Scan report for "21913.mc.tritondigital.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A 21913.mc.tritondigital.com)
Nmap scan report for 21913.mc.tritondigital.com (162.244.82.218)
Host is up (0.070s latency).
rDNS record for 162.244.82.218: nyc-mg01.streamtheworld.net
Not shown: 995 filtered tcp ports (no-response)
PORT     STATE  SERVICE   VERSION
80/tcp   open   http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 400 Bad Request
|     expires: Thu, 01 Dec 2003 16:00:00 GMT
|     cache-control: no-cache, must-revalidate
|     pragma: no-cache
|     access-control-allow-headers: *
|     access-control-expose-headers: *
|     access-control-allow-methods: GET, HEAD
|     access-control-allow-origin: *
|     content-length: 105
|     content-type: text/html
|     <html><head><title>400 Bad Request</title></head><body><h1>400 Bad Request</h1>Bad request</body></html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.0 400 Bad Request
|     expires: Thu, 01 Dec 2003 16:00:00 GMT
|     cache-control: no-cache, must-revalidate
|     pragma: no-cache
|     access-control-allow-headers: *
|     access-control-expose-headers: *
|     access-control-allow-methods: GET, HEAD
|     access-control-allow-origin: *
|     content-length: 109
|     content-type: text/html
|     <html><head><title>400 Bad Request</title></head><body><h1>400 Bad Request</h1>Invalid request</body></html>
|   RTSPRequest, X11Probe: 
|     HTTP/1.1 400 Bad request
|     Content-length: 90
|     Cache-Control: no-cache
|     Connection: close
|     Content-Type: text/html
|     <html><body><h1>400 Bad request</h1>
|     Your browser sent an invalid request.
|_    </body></html>
|_http-title: 400 Bad Request
| http-robots.txt: 1 disallowed entry 
|_/
443/tcp  open   ssl/https
| http-robots.txt: 1 disallowed entry 
|_/
|_http-title: 400 Bad Request
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 400 Bad Request
|     expires: Thu, 01 Dec 2003 16:00:00 GMT
|     cache-control: no-cache, must-revalidate
|     pragma: no-cache
|     access-control-allow-headers: *
|     access-control-expose-headers: *
|     access-control-allow-methods: GET, HEAD
|     access-control-allow-origin: *
|     content-length: 105
|     content-type: text/html
|     <html><head><title>400 Bad Request</title></head><body><h1>400 Bad Request</h1>Bad request</body></html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.0 400 Bad Request
|     expires: Thu, 01 Dec 2003 16:00:00 GMT
|     cache-control: no-cache, must-revalidate
|     pragma: no-cache
|     access-control-allow-headers: *
|     access-control-expose-headers: *
|     access-control-allow-methods: GET, HEAD
|     access-control-allow-origin: *
|     content-length: 109
|     content-type: text/html
|     <html><head><title>400 Bad Request</title></head><body><h1>400 Bad Request</h1>Invalid request</body></html>
|   RTSPRequest, tor-versions: 
|     HTTP/1.1 400 Bad request
|     Content-length: 90
|     Cache-Control: no-cache
|     Connection: close
|     Content-Type: text/html
|     <html><body><h1>400 Bad request</h1>
|     Your browser sent an invalid request.
|_    </body></html>
| ssl-cert: Subject: commonName=*.mc.tritondigital.com
| Subject Alternative Name: DNS:*.mc.tritondigital.com, DNS:mc.tritondigital.com
| Not valid before: 2023-07-03T07:11:13
|_Not valid after:  2024-08-03T07:11:13
| tls-alpn: 
|   h2
|_  http/1.1
|_ssl-date: TLS randomness does not represent time
1935/tcp closed rtmp
3690/tcp closed svn
8000/tcp closed http-alt
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=5/16%Time=6645F5E7%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,1A7,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nexpires:\x20Thu,\
SF:x2001\x20Dec\x202003\x2016:00:00\x20GMT\r\ncache-control:\x20no-cache,\
SF:x20must-revalidate\r\npragma:\x20no-cache\r\naccess-control-allow-heade
SF:rs:\x20\*\r\naccess-control-expose-headers:\x20\*\r\naccess-control-all
SF:ow-methods:\x20GET,\x20HEAD\r\naccess-control-allow-origin:\x20\*\r\nco
SF:ntent-length:\x20109\r\ncontent-type:\x20text/html\r\n\r\n<html><head><
SF:title>400\x20Bad\x20Request</title></head><body><h1>400\x20Bad\x20Reque
SF:st</h1>Invalid\x20request</body></html>\n")%r(HTTPOptions,1A7,"HTTP/1\.
SF:0\x20400\x20Bad\x20Request\r\nexpires:\x20Thu,\x2001\x20Dec\x202003\x20
SF:16:00:00\x20GMT\r\ncache-control:\x20no-cache,\x20must-revalidate\r\npr
SF:agma:\x20no-cache\r\naccess-control-allow-headers:\x20\*\r\naccess-cont
SF:rol-expose-headers:\x20\*\r\naccess-control-allow-methods:\x20GET,\x20H
SF:EAD\r\naccess-control-allow-origin:\x20\*\r\ncontent-length:\x20109\r\n
SF:content-type:\x20text/html\r\n\r\n<html><head><title>400\x20Bad\x20Requ
SF:est</title></head><body><h1>400\x20Bad\x20Request</h1>Invalid\x20reques
SF:t</body></html>\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20reques
SF:t\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:
SF:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20B
SF:ad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request
SF:\.\n</body></html>\n")%r(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20reques
SF:t\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:
SF:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20B
SF:ad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request
SF:\.\n</body></html>\n")%r(FourOhFourRequest,1A3,"HTTP/1\.0\x20400\x20Bad
SF:\x20Request\r\nexpires:\x20Thu,\x2001\x20Dec\x202003\x2016:00:00\x20GMT
SF:\r\ncache-control:\x20no-cache,\x20must-revalidate\r\npragma:\x20no-cac
SF:he\r\naccess-control-allow-headers:\x20\*\r\naccess-control-expose-head
SF:ers:\x20\*\r\naccess-control-allow-methods:\x20GET,\x20HEAD\r\naccess-c
SF:ontrol-allow-origin:\x20\*\r\ncontent-length:\x20105\r\ncontent-type:\x
SF:20text/html\r\n\r\n<html><head><title>400\x20Bad\x20Request</title></he
SF:ad><body><h1>400\x20Bad\x20Request</h1>Bad\x20request</body></html>\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=5/16%Time=6645F5ED%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,1A7,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nexpires:\x
SF:20Thu,\x2001\x20Dec\x202003\x2016:00:00\x20GMT\r\ncache-control:\x20no-
SF:cache,\x20must-revalidate\r\npragma:\x20no-cache\r\naccess-control-allo
SF:w-headers:\x20\*\r\naccess-control-expose-headers:\x20\*\r\naccess-cont
SF:rol-allow-methods:\x20GET,\x20HEAD\r\naccess-control-allow-origin:\x20\
SF:*\r\ncontent-length:\x20109\r\ncontent-type:\x20text/html\r\n\r\n<html>
SF:<head><title>400\x20Bad\x20Request</title></head><body><h1>400\x20Bad\x
SF:20Request</h1>Invalid\x20request</body></html>\n")%r(HTTPOptions,1A7,"H
SF:TTP/1\.0\x20400\x20Bad\x20Request\r\nexpires:\x20Thu,\x2001\x20Dec\x202
SF:003\x2016:00:00\x20GMT\r\ncache-control:\x20no-cache,\x20must-revalidat
SF:e\r\npragma:\x20no-cache\r\naccess-control-allow-headers:\x20\*\r\nacce
SF:ss-control-expose-headers:\x20\*\r\naccess-control-allow-methods:\x20GE
SF:T,\x20HEAD\r\naccess-control-allow-origin:\x20\*\r\ncontent-length:\x20
SF:109\r\ncontent-type:\x20text/html\r\n\r\n<html><head><title>400\x20Bad\
SF:x20Request</title></head><body><h1>400\x20Bad\x20Request</h1>Invalid\x2
SF:0request</body></html>\n")%r(FourOhFourRequest,1A3,"HTTP/1\.0\x20400\x2
SF:0Bad\x20Request\r\nexpires:\x20Thu,\x2001\x20Dec\x202003\x2016:00:00\x2
SF:0GMT\r\ncache-control:\x20no-cache,\x20must-revalidate\r\npragma:\x20no
SF:-cache\r\naccess-control-allow-headers:\x20\*\r\naccess-control-expose-
SF:headers:\x20\*\r\naccess-control-allow-methods:\x20GET,\x20HEAD\r\nacce
SF:ss-control-allow-origin:\x20\*\r\ncontent-length:\x20105\r\ncontent-typ
SF:e:\x20text/html\r\n\r\n<html><head><title>400\x20Bad\x20Request</title>
SF:</head><body><h1>400\x20Bad\x20Request</h1>Bad\x20request</body></html>
SF:\n")%r(tor-versions,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-l
SF:ength:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nC
SF:ontent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request<
SF:/h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></h
SF:tml>\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConten
SF:t-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r
SF:\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20reque
SF:st</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body>
SF:</html>\n");
Aggressive OS guesses: Oracle VM Server 3.4.2 (Linux 4.1) (96%), HP P2000 G3 NAS device (91%), Infomir MAG-250 set-top box (91%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (91%), Linux 5.1 (91%), Linux 5.0 - 5.4 (90%), Ubiquiti Pico Station WAP (AirOS 5.2.6) (90%), Linux 2.6.32 - 3.13 (90%), Linux 2.6.32 (90%), Linux 3.7 (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops

TRACEROUTE (using port 1935/tcp)
HOP RTT      ADDRESS
1   0.19 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.57 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.64 ms  r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   ...
5   12.47 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   21.43 ms be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218)
7   33.62 ms be2427.ccr21.den01.atlas.cogentco.com (154.54.87.22)
8   45.06 ms be3035.ccr21.mci01.atlas.cogentco.com (154.54.5.90)
9   56.65 ms be2831.ccr41.ord01.atlas.cogentco.com (154.54.42.166)
10  62.97 ms be2717.ccr21.cle04.atlas.cogentco.com (154.54.6.222)
11  72.05 ms 154.54.162.166
12  72.22 ms be3362.ccr31.jfk04.atlas.cogentco.com (154.54.3.10)
13  ...
14  71.56 ms nyc-mg01.streamtheworld.net (162.244.82.218)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 53.15 seconds
Color Scheme
Target
21913.mc.tritondigital.com
Target IP
162.244.82.218
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A 21913.mc.tritondigital.com
Scan date
16 May 2024 08:03
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: