54.165.78)
9   52.45 ms  be5214.ccr41.ord01.atlas.cogentco.com (154.54.165.134)
10  52.63 ms  be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18)
11  52.83 ms  cogent-lw-chi-border1-hu0-1-0-0.liquidweb.com (38.32.98.66)
12  61.87 ms  lw-chi-border1.rtr.liquidweb.com (69.167.128.212)
13  61.82 ms  xledge1mel.core-2.mel.dtw.nexcess.net (192.240.191.167)
14  ... 16
17  61.99 ms  cloudhost-531071.us-midwest-1.nxcli.net (209.87.159.227)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 177.74 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
209.87.159.227
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 19 identifiés
Exécuter la commande
nmap -A www.ebcflex.com
Scan date
08 Aug 2024 23:28
Durée de l'analyse
2min 57.74seconde (177.74seconde)
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: