Scan report for "mxa-00168f01.gslb.pphosted.com"

Membership level: Free member

mxa-00168f01.gslb.pphosted.com

67.231.156.122Target IP location is United States of America

Summary

Ports

4

Duration

2min 29.81sec (149.81sec)

Date

2025-05-10

IP

67.231.156.122

Report
Scan OS information and Traceroute (nmap -A mxa-00168f01.gslb.pphosted.com)
Nmap scan report for mxa-00168f01.gslb.pphosted.com (67.231.156.122)
Host is up (0.050s latency).
rDNS record for 67.231.156.122: mx0b-00168f01.pphosted.com
Not shown: 997 closed tcp ports (reset)
PORT      STATE SERVICE               VERSION
25/tcp    open  smtp
|_smtp-commands: mx0b-00168f01.pphosted.com Hello 208.76.253.234.rdns.ColocationAmerica.com [208.76.253.234] (may be forged), pleased to meet you, ENHANCEDSTATUSCODES, PIPELINING, 8BITMIME, SIZE 157286400, STARTTLS
| fingerprint-strings: 
|   GenericLines: 
|     220 mx0b-00168f01.pphosted.com ESMTP mfa-m0045195
|     5.5.1 Command unrecognized: ""
|     5.5.1 Command unrecognized: ""
|   GetRequest: 
|     220 mx0b-00168f01.pphosted.com ESMTP mfa-m0045194
|     4.7.0 Open proxy prohibited
|   Hello: 
|     220 mx0b-00168f01.pphosted.com ESMTP mfa-m0284479
|     5.5.4 Domain name required
|   Help: 
|     220 mx0b-00168f01.pphosted.com ESMTP mfa-m0284477
|     5.5.1 Command unrecognized: "HELP"
|   NULL: 
|_    220 mx0b-00168f01.pphosted.com ESMTP mfa-m0284479
| ssl-cert: Subject: commonName=*.pphosted.com/organizationName=Proofpoint, Inc./stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.pphosted.com, DNS:*.gslb.pphosted.com, DNS:pphosted.com
| Not valid before: 2025-02-04T00:00:00
|_Not valid after:  2026-02-04T23:59:59
|_ssl-date: TLS randomness does not represent time
10000/tcp open  ssl/snet-sensor-mgmt?
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 11 May 2025 00:39:07 GMT
|     Server: 
|     Strict-Transport-Security: max-age=31536000; includeSubDomains
|     Content-Length: 12
|     Connection: close
|     Content-Type: text/html; charset=iso-8859-1
|     Request.
|   HTTPOptions, RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 11 May 2025 00:39:08 GMT
|     Server: 
|     Strict-Transport-Security: max-age=31536000; includeSubDomains
|     Content-Length: 12
|     Connection: close
|     Content-Type: text/html; charset=iso-8859-1
|     Request.
|   Help, SSLSessionReq, TLSSessionReq, TerminalServerCookie: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 11 May 2025 00:39:24 GMT
|     Server: 
|     Strict-Transport-Security: max-age=31536000; includeSubDomains
|     Content-Length: 12
|     Connection: close
|     Content-Type: text/html; charset=iso-8859-1
|_    Request.
| ssl-cert: Subject: commonName=*.pphosted.com/organizationName=Proofpoint, Inc./stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.pphosted.com, DNS:*.gslb.pphosted.com, DNS:pphosted.com
| Not valid before: 2025-02-04T00:00:00
|_Not valid after:  2026-02-04T23:59:59
10001/tcp open  ssl/scp-config?
| fingerprint-strings: 
|   GetRequest, HTTPOptions, RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 11 May 2025 00:39:08 GMT
|     Server: 
|     Strict-Transport-Security: max-age=31536000; includeSubDomains
|     Content-Length: 12
|     Connection: close
|     Content-Type: text/html; charset=iso-8859-1
|     Request.
|   Help, SSLSessionReq, TerminalServerCookie: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 11 May 2025 00:39:24 GMT
|     Server: 
|     Strict-Transport-Security: max-age=31536000; includeSubDomains
|     Content-Length: 12
|     Connection: close
|     Content-Type: text/html; charset=iso-8859-1
|     Request.
|   TLSSessionReq: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 11 May 2025 00:39:25 GMT
|     Server: 
|     Strict-Transport-Security: max-age=31536000; includeSubDomains
|     Content-Length: 12
|     Connection: close
|     Content-Type: text/html; charset=iso-8859-1
|_    Request.
| ssl-cert: Subject: commonName=*.pphosted.com/organizationName=Proofpoint, Inc./stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.pphosted.com, DNS:*.gslb.pphosted.com, DNS:pphosted.com
| Not valid before: 2025-02-04T00:00:00
|_Not valid after:  2026-02-04T23:59:59
3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port25-TCP:V=7.92%I=7%D=5/10%Time=681FF19A%P=x86_64-redhat-linux-gnu%r(
SF:NULL,33,"220\x20mx0b-00168f01\.pphosted\.com\x20ESMTP\x20mfa-m0284479\r
SF:\n")%r(Hello,53,"220\x20mx0b-00168f01\.pphosted\.com\x20ESMTP\x20mfa-m0
SF:284479\r\n501\x205\.5\.4\x20Domain\x20name\x20required\r\n")%r(Help,5B,
SF:"220\x20mx0b-00168f01\.pphosted\.com\x20ESMTP\x20mfa-m0284477\r\n500\x2
SF:05\.5\.1\x20Command\x20unrecognized:\x20\"HELP\"\r\n")%r(GenericLines,7
SF:B,"220\x20mx0b-00168f01\.pphosted\.com\x20ESMTP\x20mfa-m0045195\r\n500\
SF:x205\.5\.1\x20Command\x20unrecognized:\x20\"\"\r\n500\x205\.5\.1\x20Com
SF:mand\x20unrecognized:\x20\"\"\r\n")%r(GetRequest,54,"220\x20mx0b-00168f
SF:01\.pphosted\.com\x20ESMTP\x20mfa-m0045194\r\n421\x204\.7\.0\x20Open\x2
SF:0proxy\x20prohibited\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port10000-TCP:V=7.92%T=SSL%I=7%D=5/10%Time=681FF1AB%P=x86_64-redhat-lin
SF:ux-gnu%r(GetRequest,EC,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20
SF:Sun,\x2011\x20May\x202025\x2000:39:07\x20GMT\r\nServer:\x20\x20\r\nStri
SF:ct-Transport-Security:\x20max-age=31536000;\x20includeSubDomains\r\nCon
SF:tent-Length:\x2012\r\nConnection:\x20close\r\nContent-Type:\x20text/htm
SF:l;\x20charset=iso-8859-1\r\n\r\nBad\x20Request\.")%r(HTTPOptions,EC,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2011\x20May\x202025\
SF:x2000:39:08\x20GMT\r\nServer:\x20\x20\r\nStrict-Transport-Security:\x20
SF:max-age=31536000;\x20includeSubDomains\r\nContent-Length:\x2012\r\nConn
SF:ection:\x20close\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1\r
SF:\n\r\nBad\x20Request\.")%r(RTSPRequest,EC,"HTTP/1\.1\x20400\x20Bad\x20R
SF:equest\r\nDate:\x20Sun,\x2011\x20May\x202025\x2000:39:08\x20GMT\r\nServ
SF:er:\x20\x20\r\nStrict-Transport-Security:\x20max-age=31536000;\x20inclu
SF:deSubDomains\r\nContent-Length:\x2012\r\nConnection:\x20close\r\nConten
SF:t-Type:\x20text/html;\x20charset=iso-8859-1\r\n\r\nBad\x20Request\.")%r
SF:(Help,EC,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2011\x20
SF:May\x202025\x2000:39:24\x20GMT\r\nServer:\x20\x20\r\nStrict-Transport-S
SF:ecurity:\x20max-age=31536000;\x20includeSubDomains\r\nContent-Length:\x
SF:2012\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=
SF:iso-8859-1\r\n\r\nBad\x20Request\.")%r(SSLSessionReq,EC,"HTTP/1\.1\x204
SF:00\x20Bad\x20Request\r\nDate:\x20Sun,\x2011\x20May\x202025\x2000:39:24\
SF:x20GMT\r\nServer:\x20\x20\r\nStrict-Transport-Security:\x20max-age=3153
SF:6000;\x20includeSubDomains\r\nContent-Length:\x2012\r\nConnection:\x20c
SF:lose\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1\r\n\r\nBad\x2
SF:0Request\.")%r(TerminalServerCookie,EC,"HTTP/1\.1\x20400\x20Bad\x20Requ
SF:est\r\nDate:\x20Sun,\x2011\x20May\x202025\x2000:39:24\x20GMT\r\nServer:
SF:\x20\x20\r\nStrict-Transport-Security:\x20max-age=31536000;\x20includeS
SF:ubDomains\r\nContent-Length:\x2012\r\nConnection:\x20close\r\nContent-T
SF:ype:\x20text/html;\x20charset=iso-8859-1\r\n\r\nBad\x20Request\.")%r(TL
SF:SSessionReq,EC,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x20
SF:11\x20May\x202025\x2000:39:24\x20GMT\r\nServer:\x20\x20\r\nStrict-Trans
SF:port-Security:\x20max-age=31536000;\x20includeSubDomains\r\nContent-Len
SF:gth:\x2012\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20ch
SF:arset=iso-8859-1\r\n\r\nBad\x20Request\.");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port10001-TCP:V=7.92%T=SSL%I=7%D=5/10%Time=681FF1AB%P=x86_64-redhat-lin
SF:ux-gnu%r(GetRequest,EC,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20
SF:Sun,\x2011\x20May\x202025\x2000:39:08\x20GMT\r\nServer:\x20\x20\r\nStri
SF:ct-Transport-Security:\x20max-age=31536000;\x20includeSubDomains\r\nCon
SF:tent-Length:\x2012\r\nConnection:\x20close\r\nContent-Type:\x20text/htm
SF:l;\x20charset=iso-8859-1\r\n\r\nBad\x20Request\.")%r(HTTPOptions,EC,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2011\x20May\x202025\
SF:x2000:39:08\x20GMT\r\nServer:\x20\x20\r\nStrict-Transport-Security:\x20
SF:max-age=31536000;\x20includeSubDomains\r\nContent-Length:\x2012\r\nConn
SF:ection:\x20close\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1\r
SF:\n\r\nBad\x20Request\.")%r(RTSPRequest,EC,"HTTP/1\.1\x20400\x20Bad\x20R
SF:equest\r\nDate:\x20Sun,\x2011\x20May\x202025\x2000:39:08\x20GMT\r\nServ
SF:er:\x20\x20\r\nStrict-Transport-Security:\x20max-age=31536000;\x20inclu
SF:deSubDomains\r\nContent-Length:\x2012\r\nConnection:\x20close\r\nConten
SF:t-Type:\x20text/html;\x20charset=iso-8859-1\r\n\r\nBad\x20Request\.")%r
SF:(Help,EC,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2011\x20
SF:May\x202025\x2000:39:24\x20GMT\r\nServer:\x20\x20\r\nStrict-Transport-S
SF:ecurity:\x20max-age=31536000;\x20includeSubDomains\r\nContent-Length:\x
SF:2012\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset=
SF:iso-8859-1\r\n\r\nBad\x20Request\.")%r(SSLSessionReq,EC,"HTTP/1\.1\x204
SF:00\x20Bad\x20Request\r\nDate:\x20Sun,\x2011\x20May\x202025\x2000:39:24\
SF:x20GMT\r\nServer:\x20\x20\r\nStrict-Transport-Security:\x20max-age=3153
SF:6000;\x20includeSubDomains\r\nContent-Length:\x2012\r\nConnection:\x20c
SF:lose\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1\r\n\r\nBad\x2
SF:0Request\.")%r(TerminalServerCookie,EC,"HTTP/1\.1\x20400\x20Bad\x20Requ
SF:est\r\nDate:\x20Sun,\x2011\x20May\x202025\x2000:39:24\x20GMT\r\nServer:
SF:\x20\x20\r\nStrict-Transport-Security:\x20max-age=31536000;\x20includeS
SF:ubDomains\r\nContent-Length:\x2012\r\nConnection:\x20close\r\nContent-T
SF:ype:\x20text/html;\x20charset=iso-8859-1\r\n\r\nBad\x20Request\.")%r(TL
SF:SSessionReq,EC,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x20
SF:11\x20May\x202025\x2000:39:25\x20GMT\r\nServer:\x20\x20\r\nStrict-Trans
SF:port-Security:\x20max-age=31536000;\x20includeSubDomains\r\nContent-Len
SF:gth:\x2012\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20ch
SF:arset=iso-8859-1\r\n\r\nBad\x20Request\.");
Device type: general purpose
Running (JUST GUESSING): FreeBSD 7.X (87%), OpenBSD 4.X|6.X|5.X (86%)
OS CPE: cpe:/o:freebsd:freebsd:7.0 cpe:/o:openbsd:openbsd:4.4 cpe:/o:openbsd:openbsd:6 cpe:/o:openbsd:openbsd:5
Aggressive OS guesses: FreeBSD 7.0-RELEASE (87%), OpenBSD 4.4 - 4.5 (86%), OpenBSD 6.0 - 6.4 (86%), OpenBSD 5.0 - 5.8 (85%), OpenBSD 5.0 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops

TRACEROUTE (using port 143/tcp)
HOP RTT      ADDRESS
1   0.26 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.53 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.68 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   0.89 ms  be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102)
6   0.76 ms  telia.lax05.atlas.cogentco.com (154.54.10.10)
7   ... 8
9   81.61 ms nash-bb1-link.ip.twelve99.net (62.115.137.44)
10  82.18 ms atl-b10-link.ip.twelve99.net (62.115.140.179)
11  82.27 ms atl-b10-link.ip.twelve99.net (62.115.140.179)
12  82.18 ms atl-b10-link.ip.twelve99.net (62.115.140.179)
13  ...
14  49.96 ms mx0b-00168f01.pphosted.com (67.231.156.122)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 149.81 seconds
Color Scheme
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Detailed report
Target
mxa-00168f01.gslb.pphosted.com
Target IP
67.231.156.122
Host status
UP
Target Country
Target IP location is United States of America
United States of America
Free scan
Free scan
Scan method
Scan OS information and Traceroute
Scan status
Identified 4 ports
Run command
nmap -A mxa-00168f01.gslb.pphosted.com
Scan date
10 May 2025 20:41
API - Scan ID
Scan duration
2min 29.81sec (149.81sec)
Download report
Remove scan result
$
Total scans
Scan more
Pricing

REGISTERED


Features

5 scans/day

Daily API Calls - 20 request

Save log

Public scan

OSINT scan

Unlisted scan

Private scan

No Ads

Remove after scan

Remove scan result

Additional methods for scan

This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.

$0.00

Lifetime

Register

PROFESSIONAL


Features

10 000 scans/day

Daily API Calls - 100 000 request

Save log

Public scan

OSINT scan

Unlisted scan

Private scan

No Ads

Remove after scan

Remove scan result

Additional methods for scan

This option is best for professionals who need to test their host's open ports from an external source.

$7.50 $3.75/Month

Billed Annually @ $45.00 - 50% discount

Get Professional