Scan OS information and Traceroute (nmap -A igit.service-now.com)
Nmap scan report for igit.service-now.com (149.96.243.59)
Host is up (0.049s latency).
rDNS record for 149.96.243.59: vip-149-96-243-59.cust.service-now.com
Not shown: 980 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
25/tcp open tcpwrapped
|_smtp-commands: Couldn't establish connection on port 25
80/tcp open http snow_adc
|_http-server-header: snow_adc
| fingerprint-strings:
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.1 403 Forbidden
| Server: snow_adc
| Date: Thu, 16 May 2024 14:52:16 GMT
| Content-Type: text/html
| Content-Length: 149
| Connection: close
| <html>
| <head><title>403 Forbidden</title></head>
| <body>
| <center><h1>403 Forbidden</h1></center>
| <hr><center>snow_adc</center>
| </body>
| </html>
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: snow_adc
| Date: Thu, 16 May 2024 14:52:21 GMT
| Content-Type: text/html
| Content-Length: 153
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>snow_adc</center>
| </body>
| </html>
| RTSPRequest, X11Probe:
| HTTP/1.1 400 Bad Request
| Server: snow_adc
| Date: Thu, 16 May 2024 14:52:16 GMT
| Content-Type: text/html
| Content-Length: 153
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>snow_adc</center>
| </body>
|_ </html>
|_http-title: Did not follow redirect to https://igit.service-now.com/
443/tcp open ssl/https snow_adc
| tls-nextprotoneg:
|_ http/1.1
|_http-server-header: snow_adc
| ssl-cert: Subject: commonName=*.service-now.com/organizationName=ServiceNow, Inc./stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.service-now.com, DNS:service-now.com, DNS:*.static.service-now.com
| Not valid before: 2024-01-23T23:50:11
|_Not valid after: 2024-11-12T23:50:10
| tls-alpn:
|_ http/1.1
| fingerprint-strings:
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.1 301 Moved Permanently
| Server: snow_adc
| Date: Thu, 16 May 2024 14:52:22 GMT
| Content-Type: text/html
| Content-Length: 165
| Connection: close
| Location: https://www.servicenow.com
| <html>
| <head><title>301 Moved Permanently</title></head>
| <body>
| <center><h1>301 Moved Permanently</h1></center>
| <hr><center>snow_adc</center>
| </body>
| </html>
| RTSPRequest:
| HTTP/1.1 400 Bad Request
| Server: snow_adc
| Date: Thu, 16 May 2024 14:52:28 GMT
| Content-Type: text/html
| Content-Length: 153
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>snow_adc</center>
| </body>
| </html>
| tor-versions:
| HTTP/1.1 400 Bad Request
| Server: snow_adc
| Date: Thu, 16 May 2024 14:52:23 GMT
| Content-Type: text/html
| Content-Length: 153
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>snow_adc</center>
| </body>
|_ </html>
|_ssl-date: TLS randomness does not represent time
| http-robots.txt: 1 disallowed entry
|_/
|_http-trane-info: Problem with XML parsing of /evox/about
|_http-title: ServiceNow
4000/tcp open remoteanything?
4001/tcp open newoak?
4002/tcp open mlchat-proxy?
4003/tcp open pxc-splr-ft?
4004/tcp closed pxc-roid
4005/tcp closed pxc-pin
4006/tcp closed pxc-spvr
4045/tcp closed lockd
4111/tcp closed xgrid
4125/tcp closed rww
4126/tcp closed ddrepl
4129/tcp closed nuauth
4224/tcp closed xtell
4242/tcp closed vrml-multi-use
4279/tcp closed vrml-multi-use
4321/tcp closed rwhois
4343/tcp closed unicall
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=5/16%Time=66461D9F%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,127,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20snow_adc\r\
SF:nDate:\x20Thu,\x2016\x20May\x202024\x2014:52:16\x20GMT\r\nContent-Type:
SF:\x20text/html\r\nContent-Length:\x20149\r\nConnection:\x20close\r\n\r\n
SF:<html>\r\n<head><title>403\x20Forbidden</title></head>\r\n<body>\r\n<ce
SF:nter><h1>403\x20Forbidden</h1></center>\r\n<hr><center>snow_adc</center
SF:>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,127,"HTTP/1\.1\x20403\x20Fo
SF:rbidden\r\nServer:\x20snow_adc\r\nDate:\x20Thu,\x2016\x20May\x202024\x2
SF:014:52:16\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2014
SF:9\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>403\x20Forbidde
SF:n</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden</h1></center
SF:>\r\n<hr><center>snow_adc</center>\r\n</body>\r\n</html>\r\n")%r(RTSPRe
SF:quest,12D,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20snow_adc\r\
SF:nDate:\x20Thu,\x2016\x20May\x202024\x2014:52:16\x20GMT\r\nContent-Type:
SF:\x20text/html\r\nContent-Length:\x20153\r\nConnection:\x20close\r\n\r\n
SF:<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r
SF:\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>snow_a
SF:dc</center>\r\n</body>\r\n</html>\r\n")%r(X11Probe,12D,"HTTP/1\.1\x2040
SF:0\x20Bad\x20Request\r\nServer:\x20snow_adc\r\nDate:\x20Thu,\x2016\x20Ma
SF:y\x202024\x2014:52:16\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L
SF:ength:\x20153\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400
SF:\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x
SF:20Request</h1></center>\r\n<hr><center>snow_adc</center>\r\n</body>\r\n
SF:</html>\r\n")%r(FourOhFourRequest,127,"HTTP/1\.1\x20403\x20Forbidden\r\
SF:nServer:\x20snow_adc\r\nDate:\x20Thu,\x2016\x20May\x202024\x2014:52:16\
SF:x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20149\r\nConne
SF:ction:\x20close\r\n\r\n<html>\r\n<head><title>403\x20Forbidden</title><
SF:/head>\r\n<body>\r\n<center><h1>403\x20Forbidden</h1></center>\r\n<hr><
SF:center>snow_adc</center>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,12D,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20snow_adc\r\nDate:\x20Thu
SF:,\x2016\x20May\x202024\x2014:52:21\x20GMT\r\nContent-Type:\x20text/html
SF:\r\nContent-Length:\x20153\r\nConnection:\x20close\r\n\r\n<html>\r\n<he
SF:ad><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1
SF:>400\x20Bad\x20Request</h1></center>\r\n<hr><center>snow_adc</center>\r
SF:\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=5/16%Time=66461DA5%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,165,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServ
SF:er:\x20snow_adc\r\nDate:\x20Thu,\x2016\x20May\x202024\x2014:52:22\x20GM
SF:T\r\nContent-Type:\x20text/html\r\nContent-Length:\x20165\r\nConnection
SF::\x20close\r\nLocation:\x20https://www\.servicenow\.com\r\n\r\n<html>\r
SF:\n<head><title>301\x20Moved\x20Permanently</title></head>\r\n<body>\r\n
SF:<center><h1>301\x20Moved\x20Permanently</h1></center>\r\n<hr><center>sn
SF:ow_adc</center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,165,"HTTP/1\.
SF:1\x20301\x20Moved\x20Permanently\r\nServer:\x20snow_adc\r\nDate:\x20Thu
SF:,\x2016\x20May\x202024\x2014:52:22\x20GMT\r\nContent-Type:\x20text/html
SF:\r\nContent-Length:\x20165\r\nConnection:\x20close\r\nLocation:\x20http
SF:s://www\.servicenow\.com\r\n\r\n<html>\r\n<head><title>301\x20Moved\x20
SF:Permanently</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20Per
SF:manently</h1></center>\r\n<hr><center>snow_adc</center>\r\n</body>\r\n<
SF:/html>\r\n")%r(FourOhFourRequest,165,"HTTP/1\.1\x20301\x20Moved\x20Perm
SF:anently\r\nServer:\x20snow_adc\r\nDate:\x20Thu,\x2016\x20May\x202024\x2
SF:014:52:22\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2016
SF:5\r\nConnection:\x20close\r\nLocation:\x20https://www\.servicenow\.com\
SF:r\n\r\n<html>\r\n<head><title>301\x20Moved\x20Permanently</title></head
SF:>\r\n<body>\r\n<center><h1>301\x20Moved\x20Permanently</h1></center>\r\
SF:n<hr><center>snow_adc</center>\r\n</body>\r\n</html>\r\n")%r(tor-versio
SF:ns,12D,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20snow_adc\r\nDa
SF:te:\x20Thu,\x2016\x20May\x202024\x2014:52:23\x20GMT\r\nContent-Type:\x2
SF:0text/html\r\nContent-Length:\x20153\r\nConnection:\x20close\r\n\r\n<ht
SF:ml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<
SF:center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>snow_adc<
SF:/center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,12D,"HTTP/1\.1\x2040
SF:0\x20Bad\x20Request\r\nServer:\x20snow_adc\r\nDate:\x20Thu,\x2016\x20Ma
SF:y\x202024\x2014:52:28\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L
SF:ength:\x20153\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400
SF:\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x
SF:20Request</h1></center>\r\n<hr><center>snow_adc</center>\r\n</body>\r\n
SF:</html>\r\n");
Aggressive OS guesses: Linux 3.2 - 4.9 (96%), Linux 2.6.32 - 3.13 (95%), Linux 5.1 (94%), Linux 3.10 - 4.11 (92%), Linux 2.6.32 - 3.10 (92%), HP P2000 G3 NAS device (91%), Linux 2.6.32 (91%), Linux 3.16 - 4.6 (91%), Linux 4.4 (90%), Netgear RAIDiator 4.2.21 (Linux 2.6.37) (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 15 hops
TRACEROUTE (using port 4343/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.52 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.72 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4 ...
5 13.46 ms be3176.ccr21.sjc01.atlas.cogentco.com (154.54.31.190)
6 13.92 ms be3178.ccr21.sfo01.atlas.cogentco.com (154.54.43.69)
7 32.19 ms be2075.ccr21.sea02.atlas.cogentco.com (154.54.0.234)
8 31.89 ms 38.142.50.226
9 ...
10 58.98 ms 142.124.126.83
11 56.68 ms 64.230.76.37
12 52.06 ms 64.230.76.139
13 ... 14
15 49.79 ms vip-149-96-243-59.cust.service-now.com (149.96.243.59)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 42.44 seconds
Color Scheme
-
Target
-
Target IP
149.96.243.59
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A igit.service-now.com
-
Scan date
16 May 2024 10:52
-
Copy scan report
-
Download report
-
Remove scan result
-
Total scans