Scan report for "oshola.shalltry.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A oshola.shalltry.com)
Nmap scan report for oshola.shalltry.com (47.254.171.103)
Host is up (0.15s latency).
Other addresses for oshola.shalltry.com (not scanned): 240b:4005:21:9d00:5fa6:eabb:a77a:db51
Not shown: 999 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
443/tcp open  ssl/https
| tls-nextprotoneg: 
|   h2
|_  http/1.1
| ssl-cert: Subject: commonName=*.shalltry.com
| Subject Alternative Name: DNS:*.shalltry.com, DNS:shalltry.com
| Not valid before: 2023-12-01T00:00:00
|_Not valid after:  2024-12-19T23:59:59
|_ssl-date: TLS randomness does not represent time
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
| tls-alpn: 
|_  http/1.1
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Date: Tue, 13 Feb 2024 11:18:59 GMT
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Vary: Accept-Encoding
|     {"error_msg":"404 Route Not Found"}
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Date: Tue, 13 Feb 2024 11:18:58 GMT
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Vary: Accept-Encoding
|_    {"error_msg":"404 Route Not Found"}
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=2/13%Time=65CB5022%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,B6,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Tue,
SF:\x2013\x20Feb\x202024\x2011:18:58\x20GMT\r\nContent-Type:\x20text/plain
SF:;\x20charset=utf-8\r\nConnection:\x20close\r\nVary:\x20Accept-Encoding\
SF:r\n\r\n{\"error_msg\":\"404\x20Route\x20Not\x20Found\"}\n")%r(HTTPOptio
SF:ns,B6,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Tue,\x2013\x20Feb\x
SF:202024\x2011:18:58\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=ut
SF:f-8\r\nConnection:\x20close\r\nVary:\x20Accept-Encoding\r\n\r\n{\"error
SF:_msg\":\"404\x20Route\x20Not\x20Found\"}\n")%r(FourOhFourRequest,B6,"HT
SF:TP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Tue,\x2013\x20Feb\x202024\x2
SF:011:18:59\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nCo
SF:nnection:\x20close\r\nVary:\x20Accept-Encoding\r\n\r\n{\"error_msg\":\"
SF:404\x20Route\x20Not\x20Found\"}\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 16 hops

TRACEROUTE (using port 443/tcp)
HOP RTT       ADDRESS
1   0.21 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.68 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.62 ms   r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   1.03 ms   be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   0.82 ms   be3360.ccr41.lax04.atlas.cogentco.com (154.54.25.150)
6   0.79 ms   lax-b22-link.ip.twelve99.net (80.239.160.64)
7   150.41 ms lax-b22-link.ip.twelve99.net (62.115.143.39)
8   137.59 ms prs-bb2-link.ip.twelve99.net (62.115.122.158)
9   153.02 ms ffm-bb1-link.ip.twelve99.net (62.115.123.12)
10  150.59 ms ffm-b11-link.ip.twelve99.net (62.115.124.117)
11  ... 13
14  152.72 ms ffm-bb1-link.ip.twelve99.net (62.115.123.12)
15  ...
16  147.47 ms 47.254.171.103

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 63.88 seconds
Color Scheme
Target
oshola.shalltry.com
Target IP
47.254.171.103
Target Country
DE
Scan method
Scan OS information and Traceroute
Run command
nmap -A oshola.shalltry.com
Scan date
13 Feb 2024 06:19
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: