Analyser le rapport pour "edl.dmv.ca.gov"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

2

Durée

2min 32.17seconde (152.17seconde)

Date

2024-09-23

IP

107.162.144.185

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A edl.dmv.ca.gov)
Nmap scan report for edl.dmv.ca.gov (107.162.144.185)
Host is up (0.0092s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE VERSION
80/tcp  open  http
|_http-title: Did not follow redirect to https://edl.dmv.ca.gov/
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 302 Moved Temporarily
|     Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
|     Via: HTTP/1.0 bit14004.sjc1.defense.net
|     Connection: close
|     Content-Length: 0
|   GetRequest, HTTPOptions, RTSPRequest: 
|     HTTP/1.0 302 Moved Temporarily
|     Location: https:///
|     Via: HTTP/1.0 bit14004.sjc1.defense.net
|     Connection: close
|     Content-Length: 0
|   SIPOptions: 
|     HTTP/1.0 302 Moved Temporarily
|     Location: https://sip:nm
|     Via: HTTP/Unknown bit14004.sjc1.defense.net
|     Connection: close
|     Content-Length: 0
|   TerminalServerCookie: 
|     HTTP/1.0 302 Moved Temporarily
|     Location: https://mstshash=nmap
|     Via: HTTP/0.9 bit14004.sjc1.defense.net
|     Connection: close
|_    Content-Length: 0
443/tcp open  https?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=9/23%Time=66F1C622%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,86,"HTTP/1\.0\x20302\x20Moved\x20Temporarily\r\nLocation:\x2
SF:0https:///\r\nVia:\x20HTTP/1\.0\x20bit14004\.sjc1\.defense\.net\r\nConn
SF:ection:\x20close\r\nContent-Length:\x200\r\n\r\n")%r(HTTPOptions,86,"HT
SF:TP/1\.0\x20302\x20Moved\x20Temporarily\r\nLocation:\x20https:///\r\nVia
SF::\x20HTTP/1\.0\x20bit14004\.sjc1\.defense\.net\r\nConnection:\x20close\
SF:r\nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,86,"HTTP/1\.0\x20302\x2
SF:0Moved\x20Temporarily\r\nLocation:\x20https:///\r\nVia:\x20HTTP/1\.0\x2
SF:0bit14004\.sjc1\.defense\.net\r\nConnection:\x20close\r\nContent-Length
SF::\x200\r\n\r\n")%r(FourOhFourRequest,A9,"HTTP/1\.0\x20302\x20Moved\x20T
SF:emporarily\r\nLocation:\x20https:///nice%20ports%2C/Tri%6Eity\.txt%2eba
SF:k\r\nVia:\x20HTTP/1\.0\x20bit14004\.sjc1\.defense\.net\r\nConnection:\x
SF:20close\r\nContent-Length:\x200\r\n\r\n")%r(TerminalServerCookie,92,"HT
SF:TP/1\.0\x20302\x20Moved\x20Temporarily\r\nLocation:\x20https://mstshash
SF:=nmap\r\nVia:\x20HTTP/0\.9\x20bit14004\.sjc1\.defense\.net\r\nConnectio
SF:n:\x20close\r\nContent-Length:\x200\r\n\r\n")%r(SIPOptions,8F,"HTTP/1\.
SF:0\x20302\x20Moved\x20Temporarily\r\nLocation:\x20https://sip:nm\r\nVia:
SF:\x20HTTP/Unknown\x20bit14004\.sjc1\.defense\.net\r\nConnection:\x20clos
SF:e\r\nContent-Length:\x200\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: load balancer
Running (JUST GUESSING): F5 Networks TMOS 11.6.X (88%)
OS CPE: cpe:/o:f5:tmos:11.6
Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.21 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.54 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.69 ms  r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   1.11 ms  ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5   0.51 ms  ae-16.r25.lsanca07.us.bb.gin.ntt.net (129.250.3.80)
6   13.72 ms ae-3.r24.snjsca04.us.bb.gin.ntt.net (129.250.4.150)
7   11.19 ms ae-0.a04.snjsca04.us.bb.gin.ntt.net (129.250.2.123)
8   9.47 ms  ae-0.f5-networks.snjsca04.us.bb.gin.ntt.net (128.242.179.46)
9   ...
10  12.01 ms 107.162.79.2
11  9.38 ms  107.162.144.185

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 152.17 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
107.162.144.185
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 2 identifiés
Exécuter la commande
nmap -A edl.dmv.ca.gov
Scan date
23 Sep 2024 15:51
API - Scan ID
Durée de l'analyse
2min 32.17seconde (152.17seconde)
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: