Scan OS information and Traceroute (nmap -A firefly.bol.com)
Nmap scan report for firefly.bol.com (34.96.85.238)
Host is up (0.00045s latency).
rDNS record for 34.96.85.238: 238.85.96.34.bc.googleusercontent.com
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP:
| HTTP/1.0 400 Bad Request
| Content-Length: 54
| Content-Type: text/html; charset=UTF-8
| Date: Sat, 18 Nov 2023 17:12:40 GMT
| <html><title>Error 400 (Bad Request)!!1</title></html>
| FourOhFourRequest:
| HTTP/1.0 301 Moved Permanently
| Cache-Control: private
| Location: https://34.96.85.238:443/nice%20ports%2C/Trinity.txt.bak
| Content-Length: 0
| Date: Sat, 18 Nov 2023 17:12:30 GMT
| Content-Type: text/html; charset=UTF-8
| GetRequest, HTTPOptions:
| HTTP/1.0 301 Moved Permanently
| Cache-Control: private
| Location: https://34.96.85.238:443/
| Content-Length: 0
| Date: Sat, 18 Nov 2023 17:12:25 GMT
| Content-Type: text/html; charset=UTF-8
| Help:
| HTTP/1.0 400 Bad Request
| Content-Type: text/html; charset=UTF-8
| Referrer-Policy: no-referrer
| Content-Length: 273
| Date: Sat, 18 Nov 2023 17:12:40 GMT
| <html><head>
| <meta http-equiv="content-type" content="text/html;charset=utf-8">
| <title>400 Bad Request</title>
| </head>
| <body text=#000000 bgcolor=#ffffff>
| <h1>Error: Bad Request</h1>
| <h2>Your client has issued a malformed or illegal request.</h2>
| <h2></h2>
| </body></html>
| RTSPRequest:
| HTTP/1.0 400 Bad Request
| Content-Type: text/html; charset=UTF-8
| Referrer-Policy: no-referrer
| Content-Length: 273
| Date: Sat, 18 Nov 2023 17:12:25 GMT
| <html><head>
| <meta http-equiv="content-type" content="text/html;charset=utf-8">
| <title>400 Bad Request</title>
| </head>
| <body text=#000000 bgcolor=#ffffff>
| <h1>Error: Bad Request</h1>
| <h2>Your client has issued a malformed or illegal request.</h2>
| <h2></h2>
|_ </body></html>
|_http-title: Did not follow redirect to https://firefly.bol.com:443/
443/tcp open ssl/https undefined
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.0 404 Not Found
| Date: Sat, 18 Nov 2023 17:12:32 GMT
| Content-Length: 74
| Content-Type: text/plain; charset=utf-8
| Via: 1.1 google
| Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
| response 404 (backend NotFound), service rules for the path non-existent
| GetRequest, HTTPOptions:
| HTTP/1.0 404 Not Found
| Date: Sat, 18 Nov 2023 17:12:31 GMT
| Content-Length: 74
| Content-Type: text/plain; charset=utf-8
| Via: 1.1 google
| Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
| response 404 (backend NotFound), service rules for the path non-existent
| RTSPRequest:
| HTTP/1.0 400 Bad Request
| Content-Type: text/html; charset=UTF-8
| Referrer-Policy: no-referrer
| Content-Length: 273
| Date: Sat, 18 Nov 2023 17:12:37 GMT
| <html><head>
| <meta http-equiv="content-type" content="text/html;charset=utf-8">
| <title>400 Bad Request</title>
| </head>
| <body text=#000000 bgcolor=#ffffff>
| <h1>Error: Bad Request</h1>
| <h2>Your client has issued a malformed or illegal request.</h2>
| <h2></h2>
| </body></html>
| tor-versions:
| HTTP/1.0 400 Bad Request
| Content-Length: 54
| Content-Type: text/html; charset=UTF-8
| Date: Sat, 18 Nov 2023 17:12:32 GMT
|_ <html><title>Error 400 (Bad Request)!!1</title></html>
|_http-server-header: undefined
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=firefly.bol.com
| Subject Alternative Name: DNS:firefly.bol.com
| Not valid before: 2023-10-21T15:31:34
|_Not valid after: 2024-01-19T15:31:33
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/18%Time=6558F078%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,BF,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nCache-Contr
SF:ol:\x20private\r\nLocation:\x20https://34\.96\.85\.238:443/\r\nContent-
SF:Length:\x200\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2017:12:25\x20GMT\r
SF:\nContent-Type:\x20text/html;\x20charset=UTF-8\r\n\r\n")%r(HTTPOptions,
SF:BF,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nCache-Control:\x20priva
SF:te\r\nLocation:\x20https://34\.96\.85\.238:443/\r\nContent-Length:\x200
SF:\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2017:12:25\x20GMT\r\nContent-Ty
SF:pe:\x20text/html;\x20charset=UTF-8\r\n\r\n")%r(RTSPRequest,1AD,"HTTP/1\
SF:.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=U
SF:TF-8\r\nReferrer-Policy:\x20no-referrer\r\nContent-Length:\x20273\r\nDa
SF:te:\x20Sat,\x2018\x20Nov\x202023\x2017:12:25\x20GMT\r\n\r\n\n<html><hea
SF:d>\n<meta\x20http-equiv=\"content-type\"\x20content=\"text/html;charset
SF:=utf-8\">\n<title>400\x20Bad\x20Request</title>\n</head>\n<body\x20text
SF:=#000000\x20bgcolor=#ffffff>\n<h1>Error:\x20Bad\x20Request</h1>\n<h2>Yo
SF:ur\x20client\x20has\x20issued\x20a\x20malformed\x20or\x20illegal\x20req
SF:uest\.</h2>\n<h2></h2>\n</body></html>\n")%r(FourOhFourRequest,DE,"HTTP
SF:/1\.0\x20301\x20Moved\x20Permanently\r\nCache-Control:\x20private\r\nLo
SF:cation:\x20https://34\.96\.85\.238:443/nice%20ports%2C/Trinity\.txt\.ba
SF:k\r\nContent-Length:\x200\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2017:1
SF:2:30\x20GMT\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\n\r\n")%r
SF:(DNSVersionBindReqTCP,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent
SF:-Length:\x2054\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nDate:
SF:\x20Sat,\x2018\x20Nov\x202023\x2017:12:40\x20GMT\r\n\r\n<html><title>Er
SF:ror\x20400\x20\(Bad\x20Request\)!!1</title></html>")%r(DNSStatusRequest
SF:TCP,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Length:\x2054\r\n
SF:Content-Type:\x20text/html;\x20charset=UTF-8\r\nDate:\x20Sat,\x2018\x20
SF:Nov\x202023\x2017:12:40\x20GMT\r\n\r\n<html><title>Error\x20400\x20\(Ba
SF:d\x20Request\)!!1</title></html>")%r(Help,1AD,"HTTP/1\.0\x20400\x20Bad\
SF:x20Request\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nReferrer-
SF:Policy:\x20no-referrer\r\nContent-Length:\x20273\r\nDate:\x20Sat,\x2018
SF:\x20Nov\x202023\x2017:12:40\x20GMT\r\n\r\n\n<html><head>\n<meta\x20http
SF:-equiv=\"content-type\"\x20content=\"text/html;charset=utf-8\">\n<title
SF:>400\x20Bad\x20Request</title>\n</head>\n<body\x20text=#000000\x20bgcol
SF:or=#ffffff>\n<h1>Error:\x20Bad\x20Request</h1>\n<h2>Your\x20client\x20h
SF:as\x20issued\x20a\x20malformed\x20or\x20illegal\x20request\.</h2>\n<h2>
SF:</h2>\n</body></html>\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/18%Time=6558F07F%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,110,"HTTP/1\.0\x20404\x20Not\x20Found\r\nDate:\x20Sa
SF:t,\x2018\x20Nov\x202023\x2017:12:31\x20GMT\r\nContent-Length:\x2074\r\n
SF:Content-Type:\x20text/plain;\x20charset=utf-8\r\nVia:\x201\.1\x20google
SF:\r\nAlt-Svc:\x20h3=\":443\";\x20ma=2592000,h3-29=\":443\";\x20ma=259200
SF:0\r\n\r\nresponse\x20404\x20\(backend\x20NotFound\),\x20service\x20rule
SF:s\x20for\x20the\x20path\x20non-existent\x20\n")%r(HTTPOptions,110,"HTTP
SF:/1\.0\x20404\x20Not\x20Found\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x201
SF:7:12:31\x20GMT\r\nContent-Length:\x2074\r\nContent-Type:\x20text/plain;
SF:\x20charset=utf-8\r\nVia:\x201\.1\x20google\r\nAlt-Svc:\x20h3=\":443\";
SF:\x20ma=2592000,h3-29=\":443\";\x20ma=2592000\r\n\r\nresponse\x20404\x20
SF:\(backend\x20NotFound\),\x20service\x20rules\x20for\x20the\x20path\x20n
SF:on-existent\x20\n")%r(FourOhFourRequest,110,"HTTP/1\.0\x20404\x20Not\x2
SF:0Found\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2017:12:32\x20GMT\r\nCont
SF:ent-Length:\x2074\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nV
SF:ia:\x201\.1\x20google\r\nAlt-Svc:\x20h3=\":443\";\x20ma=2592000,h3-29=\
SF:":443\";\x20ma=2592000\r\n\r\nresponse\x20404\x20\(backend\x20NotFound\
SF:),\x20service\x20rules\x20for\x20the\x20path\x20non-existent\x20\n")%r(
SF:tor-versions,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Length:\
SF:x2054\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nDate:\x20Sat,\
SF:x2018\x20Nov\x202023\x2017:12:32\x20GMT\r\n\r\n<html><title>Error\x2040
SF:0\x20\(Bad\x20Request\)!!1</title></html>")%r(RTSPRequest,1AD,"HTTP/1\.
SF:0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=UT
SF:F-8\r\nReferrer-Policy:\x20no-referrer\r\nContent-Length:\x20273\r\nDat
SF:e:\x20Sat,\x2018\x20Nov\x202023\x2017:12:37\x20GMT\r\n\r\n\n<html><head
SF:>\n<meta\x20http-equiv=\"content-type\"\x20content=\"text/html;charset=
SF:utf-8\">\n<title>400\x20Bad\x20Request</title>\n</head>\n<body\x20text=
SF:#000000\x20bgcolor=#ffffff>\n<h1>Error:\x20Bad\x20Request</h1>\n<h2>You
SF:r\x20client\x20has\x20issued\x20a\x20malformed\x20or\x20illegal\x20requ
SF:est\.</h2>\n<h2></h2>\n</body></html>\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 7 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.63 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.67 ms multacom.com (96.45.162.9)
4 0.42 ms 206.72.211.148.any2ix.coresite.com (206.72.211.148)
5 1.40 ms 108.170.247.129
6 0.30 ms 209.85.249.95
7 0.53 ms 238.85.96.34.bc.googleusercontent.com (34.96.85.238)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 101.00 seconds
Color Scheme
-
Target
-
Target IP
34.96.85.238
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A firefly.bol.com
-
Scan date
18 Nov 2023 12:13
-
Copy scan report
-
Download report
-
Remove scan result