Scan OS information and Traceroute (nmap -A www.penskelogistics.net)
Nmap scan report for www.penskelogistics.net (159.60.134.235)
Host is up (0.0087s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http volt-adc
|_http-title: Did not follow redirect to https://www.penskelogistics.net/
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, SSLSessionReq:
| HTTP/1.1 400 Bad Request
| server: volt-adc
| content-length: 11
| content-type: text/plain
| date: Fri, 17 May 2024 00:14:21 GMT
| connection: close
| Request
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.0 400 Bad Request
| server: volt-adc
| date: Fri, 17 May 2024 00:14:16 GMT
| connection: close
| content-length: 0
| RTSPRequest, X11Probe:
| HTTP/1.1 400 Bad Request
| server: volt-adc
| content-length: 11
| content-type: text/plain
| date: Fri, 17 May 2024 00:14:16 GMT
| connection: close
|_ Request
|_http-server-header: volt-adc
443/tcp open ssl/https
|_http-title: Welcome to Penske Corporation
| http-methods:
|_ Potentially risky methods: TRACE
| ssl-cert: Subject: commonName=*.penskelogistics.net/organizationName=Penske Truck Leasing Co., L.P./stateOrProvinceName=Pennsylvania/countryName=US
| Subject Alternative Name: DNS:*.penskelogistics.net, DNS:penskelogistics.net
| Not valid before: 2023-08-15T00:00:00
|_Not valid after: 2024-09-09T23:59:59
|_http-server-header: volt-adc
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=5/16%Time=6646A157%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,79,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nserver:\x20volt-ad
SF:c\r\ndate:\x20Fri,\x2017\x20May\x202024\x2000:14:16\x20GMT\r\nconnectio
SF:n:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,79,"HTTP/1\
SF:.0\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ndate:\x20Fri,\x20
SF:17\x20May\x202024\x2000:14:16\x20GMT\r\nconnection:\x20close\r\ncontent
SF:-length:\x200\r\n\r\n")%r(RTSPRequest,9F,"HTTP/1\.1\x20400\x20Bad\x20Re
SF:quest\r\nserver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\
SF:x20text/plain\r\ndate:\x20Fri,\x2017\x20May\x202024\x2000:14:16\x20GMT\
SF:r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9F,"HTTP/1\.
SF:1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-length:\x2
SF:011\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x2017\x20May\x20202
SF:4\x2000:14:16\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(
SF:FourOhFourRequest,79,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nserver:\x20
SF:volt-adc\r\ndate:\x20Fri,\x2017\x20May\x202024\x2000:14:16\x20GMT\r\nco
SF:nnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9F,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-lengt
SF:h:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x2017\x20May\x
SF:202024\x2000:14:21\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request
SF:")%r(DNSVersionBindReqTCP,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nser
SF:ver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plai
SF:n\r\ndate:\x20Fri,\x2017\x20May\x202024\x2000:14:21\x20GMT\r\nconnectio
SF:n:\x20close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9F,"HTTP/1\.1
SF:\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-length:\x20
SF:11\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x2017\x20May\x202024
SF:\x2000:14:21\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(H
SF:elp,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\nco
SF:ntent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x20
SF:17\x20May\x202024\x2000:14:21\x20GMT\r\nconnection:\x20close\r\n\r\nBad
SF:\x20Request")%r(SSLSessionReq,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
SF:nserver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\x20text/
SF:plain\r\ndate:\x20Fri,\x2017\x20May\x202024\x2000:14:21\x20GMT\r\nconne
SF:ction:\x20close\r\n\r\nBad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 10 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.82 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.64 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4 2.61 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5 ... 6
7 9.55 ms ae-0.a04.snjsca04.us.bb.gin.ntt.net (129.250.2.123)
8 24.92 ms ae-0.f5-networks.snjsca04.us.bb.gin.ntt.net (128.242.179.46)
9 ...
10 9.66 ms 159.60.134.235
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 35.30 seconds