Scan report for "selfeducatethemasses.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A selfeducatethemasses.com)
Nmap scan report for selfeducatethemasses.com (46.8.8.100)
Host is up (0.00038s latency).
Not shown: 994 closed ports
PORT      STATE SERVICE    VERSION
22/tcp    open  ssh        OpenSSH 8.4p1 Debian 5+deb11u2 (protocol 2.0)
53/tcp    open  tcpwrapped
80/tcp    open  http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 301 Moved Permanently
|     Content-Type: text/html; charset=utf-8
|     Location: http://ww82.keznews.com/
|     Date: Mon, 20 Nov 2023 00:22:17 GMT
|     Content-Length: 59
|     href="http://ww82.keznews.com/">Moved Permanently</a>.
|   GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SSLSessionReq, TLSSessionReq: 
|     HTTP/1.1 400 Bad Request
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Request
|   GetRequest: 
|     HTTP/1.0 301 Moved Permanently
|     Content-Type: text/html; charset=utf-8
|     Location: http://ww82.keznews.com/
|     Date: Mon, 20 Nov 2023 00:22:12 GMT
|     Content-Length: 59
|     href="http://ww82.keznews.com/">Moved Permanently</a>.
|   HTTPOptions: 
|     HTTP/1.0 301 Moved Permanently
|     Location: http://ww82.keznews.com/
|     Date: Mon, 20 Nov 2023 00:22:12 GMT
|_    Content-Length: 0
|_http-title: Did not follow redirect to http://ww82.selfeducatethemasses.com/
179/tcp   open  tcpwrapped
443/tcp   open  ssl/https
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest: 
|     HTTP/1.0 301 Moved Permanently
|     Content-Type: text/html; charset=utf-8
|     Location: http://ww82.keznews.com/
|     Date: Mon, 20 Nov 2023 00:22:18 GMT
|     Content-Length: 59
|     href="http://ww82.keznews.com/">Moved Permanently</a>.
|   GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SSLSessionReq, TLSSessionReq: 
|     HTTP/1.1 400 Bad Request
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Request
|   HTTPOptions: 
|     HTTP/1.0 301 Moved Permanently
|     Location: http://ww82.keznews.com/
|     Date: Mon, 20 Nov 2023 00:22:18 GMT
|_    Content-Length: 0
|_http-title: Did not follow redirect to http://ww82.selfeducatethemasses.com/
| ssl-cert: Subject: commonName=*.selfeducatethemasses.com
| Subject Alternative Name: DNS:*.selfeducatethemasses.com, DNS:selfeducatethemasses.com
| Not valid before: 2023-11-05T20:32:58
|_Not valid after:  2024-02-03T20:32:57
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
58080/tcp open  http       Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=655AA6B4%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,E2,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nContent-Typ
SF:e:\x20text/html;\x20charset=utf-8\r\nLocation:\x20http://ww82\.keznews\
SF:.com/\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2000:22:12\x20GMT\r\nConte
SF:nt-Length:\x2059\r\n\r\n<a\x20href=\"http://ww82\.keznews\.com/\">Moved
SF:\x20Permanently</a>\.\n\n")%r(HTTPOptions,7E,"HTTP/1\.0\x20301\x20Moved
SF:\x20Permanently\r\nLocation:\x20http://ww82\.keznews\.com/\r\nDate:\x20
SF:Mon,\x2020\x20Nov\x202023\x2000:22:12\x20GMT\r\nContent-Length:\x200\r\
SF:n\r\n")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent
SF:-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n4
SF:00\x20Bad\x20Request")%r(FourOhFourRequest,E2,"HTTP/1\.0\x20301\x20Move
SF:d\x20Permanently\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nLoc
SF:ation:\x20http://ww82\.keznews\.com/\r\nDate:\x20Mon,\x2020\x20Nov\x202
SF:023\x2000:22:17\x20GMT\r\nContent-Length:\x2059\r\n\r\n<a\x20href=\"htt
SF:p://ww82\.keznews\.com/\">Moved\x20Permanently</a>\.\n\n")%r(GenericLin
SF:es,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plai
SF:n;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Reques
SF:t")%r(Help,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20t
SF:ext/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x
SF:20Request")%r(SSLSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nC
SF:ontent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\
SF:n\r\n400\x20Bad\x20Request")%r(TLSSessionReq,67,"HTTP/1\.1\x20400\x20Ba
SF:d\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnec
SF:tion:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Kerberos,67,"HTTP/1\.1\
SF:x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf
SF:-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(LPDString,6
SF:7,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x
SF:20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%
SF:r(LDAPSearchReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:
SF:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20
SF:Bad\x20Request");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655AA6BA%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,E2,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nCont
SF:ent-Type:\x20text/html;\x20charset=utf-8\r\nLocation:\x20http://ww82\.k
SF:eznews\.com/\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2000:22:18\x20GMT\r
SF:\nContent-Length:\x2059\r\n\r\n<a\x20href=\"http://ww82\.keznews\.com/\
SF:">Moved\x20Permanently</a>\.\n\n")%r(HTTPOptions,7E,"HTTP/1\.0\x20301\x
SF:20Moved\x20Permanently\r\nLocation:\x20http://ww82\.keznews\.com/\r\nDa
SF:te:\x20Mon,\x2020\x20Nov\x202023\x2000:22:18\x20GMT\r\nContent-Length:\
SF:x200\r\n\r\n")%r(FourOhFourRequest,E2,"HTTP/1\.0\x20301\x20Moved\x20Per
SF:manently\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nLocation:\x
SF:20http://ww82\.keznews\.com/\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x200
SF:0:22:18\x20GMT\r\nContent-Length:\x2059\r\n\r\n<a\x20href=\"http://ww82
SF:\.keznews\.com/\">Moved\x20Permanently</a>\.\n\n")%r(GenericLines,67,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20ch
SF:arset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(RT
SF:SPRequest,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20te
SF:xt/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x2
SF:0Request")%r(Help,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Typ
SF:e:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x
SF:20Bad\x20Request")%r(SSLSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20c
SF:lose\r\n\r\n400\x20Bad\x20Request")%r(TLSSessionReq,67,"HTTP/1\.1\x2040
SF:0\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\
SF:nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Kerberos,67,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20char
SF:set=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(LPDS
SF:tring,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/p
SF:lain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Req
SF:uest")%r(LDAPSearchReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConten
SF:t-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n
SF:400\x20Bad\x20Request");
Aggressive OS guesses: Oracle VM Server 3.4.2 (Linux 4.1) (99%), Linux 3.1 (94%), Linux 3.2 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), CyanogenMod 11 (Android 4.4.4) (93%), Android 4 (93%), Linux 2.6.32 (93%), Linux 3.2 - 4.9 (93%), Netgear ReadyNAS 2100 (RAIDiator 4.2.24) (93%), Ubiquiti AirOS 5.6.2 (Linux 2.6.32) (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 7 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 143/tcp)
HOP RTT     ADDRESS
1   0.23 ms 208.76.251.177
2   0.52 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.95 ms multacom.com (96.45.162.9)
4   0.69 ms clan-servers-hosting.as20473.any2ix.coresite.com (206.72.211.53)
5   1.13 ms 10.68.1.14
6   0.45 ms 10.68.2.238
7   0.45 ms 46.8.8.100

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 127.86 seconds
Color Scheme
Target
selfeducatethemasses.com
Target IP
46.8.8.100
Target Country
CZ
Scan method
Scan OS information and Traceroute
Run command
nmap -A selfeducatethemasses.com
Scan date
19 Nov 2023 19:24
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: