Scan report for "abnormalsecurity.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A abnormalsecurity.com)
Nmap scan report for abnormalsecurity.com (76.76.21.21)
Host is up (0.00027s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http      Vercel
|_http-server-header: Vercel
|_http-title: Site doesn't have a title (text/plain).
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 308 Permanent Redirect
|     Content-Type: text/plain
|     Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
|     Refresh: 0;url=https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
|     server: Vercel
|     Redirecting...
|   GetRequest, HTTPOptions: 
|     HTTP/1.0 308 Permanent Redirect
|     Content-Type: text/plain
|     Location: https:///
|     Refresh: 0;url=https:///
|     server: Vercel
|_    Redirecting...
443/tcp open  ssl/https Vercel
| http-robots.txt: 4 disallowed entries 
|_/cpresources/ /vendor/ /.env /cache/
| ssl-cert: Subject: commonName=abnormalsecurity.com/organizationName=Abnormal Security Corporation/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:abnormalsecurity.com, DNS:www.abnormalsecurity.com, DNS:updates.abnormalsecurity.com, DNS:intelligence.abnormalsecurity.com, DNS:careers.abnormalsecurity.com
| Not valid before: 2023-11-30T00:00:00
|_Not valid after:  2024-12-30T23:59:59
|_http-title: Cloud Email Security - Block Malicious Email Attacks | Abnormal
|_http-server-header: Vercel
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 404 Not Found
|     Cache-Control: public, max-age=0, must-revalidate
|     Content-Length: 67
|     Content-Type: text/plain; charset=utf-8
|     Date: Wed, 12 Jun 2024 01:02:58 GMT
|     Server: Vercel
|     Strict-Transport-Security: max-age=63072000
|     X-Vercel-Error: DEPLOYMENT_NOT_FOUND
|     X-Vercel-Id: sfo1::gxrkv-1718154178855-b1e070980f5e
|     deployment could not be found on Vercel.
|     DEPLOYMENT_NOT_FOUND
|   GenericLines, Help, RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Request
|   GetRequest: 
|     HTTP/1.0 404 Not Found
|     Cache-Control: public, max-age=0, must-revalidate
|     Content-Length: 67
|     Content-Type: text/plain; charset=utf-8
|     Date: Wed, 12 Jun 2024 01:02:58 GMT
|     Server: Vercel
|     Strict-Transport-Security: max-age=63072000
|     X-Vercel-Error: DEPLOYMENT_NOT_FOUND
|     X-Vercel-Id: sfo1::4pc95-1718154178663-0e1112cbc594
|     deployment could not be found on Vercel.
|     DEPLOYMENT_NOT_FOUND
|   HTTPOptions: 
|     HTTP/1.0 404 Not Found
|     Cache-Control: public, max-age=0, must-revalidate
|     Content-Length: 67
|     Content-Type: text/plain; charset=utf-8
|     Date: Wed, 12 Jun 2024 01:02:58 GMT
|     Server: Vercel
|     Strict-Transport-Security: max-age=63072000
|     X-Vercel-Error: DEPLOYMENT_NOT_FOUND
|     X-Vercel-Id: sfo1::tdx6k-1718154178762-d20aaa1f188e
|     deployment could not be found on Vercel.
|_    DEPLOYMENT_NOT_FOUND
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=6/11%Time=6668F3BC%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,8A,"HTTP/1\.0\x20308\x20Permanent\x20Redirect\r\nContent-Typ
SF:e:\x20text/plain\r\nLocation:\x20https:///\r\nRefresh:\x200;url=https:/
SF://\r\nserver:\x20Vercel\r\n\r\nRedirecting\.\.\.")%r(HTTPOptions,8A,"HT
SF:TP/1\.0\x20308\x20Permanent\x20Redirect\r\nContent-Type:\x20text/plain\
SF:r\nLocation:\x20https:///\r\nRefresh:\x200;url=https:///\r\nserver:\x20
SF:Vercel\r\n\r\nRedirecting\.\.\.")%r(FourOhFourRequest,D0,"HTTP/1\.0\x20
SF:308\x20Permanent\x20Redirect\r\nContent-Type:\x20text/plain\r\nLocation
SF::\x20https:///nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\nRefresh:\x200;url
SF:=https:///nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\nserver:\x20Vercel\r\n
SF:\r\nRedirecting\.\.\.");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=6/11%Time=6668F3C2%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,18A,"HTTP/1\.0\x20404\x20Not\x20Found\r\nCache-Contro
SF:l:\x20public,\x20max-age=0,\x20must-revalidate\r\nContent-Length:\x2067
SF:\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nDate:\x20Wed,\x201
SF:2\x20Jun\x202024\x2001:02:58\x20GMT\r\nServer:\x20Vercel\r\nStrict-Tran
SF:sport-Security:\x20max-age=63072000\r\nX-Vercel-Error:\x20DEPLOYMENT_NO
SF:T_FOUND\r\nX-Vercel-Id:\x20sfo1::4pc95-1718154178663-0e1112cbc594\r\n\r
SF:\nThe\x20deployment\x20could\x20not\x20be\x20found\x20on\x20Vercel\.\n\
SF:nDEPLOYMENT_NOT_FOUND\n")%r(HTTPOptions,18A,"HTTP/1\.0\x20404\x20Not\x2
SF:0Found\r\nCache-Control:\x20public,\x20max-age=0,\x20must-revalidate\r\
SF:nContent-Length:\x2067\r\nContent-Type:\x20text/plain;\x20charset=utf-8
SF:\r\nDate:\x20Wed,\x2012\x20Jun\x202024\x2001:02:58\x20GMT\r\nServer:\x2
SF:0Vercel\r\nStrict-Transport-Security:\x20max-age=63072000\r\nX-Vercel-E
SF:rror:\x20DEPLOYMENT_NOT_FOUND\r\nX-Vercel-Id:\x20sfo1::tdx6k-1718154178
SF:762-d20aaa1f188e\r\n\r\nThe\x20deployment\x20could\x20not\x20be\x20foun
SF:d\x20on\x20Vercel\.\n\nDEPLOYMENT_NOT_FOUND\n")%r(FourOhFourRequest,18A
SF:,"HTTP/1\.0\x20404\x20Not\x20Found\r\nCache-Control:\x20public,\x20max-
SF:age=0,\x20must-revalidate\r\nContent-Length:\x2067\r\nContent-Type:\x20
SF:text/plain;\x20charset=utf-8\r\nDate:\x20Wed,\x2012\x20Jun\x202024\x200
SF:1:02:58\x20GMT\r\nServer:\x20Vercel\r\nStrict-Transport-Security:\x20ma
SF:x-age=63072000\r\nX-Vercel-Error:\x20DEPLOYMENT_NOT_FOUND\r\nX-Vercel-I
SF:d:\x20sfo1::gxrkv-1718154178855-b1e070980f5e\r\n\r\nThe\x20deployment\x
SF:20could\x20not\x20be\x20found\x20on\x20Vercel\.\n\nDEPLOYMENT_NOT_FOUND
SF:\n")%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-T
SF:ype:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400
SF:\x20Bad\x20Request")%r(RTSPRequest,67,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20c
SF:lose\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"HTTP/1\.1\x20400\x20Bad\
SF:x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnecti
SF:on:\x20close\r\n\r\n400\x20Bad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 7 hops

TRACEROUTE (using port 443/tcp)
HOP RTT     ADDRESS
1   0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.52 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.66 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.47 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146)
5   0.28 ms 52.93.92.42
6   ...
7   0.21 ms 76.76.21.21

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 117.79 seconds
Color Scheme
Target
abnormalsecurity.com
Target IP
76.76.21.21
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A abnormalsecurity.com
Scan date
11 Jun 2024 21:04
Copy scan report
Download report
Remove scan result
$
Total scans
About 5 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: