Scan report for "flocktory.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A flocktory.com)
Nmap scan report for flocktory.com (130.193.52.39)
Host is up (0.19s latency).
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http      ycalb
| fingerprint-strings: 
|   DNSStatusRequestTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:41:54 GMT
|     server: ycalb
|     connection: close
|     Request
|   DNSVersionBindReqTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:41:53 GMT
|     server: ycalb
|     connection: close
|     Request
|   FourOhFourRequest: 
|     HTTP/1.1 426 Upgrade Required
|     date: Sun, 19 Nov 2023 22:41:45 GMT
|     server: ycalb
|     connection: close
|     content-length: 0
|   GetRequest: 
|     HTTP/1.1 426 Upgrade Required
|     date: Sun, 19 Nov 2023 22:41:40 GMT
|     server: ycalb
|     connection: close
|     content-length: 0
|   HTTPOptions: 
|     HTTP/1.1 426 Upgrade Required
|     date: Sun, 19 Nov 2023 22:41:41 GMT
|     server: ycalb
|     connection: close
|     content-length: 0
|   Help: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:41:56 GMT
|     server: ycalb
|     connection: close
|     Request
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:41:51 GMT
|     server: ycalb
|     connection: close
|     Request
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:41:42 GMT
|     server: ycalb
|     connection: close
|     Request
|   SSLSessionReq: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:41:57 GMT
|     server: ycalb
|     connection: close
|     Request
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:41:43 GMT
|     server: ycalb
|     connection: close
|_    Request
|_http-server-header: ycalb
|_http-title: Did not follow redirect to https://flocktory.com:443/
443/tcp open  ssl/https ycalb
| fingerprint-strings: 
|   DNSStatusRequestTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:42:04 GMT
|     server: ycalb
|     connection: close
|     Request
|   DNSVersionBindReqTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:42:02 GMT
|     server: ycalb
|     connection: close
|     Request
|   FourOhFourRequest: 
|     HTTP/1.1 426 Upgrade Required
|     date: Sun, 19 Nov 2023 22:41:50 GMT
|     server: ycalb
|     connection: close
|     content-length: 0
|   GetRequest: 
|     HTTP/1.1 426 Upgrade Required
|     date: Sun, 19 Nov 2023 22:41:46 GMT
|     server: ycalb
|     connection: close
|     content-length: 0
|   HTTPOptions: 
|     HTTP/1.1 426 Upgrade Required
|     date: Sun, 19 Nov 2023 22:41:47 GMT
|     server: ycalb
|     connection: close
|     content-length: 0
|   Help: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:42:06 GMT
|     server: ycalb
|     connection: close
|     Request
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:42:00 GMT
|     server: ycalb
|     connection: close
|     Request
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:41:58 GMT
|     server: ycalb
|     connection: close
|     Request
|   SSLSessionReq: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:42:07 GMT
|     server: ycalb
|     connection: close
|     Request
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Sun, 19 Nov 2023 22:41:51 GMT
|     server: ycalb
|     connection: close
|_    Request
|_http-server-header: ycalb
|_http-title: DDoS-Guard
| ssl-cert: Subject: commonName=*.flocktory.com
| Subject Alternative Name: DNS:*.flocktory.com, DNS:flocktory.com
| Not valid before: 2023-11-07T10:14:36
|_Not valid after:  2024-02-05T10:14:35
|_ssl-date: 2023-11-19T22:43:06+00:00; 0s from scanner time.
| tls-alpn: 
|   h2
|_  http/1.1
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=655A8F25%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Sun
SF:,\x2019\x20Nov\x202023\x2022:41:40\x20GMT\r\nserver:\x20ycalb\r\nconnec
SF:tion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,7B,"HTTP
SF:/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Sun,\x2019\x20Nov\x2020
SF:23\x2022:41:41\x20GMT\r\nserver:\x20ycalb\r\nconnection:\x20close\r\nco
SF:ntent-length:\x200\r\n\r\n")%r(RTSPRequest,9C,"HTTP/1\.1\x20400\x20Bad\
SF:x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\nd
SF:ate:\x20Sun,\x2019\x20Nov\x202023\x2022:41:42\x20GMT\r\nserver:\x20ycal
SF:b\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9C,"HTTP/1
SF:\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\
SF:x20text/plain\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2022:41:43\x20GMT\
SF:r\nserver:\x20ycalb\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(F
SF:ourOhFourRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x
SF:20Sun,\x2019\x20Nov\x202023\x2022:41:45\x20GMT\r\nserver:\x20ycalb\r\nc
SF:onnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9C,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-ty
SF:pe:\x20text/plain\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2022:41:51\x20
SF:GMT\r\nserver:\x20ycalb\r\nconnection:\x20close\r\n\r\nBad\x20Request")
SF:%r(DNSVersionBindReqTCP,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconte
SF:nt-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Sun,\x2019\
SF:x20Nov\x202023\x2022:41:53\x20GMT\r\nserver:\x20ycalb\r\nconnection:\x2
SF:0close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9C,"HTTP/1\.1\x204
SF:00\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/
SF:plain\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2022:41:54\x20GMT\r\nserve
SF:r:\x20ycalb\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(Help,9C,"
SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-
SF:type:\x20text/plain\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2022:41:56\x
SF:20GMT\r\nserver:\x20ycalb\r\nconnection:\x20close\r\n\r\nBad\x20Request
SF:")%r(SSLSessionReq,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-le
SF:ngth:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Sun,\x2019\x20No
SF:v\x202023\x2022:41:57\x20GMT\r\nserver:\x20ycalb\r\nconnection:\x20clos
SF:e\r\n\r\nBad\x20Request");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655A8F2B%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:
SF:\x20Sun,\x2019\x20Nov\x202023\x2022:41:46\x20GMT\r\nserver:\x20ycalb\r\
SF:nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,7
SF:B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Sun,\x2019\x20No
SF:v\x202023\x2022:41:47\x20GMT\r\nserver:\x20ycalb\r\nconnection:\x20clos
SF:e\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,7B,"HTTP/1\.1\x
SF:20426\x20Upgrade\x20Required\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x202
SF:2:41:50\x20GMT\r\nserver:\x20ycalb\r\nconnection:\x20close\r\ncontent-l
SF:ength:\x200\r\n\r\n")%r(tor-versions,9C,"HTTP/1\.1\x20400\x20Bad\x20Req
SF:uest\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x
SF:20Sun,\x2019\x20Nov\x202023\x2022:41:51\x20GMT\r\nserver:\x20ycalb\r\nc
SF:onnection:\x20close\r\n\r\nBad\x20Request")%r(RTSPRequest,9C,"HTTP/1\.1
SF:\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20
SF:text/plain\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2022:41:58\x20GMT\r\n
SF:server:\x20ycalb\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(RPCC
SF:heck,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\
SF:ncontent-type:\x20text/plain\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x202
SF:2:42:00\x20GMT\r\nserver:\x20ycalb\r\nconnection:\x20close\r\n\r\nBad\x
SF:20Request")%r(DNSVersionBindReqTCP,9C,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20
SF:Sun,\x2019\x20Nov\x202023\x2022:42:02\x20GMT\r\nserver:\x20ycalb\r\ncon
SF:nection:\x20close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9C,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-typ
SF:e:\x20text/plain\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2022:42:04\x20G
SF:MT\r\nserver:\x20ycalb\r\nconnection:\x20close\r\n\r\nBad\x20Request")%
SF:r(Help,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\
SF:r\ncontent-type:\x20text/plain\r\ndate:\x20Sun,\x2019\x20Nov\x202023\x2
SF:022:42:06\x20GMT\r\nserver:\x20ycalb\r\nconnection:\x20close\r\n\r\nBad
SF:\x20Request")%r(SSLSessionReq,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
SF:ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Sun,\
SF:x2019\x20Nov\x202023\x2022:42:07\x20GMT\r\nserver:\x20ycalb\r\nconnecti
SF:on:\x20close\r\n\r\nBad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: phone|general purpose|specialized
Running (JUST GUESSING): Google Android 5.X|6.X|7.X (90%), FreeBSD 11.X (85%), Linux 3.X|4.X|2.6.X (85%), Crestron 2-Series (85%)
OS CPE: cpe:/o:google:android:5.1.1 cpe:/o:freebsd:freebsd:11.0 cpe:/o:google:android:6 cpe:/o:linux:linux_kernel:3 cpe:/o:google:android:7 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:crestron:2_series
Aggressive OS guesses: Android 5.1.1 (90%), FreeBSD 11.0-RELEASE (85%), FreeBSD 11.0-STABLE (85%), Android 5.0 - 7.0 (Linux 3.4 - 3.10) (85%), Android 6.0 - 7.1.2 (Linux 3.18 - 4.4.1) (85%), Android 7.1.1 - 7.1.2 (85%), Linux 2.6.32 (85%), Linux 3.2 - 3.16 (85%), Linux 3.2 - 4.9 (85%), Linux 3.8 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 19 hops

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   0.19 ms   208.76.251.177
2   0.57 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.72 ms   multacom.com (96.45.162.9)
4   0.37 ms   linxtelecom.as8359.any2ix.coresite.com (206.72.210.180)
5   147.99 ms sd-cr01-te3-4.161.nyc.mts-internet.net (212.188.28.129)
6   180.33 ms tct-cr02-xe-2-2-1.195.ams.mts-internet.net (195.34.59.113)
7   182.58 ms anc-cr01-be4.131.ff.mts-internet.net (212.188.42.102)
8   182.88 ms a197-cr06-be6.77.msk.mts-internet.net (212.188.2.190)
9   180.19 ms a433-cr02-be18.77.msk.mts-internet.net (212.188.56.143)
10  180.09 ms m9-cr03-ae11.77.msk.mts-internet.net (212.188.42.125)
11  185.29 ms as200350.asbr.router (212.188.44.147)
12  ... 18
19  188.47 ms 130.193.52.39

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 131.41 seconds
Color Scheme
Target
flocktory.com
Target IP
130.193.52.39
Target Country
RU
Scan method
Scan OS information and Traceroute
Run command
nmap -A flocktory.com
Scan date
19 Nov 2023 17:43
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: