Scan report for "one.newrelic.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A one.newrelic.com)
Nmap scan report for one.newrelic.com (3.130.130.93)
Host is up (0.068s latency).
Other addresses for one.newrelic.com (not scanned): 3.21.88.73 18.188.220.94 3.135.157.0 3.22.141.214 3.140.6.109 18.220.230.11 3.20.30.113 18.225.1.82
rDNS record for 3.130.130.93: ec2-3-130-130-93.us-east-2.compute.amazonaws.com
Not shown: 999 filtered ports
PORT    STATE SERVICE   VERSION
443/tcp open  ssl/https gloo-public
| fingerprint-strings: 
|   DNSStatusRequestTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 20:21:39 GMT
|     server: gloo-public
|     connection: close
|     Request
|   DNSVersionBindReqTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 20:21:37 GMT
|     server: gloo-public
|     connection: close
|     Request
|   FourOhFourRequest: 
|     HTTP/1.1 426 Upgrade Required
|     date: Tue, 21 Nov 2023 20:21:27 GMT
|     server: gloo-public
|     connection: close
|     content-length: 0
|   GetRequest: 
|     HTTP/1.1 426 Upgrade Required
|     date: Tue, 21 Nov 2023 20:21:24 GMT
|     server: gloo-public
|     connection: close
|     content-length: 0
|   HTTPOptions: 
|     HTTP/1.1 426 Upgrade Required
|     date: Tue, 21 Nov 2023 20:21:25 GMT
|     server: gloo-public
|     connection: close
|     content-length: 0
|   Help: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 20:21:40 GMT
|     server: gloo-public
|     connection: close
|     Request
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 20:21:36 GMT
|     server: gloo-public
|     connection: close
|     Request
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 20:21:35 GMT
|     server: gloo-public
|     connection: close
|     Request
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Tue, 21 Nov 2023 20:21:28 GMT
|     server: gloo-public
|     connection: close
|_    Request
|_http-server-header: gloo-public
| http-title:       Log in to New Relic    
|_Requested resource was https://login.newrelic.com/login?return_to=https%3A%2F%2Fone.newrelic.com%2F
|_http-trane-info: Problem with XML parsing of /evox/about
| ssl-cert: Subject: commonName=*.us-burnt-shake.nucleus-lb.newrelic.com
| Subject Alternative Name: DNS:*.1nr.io, DNS:*.datanerd.one, DNS:*.newrelic.com, DNS:*.nr-data.net, DNS:*.nucleus-lb.datanerd.one, DNS:*.nucleus-lb.newrelic.com, DNS:*.one.nr, DNS:*.onenr.io, DNS:*.service.datanerd.one, DNS:*.service.newrelic.com, DNS:*.us-burnt-shake.nucleus-lb.newrelic.com, DNS:1nr.io, DNS:one.nr, DNS:onenr.io
| Not valid before: 2023-10-25T17:43:14
|_Not valid after:  2024-01-23T17:43:13
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655D1145%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,81,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:
SF:\x20Tue,\x2021\x20Nov\x202023\x2020:21:24\x20GMT\r\nserver:\x20gloo-pub
SF:lic\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOpt
SF:ions,81,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Tue,\x2021
SF:\x20Nov\x202023\x2020:21:25\x20GMT\r\nserver:\x20gloo-public\r\nconnect
SF:ion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,81,
SF:"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Tue,\x2021\x20Nov\
SF:x202023\x2020:21:27\x20GMT\r\nserver:\x20gloo-public\r\nconnection:\x20
SF:close\r\ncontent-length:\x200\r\n\r\n")%r(tor-versions,A2,"HTTP/1\.1\x2
SF:0400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20tex
SF:t/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2020:21:28\x20GMT\r\nser
SF:ver:\x20gloo-public\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(R
SF:TSPRequest,A2,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2
SF:011\r\ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x20202
SF:3\x2020:21:35\x20GMT\r\nserver:\x20gloo-public\r\nconnection:\x20close\
SF:r\n\r\nBad\x20Request")%r(RPCCheck,A2,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20
SF:Tue,\x2021\x20Nov\x202023\x2020:21:36\x20GMT\r\nserver:\x20gloo-public\
SF:r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(DNSVersionBindReqTCP,
SF:A2,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncont
SF:ent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2020:21:
SF:37\x20GMT\r\nserver:\x20gloo-public\r\nconnection:\x20close\r\n\r\nBad\
SF:x20Request")%r(DNSStatusRequestTCP,A2,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20
SF:Tue,\x2021\x20Nov\x202023\x2020:21:39\x20GMT\r\nserver:\x20gloo-public\
SF:r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(Help,A2,"HTTP/1\.1\x2
SF:0400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20tex
SF:t/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2020:21:40\x20GMT\r\nser
SF:ver:\x20gloo-public\r\nconnection:\x20close\r\n\r\nBad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 19 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   0.19 ms  208.76.251.177
2   0.48 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.55 ms  1.162.45.96-dedicated.multacom.com (96.45.162.1)
4   0.89 ms  be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   12.49 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161)
6   46.48 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54)
7   37.04 ms be3851.ccr42.iah01.atlas.cogentco.com (154.54.2.5)
8   38.29 ms be2418.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.6.78)
9   38.29 ms 38.104.61.42
10  45.10 ms 52.93.254.221
11  38.14 ms 52.93.64.95
12  ...
13  68.00 ms 108.166.252.11
14  ...
15  67.80 ms 108.166.248.46
16  ...
17  67.74 ms 108.166.248.63
18  ...
19  67.06 ms ec2-3-130-130-93.us-east-2.compute.amazonaws.com (3.130.130.93)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 89.90 seconds
Color Scheme
Target
one.newrelic.com
Target IP
3.130.130.93
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A one.newrelic.com
Scan date
21 Nov 2023 15:22
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: