Scan report for "api-us.mapsindoors.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A api-us.mapsindoors.com)
Nmap scan report for api-us.mapsindoors.com (35.190.6.186)
Host is up (0.00043s latency).
rDNS record for 35.190.6.186: 186.6.190.35.bc.googleusercontent.com
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP: 
|     HTTP/1.0 400 Bad Request
|     Content-Length: 54
|     Content-Type: text/html; charset=UTF-8
|     Date: Sun, 09 Jun 2024 09:33:07 GMT
|     <html><title>Error 400 (Bad Request)!!1</title></html>
|   FourOhFourRequest: 
|     HTTP/1.0 301 Moved Permanently
|     Cache-Control: private
|     Location: https://35.190.6.186:443/nice%20ports%2C/Trinity.txt.bak
|     Content-Length: 0
|     Date: Sun, 09 Jun 2024 09:32:57 GMT
|     Content-Type: text/html; charset=UTF-8
|   GetRequest, HTTPOptions: 
|     HTTP/1.0 301 Moved Permanently
|     Cache-Control: private
|     Location: https://35.190.6.186:443/
|     Content-Length: 0
|     Date: Sun, 09 Jun 2024 09:32:52 GMT
|     Content-Type: text/html; charset=UTF-8
|   Help: 
|     HTTP/1.0 400 Bad Request
|     Content-Type: text/html; charset=UTF-8
|     Referrer-Policy: no-referrer
|     Content-Length: 273
|     Date: Sun, 09 Jun 2024 09:33:07 GMT
|     <html><head>
|     <meta http-equiv="content-type" content="text/html;charset=utf-8">
|     <title>400 Bad Request</title>
|     </head>
|     <body text=#000000 bgcolor=#ffffff>
|     <h1>Error: Bad Request</h1>
|     <h2>Your client has issued a malformed or illegal request.</h2>
|     <h2></h2>
|     </body></html>
|   RTSPRequest: 
|     HTTP/1.0 400 Bad Request
|     Content-Type: text/html; charset=UTF-8
|     Referrer-Policy: no-referrer
|     Content-Length: 273
|     Date: Sun, 09 Jun 2024 09:32:52 GMT
|     <html><head>
|     <meta http-equiv="content-type" content="text/html;charset=utf-8">
|     <title>400 Bad Request</title>
|     </head>
|     <body text=#000000 bgcolor=#ffffff>
|     <h1>Error: Bad Request</h1>
|     <h2>Your client has issued a malformed or illegal request.</h2>
|     <h2></h2>
|_    </body></html>
|_http-title: Did not follow redirect to https://api-us.mapsindoors.com:443/
443/tcp open  ssl/https
| fingerprint-strings: 
|   DNSVersionBindReqTCP: 
|     HTTP/1.0 400 Bad Request
|     Content-Length: 54
|     Content-Type: text/html; charset=UTF-8
|     Date: Sun, 09 Jun 2024 09:33:08 GMT
|     <html><title>Error 400 (Bad Request)!!1</title></html>
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.0 500 Internal Server Error
|     Date: Sun, 09 Jun 2024 09:32:58 GMT
|     Content-Length: 21
|     Content-Type: text/plain; charset=utf-8
|     Via: 1.1 google
|     Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
|     Internal Server Error
|   RTSPRequest: 
|     HTTP/1.0 400 Bad Request
|     Content-Type: text/html; charset=UTF-8
|     Referrer-Policy: no-referrer
|     Content-Length: 273
|     Date: Sun, 09 Jun 2024 09:33:03 GMT
|     <html><head>
|     <meta http-equiv="content-type" content="text/html;charset=utf-8">
|     <title>400 Bad Request</title>
|     </head>
|     <body text=#000000 bgcolor=#ffffff>
|     <h1>Error: Bad Request</h1>
|     <h2>Your client has issued a malformed or illegal request.</h2>
|     <h2></h2>
|     </body></html>
|   tor-versions: 
|     HTTP/1.0 400 Bad Request
|     Content-Length: 54
|     Content-Type: text/html; charset=UTF-8
|     Date: Sun, 09 Jun 2024 09:32:58 GMT
|_    <html><title>Error 400 (Bad Request)!!1</title></html>
|_http-title: Site doesn't have a title (application/json; charset=utf-8).
|_http-cors: HEAD GET POST PUT DELETE OPTIONS
| ssl-cert: Subject: commonName=*.mapsindoors.com
| Subject Alternative Name: DNS:*.mapsindoors.com, DNS:mapsindoors.com
| Not valid before: 2023-10-06T00:00:00
|_Not valid after:  2024-10-16T23:59:59
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=6/9%Time=666576C3%P=x86_64-redhat-linux-gnu%r(G
SF:etRequest,BF,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nCache-Control
SF::\x20private\r\nLocation:\x20https://35\.190\.6\.186:443/\r\nContent-Le
SF:ngth:\x200\r\nDate:\x20Sun,\x2009\x20Jun\x202024\x2009:32:52\x20GMT\r\n
SF:Content-Type:\x20text/html;\x20charset=UTF-8\r\n\r\n")%r(HTTPOptions,BF
SF:,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nCache-Control:\x20private
SF:\r\nLocation:\x20https://35\.190\.6\.186:443/\r\nContent-Length:\x200\r
SF:\nDate:\x20Sun,\x2009\x20Jun\x202024\x2009:32:52\x20GMT\r\nContent-Type
SF::\x20text/html;\x20charset=UTF-8\r\n\r\n")%r(RTSPRequest,1AD,"HTTP/1\.0
SF:\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=UTF
SF:-8\r\nReferrer-Policy:\x20no-referrer\r\nContent-Length:\x20273\r\nDate
SF::\x20Sun,\x2009\x20Jun\x202024\x2009:32:52\x20GMT\r\n\r\n\n<html><head>
SF:\n<meta\x20http-equiv=\"content-type\"\x20content=\"text/html;charset=u
SF:tf-8\">\n<title>400\x20Bad\x20Request</title>\n</head>\n<body\x20text=#
SF:000000\x20bgcolor=#ffffff>\n<h1>Error:\x20Bad\x20Request</h1>\n<h2>Your
SF:\x20client\x20has\x20issued\x20a\x20malformed\x20or\x20illegal\x20reque
SF:st\.</h2>\n<h2></h2>\n</body></html>\n")%r(FourOhFourRequest,DE,"HTTP/1
SF:\.0\x20301\x20Moved\x20Permanently\r\nCache-Control:\x20private\r\nLoca
SF:tion:\x20https://35\.190\.6\.186:443/nice%20ports%2C/Trinity\.txt\.bak\
SF:r\nContent-Length:\x200\r\nDate:\x20Sun,\x2009\x20Jun\x202024\x2009:32:
SF:57\x20GMT\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\n\r\n")%r(D
SF:NSVersionBindReqTCP,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-L
SF:ength:\x2054\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nDate:\x
SF:20Sun,\x2009\x20Jun\x202024\x2009:33:07\x20GMT\r\n\r\n<html><title>Erro
SF:r\x20400\x20\(Bad\x20Request\)!!1</title></html>")%r(DNSStatusRequestTC
SF:P,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Length:\x2054\r\nCo
SF:ntent-Type:\x20text/html;\x20charset=UTF-8\r\nDate:\x20Sun,\x2009\x20Ju
SF:n\x202024\x2009:33:07\x20GMT\r\n\r\n<html><title>Error\x20400\x20\(Bad\
SF:x20Request\)!!1</title></html>")%r(Help,1AD,"HTTP/1\.0\x20400\x20Bad\x2
SF:0Request\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nReferrer-Po
SF:licy:\x20no-referrer\r\nContent-Length:\x20273\r\nDate:\x20Sun,\x2009\x
SF:20Jun\x202024\x2009:33:07\x20GMT\r\n\r\n\n<html><head>\n<meta\x20http-e
SF:quiv=\"content-type\"\x20content=\"text/html;charset=utf-8\">\n<title>4
SF:00\x20Bad\x20Request</title>\n</head>\n<body\x20text=#000000\x20bgcolor
SF:=#ffffff>\n<h1>Error:\x20Bad\x20Request</h1>\n<h2>Your\x20client\x20has
SF:\x20issued\x20a\x20malformed\x20or\x20illegal\x20request\.</h2>\n<h2></
SF:h2>\n</body></html>\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=6/9%Time=666576C9%P=x86_64-redhat-linux-
SF:gnu%r(GetRequest,E7,"HTTP/1\.0\x20500\x20Internal\x20Server\x20Error\r\
SF:nDate:\x20Sun,\x2009\x20Jun\x202024\x2009:32:58\x20GMT\r\nContent-Lengt
SF:h:\x2021\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nVia:\x201\
SF:.1\x20google\r\nAlt-Svc:\x20h3=\":443\";\x20ma=2592000,h3-29=\":443\";\
SF:x20ma=2592000\r\n\r\nInternal\x20Server\x20Error")%r(HTTPOptions,E7,"HT
SF:TP/1\.0\x20500\x20Internal\x20Server\x20Error\r\nDate:\x20Sun,\x2009\x2
SF:0Jun\x202024\x2009:32:58\x20GMT\r\nContent-Length:\x2021\r\nContent-Typ
SF:e:\x20text/plain;\x20charset=utf-8\r\nVia:\x201\.1\x20google\r\nAlt-Svc
SF::\x20h3=\":443\";\x20ma=2592000,h3-29=\":443\";\x20ma=2592000\r\n\r\nIn
SF:ternal\x20Server\x20Error")%r(FourOhFourRequest,E7,"HTTP/1\.0\x20500\x2
SF:0Internal\x20Server\x20Error\r\nDate:\x20Sun,\x2009\x20Jun\x202024\x200
SF:9:32:58\x20GMT\r\nContent-Length:\x2021\r\nContent-Type:\x20text/plain;
SF:\x20charset=utf-8\r\nVia:\x201\.1\x20google\r\nAlt-Svc:\x20h3=\":443\";
SF:\x20ma=2592000,h3-29=\":443\";\x20ma=2592000\r\n\r\nInternal\x20Server\
SF:x20Error")%r(tor-versions,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nCon
SF:tent-Length:\x2054\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nD
SF:ate:\x20Sun,\x2009\x20Jun\x202024\x2009:32:58\x20GMT\r\n\r\n<html><titl
SF:e>Error\x20400\x20\(Bad\x20Request\)!!1</title></html>")%r(RTSPRequest,
SF:1AD,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\
SF:x20charset=UTF-8\r\nReferrer-Policy:\x20no-referrer\r\nContent-Length:\
SF:x20273\r\nDate:\x20Sun,\x2009\x20Jun\x202024\x2009:33:03\x20GMT\r\n\r\n
SF:\n<html><head>\n<meta\x20http-equiv=\"content-type\"\x20content=\"text/
SF:html;charset=utf-8\">\n<title>400\x20Bad\x20Request</title>\n</head>\n<
SF:body\x20text=#000000\x20bgcolor=#ffffff>\n<h1>Error:\x20Bad\x20Request<
SF:/h1>\n<h2>Your\x20client\x20has\x20issued\x20a\x20malformed\x20or\x20il
SF:legal\x20request\.</h2>\n<h2></h2>\n</body></html>\n")%r(DNSVersionBind
SF:ReqTCP,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Length:\x2054\
SF:r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nDate:\x20Sun,\x2009\
SF:x20Jun\x202024\x2009:33:08\x20GMT\r\n\r\n<html><title>Error\x20400\x20\
SF:(Bad\x20Request\)!!1</title></html>");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 7 hops

TRACEROUTE (using port 80/tcp)
HOP RTT     ADDRESS
1   0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.62 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.75 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.36 ms google.as15169.any2ix.coresite.com (206.72.210.41)
5   0.50 ms 142.251.232.55
6   0.97 ms 209.85.250.41
7   0.51 ms 186.6.190.35.bc.googleusercontent.com (35.190.6.186)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 74.82 seconds
Color Scheme
Target
api-us.mapsindoors.com
Target IP
35.190.6.186
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A api-us.mapsindoors.com
Scan date
09 Jun 2024 05:33
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: