Ports
Duration
Date
IP
Nmap scan report for smtp.mailgun.com (34.160.13.42) Host is up (0.00045s latency). rDNS record for 34.160.13.42: 42.13.160.34.bc.googleusercontent.com Not shown: 994 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 25/tcp open smtp? | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, NULL, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: | 220 Mailgun Influx ready | FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, RTSPRequest: | 220 Mailgun Influx ready | Command not implemented | Command not implemented | Hello: | 220 Mailgun Influx ready | 250-54338c986ba5 | 250-AUTH PLAIN LOGIN | 250-SIZE 52428800 | 250-8BITMIME | 250-SMTPUTF8 | 250-PIPELINING | STARTTLS | Help: | 220 Mailgun Influx ready | Command not implemented | SIPOptions: | 220 Mailgun Influx ready | Command not implemented | Command not implemented | Command not implemented | Command not implemented | Command not implemented |_ many invalid commands |_smtp-commands: 16d02dc80a07, AUTH PLAIN LOGIN, SIZE 52428800, 8BITMIME, SMTPUTF8, PIPELINING, STARTTLS |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=*.mailgun.org/organizationName=MAILGUN TECHNOLOGIES, INC/stateOrProvinceName=Texas/countryName=US | Subject Alternative Name: DNS:*.mailgun.org, DNS:mailgun.org | Not valid before: 2025-03-14T00:00:00 |_Not valid after: 2026-04-14T23:59:59 80/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) |_http-title: Site doesn't have a title (text/plain; charset=utf-8). 443/tcp open ssl/http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) |_http-title: Site doesn't have a title (text/plain; charset=utf-8). | ssl-cert: Subject: commonName=*.mailgun.com/organizationName=MAILGUN TECHNOLOGIES, INC/stateOrProvinceName=Texas/countryName=US | Subject Alternative Name: DNS:*.mailgun.com, DNS:mailgun.com | Not valid before: 2025-04-28T00:00:00 |_Not valid after: 2026-05-04T23:59:59 465/tcp open ssl/smtps? | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, NULL, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: | 220 Mailgun Influx ready | FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, RTSPRequest: | 220 Mailgun Influx ready | Command not implemented | Command not implemented | Hello: | 220 Mailgun Influx ready | 250-ca21874fedea | 250-AUTH PLAIN LOGIN | 250-SIZE 52428800 | 250-8BITMIME | 250-SMTPUTF8 | 250-PIPELINING | STARTTLS | Help: | 220 Mailgun Influx ready | Command not implemented | SIPOptions: | 220 Mailgun Influx ready | Command not implemented | Command not implemented | Command not implemented | Command not implemented | Command not implemented |_ many invalid commands |_smtp-commands: a06b8571cb3d, AUTH PLAIN LOGIN, SIZE 52428800, 8BITMIME, SMTPUTF8, PIPELINING, STARTTLS | ssl-cert: Subject: commonName=*.mailgun.org/organizationName=MAILGUN TECHNOLOGIES, INC/stateOrProvinceName=Texas/countryName=US | Subject Alternative Name: DNS:*.mailgun.org, DNS:mailgun.org | Not valid before: 2025-03-14T00:00:00 |_Not valid after: 2026-04-14T23:59:59 587/tcp open submission? | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, NULL, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: | 220 Mailgun Influx ready | FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, RTSPRequest: | 220 Mailgun Influx ready | Command not implemented | Command not implemented | Hello: | 220 Mailgun Influx ready | 250-bc67d2a06623 | 250-AUTH PLAIN LOGIN | 250-SIZE 52428800 | 250-8BITMIME | 250-SMTPUTF8 | 250-PIPELINING | STARTTLS | Help: | 220 Mailgun Influx ready | Command not implemented | SIPOptions: | 220 Mailgun Influx ready | Command not implemented | Command not implemented | Command not implemented | Command not implemented | Command not implemented |_ many invalid commands |_smtp-commands: fd63f1f5b707, AUTH PLAIN LOGIN, SIZE 52428800, 8BITMIME, SMTPUTF8, PIPELINING, STARTTLS |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=*.mailgun.org/organizationName=MAILGUN TECHNOLOGIES, INC/stateOrProvinceName=Texas/countryName=US | Subject Alternative Name: DNS:*.mailgun.org, DNS:mailgun.org | Not valid before: 2025-03-14T00:00:00 |_Not valid after: 2026-04-14T23:59:59 2525/tcp open ms-v-worlds? | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, NCP, NULL, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe: | 220 Mailgun Influx ready | FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, RTSPRequest: | 220 Mailgun Influx ready | Command not implemented | Command not implemented | Help: | 220 Mailgun Influx ready | Command not implemented | SIPOptions: | 220 Mailgun Influx ready | Command not implemented | Command not implemented | Command not implemented | Command not implemented | Command not implemented |_ many invalid commands 4 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port25-TCP:V=7.92%I=7%D=6/11%Time=684974A7%P=x86_64-redhat-linux-gnu%r( SF:NULL,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(Hello,8F,"220\x20Mai SF:lgun\x20Influx\x20ready\r\n250-54338c986ba5\r\n250-AUTH\x20PLAIN\x20LOG SF:IN\r\n250-SIZE\x2052428800\r\n250-8BITMIME\r\n250-SMTPUTF8\r\n250-PIPEL SF:INING\r\n250\x20STARTTLS\r\n")%r(Help,37,"220\x20Mailgun\x20Influx\x20r SF:eady\r\n502\x20Command\x20not\x20implemented\r\n")%r(GenericLines,54,"2 SF:20\x20Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemente SF:d\r\n502\x20Command\x20not\x20implemented\r\n")%r(GetRequest,54,"220\x2 SF:0Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n SF:502\x20Command\x20not\x20implemented\r\n")%r(HTTPOptions,54,"220\x20Mai SF:lgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n502\ SF:x20Command\x20not\x20implemented\r\n")%r(RTSPRequest,54,"220\x20Mailgun SF:\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n502\x20C SF:ommand\x20not\x20implemented\r\n")%r(RPCCheck,1A,"220\x20Mailgun\x20Inf SF:lux\x20ready\r\n")%r(DNSVersionBindReqTCP,1A,"220\x20Mailgun\x20Influx\ SF:x20ready\r\n")%r(DNSStatusRequestTCP,1A,"220\x20Mailgun\x20Influx\x20re SF:ady\r\n")%r(SSLSessionReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r SF:(TerminalServerCookie,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(TLS SF:SessionReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(Kerberos,1A,"2 SF:20\x20Mailgun\x20Influx\x20ready\r\n")%r(SMBProgNeg,1A,"220\x20Mailgun\ SF:x20Influx\x20ready\r\n")%r(X11Probe,1A,"220\x20Mailgun\x20Influx\x20rea SF:dy\r\n")%r(FourOhFourRequest,54,"220\x20Mailgun\x20Influx\x20ready\r\n5 SF:02\x20Command\x20not\x20implemented\r\n502\x20Command\x20not\x20impleme SF:nted\r\n")%r(LPDString,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(LD SF:APSearchReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(LDAPBindReq,1 SF:A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(SIPOptions,CA,"220\x20Mail SF:gun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n502\x SF:20Command\x20not\x20implemented\r\n502\x20Command\x20not\x20implemented SF:\r\n502\x20Command\x20not\x20implemented\r\n502\x20Command\x20not\x20im SF:plemented\r\n421\x20Too\x20many\x20invalid\x20commands\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port465-TCP:V=7.92%T=SSL%I=7%D=6/11%Time=684974AD%P=x86_64-redhat-linux SF:-gnu%r(NULL,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(Hello,8F,"220 SF:\x20Mailgun\x20Influx\x20ready\r\n250-ca21874fedea\r\n250-AUTH\x20PLAIN SF:\x20LOGIN\r\n250-SIZE\x2052428800\r\n250-8BITMIME\r\n250-SMTPUTF8\r\n25 SF:0-PIPELINING\r\n250\x20STARTTLS\r\n")%r(Help,37,"220\x20Mailgun\x20Infl SF:ux\x20ready\r\n502\x20Command\x20not\x20implemented\r\n")%r(GenericLine SF:s,54,"220\x20Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20imp SF:lemented\r\n502\x20Command\x20not\x20implemented\r\n")%r(GetRequest,54, SF:"220\x20Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemen SF:ted\r\n502\x20Command\x20not\x20implemented\r\n")%r(HTTPOptions,54,"220 SF:\x20Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\ SF:r\n502\x20Command\x20not\x20implemented\r\n")%r(RTSPRequest,54,"220\x20 SF:Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n5 SF:02\x20Command\x20not\x20implemented\r\n")%r(RPCCheck,1A,"220\x20Mailgun SF:\x20Influx\x20ready\r\n")%r(DNSVersionBindReqTCP,1A,"220\x20Mailgun\x20 SF:Influx\x20ready\r\n")%r(DNSStatusRequestTCP,1A,"220\x20Mailgun\x20Influ SF:x\x20ready\r\n")%r(SSLSessionReq,1A,"220\x20Mailgun\x20Influx\x20ready\ SF:r\n")%r(TerminalServerCookie,1A,"220\x20Mailgun\x20Influx\x20ready\r\n" SF:)%r(TLSSessionReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(Kerbero SF:s,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(SMBProgNeg,1A,"220\x20M SF:ailgun\x20Influx\x20ready\r\n")%r(X11Probe,1A,"220\x20Mailgun\x20Influx SF:\x20ready\r\n")%r(FourOhFourRequest,54,"220\x20Mailgun\x20Influx\x20rea SF:dy\r\n502\x20Command\x20not\x20implemented\r\n502\x20Command\x20not\x20 SF:implemented\r\n")%r(LPDString,1A,"220\x20Mailgun\x20Influx\x20ready\r\n SF:")%r(LDAPSearchReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(LDAPBi SF:ndReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(SIPOptions,CA,"220\ SF:x20Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r SF:\n502\x20Command\x20not\x20implemented\r\n502\x20Command\x20not\x20impl SF:emented\r\n502\x20Command\x20not\x20implemented\r\n502\x20Command\x20no SF:t\x20implemented\r\n421\x20Too\x20many\x20invalid\x20commands\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port587-TCP:V=7.92%I=7%D=6/11%Time=684974A7%P=x86_64-redhat-linux-gnu%r SF:(NULL,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(GenericLines,54,"22 SF:0\x20Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented SF:\r\n502\x20Command\x20not\x20implemented\r\n")%r(Hello,8F,"220\x20Mailg SF:un\x20Influx\x20ready\r\n250-bc67d2a06623\r\n250-AUTH\x20PLAIN\x20LOGIN SF:\r\n250-SIZE\x2052428800\r\n250-8BITMIME\r\n250-SMTPUTF8\r\n250-PIPELIN SF:ING\r\n250\x20STARTTLS\r\n")%r(Help,37,"220\x20Mailgun\x20Influx\x20rea SF:dy\r\n502\x20Command\x20not\x20implemented\r\n")%r(GetRequest,54,"220\x SF:20Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\ SF:n502\x20Command\x20not\x20implemented\r\n")%r(HTTPOptions,54,"220\x20Ma SF:ilgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n502 SF:\x20Command\x20not\x20implemented\r\n")%r(RTSPRequest,54,"220\x20Mailgu SF:n\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n502\x20 SF:Command\x20not\x20implemented\r\n")%r(RPCCheck,1A,"220\x20Mailgun\x20In SF:flux\x20ready\r\n")%r(DNSVersionBindReqTCP,1A,"220\x20Mailgun\x20Influx SF:\x20ready\r\n")%r(DNSStatusRequestTCP,1A,"220\x20Mailgun\x20Influx\x20r SF:eady\r\n")%r(SSLSessionReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")% SF:r(TerminalServerCookie,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(TL SF:SSessionReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(Kerberos,1A," SF:220\x20Mailgun\x20Influx\x20ready\r\n")%r(SMBProgNeg,1A,"220\x20Mailgun SF:\x20Influx\x20ready\r\n")%r(X11Probe,1A,"220\x20Mailgun\x20Influx\x20re SF:ady\r\n")%r(FourOhFourRequest,54,"220\x20Mailgun\x20Influx\x20ready\r\n SF:502\x20Command\x20not\x20implemented\r\n502\x20Command\x20not\x20implem SF:ented\r\n")%r(LPDString,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(L SF:DAPSearchReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(LDAPBindReq, SF:1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(SIPOptions,CA,"220\x20Mai SF:lgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n502\ SF:x20Command\x20not\x20implemented\r\n502\x20Command\x20not\x20implemente SF:d\r\n502\x20Command\x20not\x20implemented\r\n502\x20Command\x20not\x20i SF:mplemented\r\n421\x20Too\x20many\x20invalid\x20commands\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port2525-TCP:V=7.92%I=7%D=6/11%Time=684974A7%P=x86_64-redhat-linux-gnu% SF:r(NULL,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(GetRequest,54,"220 SF:\x20Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\ SF:r\n502\x20Command\x20not\x20implemented\r\n")%r(GenericLines,54,"220\x2 SF:0Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n SF:502\x20Command\x20not\x20implemented\r\n")%r(HTTPOptions,54,"220\x20Mai SF:lgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n502\ SF:x20Command\x20not\x20implemented\r\n")%r(RTSPRequest,54,"220\x20Mailgun SF:\x20Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n502\x20C SF:ommand\x20not\x20implemented\r\n")%r(RPCCheck,1A,"220\x20Mailgun\x20Inf SF:lux\x20ready\r\n")%r(DNSVersionBindReqTCP,1A,"220\x20Mailgun\x20Influx\ SF:x20ready\r\n")%r(DNSStatusRequestTCP,1A,"220\x20Mailgun\x20Influx\x20re SF:ady\r\n")%r(Help,37,"220\x20Mailgun\x20Influx\x20ready\r\n502\x20Comman SF:d\x20not\x20implemented\r\n")%r(SSLSessionReq,1A,"220\x20Mailgun\x20Inf SF:lux\x20ready\r\n")%r(TerminalServerCookie,1A,"220\x20Mailgun\x20Influx\ SF:x20ready\r\n")%r(TLSSessionReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\ SF:n")%r(Kerberos,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(SMBProgNeg SF:,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(X11Probe,1A,"220\x20Mail SF:gun\x20Influx\x20ready\r\n")%r(FourOhFourRequest,54,"220\x20Mailgun\x20 SF:Influx\x20ready\r\n502\x20Command\x20not\x20implemented\r\n502\x20Comma SF:nd\x20not\x20implemented\r\n")%r(LPDString,1A,"220\x20Mailgun\x20Influx SF:\x20ready\r\n")%r(LDAPSearchReq,1A,"220\x20Mailgun\x20Influx\x20ready\r SF:\n")%r(LDAPBindReq,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(SIPOpt SF:ions,CA,"220\x20Mailgun\x20Influx\x20ready\r\n502\x20Command\x20not\x20 SF:implemented\r\n502\x20Command\x20not\x20implemented\r\n502\x20Command\x SF:20not\x20implemented\r\n502\x20Command\x20not\x20implemented\r\n502\x20 SF:Command\x20not\x20implemented\r\n421\x20Too\x20many\x20invalid\x20comma SF:nds\r\n")%r(LANDesk-RC,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(Te SF:rminalServer,1A,"220\x20Mailgun\x20Influx\x20ready\r\n")%r(NCP,1A,"220\ SF:x20Mailgun\x20Influx\x20ready\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 7 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.64 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.70 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.57 ms google.as15169.any2ix.coresite.com (206.72.210.41) 5 1.28 ms 108.170.248.67 6 0.52 ms 142.251.60.109 7 0.49 ms 42.13.160.34.bc.googleusercontent.com (34.160.13.42) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 147.20 seconds
Features
5 scans/day
Daily API Calls - 20 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.
Lifetime
Features
10 000 scans/day
Daily API Calls - 100 000 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is best for professionals who need to test their host's open ports from an external source.
Billed Annually @ $45.00 - 50% discount