Scan report for "www.penskelogistics.net"

Membership level: Free member
Scan OS information and Traceroute (nmap -A www.penskelogistics.net)
Nmap scan report for www.penskelogistics.net (159.60.134.235)
Host is up (0.0087s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http      volt-adc
|_http-title: Did not follow redirect to https://www.penskelogistics.net/
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, SSLSessionReq: 
|     HTTP/1.1 400 Bad Request
|     server: volt-adc
|     content-length: 11
|     content-type: text/plain
|     date: Fri, 17 May 2024 00:14:21 GMT
|     connection: close
|     Request
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.0 400 Bad Request
|     server: volt-adc
|     date: Fri, 17 May 2024 00:14:16 GMT
|     connection: close
|     content-length: 0
|   RTSPRequest, X11Probe: 
|     HTTP/1.1 400 Bad Request
|     server: volt-adc
|     content-length: 11
|     content-type: text/plain
|     date: Fri, 17 May 2024 00:14:16 GMT
|     connection: close
|_    Request
|_http-server-header: volt-adc
443/tcp open  ssl/https
|_http-title: Welcome to Penske Corporation
| http-methods: 
|_  Potentially risky methods: TRACE
| ssl-cert: Subject: commonName=*.penskelogistics.net/organizationName=Penske Truck Leasing Co., L.P./stateOrProvinceName=Pennsylvania/countryName=US
| Subject Alternative Name: DNS:*.penskelogistics.net, DNS:penskelogistics.net
| Not valid before: 2023-08-15T00:00:00
|_Not valid after:  2024-09-09T23:59:59
|_http-server-header: volt-adc
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=5/16%Time=6646A157%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,79,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nserver:\x20volt-ad
SF:c\r\ndate:\x20Fri,\x2017\x20May\x202024\x2000:14:16\x20GMT\r\nconnectio
SF:n:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,79,"HTTP/1\
SF:.0\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ndate:\x20Fri,\x20
SF:17\x20May\x202024\x2000:14:16\x20GMT\r\nconnection:\x20close\r\ncontent
SF:-length:\x200\r\n\r\n")%r(RTSPRequest,9F,"HTTP/1\.1\x20400\x20Bad\x20Re
SF:quest\r\nserver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\
SF:x20text/plain\r\ndate:\x20Fri,\x2017\x20May\x202024\x2000:14:16\x20GMT\
SF:r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9F,"HTTP/1\.
SF:1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-length:\x2
SF:011\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x2017\x20May\x20202
SF:4\x2000:14:16\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(
SF:FourOhFourRequest,79,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nserver:\x20
SF:volt-adc\r\ndate:\x20Fri,\x2017\x20May\x202024\x2000:14:16\x20GMT\r\nco
SF:nnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9F,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-lengt
SF:h:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x2017\x20May\x
SF:202024\x2000:14:21\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request
SF:")%r(DNSVersionBindReqTCP,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nser
SF:ver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plai
SF:n\r\ndate:\x20Fri,\x2017\x20May\x202024\x2000:14:21\x20GMT\r\nconnectio
SF:n:\x20close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9F,"HTTP/1\.1
SF:\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-length:\x20
SF:11\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x2017\x20May\x202024
SF:\x2000:14:21\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(H
SF:elp,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\nco
SF:ntent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x20
SF:17\x20May\x202024\x2000:14:21\x20GMT\r\nconnection:\x20close\r\n\r\nBad
SF:\x20Request")%r(SSLSessionReq,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
SF:nserver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\x20text/
SF:plain\r\ndate:\x20Fri,\x2017\x20May\x202024\x2000:14:21\x20GMT\r\nconne
SF:ction:\x20close\r\n\r\nBad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 10 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.19 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.82 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.64 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   2.61 ms  ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5   ... 6
7   9.55 ms  ae-0.a04.snjsca04.us.bb.gin.ntt.net (129.250.2.123)
8   24.92 ms ae-0.f5-networks.snjsca04.us.bb.gin.ntt.net (128.242.179.46)
9   ...
10  9.66 ms  159.60.134.235

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 35.30 seconds
Color Scheme
Target
www.penskelogistics.net
Target IP
159.60.134.235
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A www.penskelogistics.net
Scan date
16 May 2024 20:14
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: