Scan report for "www.flippity.net"

Membership level: Free member
Scan OS information and Traceroute (nmap -A www.flippity.net)
Nmap scan report for www.flippity.net (148.72.126.183)
Host is up (0.011s latency).
rDNS record for 148.72.126.183: 183.126.72.148.host.secureserver.net
Not shown: 977 filtered tcp ports (no-response)
PORT      STATE  SERVICE     VERSION
21/tcp    open   ftp         Pure-FTPd
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=*.prod.phx3.secureserver.net
| Subject Alternative Name: DNS:*.prod.phx3.secureserver.net, DNS:prod.phx3.secureserver.net
| Not valid before: 2024-02-15T21:45:33
|_Not valid after:  2025-03-18T21:45:33
22/tcp    open   ssh         OpenSSH 8.0 (protocol 2.0)
| ssh-hostkey: 
|   2048 bf:35:f1:33:76:2d:22:4e:20:66:31:df:80:6d:41:45 (RSA)
|   256 82:54:18:bf:a2:f2:d7:57:71:a4:59:a0:fc:53:36:be (ECDSA)
|_  256 e9:d7:60:f4:e5:96:ce:94:e3:cf:c6:11:fc:80:ff:b4 (ED25519)
25/tcp    open   smtp?
|_smtp-commands: SMTP EHLO www.flippity.net: failed to receive data: connection closed
| fingerprint-strings: 
|   NULL: 
|_    421 Too many concurrent SMTP connections from this IP address; please try again later.
80/tcp    open   http        Apache httpd
|_http-title: Did not follow redirect to https://www.flippity.net/
|_http-server-header: Apache
110/tcp   open   pop3        Dovecot pop3d
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=flippity.net
| Subject Alternative Name: DNS:flippity.net, DNS:www.flippity.net
| Not valid before: 2023-08-07T13:20:25
|_Not valid after:  2024-09-07T13:20:25
|_pop3-capabilities: TOP STLS SASL(PLAIN LOGIN) USER UIDL RESP-CODES PIPELINING CAPA AUTH-RESP-CODE
143/tcp   open   imap        Dovecot imapd
| ssl-cert: Subject: commonName=flippity.net
| Subject Alternative Name: DNS:flippity.net, DNS:www.flippity.net
| Not valid before: 2023-08-07T13:20:25
|_Not valid after:  2024-09-07T13:20:25
|_ssl-date: TLS randomness does not represent time
|_imap-capabilities: SASL-IR STARTTLS Pre-login LOGIN-REFERRALS AUTH=PLAIN ID capabilities more LITERAL+ IMAP4rev1 ENABLE IDLE have OK post-login listed AUTH=LOGINA0001 NAMESPACE
443/tcp   open   ssl/http    Apache httpd
| ssl-cert: Subject: commonName=flippity.net
| Subject Alternative Name: DNS:flippity.net, DNS:www.flippity.net
| Not valid before: 2023-08-07T13:20:25
|_Not valid after:  2024-09-07T13:20:25
|_http-server-header: Apache
| tls-alpn: 
|   h2
|_  http/1.1
| http-title: 404 Not Found
|_Requested resource was https:///400.shtml
|_ssl-date: TLS randomness does not represent time
465/tcp   open   ssl/smtp    Exim smtpd 4.96.2
|_smtp-commands: SMTP EHLO www.flippity.net: failed to receive data: connection closed
587/tcp   open   submission?
|_ssl-date: TLS randomness does not represent time
|_smtp-commands: SMTP EHLO www.flippity.net: failed to receive data: connection closed
| fingerprint-strings: 
|   NULL: 
|_    421 Too many concurrent SMTP connections from this IP address; please try again later.
993/tcp   open   imaps?
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=flippity.net
| Subject Alternative Name: DNS:flippity.net, DNS:www.flippity.net
| Not valid before: 2023-08-07T13:20:25
|_Not valid after:  2024-09-07T13:20:25
|_imap-capabilities: SASL-IR post-login Pre-login LOGIN-REFERRALS AUTH=PLAIN ID capabilities LITERAL+ IMAP4rev1 ENABLE IDLE more OK have listed AUTH=LOGINA0001 NAMESPACE
995/tcp   open   pop3s?
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=flippity.net
| Subject Alternative Name: DNS:flippity.net, DNS:www.flippity.net
| Not valid before: 2023-08-07T13:20:25
|_Not valid after:  2024-09-07T13:20:25
|_pop3-capabilities: TOP UIDL RESP-CODES SASL(PLAIN LOGIN) USER PIPELINING CAPA AUTH-RESP-CODE
3306/tcp  open   mysql       MariaDB (unauthorized)
8443/tcp  closed https-alt
50000/tcp closed ibm-db2
50001/tcp closed unknown
50002/tcp closed iiimsf
50003/tcp closed unknown
50006/tcp closed unknown
50300/tcp closed unknown
50389/tcp closed unknown
50500/tcp closed unknown
50636/tcp closed unknown
50800/tcp closed unknown
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port25-TCP:V=7.92%I=7%D=5/15%Time=66453BA9%P=x86_64-redhat-linux-gnu%r(
SF:NULL,58,"421\x20Too\x20many\x20concurrent\x20SMTP\x20connections\x20fro
SF:m\x20this\x20IP\x20address;\x20please\x20try\x20again\x20later\.\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port587-TCP:V=7.92%I=7%D=5/15%Time=66453BA9%P=x86_64-redhat-linux-gnu%r
SF:(NULL,58,"421\x20Too\x20many\x20concurrent\x20SMTP\x20connections\x20fr
SF:om\x20this\x20IP\x20address;\x20please\x20try\x20again\x20later\.\r\n");
Aggressive OS guesses: Linux 3.2 - 4.9 (96%), Linux 2.6.32 - 3.13 (95%), Linux 5.1 (95%), Linux 3.10 - 4.11 (92%), Linux 2.6.32 (92%), Linux 2.6.32 - 3.10 (91%), HP P2000 G3 NAS device (91%), Linux 3.16 - 4.6 (90%), Linux 4.4 (90%), Infomir MAG-250 set-top box (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops
Service Info: Host: p3plmcpnl498427.prod.phx3.secureserver.net

TRACEROUTE (using port 50800/tcp)
HOP RTT      ADDRESS
1   0.21 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.57 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.73 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   1.20 ms  be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102)
6   0.78 ms  lax-b22-link.ip.twelve99.net (80.239.160.64)
7   10.78 ms phx-b5-link.ip.twelve99.net (62.115.125.73)
8   11.08 ms phx-b5-link.ip.twelve99.net (62.115.125.73)
9   10.77 ms phx-b9-link.ip.twelve99.net (62.115.138.63)
10  11.47 ms ae1.phx3-pemc0215-01.bb.gdinf.net (148.72.32.65)
11  ... 17
18  11.60 ms 183.126.72.148.host.secureserver.net (148.72.126.183)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 53.89 seconds
Color Scheme
Target
www.flippity.net
Target IP
148.72.126.183
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A www.flippity.net
Scan date
15 May 2024 18:48
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: