Ports
Durée
Date
IP
Nmap scan report for learn.hawkeslearning.com (12.146.245.164) Host is up (0.060s latency). Not shown: 997 filtered ports PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | GetRequest, HTTPOptions: | HTTP/1.1 302 Moved Temporarily | Location: https://12.146.245.164/ | Connection: Keep-Alive | Content-Length: 0 | RTSPRequest: | HTTP/1.0 302 Moved Temporarily | Location: https:/// | Connection: close | Content-Length: 0 | SIPOptions: | HTTP/1.0 302 Moved Temporarily | Location: https://sip:nm | Connection: close |_ Content-Length: 0 113/tcp closed ident 443/tcp open https |_http-title: Intrusion Prevention Violation | ssl-cert: Subject: commonName=*.hawkeslearning.com/organizationName=Quant Systems Inc/stateOrProvinceName=South Carolina/countryName=US | Subject Alternative Name: DNS:*.hawkeslearning.com, DNS:hawkeslearning.com | Not valid before: 2023-08-25T00:00:00 |_Not valid after: 2024-09-24T23:59:59 |_ssl-date: 2023-12-05T09:32:59+00:00; 0s from scanner time. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.70%I=7%D=12/5%Time=656EEDBD%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,70,"HTTP/1\.1\x20302\x20Moved\x20Temporarily\r\nLocation:\x2 SF:0https://12\.146\.245\.164/\r\nConnection:\x20Keep-Alive\r\nContent-Len SF:gth:\x200\r\n\r\n")%r(HTTPOptions,70,"HTTP/1\.1\x20302\x20Moved\x20Temp SF:orarily\r\nLocation:\x20https://12\.146\.245\.164/\r\nConnection:\x20Ke SF:ep-Alive\r\nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,5D,"HTTP/1\.0\ SF:x20302\x20Moved\x20Temporarily\r\nLocation:\x20https:///\r\nConnection: SF:\x20close\r\nContent-Length:\x200\r\n\r\n")%r(SIPOptions,62,"HTTP/1\.0\ SF:x20302\x20Moved\x20Temporarily\r\nLocation:\x20https://sip:nm\r\nConnec SF:tion:\x20close\r\nContent-Length:\x200\r\n\r\n"); Device type: general purpose|VoIP phone Running (JUST GUESSING): Linux 3.X|2.6.X|4.X (94%), Grandstream embedded (85%) OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:4 cpe:/h:grandstream:gxv3275 Aggressive OS guesses: Linux 3.2 - 3.8 (94%), Linux 2.6.32 - 2.6.39 (91%), Linux 2.6.38 (91%), Linux 2.6.32 (88%), Linux 2.6.32 or 3.10 (88%), Linux 3.11 - 4.1 (88%), Linux 3.6 (86%), Linux 2.6.31 (86%), Linux 2.6.32 - 2.6.33 (85%), Grandstream GXV3275 video phone (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 15 hops TRACEROUTE (using port 113/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177 2 0.63 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.81 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.96 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57) 5 1.03 ms be3359.ccr41.lax05.atlas.cogentco.com (154.54.3.70) 6 0.88 ms 192.205.37.29 7 ... 12 13 55.27 ms 32.130.25.147 14 60.15 ms 32.143.248.154 15 61.53 ms 12.146.245.164 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 186.32 seconds