Scan report for "gcdn0.wixdns.net"

Membership level: Free member
Scan OS information and Traceroute (nmap -A gcdn0.wixdns.net)
Nmap scan report for gcdn0.wixdns.net (34.149.87.45)
Host is up (0.00045s latency).
rDNS record for 34.149.87.45: 45.87.149.34.bc.googleusercontent.com
Not shown: 998 filtered ports
PORT    STATE SERVICE    VERSION
80/tcp  open  http
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP: 
|     HTTP/1.0 400 Bad Request
|     Content-Length: 54
|     Content-Type: text/html; charset=UTF-8
|     Date: Tue, 21 Nov 2023 08:37:44 GMT
|     <html><title>Error 400 (Bad Request)!!1</title></html>
|   FourOhFourRequest: 
|     HTTP/1.0 403 Forbidden
|     Content-Length: 134
|     Content-Type: text/html; charset=UTF-8
|     Date: Tue, 21 Nov 2023 08:37:34 GMT
|     <!doctype html><meta charset="utf-8"><meta name=viewport content="width=device-width, initial-scale=1"><title>403</title>403 Forbidden
|   GetRequest, HTTPOptions: 
|     HTTP/1.0 403 Forbidden
|     Content-Length: 134
|     Content-Type: text/html; charset=UTF-8
|     Date: Tue, 21 Nov 2023 08:37:29 GMT
|     <!doctype html><meta charset="utf-8"><meta name=viewport content="width=device-width, initial-scale=1"><title>403</title>403 Forbidden
|   RTSPRequest: 
|     HTTP/1.0 400 Bad Request
|     Content-Type: text/html; charset=UTF-8
|     Referrer-Policy: no-referrer
|     Content-Length: 273
|     Date: Tue, 21 Nov 2023 08:37:29 GMT
|     <html><head>
|     <meta http-equiv="content-type" content="text/html;charset=utf-8">
|     <title>400 Bad Request</title>
|     </head>
|     <body text=#000000 bgcolor=#ffffff>
|     <h1>Error: Bad Request</h1>
|     <h2>Your client has issued a malformed or illegal request.</h2>
|     <h2></h2>
|_    </body></html>
|_http-title: 403
443/tcp open  ssl/https?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.70%I=7%D=11/21%Time=655C6C48%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,102,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\x2013
SF:4\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nDate:\x20Tue,\x202
SF:1\x20Nov\x202023\x2008:37:29\x20GMT\r\n\r\n<!doctype\x20html><meta\x20c
SF:harset=\"utf-8\"><meta\x20name=viewport\x20content=\"width=device-width
SF:,\x20initial-scale=1\"><title>403</title>403\x20Forbidden")%r(HTTPOptio
SF:ns,102,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\x20134\r\nCont
SF:ent-Type:\x20text/html;\x20charset=UTF-8\r\nDate:\x20Tue,\x2021\x20Nov\
SF:x202023\x2008:37:29\x20GMT\r\n\r\n<!doctype\x20html><meta\x20charset=\"
SF:utf-8\"><meta\x20name=viewport\x20content=\"width=device-width,\x20init
SF:ial-scale=1\"><title>403</title>403\x20Forbidden")%r(RTSPRequest,1AD,"H
SF:TTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20cha
SF:rset=UTF-8\r\nReferrer-Policy:\x20no-referrer\r\nContent-Length:\x20273
SF:\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2008:37:29\x20GMT\r\n\r\n\n<htm
SF:l><head>\n<meta\x20http-equiv=\"content-type\"\x20content=\"text/html;c
SF:harset=utf-8\">\n<title>400\x20Bad\x20Request</title>\n</head>\n<body\x
SF:20text=#000000\x20bgcolor=#ffffff>\n<h1>Error:\x20Bad\x20Request</h1>\n
SF:<h2>Your\x20client\x20has\x20issued\x20a\x20malformed\x20or\x20illegal\
SF:x20request\.</h2>\n<h2></h2>\n</body></html>\n")%r(FourOhFourRequest,10
SF:2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\x20134\r\nContent-T
SF:ype:\x20text/html;\x20charset=UTF-8\r\nDate:\x20Tue,\x2021\x20Nov\x2020
SF:23\x2008:37:34\x20GMT\r\n\r\n<!doctype\x20html><meta\x20charset=\"utf-8
SF:\"><meta\x20name=viewport\x20content=\"width=device-width,\x20initial-s
SF:cale=1\"><title>403</title>403\x20Forbidden")%r(DNSVersionBindReqTCP,B3
SF:,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Length:\x2054\r\nConten
SF:t-Type:\x20text/html;\x20charset=UTF-8\r\nDate:\x20Tue,\x2021\x20Nov\x2
SF:02023\x2008:37:44\x20GMT\r\n\r\n<html><title>Error\x20400\x20\(Bad\x20R
SF:equest\)!!1</title></html>")%r(DNSStatusRequestTCP,B3,"HTTP/1\.0\x20400
SF:\x20Bad\x20Request\r\nContent-Length:\x2054\r\nContent-Type:\x20text/ht
SF:ml;\x20charset=UTF-8\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2008:37:44\
SF:x20GMT\r\n\r\n<html><title>Error\x20400\x20\(Bad\x20Request\)!!1</title
SF:></html>");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 7 hops

TRACEROUTE (using port 443/tcp)
HOP RTT     ADDRESS
1   0.19 ms 208.76.251.177
2   0.55 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.72 ms multacom.com (96.45.162.9)
4   5.31 ms 206.72.211.148.any2ix.coresite.com (206.72.211.148)
5   0.43 ms 108.170.247.161
6   0.37 ms 142.251.60.109
7   0.48 ms 45.87.149.34.bc.googleusercontent.com (34.149.87.45)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 153.98 seconds
Color Scheme
Target
gcdn0.wixdns.net
Target IP
34.149.87.45
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A gcdn0.wixdns.net
Scan date
21 Nov 2023 03:39
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: