Analyser le rapport pour "cdn.acketiwi.cfd"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

7

Durée

44.57seconde

Date

2024-02-04

IP

72.52.178.23

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A cdn.acketiwi.cfd)
Nmap scan report for cdn.acketiwi.cfd (72.52.178.23)
Host is up (0.063s latency).
rDNS record for 72.52.178.23: lb01.parklogic.com
Not shown: 993 closed tcp ports (reset)
PORT     STATE    SERVICE       VERSION
19/tcp   filtered chargen
22/tcp   open     ssh           OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 
|   2048 b6:5f:8c:4c:e9:04:4e:d4:47:4b:16:fc:89:4a:7e:3e (RSA)
|   256 05:d2:55:eb:c2:b6:7c:91:6f:60:2c:c4:1f:f7:49:5d (ECDSA)
|_  256 af:0d:59:1e:8a:d1:78:25:42:8b:1c:e7:bd:97:4d:a1 (ED25519)
80/tcp   open     http?
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, NotesRPC, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe: 
|     HTTP/1.0 400 Bad request
|     Content-Type: text/html
|_    <h2>Client sent a bad request.</h2>
|_http-trane-info: Problem with XML parsing of /evox/about
| http-title: Site doesn't have a title (text/html; charset=utf-8).
|_Requested resource was http://ww7.acketiwi.cfd/?usid=16&utid=30972223365
111/tcp  open     rpcbind       2-4 (RPC #100000)
| rpcinfo: 
|   program version    port/proto  service
|   100000  2,3,4        111/tcp   rpcbind
|   100000  2,3,4        111/udp   rpcbind
|   100000  3,4          111/tcp6  rpcbind
|_  100000  3,4          111/udp6  rpcbind
161/tcp  filtered snmp
427/tcp  filtered svrloc
1666/tcp filtered netview-aix-6
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=2/3%Time=65BF3EE5%P=x86_64-redhat-linux-gnu%r(X
SF:11Probe,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nContent-Type:\x20text
SF:/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20request\.</h2>\n")%r(RPC
SF:Check,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nContent-Type:\x20text/h
SF:tml\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20request\.</h2>\n")%r(DNSVe
SF:rsionBindReqTCP,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nContent-Type:
SF:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20request\.</h2>\n
SF:")%r(DNSStatusRequestTCP,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nCont
SF:ent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20request
SF:\.</h2>\n")%r(SSLSessionReq,59,"HTTP/1\.0\x20400\x20Bad\x20request\r\nC
SF:ontent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20bad\x20requ
SF:est\.</h2>\n")%r(TerminalServerCookie,59,"HTTP/1\.0\x20400\x20Bad\x20re
SF:quest\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20b
SF:ad\x20request\.</h2>\n")%r(TLSSessionReq,59,"HTTP/1\.0\x20400\x20Bad\x2
SF:0request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x
SF:20bad\x20request\.</h2>\n")%r(Kerberos,59,"HTTP/1\.0\x20400\x20Bad\x20r
SF:equest\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20
SF:bad\x20request\.</h2>\n")%r(SMBProgNeg,59,"HTTP/1\.0\x20400\x20Bad\x20r
SF:equest\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20
SF:bad\x20request\.</h2>\n")%r(LPDString,59,"HTTP/1\.0\x20400\x20Bad\x20re
SF:quest\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x20b
SF:ad\x20request\.</h2>\n")%r(LDAPSearchReq,59,"HTTP/1\.0\x20400\x20Bad\x2
SF:0request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\x
SF:20bad\x20request\.</h2>\n")%r(LDAPBindReq,59,"HTTP/1\.0\x20400\x20Bad\x
SF:20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20a\
SF:x20bad\x20request\.</h2>\n")%r(TerminalServer,59,"HTTP/1\.0\x20400\x20B
SF:ad\x20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x
SF:20a\x20bad\x20request\.</h2>\n")%r(NotesRPC,59,"HTTP/1\.0\x20400\x20Bad
SF:\x20request\r\nContent-Type:\x20text/html\r\n\r\n<h2>Client\x20sent\x20
SF:a\x20bad\x20request\.</h2>\n");
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 14 hops

TRACEROUTE (using port 199/tcp)
HOP RTT      ADDRESS
1   0.21 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.61 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.70 ms  r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   1.04 ms  be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   12.43 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161)
6   20.91 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54)
7   33.50 ms be2668.ccr22.den01.atlas.cogentco.com (154.54.87.30)
8   44.87 ms be3036.ccr22.mci01.atlas.cogentco.com (154.54.31.90)
9   56.61 ms be2832.ccr42.ord01.atlas.cogentco.com (154.54.44.170)
10  56.75 ms be2766.ccr41.ord03.atlas.cogentco.com (154.54.46.178)
11  56.93 ms cogent-lw-chi-border1-hu0-1-0-0.liquidweb.com (38.32.98.66)
12  64.57 ms lw-dc3-core2.rtr.liquidweb.com (209.59.157.50)
13  63.07 ms lw-dc3-dist14-nexus.rtr.liquidweb.com (209.59.157.243)
14  63.13 ms lb01.parklogic.com (72.52.178.23)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 44.57 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
72.52.178.23
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 7 identifiés
Exécuter la commande
nmap -A cdn.acketiwi.cfd
Scan date
04 Feb 2024 02:38
Durée de l'analyse
44.57seconde
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: