Scan report for "a.reporting.flex.paychex.com"

Membership level: Free member
Summary

Ports

2

Duration

36.07sec

Date

2024-10-19

IP

141.123.222.26

Report
Scan OS information and Traceroute (nmap -A a.reporting.flex.paychex.com)
Nmap scan report for a.reporting.flex.paychex.com (141.123.222.26)
Host is up (0.083s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE    VERSION
80/tcp  open  http-proxy F5 BIG-IP load balancer http proxy
|_http-open-proxy: Proxy might be redirecting requests
|_http-server-header: BigIP
443/tcp open  ssl/http   Apache httpd
| http-auth: 
| HTTP/1.1 401 Unauthorized\x0D
|_  Bearer error=invalid_request error_description=No bearer token found in the request.
|_http-title: 401 Unauthorized
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: Apache
| ssl-cert: Subject: commonName=reporting.flex.paychex.com/organizationName=Paychex, Inc./stateOrProvinceName=New York/countryName=US
| Subject Alternative Name: DNS:reporting.flex.paychex.com, DNS:a.reporting.flex.paychex.com, DNS:b.reporting.flex.paychex.com, DNS:c.reporting.flex.paychex.com
| Not valid before: 2024-03-23T00:00:00
|_Not valid after:  2025-03-23T23:59:59
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: phone|media device|general purpose|WAP
Running (JUST GUESSING): Apple iOS 4.X|5.X|6.X (94%), Apple OS X 10.8.X|10.9.X (94%), Netgear embedded (94%), Apple Mac OS X 10.7.X (94%)
OS CPE: cpe:/o:apple:iphone_os:4 cpe:/o:apple:iphone_os:5 cpe:/o:apple:iphone_os:6 cpe:/o:apple:mac_os_x:10.8 cpe:/h:netgear:wnr834bv2 cpe:/o:apple:mac_os_x:10.9 cpe:/o:apple:mac_os_x:10.7
Aggressive OS guesses: Apple iOS 4.3.1 - 4.3.5 (94%), Apple iOS 5.1.1 - 6.1 (94%), Apple OS X 10.8 (Mountain Lion) (Darwin 12.4.0) (94%), Netgear WNR834Bv2 WAP (94%), Apple OS X 10.8 (Mountain Lion) - 10.9 (Mavericks) or iOS 5.0.1 - 5.1.1 (Darwin 11.0.0 - 13.2.0) (94%), Apple Mac OS X 10.7.0 - 10.7.3 (Lion) (Darwin 11.0.0 - 11.3.0) (94%), Microsoft Windows Server 2008 R2 (94%), AirSpan ProST WiMAX access point (92%), Apple iOS 5.1.1 (92%), Apple iOS 6 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops
Service Info: Device: load balancer

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.22 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.54 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.73 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.39 ms  ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5   0.53 ms  ae-16.r25.lsanca07.us.bb.gin.ntt.net (129.250.3.80)
6   ...
7   9.90 ms  ae-0.a04.snjsca04.us.bb.gin.ntt.net (129.250.2.123)
8   9.42 ms  ae-0.f5-networks.snjsca04.us.bb.gin.ntt.net (128.242.179.46)
9   ...
10  15.06 ms 107.162.79.2
11  ... 12
13  87.59 ms 141.123.222.26

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 36.07 seconds
Color Scheme
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Detailed report
Target
Target IP
141.123.222.26
Host status
UP
Target Country
Target IP location is United States of America
United States of America
Free scan
Free scan
Scan method
Scan OS information and Traceroute
Scan status
Identified 2 ports
Run command
nmap -A a.reporting.flex.paychex.com
Scan date
19 Oct 2024 04:33
Scan duration
36.07sec
Download report
Remove scan result
$
Scan more
Pricing

PROFESSIONAL


  • 10 000 scans/day
  • Daily API Calls - 100 000 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0.75$7.50/month
Billed Annually @ $9.00$90.00 90% discount
Get Professional

REGISTERED


  • 5 scans/day
  • Daily API Calls - 20 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0/lifetime
 
Register
Scan host
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: