Scan OS information and Traceroute (nmap -A widgets.oddschecker.com)
Nmap scan report for widgets.oddschecker.com (34.160.176.88)
Host is up (0.00041s latency).
rDNS record for 34.160.176.88: 88.176.160.34.bc.googleusercontent.com
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http openresty
| fingerprint-strings:
| DNSVersionBindReqTCP:
| HTTP/1.0 400 Bad Request
| Content-Length: 54
| Content-Type: text/html; charset=UTF-8
| Date: Sun, 19 Nov 2023 22:32:35 GMT
| <html><title>Error 400 (Bad Request)!!1</title></html>
| FourOhFourRequest:
| HTTP/1.0 404 Not Found
| Server: openresty
| Date: Sun, 19 Nov 2023 22:32:25 GMT
| Content-Type: text/html
| Content-Length: 166
| Vary: Accept-Encoding
| Via: 1.1 google
| <html>
| <head><title>404 Not Found</title></head>
| <body bgcolor="white">
| <center><h1>404 Not Found</h1></center>
| <hr><center>openresty</center>
| </body>
| </html>
| GetRequest, HTTPOptions:
| HTTP/1.0 404 Not Found
| Server: openresty
| Date: Sun, 19 Nov 2023 22:32:19 GMT
| Content-Type: text/html
| Content-Length: 166
| Vary: Accept-Encoding
| Via: 1.1 google
| <html>
| <head><title>404 Not Found</title></head>
| <body bgcolor="white">
| <center><h1>404 Not Found</h1></center>
| <hr><center>openresty</center>
| </body>
| </html>
| RTSPRequest:
| HTTP/1.0 400 Bad Request
| Content-Type: text/html; charset=UTF-8
| Referrer-Policy: no-referrer
| Content-Length: 273
| Date: Sun, 19 Nov 2023 22:32:19 GMT
| <html><head>
| <meta http-equiv="content-type" content="text/html;charset=utf-8">
| <title>400 Bad Request</title>
| </head>
| <body text=#000000 bgcolor=#ffffff>
| <h1>Error: Bad Request</h1>
| <h2>Your client has issued a malformed or illegal request.</h2>
| <h2></h2>
|_ </body></html>
|_http-server-header: openresty
|_http-title: 404 Not Found
443/tcp open ssl/https openresty
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.0 404 Not Found
| Server: openresty
| Date: Sun, 19 Nov 2023 22:32:26 GMT
| Content-Type: text/html
| Content-Length: 166
| Vary: Accept-Encoding
| Via: 1.1 google
| Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
| <html>
| <head><title>404 Not Found</title></head>
| <body bgcolor="white">
| <center><h1>404 Not Found</h1></center>
| <hr><center>openresty</center>
| </body>
| </html>
| GetRequest, HTTPOptions:
| HTTP/1.0 404 Not Found
| Server: openresty
| Date: Sun, 19 Nov 2023 22:32:25 GMT
| Content-Type: text/html
| Content-Length: 166
| Vary: Accept-Encoding
| Via: 1.1 google
| Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
| <html>
| <head><title>404 Not Found</title></head>
| <body bgcolor="white">
| <center><h1>404 Not Found</h1></center>
| <hr><center>openresty</center>
| </body>
| </html>
| RTSPRequest:
| HTTP/1.0 400 Bad Request
| Content-Type: text/html; charset=UTF-8
| Referrer-Policy: no-referrer
| Content-Length: 273
| Date: Sun, 19 Nov 2023 22:32:31 GMT
| <html><head>
| <meta http-equiv="content-type" content="text/html;charset=utf-8">
| <title>400 Bad Request</title>
| </head>
| <body text=#000000 bgcolor=#ffffff>
| <h1>Error: Bad Request</h1>
| <h2>Your client has issued a malformed or illegal request.</h2>
| <h2></h2>
| </body></html>
| tor-versions:
| HTTP/1.0 400 Bad Request
| Content-Length: 54
| Content-Type: text/html; charset=UTF-8
| Date: Sun, 19 Nov 2023 22:32:26 GMT
|_ <html><title>Error 400 (Bad Request)!!1</title></html>
|_http-server-header: openresty
|_http-title: 404 Not Found
| ssl-cert: Subject: commonName=www.oddschecker.com/organizationName=Cyan Blue Odds USA Limited/stateOrProvinceName=London, City of/countryName=GB
| Subject Alternative Name: DNS:www.oddschecker.com, DNS:api.oddschecker.com, DNS:clickout.cloud.oddschecker.com, DNS:clickout.oddschecker.com, DNS:clients.oddschecker.com, DNS:diffusion.oddschecker.com, DNS:downloads.oddschecker.com, DNS:live-analytics.oddschecker.com, DNS:m.oddschecker.com, DNS:oc-connect.oddschecker.com, DNS:oddschecker.com, DNS:secure.oddschecker.com, DNS:static.oddschecker.com, DNS:widgets.oddschecker.com
| Not valid before: 2022-11-16T00:00:00
|_Not valid after: 2023-11-21T23:59:59
|_ssl-date: 2023-11-19T22:33:35+00:00; 0s from scanner time.
| tls-alpn:
| grpc-exp
| h2
|_ http/1.1
| tls-nextprotoneg:
| grpc-exp
| h2
|_ http/1.1
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=655A8CF3%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,14E,"HTTP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20openres
SF:ty\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:19\x20GMT\r\nContent-
SF:Type:\x20text/html\r\nContent-Length:\x20166\r\nVary:\x20Accept-Encodin
SF:g\r\nVia:\x201\.1\x20google\r\n\r\n<html>\r\n<head><title>404\x20Not\x2
SF:0Found</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>404
SF:\x20Not\x20Found</h1></center>\r\n<hr><center>openresty</center>\r\n</b
SF:ody>\r\n</html>\r\n")%r(HTTPOptions,14E,"HTTP/1\.0\x20404\x20Not\x20Fou
SF:nd\r\nServer:\x20openresty\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2022:
SF:32:19\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20166\r\
SF:nVary:\x20Accept-Encoding\r\nVia:\x201\.1\x20google\r\n\r\n<html>\r\n<h
SF:ead><title>404\x20Not\x20Found</title></head>\r\n<body\x20bgcolor=\"whi
SF:te\">\r\n<center><h1>404\x20Not\x20Found</h1></center>\r\n<hr><center>o
SF:penresty</center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,1AD,"HTTP/1
SF:\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=
SF:UTF-8\r\nReferrer-Policy:\x20no-referrer\r\nContent-Length:\x20273\r\nD
SF:ate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:19\x20GMT\r\n\r\n\n<html><he
SF:ad>\n<meta\x20http-equiv=\"content-type\"\x20content=\"text/html;charse
SF:t=utf-8\">\n<title>400\x20Bad\x20Request</title>\n</head>\n<body\x20tex
SF:t=#000000\x20bgcolor=#ffffff>\n<h1>Error:\x20Bad\x20Request</h1>\n<h2>Y
SF:our\x20client\x20has\x20issued\x20a\x20malformed\x20or\x20illegal\x20re
SF:quest\.</h2>\n<h2></h2>\n</body></html>\n")%r(FourOhFourRequest,14E,"HT
SF:TP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20openresty\r\nDate:\x20Sun,
SF:\x2019\x20Nov\x202023\x2022:32:25\x20GMT\r\nContent-Type:\x20text/html\
SF:r\nContent-Length:\x20166\r\nVary:\x20Accept-Encoding\r\nVia:\x201\.1\x
SF:20google\r\n\r\n<html>\r\n<head><title>404\x20Not\x20Found</title></hea
SF:d>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>404\x20Not\x20Found</h
SF:1></center>\r\n<hr><center>openresty</center>\r\n</body>\r\n</html>\r\n
SF:")%r(DNSVersionBindReqTCP,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nCon
SF:tent-Length:\x2054\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nD
SF:ate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:35\x20GMT\r\n\r\n<html><titl
SF:e>Error\x20400\x20\(Bad\x20Request\)!!1</title></html>");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655A8CF9%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,187,"HTTP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20
SF:openresty\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:25\x20GMT\r\nC
SF:ontent-Type:\x20text/html\r\nContent-Length:\x20166\r\nVary:\x20Accept-
SF:Encoding\r\nVia:\x201\.1\x20google\r\nAlt-Svc:\x20h3=\":443\";\x20ma=25
SF:92000,h3-29=\":443\";\x20ma=2592000\r\n\r\n<html>\r\n<head><title>404\x
SF:20Not\x20Found</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center
SF:><h1>404\x20Not\x20Found</h1></center>\r\n<hr><center>openresty</center
SF:>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,187,"HTTP/1\.0\x20404\x20No
SF:t\x20Found\r\nServer:\x20openresty\r\nDate:\x20Sun,\x2019\x20Nov\x20202
SF:3\x2022:32:25\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x
SF:20166\r\nVary:\x20Accept-Encoding\r\nVia:\x201\.1\x20google\r\nAlt-Svc:
SF:\x20h3=\":443\";\x20ma=2592000,h3-29=\":443\";\x20ma=2592000\r\n\r\n<ht
SF:ml>\r\n<head><title>404\x20Not\x20Found</title></head>\r\n<body\x20bgco
SF:lor=\"white\">\r\n<center><h1>404\x20Not\x20Found</h1></center>\r\n<hr>
SF:<center>openresty</center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequ
SF:est,187,"HTTP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20openresty\r\nDa
SF:te:\x20Sun,\x2019\x20Nov\x202023\x2022:32:26\x20GMT\r\nContent-Type:\x2
SF:0text/html\r\nContent-Length:\x20166\r\nVary:\x20Accept-Encoding\r\nVia
SF::\x201\.1\x20google\r\nAlt-Svc:\x20h3=\":443\";\x20ma=2592000,h3-29=\":
SF:443\";\x20ma=2592000\r\n\r\n<html>\r\n<head><title>404\x20Not\x20Found<
SF:/title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>404\x20Not
SF:\x20Found</h1></center>\r\n<hr><center>openresty</center>\r\n</body>\r\
SF:n</html>\r\n")%r(tor-versions,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\
SF:nContent-Length:\x2054\r\nContent-Type:\x20text/html;\x20charset=UTF-8\
SF:r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:26\x20GMT\r\n\r\n<html><
SF:title>Error\x20400\x20\(Bad\x20Request\)!!1</title></html>")%r(RTSPRequ
SF:est,1AD,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/ht
SF:ml;\x20charset=UTF-8\r\nReferrer-Policy:\x20no-referrer\r\nContent-Leng
SF:th:\x20273\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:31\x20GMT\r\n
SF:\r\n\n<html><head>\n<meta\x20http-equiv=\"content-type\"\x20content=\"t
SF:ext/html;charset=utf-8\">\n<title>400\x20Bad\x20Request</title>\n</head
SF:>\n<body\x20text=#000000\x20bgcolor=#ffffff>\n<h1>Error:\x20Bad\x20Requ
SF:est</h1>\n<h2>Your\x20client\x20has\x20issued\x20a\x20malformed\x20or\x
SF:20illegal\x20request\.</h2>\n<h2></h2>\n</body></html>\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 7 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.20 ms 208.76.251.177
2 0.53 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.68 ms multacom.com (96.45.162.9)
4 0.39 ms 206.72.211.148.any2ix.coresite.com (206.72.211.148)
5 1.48 ms 108.170.247.129
6 0.32 ms 209.85.248.131
7 0.36 ms 88.176.160.34.bc.googleusercontent.com (34.160.176.88)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 94.17 seconds
Color Scheme
-
Target
-
Target IP
34.160.176.88
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A widgets.oddschecker.com
-
Scan date
19 Nov 2023 17:33
-
Copy scan report
-
Download report
-
Remove scan result
-
Total scans