Scan report for "wup-b6764381.us.v2.we-stats.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A wup-b6764381.us.v2.we-stats.com)
Nmap scan report for wup-b6764381.us.v2.we-stats.com (52.141.217.134)
Host is up (0.037s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE  SERVICE   VERSION
80/tcp  closed http
443/tcp open   ssl/https uvicorn
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 09 Jun 2024 17:05:34 GMT
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Content-Length: 12
|     request
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Date: Sun, 09 Jun 2024 17:05:28 GMT
|     Content-Type: application/json; charset=utf-8
|     Connection: close
|     Content-Length: 52
|     "message":"no Route matched with those values"
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 09 Jun 2024 17:05:28 GMT
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Content-Length: 12
|_    request
|_http-title: Site doesn't have a title (application/json).
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=*.us.v2.we-stats.com
| Subject Alternative Name: DNS:*.us.v2.we-stats.com, DNS:us.v2.we-stats.com
| Not valid before: 2023-06-29T18:52:04
|_Not valid after:  2024-07-30T18:52:04
|_http-server-header: uvicorn
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=6/9%Time=6665E0D7%P=x86_64-redhat-linux-
SF:gnu%r(GetRequest,C9,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Sun,\
SF:x2009\x20Jun\x202024\x2017:05:28\x20GMT\r\nContent-Type:\x20application
SF:/json;\x20charset=utf-8\r\nConnection:\x20close\r\nContent-Length:\x205
SF:2\r\n\r\n{\n\x20\x20\"message\":\"no\x20Route\x20matched\x20with\x20tho
SF:se\x20values\"\n}")%r(HTTPOptions,C9,"HTTP/1\.1\x20404\x20Not\x20Found\
SF:r\nDate:\x20Sun,\x2009\x20Jun\x202024\x2017:05:28\x20GMT\r\nContent-Typ
SF:e:\x20application/json;\x20charset=utf-8\r\nConnection:\x20close\r\nCon
SF:tent-Length:\x2052\r\n\r\n{\n\x20\x20\"message\":\"no\x20Route\x20match
SF:ed\x20with\x20those\x20values\"\n}")%r(FourOhFourRequest,C9,"HTTP/1\.1\
SF:x20404\x20Not\x20Found\r\nDate:\x20Sun,\x2009\x20Jun\x202024\x2017:05:2
SF:8\x20GMT\r\nContent-Type:\x20application/json;\x20charset=utf-8\r\nConn
SF:ection:\x20close\r\nContent-Length:\x2052\r\n\r\n{\n\x20\x20\"message\"
SF::\"no\x20Route\x20matched\x20with\x20those\x20values\"\n}")%r(tor-versi
SF:ons,9D,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2009\x20Ju
SF:n\x202024\x2017:05:28\x20GMT\r\nContent-Type:\x20text/plain;\x20charset
SF:=utf-8\r\nConnection:\x20close\r\nContent-Length:\x2012\r\n\r\nBad\x20r
SF:equest\n")%r(RTSPRequest,9D,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate
SF::\x20Sun,\x2009\x20Jun\x202024\x2017:05:34\x20GMT\r\nContent-Type:\x20t
SF:ext/plain;\x20charset=utf-8\r\nConnection:\x20close\r\nContent-Length:\
SF:x2012\r\n\r\nBad\x20request\n")%r(RPCCheck,9D,"HTTP/1\.1\x20400\x20Bad\
SF:x20Request\r\nDate:\x20Sun,\x2009\x20Jun\x202024\x2017:05:34\x20GMT\r\n
SF:Content-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r
SF:\nContent-Length:\x2012\r\n\r\nBad\x20request\n")%r(DNSVersionBindReqTC
SF:P,9D,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2009\x20Jun\
SF:x202024\x2017:05:34\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=u
SF:tf-8\r\nConnection:\x20close\r\nContent-Length:\x2012\r\n\r\nBad\x20req
SF:uest\n")%r(DNSStatusRequestTCP,9D,"HTTP/1\.1\x20400\x20Bad\x20Request\r
SF:\nDate:\x20Sun,\x2009\x20Jun\x202024\x2017:05:34\x20GMT\r\nContent-Type
SF::\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\nContent-Le
SF:ngth:\x2012\r\n\r\nBad\x20request\n");
OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
No OS matches for host
Network Distance: 22 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   0.21 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.80 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.93 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.67 ms  microsoft.as8075.any2ix.coresite.com (206.72.210.143)
5   1.32 ms  ae27-0.ear03.lax31.ntwk.msn.net (104.44.49.168)
6   36.92 ms be-22-0.ibr01.lax31.ntwk.msn.net (104.44.33.177)
7   37.05 ms be-10-0.ibr04.cys04.ntwk.msn.net (104.44.7.41)
8   37.26 ms be-4-0.ibr03.dsm05.ntwk.msn.net (104.44.28.248)
9   48.35 ms ae214-0.icr08.dsm05.ntwk.msn.net (104.44.32.77)
10  ... 21
22  36.61 ms 52.141.217.134

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 40.05 seconds
Color Scheme
Target
wup-b6764381.us.v2.we-stats.com
Target IP
52.141.217.134
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A wup-b6764381.us.v2.we-stats.com
Scan date
09 Jun 2024 13:05
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: