Scan report for "everefor.buzz"

Membership level: Free member
Summary

Ports

19

Duration

45.3sec

Date

2024-09-21

IP

54.225.185.110

Report
Scan OS information and Traceroute (nmap -A everefor.buzz)
Nmap scan report for everefor.buzz (54.225.185.110)
Host is up (0.064s latency).
Other addresses for everefor.buzz (not scanned): 34.195.224.242
rDNS record for 54.225.185.110: ec2-54-225-185-110.compute-1.amazonaws.com
Not shown: 981 filtered tcp ports (no-response)
PORT      STATE  SERVICE         VERSION
22/tcp    open   ssh             OpenSSH 8.7 (protocol 2.0)
| ssh-hostkey: 
|   256 ab:a8:a9:02:cb:66:8e:05:a2:6f:10:6d:fe:de:00:77 (ECDSA)
|_  256 2b:ac:75:b1:ee:ac:59:56:58:b1:08:4a:6e:ed:42:76 (ED25519)
80/tcp    open   http            OpenResty web app server 1.21.4.1
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: openresty/1.21.4.1
|_http-cors: GET POST
81/tcp    closed hosts2-ns
82/tcp    closed xfer
83/tcp    closed mit-ml-dev
443/tcp   open   ssl/http        OpenResty web app server 1.21.4.1
| ssl-cert: Subject: commonName=everefor.buzz
| Subject Alternative Name: DNS:*.everefor.buzz, DNS:everefor.buzz
| Not valid before: 2024-08-08T08:16:49
|_Not valid after:  2024-11-06T08:16:48
|_http-cors: GET POST
|_http-title: Title
3000/tcp  closed ppp
8080/tcp  closed http-proxy
8082/tcp  closed blackice-alerts
8085/tcp  closed unknown
8888/tcp  closed sun-answerbook
9090/tcp  closed zeus-admin
9100/tcp  closed jetdirect
10001/tcp closed scp-config
10002/tcp closed documentum
10003/tcp closed documentum_s
10004/tcp closed emcrmirccd
10009/tcp closed swdtp-sv
10010/tcp closed rxapi
Aggressive OS guesses: Linux 2.6.32 (91%), Linux 3.2 - 4.9 (91%), Linux 4.15 - 5.6 (91%), Linux 2.6.32 - 3.10 (91%), Linux 3.4 - 3.10 (89%), Linux 5.0 - 5.3 (89%), Synology DiskStation Manager 5.2-5644 (89%), Linux 4.2 (88%), Linux 3.1 (87%), Linux 3.2 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   0.98 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.56 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.77 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.53 ms  ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5   ...
6   32.63 ms ae-3.r22.dllstx14.us.bb.gin.ntt.net (129.250.7.68)
7   32.77 ms ae-22.a01.dllstx14.us.bb.gin.ntt.net (129.250.3.115)
8   33.60 ms ae-0.amazon.dllstx14.us.bb.gin.ntt.net (128.241.14.138)
9   33.78 ms 15.230.130.145
10  33.32 ms 176.32.125.143
11  ... 16
17  64.43 ms ec2-54-225-185-110.compute-1.amazonaws.com (54.225.185.110)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 45.30 seconds
Color Scheme
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Detailed report
Target
Target IP
54.225.185.110
Host status
UP
Target Country
Target IP location is United States of America
United States of America
Free scan
Free scan
Scan method
Scan OS information and Traceroute
Scan status
Identified 19 ports
Run command
nmap -A everefor.buzz
Scan date
21 Sep 2024 15:59
Scan duration
45.3sec
Download report
Remove scan result
$
Total scans
Scan more
Pricing

PROFESSIONAL


  • 10 000 scans/day
  • Daily API Calls - 100 000 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0.75$7.50/month
Billed Annually @ $9.00$90.00 90% discount
Get Professional

REGISTERED


  • 5 scans/day
  • Daily API Calls - 20 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0/lifetime
 
Register
Scan host
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: