Analyser le rapport pour "az-tuhsd-psv.edupoint.com"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

2

Durée

2min 56.97seconde (176.97seconde)

Date

2023-12-01

IP

54.218.208.114

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A az-tuhsd-psv.edupoint.com)
Nmap scan report for az-tuhsd-psv.edupoint.com (54.218.208.114)
Host is up (0.026s latency).
rDNS record for 54.218.208.114: ec2-54-218-208-114.us-west-2.compute.amazonaws.com
Not shown: 998 filtered ports
PORT    STATE SERVICE  VERSION
80/tcp  open  http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 302 Found 
|     Connection: close
|     Content-Type: text/html
|     X-Frame-Options: SAMEORIGIN
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     Location: https://10.100.197.173/nice%20ports%2C/Tri%6Eity.txt%2ebak
|     Content-Length: 169
|     <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
|     <HTML><HEAD>
|     <TITLE>302 Found </TITLE>
|     </HEAD><BODY>
|     <H1>The Document has moved</H1></BODY></HTML>
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 302 Found 
|     Connection: close
|     Content-Type: text/html
|     X-Frame-Options: SAMEORIGIN
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     Location: https://10.100.197.173/
|     Content-Length: 169
|     <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
|     <HTML><HEAD>
|     <TITLE>302 Found </TITLE>
|     </HEAD><BODY>
|     <H1>The Document has moved</H1></BODY></HTML>
|   RTSPRequest: 
|     HTTP/1.1 400 Invalid Request
|     Date: Fri, 01 Dec 2023 20:06:31 GMT
|     X-Frame-Options: SAMEORIGIN
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     Connection: close
|     Content-Length: 87
|     Content-Type: text/html
|     <html><head><title>400 Invalid Request</title></head><body>Invalid Request: ??</body>
|   SIPOptions: 
|     HTTP/1.1 400 Invalid Request
|     Date: Fri, 01 Dec 2023 20:07:39 GMT
|     X-Frame-Options: SAMEORIGIN
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     Connection: close
|     Content-Length: 87
|     Content-Type: text/html
|_    <html><head><title>400 Invalid Request</title></head><body>Invalid Request: ??</body>
|_http-title: Did not follow redirect to https://az-tuhsd-psv.edupoint.com/
443/tcp open  ssl/http Microsoft IIS httpd 10.0
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
| http-title: ParentVUE 
|_Requested resource was /PXP2_Login.aspx
| ssl-cert: Subject: commonName=*.edupoint.com
| Subject Alternative Name: DNS:*.edupoint.com, DNS:edupoint.com
| Not valid before: 2023-05-08T18:34:16
|_Not valid after:  2024-06-08T18:34:16
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.70%I=7%D=12/1%Time=656A3CC7%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,183,"HTTP/1\.1\x20302\x20Found\x20\r\nConnection:\x20close\r
SF:\nContent-Type:\x20text/html\r\nX-Frame-Options:\x20SAMEORIGIN\r\nX-XSS
SF:-Protection:\x201;\x20mode=block\r\nX-Content-Type-Options:\x20nosniff\
SF:r\nLocation:\x20https://10\.100\.197\.173/\r\nContent-Length:\x20169\r\
SF:n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.0\x20Tr
SF:ansitional//EN\">\r\n<HTML><HEAD>\r\n<TITLE>302\x20Found\x20</TITLE>\r\
SF:n</HEAD><BODY>\r\n<H1>The\x20Document\x20has\x20moved</H1></BODY></HTML
SF:>\r\n\r\n")%r(HTTPOptions,183,"HTTP/1\.1\x20302\x20Found\x20\r\nConnect
SF:ion:\x20close\r\nContent-Type:\x20text/html\r\nX-Frame-Options:\x20SAME
SF:ORIGIN\r\nX-XSS-Protection:\x201;\x20mode=block\r\nX-Content-Type-Optio
SF:ns:\x20nosniff\r\nLocation:\x20https://10\.100\.197\.173/\r\nContent-Le
SF:ngth:\x20169\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTM
SF:L\x204\.0\x20Transitional//EN\">\r\n<HTML><HEAD>\r\n<TITLE>302\x20Found
SF:\x20</TITLE>\r\n</HEAD><BODY>\r\n<H1>The\x20Document\x20has\x20moved</H
SF:1></BODY></HTML>\r\n\r\n")%r(RTSPRequest,13B,"HTTP/1\.1\x20400\x20Inval
SF:id\x20Request\r\nDate:\x20Fri,\x2001\x20Dec\x202023\x2020:06:31\x20GMT\
SF:r\nX-Frame-Options:\x20SAMEORIGIN\r\nX-XSS-Protection:\x201;\x20mode=bl
SF:ock\r\nX-Content-Type-Options:\x20nosniff\r\nConnection:\x20close\r\nCo
SF:ntent-Length:\x2087\r\nContent-Type:\x20text/html\r\n\r\n<html><head><t
SF:itle>400\x20Invalid\x20Request</title></head><body>Invalid\x20Request:\
SF:x20\?\?</body>\r\n")%r(FourOhFourRequest,1A6,"HTTP/1\.1\x20302\x20Found
SF:\x20\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\nX-Frame-O
SF:ptions:\x20SAMEORIGIN\r\nX-XSS-Protection:\x201;\x20mode=block\r\nX-Con
SF:tent-Type-Options:\x20nosniff\r\nLocation:\x20https://10\.100\.197\.173
SF:/nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\nContent-Length:\x20169\r\n\r\n
SF:<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.0\x20Transit
SF:ional//EN\">\r\n<HTML><HEAD>\r\n<TITLE>302\x20Found\x20</TITLE>\r\n</HE
SF:AD><BODY>\r\n<H1>The\x20Document\x20has\x20moved</H1></BODY></HTML>\r\n
SF:\r\n")%r(SIPOptions,13B,"HTTP/1\.1\x20400\x20Invalid\x20Request\r\nDate
SF::\x20Fri,\x2001\x20Dec\x202023\x2020:07:39\x20GMT\r\nX-Frame-Options:\x
SF:20SAMEORIGIN\r\nX-XSS-Protection:\x201;\x20mode=block\r\nX-Content-Type
SF:-Options:\x20nosniff\r\nConnection:\x20close\r\nContent-Length:\x2087\r
SF:\nContent-Type:\x20text/html\r\n\r\n<html><head><title>400\x20Invalid\x
SF:20Request</title></head><body>Invalid\x20Request:\x20\?\?</body>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 3.12 - 4.10 (92%), Kemp LoadMaster LM-2400 Firmware 7.1 (91%), Linux 3.18 (91%), Linux 3.16 (91%), Crestron XPanel control system (87%), Nintendo Wii game console (86%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), OpenWrt White Russian 0.9 (Linux 2.4.30) (86%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (86%), Linux 2.6.32 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.18 ms  208.76.251.177
2   0.62 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.66 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.28 ms  206.72.211.146.any2ix.coresite.com (206.72.211.146)
5   ... 16
17  26.15 ms ec2-54-218-208-114.us-west-2.compute.amazonaws.com (54.218.208.114)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 176.97 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
54.218.208.114
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 2 identifiés
Exécuter la commande
nmap -A az-tuhsd-psv.edupoint.com
Scan date
01 Dec 2023 15:09
API - Scan ID
Durée de l'analyse
2min 56.97seconde (176.97seconde)
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: