Analyser le rapport pour "graybar.com"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A graybar.com)
Nmap scan report for graybar.com (104.19.160.227)
Host is up (0.00095s latency).
Other addresses for graybar.com (not scanned): 2606:4700::6813:a0e3 2606:4700::6812:bfa4 104.18.191.164
Not shown: 996 filtered tcp ports (no-response)
PORT     STATE SERVICE  VERSION
80/tcp   open  http     Cloudflare http proxy
|_http-server-header: cloudflare
|_http-title: Did not follow redirect to https://graybar.com/
443/tcp  open  ssl/http Cloudflare http proxy
| ssl-cert: Subject: commonName=graybar.com
| Subject Alternative Name: DNS:*.graybar.com, DNS:graybar.com
| Not valid before: 2024-01-02T02:46:49
|_Not valid after:  2024-04-01T02:46:48
| tls-nextprotoneg: 
|   h2
|_  http/1.1
|_http-server-header: cloudflare
| tls-alpn: 
|   h2
|_  http/1.1
|_ssl-date: 2024-02-13T05:04:50+00:00; -39s from scanner time.
|_http-title: Did not follow redirect to https://www.graybar.com//
8080/tcp open  http     Cloudflare http proxy
|_http-server-header: cloudflare
|_http-title: Did not follow redirect to https://graybar.com/
8443/tcp open  ssl/http Cloudflare http proxy
| tls-alpn: 
|   h2
|_  http/1.1
| tls-nextprotoneg: 
|   h2
|_  http/1.1
|_http-server-header: cloudflare
| ssl-cert: Subject: commonName=graybar.com
| Subject Alternative Name: DNS:*.graybar.com, DNS:graybar.com
| Not valid before: 2024-01-02T02:46:49
|_Not valid after:  2024-04-01T02:46:48
|_http-title: 400 The plain HTTP request was sent to HTTPS port
|_ssl-date: 2024-02-13T05:04:50+00:00; -39s from scanner time.
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|webcam
Running (JUST GUESSING): FreeBSD 11.X (88%), Linux 3.X|4.X|5.X|2.6.X (86%), AXIS embedded (85%)
OS CPE: cpe:/o:freebsd:freebsd:11.1 cpe:/o:linux:linux_kernel:3.1 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:linux:linux_kernel:2.6.17 cpe:/h:axis:210a_network_camera cpe:/h:axis:211_network_camera cpe:/o:linux:linux_kernel:2.6.32
Aggressive OS guesses: FreeBSD 11.1-STABLE (88%), Linux 3.1 (86%), Linux 3.2 (86%), Linux 4.15 - 5.6 (85%), Linux 5.4 (85%), Linux 3.2 - 3.5 (85%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (85%), Linux 5.3 - 5.4 (85%), Linux 2.6.32 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 8 hops

Host script results:
|_clock-skew: mean: -39s, deviation: 0s, median: -39s

TRACEROUTE (using port 80/tcp)
HOP RTT     ADDRESS
1   0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.68 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.58 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   0.81 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   0.70 ms be3360.ccr41.lax04.atlas.cogentco.com (154.54.25.150)
6   1.14 ms 38.104.83.170
7   1.06 ms 162.158.184.5
8   0.99 ms 104.19.160.227

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 92.53 seconds
Schéma de couleur
Cible
graybar.com
IP cible
104.19.160.227
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A graybar.com
Scan date
13 Feb 2024 00:05
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Total scans
About 4 times
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: