Scan OS information and Traceroute (nmap -A zpublic.zohopublic.com)
Nmap scan report for zpublic.zohopublic.com (136.143.190.97)
Host is up (0.033s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http ZGS
| fingerprint-strings:
| FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, X11Probe:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Sun, 19 Nov 2023 07:11:30 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| zproxy: domain_not_configured
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Sun, 19 Nov 2023 07:11:35 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| zproxy: domain_not_configured
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
|_http-server-header: ZGS
|_http-title: Did not follow redirect to https://zpublic.zohopublic.com/
113/tcp closed ident
443/tcp open ssl/https ZGS
| fingerprint-strings:
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Sun, 19 Nov 2023 07:11:36 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| zproxy: domain_not_configured
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Sun, 19 Nov 2023 07:11:42 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| RTSPRequest:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Sun, 19 Nov 2023 07:11:41 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| tor-versions:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Sun, 19 Nov 2023 07:11:36 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
| http-methods:
|_ Potentially risky methods: PUT DELETE TRACE
| http-robots.txt: 5 disallowed entries
|_/images/ /css/ /js/ /html/ /zs/
|_http-server-header: ZGS
|_http-title: Did not follow redirect to https://www.zoho.com/survey
| ssl-cert: Subject: commonName=zohopublic.com
| Subject Alternative Name: DNS:*.zohopublic.com, DNS:zohopublic.com
| Not valid before: 2023-10-26T02:50:07
|_Not valid after: 2024-01-24T02:50:06
| tls-alpn:
|_ http/1.1
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/18%Time=6559B521%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r
SF:\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:11:30\x20GMT\r\nContent-Type
SF::\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nzpr
SF:oxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head><title>400\x20Bad\
SF:x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reques
SF:t</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,128,"HTTP/1\.
SF:1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2019\x20
SF:Nov\x202023\x2007:11:30\x20GMT\r\nContent-Type:\x20text/html\r\nContent
SF:-Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_config
SF:ured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>
SF:\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body
SF:>\r\n</html>\r\n")%r(RTSPRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Reques
SF:t\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:11:30\x
SF:20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnec
SF:tion:\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<he
SF:ad><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1
SF:>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(X11P
SF:robe,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:
SF:\x20Sun,\x2019\x20Nov\x202023\x2007:11:30\x20GMT\r\nContent-Type:\x20te
SF:xt/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x2
SF:0domain_not_configured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Requ
SF:est</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1><
SF:/center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,128,"HTTP/1\.1
SF:\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2019\x20N
SF:ov\x202023\x2007:11:30\x20GMT\r\nContent-Type:\x20text/html\r\nContent-
SF:Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configu
SF:red\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\
SF:r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>
SF:\r\n</html>\r\n")%r(RPCCheck,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
SF:nServer:\x20ZGS\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:11:35\x20GM
SF:T\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection
SF::\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head><
SF:title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400
SF:\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/18%Time=6559B527%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x
SF:20ZGS\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:11:36\x20GMT\r\nConte
SF:nt-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close
SF:\r\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head><title>400\
SF:x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x2
SF:0Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,128,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2
SF:019\x20Nov\x202023\x2007:11:36\x20GMT\r\nContent-Type:\x20text/html\r\n
SF:Content-Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not
SF:_configured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title>
SF:</head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\
SF:n</body>\r\n</html>\r\n")%r(FourOhFourRequest,128,"HTTP/1\.1\x20400\x20
SF:Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2019\x20Nov\x202023\
SF:x2007:11:36\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20
SF:122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n
SF:<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r
SF:\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>
SF:\r\n")%r(tor-versions,109,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
SF::\x20ZGS\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:11:36\x20GMT\r\nCo
SF:ntent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20cl
SF:ose\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\
SF:r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>
SF:\r\n</html>\r\n")%r(RTSPRequest,109,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:11:41\x2
SF:0GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnect
SF:ion:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</titl
SF:e></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\
SF:r\n</body>\r\n</html>\r\n")%r(RPCCheck,109,"HTTP/1\.1\x20400\x20Bad\x20
SF:Request\r\nServer:\x20ZGS\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:1
SF:1:42\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\n
SF:Connection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Reques
SF:t</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></c
SF:enter>\r\n</body>\r\n</html>\r\n");
Device type: general purpose
Running (JUST GUESSING): FreeBSD 11.X (96%)
OS CPE: cpe:/o:freebsd:freebsd:11.0
Aggressive OS guesses: FreeBSD 11.0-RELEASE (96%), FreeBSD 11.0-STABLE or 11.0-RELEASE (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops
TRACEROUTE (using port 113/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.53 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.67 ms multacom.com (96.45.162.9)
4 0.43 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5 ...
6 14.14 ms ae-3.r24.snjsca04.us.bb.gin.ntt.net (129.250.4.150)
7 ...
8 47.34 ms ae-4.r25.sttlwa01.us.bb.gin.ntt.net (129.250.3.125)
9 25.58 ms ae-1.a02.sttlwa01.us.bb.gin.ntt.net (129.250.2.95)
10 31.74 ms xe-2-5-3-1.a02.sttlwa01.us.ce.gin.ntt.net (168.143.191.5)
11 38.80 ms 204.141.42.18
12 33.42 ms 136.143.190.97
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 64.41 seconds
Color Scheme
-
Target
-
Target IP
136.143.190.97
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A zpublic.zohopublic.com
-
Scan date
19 Nov 2023 02:12
-
Copy scan report
-
Download report
-
Remove scan result