Scan report for "testandtarget.omniture.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A testandtarget.omniture.com)
Nmap scan report for testandtarget.omniture.com (18.204.72.198)
Host is up (0.068s latency).
Other addresses for testandtarget.omniture.com (not scanned): 52.203.100.30 34.199.150.203
rDNS record for 18.204.72.198: ec2-18-204-72-198.compute-1.amazonaws.com
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http      adobe
| fingerprint-strings: 
|   DNSStatusRequestTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Thu, 16 May 2024 23:26:30 GMT
|     server: adobe
|     connection: close
|     Request
|   DNSVersionBindReqTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Thu, 16 May 2024 23:26:29 GMT
|     server: adobe
|     connection: close
|     Request
|   FourOhFourRequest: 
|     HTTP/1.0 400 Bad Request
|     date: Thu, 16 May 2024 23:26:21 GMT
|     server: adobe
|     connection: close
|     content-length: 0
|   GetRequest: 
|     HTTP/1.0 400 Bad Request
|     date: Thu, 16 May 2024 23:26:17 GMT
|     server: adobe
|     connection: close
|     content-length: 0
|   HTTPOptions: 
|     HTTP/1.0 400 Bad Request
|     date: Thu, 16 May 2024 23:26:18 GMT
|     server: adobe
|     connection: close
|     content-length: 0
|   Help: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Thu, 16 May 2024 23:26:31 GMT
|     server: adobe
|     connection: close
|     Request
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Thu, 16 May 2024 23:26:28 GMT
|     server: adobe
|     connection: close
|     Request
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Thu, 16 May 2024 23:26:19 GMT
|     server: adobe
|     connection: close
|     Request
|   SSLSessionReq: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Thu, 16 May 2024 23:26:32 GMT
|     server: adobe
|     connection: close
|     Request
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Thu, 16 May 2024 23:26:20 GMT
|     server: adobe
|     connection: close
|_    Request
|_http-title: Did not follow redirect to https://testandtarget.omniture.com/
|_http-server-header: adobe
443/tcp open  ssl/https
|_http-title: Site doesn't have a title (application/json).
| ssl-cert: Subject: commonName=*.testandtarget.omniture.com/organizationName=Adobe Inc./stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.testandtarget.omniture.com, DNS:testandtarget.omniture.com
| Not valid before: 2023-10-18T00:00:00
|_Not valid after:  2024-11-17T23:59:59
|_http-server-header: adobe
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=5/16%Time=6646961A%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,76,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ndate:\x20Thu,\x201
SF:6\x20May\x202024\x2023:26:17\x20GMT\r\nserver:\x20adobe\r\nconnection:\
SF:x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,76,"HTTP/1\.0\
SF:x20400\x20Bad\x20Request\r\ndate:\x20Thu,\x2016\x20May\x202024\x2023:26
SF::18\x20GMT\r\nserver:\x20adobe\r\nconnection:\x20close\r\ncontent-lengt
SF:h:\x200\r\n\r\n")%r(RTSPRequest,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\
SF:r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Thu
SF:,\x2016\x20May\x202024\x2023:26:19\x20GMT\r\nserver:\x20adobe\r\nconnec
SF:tion:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9C,"HTTP/1\.1\x20400\
SF:x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/pla
SF:in\r\ndate:\x20Thu,\x2016\x20May\x202024\x2023:26:20\x20GMT\r\nserver:\
SF:x20adobe\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(FourOhFourRe
SF:quest,76,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ndate:\x20Thu,\x2016\x20
SF:May\x202024\x2023:26:21\x20GMT\r\nserver:\x20adobe\r\nconnection:\x20cl
SF:ose\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9C,"HTTP/1\.1\x20400\x
SF:20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plai
SF:n\r\ndate:\x20Thu,\x2016\x20May\x202024\x2023:26:28\x20GMT\r\nserver:\x
SF:20adobe\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(DNSVersionBin
SF:dReqTCP,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011
SF:\r\ncontent-type:\x20text/plain\r\ndate:\x20Thu,\x2016\x20May\x202024\x
SF:2023:26:29\x20GMT\r\nserver:\x20adobe\r\nconnection:\x20close\r\n\r\nBa
SF:d\x20Request")%r(DNSStatusRequestTCP,9C,"HTTP/1\.1\x20400\x20Bad\x20Req
SF:uest\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x
SF:20Thu,\x2016\x20May\x202024\x2023:26:30\x20GMT\r\nserver:\x20adobe\r\nc
SF:onnection:\x20close\r\n\r\nBad\x20Request")%r(Help,9C,"HTTP/1\.1\x20400
SF:\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/pl
SF:ain\r\ndate:\x20Thu,\x2016\x20May\x202024\x2023:26:31\x20GMT\r\nserver:
SF:\x20adobe\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(SSLSessionR
SF:eq,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\nc
SF:ontent-type:\x20text/plain\r\ndate:\x20Thu,\x2016\x20May\x202024\x2023:
SF:26:32\x20GMT\r\nserver:\x20adobe\r\nconnection:\x20close\r\n\r\nBad\x20
SF:Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   0.20 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.58 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.65 ms  r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   ...
5   12.44 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   20.97 ms be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218)
7   36.71 ms be3850.ccr41.iah01.atlas.cogentco.com (154.54.0.53)
8   37.86 ms be2417.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.3.246)
9   39.27 ms 38.104.61.42
10  39.63 ms 52.93.254.215
11  42.37 ms 52.93.64.171
12  ... 30

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 64.37 seconds
Color Scheme
Target
testandtarget.omniture.com
Target IP
18.204.72.198
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A testandtarget.omniture.com
Scan date
16 May 2024 19:27
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: