Scan report for "email.mail.joinhandshake.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A email.mail.joinhandshake.com)
Nmap scan report for email.mail.joinhandshake.com (34.102.239.211)
Host is up (0.00042s latency).
rDNS record for 34.102.239.211: 211.239.102.34.bc.googleusercontent.com
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http      Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
443/tcp open  ssl/https
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.0 404 Not Found
|     Content-Length: 19
|     Content-Type: text/plain; charset=utf-8
|     Date: Sun, 19 Nov 2023 01:53:31 GMT
|     X-Content-Type-Options: nosniff
|     page not found
|   GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SSLSessionReq, TLSSessionReq: 
|     HTTP/1.1 400 Bad Request
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|_    Request
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
| ssl-cert: Subject: commonName=email.mail.joinhandshake.com
| Subject Alternative Name: DNS:email.mail.joinhandshake.com
| Not valid before: 2023-10-15T20:41:20
|_Not valid after:  2024-01-13T20:41:19
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/18%Time=65596A9B%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,B0,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Leng
SF:th:\x2019\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nDate:\x20
SF:Sun,\x2019\x20Nov\x202023\x2001:53:31\x20GMT\r\nX-Content-Type-Options:
SF:\x20nosniff\r\n\r\n404\x20page\x20not\x20found\n")%r(HTTPOptions,B0,"HT
SF:TP/1\.0\x20404\x20Not\x20Found\r\nContent-Length:\x2019\r\nContent-Type
SF::\x20text/plain;\x20charset=utf-8\r\nDate:\x20Sun,\x2019\x20Nov\x202023
SF:\x2001:53:31\x20GMT\r\nX-Content-Type-Options:\x20nosniff\r\n\r\n404\x2
SF:0page\x20not\x20found\n")%r(FourOhFourRequest,B0,"HTTP/1\.0\x20404\x20N
SF:ot\x20Found\r\nContent-Length:\x2019\r\nContent-Type:\x20text/plain;\x2
SF:0charset=utf-8\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2001:53:31\x20GMT
SF:\r\nX-Content-Type-Options:\x20nosniff\r\n\r\n404\x20page\x20not\x20fou
SF:nd\n")%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent
SF:-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n4
SF:00\x20Bad\x20Request")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad\x20Req
SF:uest\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x2
SF:0close\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.1\x20400\x20Ba
SF:d\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnec
SF:tion:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SSLSessionReq,67,"HTTP/
SF:1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charse
SF:t=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(TLSSes
SF:sionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text
SF:/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20R
SF:equest")%r(Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-T
SF:ype:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400
SF:\x20Bad\x20Request")%r(LPDString,67,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20clo
SF:se\r\n\r\n400\x20Bad\x20Request")%r(LDAPSearchReq,67,"HTTP/1\.1\x20400\
SF:x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nC
SF:onnection:\x20close\r\n\r\n400\x20Bad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 7 hops

TRACEROUTE (using port 80/tcp)
HOP RTT     ADDRESS
1   0.19 ms 208.76.251.177
2   0.58 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.60 ms multacom.com (96.45.162.9)
4   0.45 ms 206.72.211.148.any2ix.coresite.com (206.72.211.148)
5   1.04 ms 108.170.247.193
6   1.29 ms 74.125.251.39
7   0.44 ms 211.239.102.34.bc.googleusercontent.com (34.102.239.211)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 132.42 seconds
Color Scheme
Target
email.mail.joinhandshake.com
Target IP
34.102.239.211
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A email.mail.joinhandshake.com
Scan date
18 Nov 2023 20:55
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: