Scan OS information and Traceroute (nmap -A www.zoho.com.au)
Nmap scan report for www.zoho.com.au (103.138.128.98)
Host is up (0.16s latency).
Not shown: 997 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http ZGS
|_http-server-header: ZGS
|_http-title: Did not follow redirect to https://www.zoho.com.au/
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Thu, 04 Apr 2024 04:08:21 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| zproxy: domain_not_configured
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| GetRequest:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Thu, 04 Apr 2024 04:08:19 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| zproxy: domain_not_configured
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| HTTPOptions, RTSPRequest, X11Probe:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Thu, 04 Apr 2024 04:08:20 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| zproxy: domain_not_configured
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Thu, 04 Apr 2024 04:08:26 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| zproxy: domain_not_configured
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
113/tcp closed ident
443/tcp open ssl/https ZGS
| fingerprint-strings:
| FourOhFourRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Thu, 04 Apr 2024 04:08:27 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| zproxy: domain_not_configured
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| GetRequest:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Thu, 04 Apr 2024 04:08:26 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| zproxy: domain_not_configured
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| RPCCheck, RTSPRequest:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Thu, 04 Apr 2024 04:08:34 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| tor-versions:
| HTTP/1.1 400 Bad Request
| Server: ZGS
| Date: Thu, 04 Apr 2024 04:08:28 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
| ssl-cert: Subject: commonName=*.zoho.com.au
| Subject Alternative Name: DNS:*.zoho.com.au, DNS:zoho.com.au
| Not valid before: 2023-04-30T00:00:00
|_Not valid after: 2024-05-24T23:59:59
|_http-server-header: ZGS
|_http-title: Did not follow redirect to https://www.zoho.com/
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=4/3%Time=660E27B3%P=x86_64-redhat-linux-gnu%r(G
SF:etRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\n
SF:Date:\x20Thu,\x2004\x20Apr\x202024\x2004:08:19\x20GMT\r\nContent-Type:\
SF:x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nzprox
SF:y:\x20domain_not_configured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x2
SF:0Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request<
SF:/h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,128,"HTTP/1\.1\
SF:x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Ap
SF:r\x202024\x2004:08:20\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L
SF:ength:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configur
SF:ed\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r
SF:\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\
SF:r\n</html>\r\n")%r(RTSPRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request\
SF:r\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:20\x20
SF:GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnecti
SF:on:\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head
SF:><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>4
SF:00\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(X11Pro
SF:be,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x
SF:20Thu,\x2004\x20Apr\x202024\x2004:08:20\x20GMT\r\nContent-Type:\x20text
SF:/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20d
SF:omain_not_configured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Reques
SF:t</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></c
SF:enter>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,128,"HTTP/1\.1\x
SF:20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr
SF:\x202024\x2004:08:21\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Le
SF:ngth:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configure
SF:d\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\
SF:n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r
SF:\n</html>\r\n")%r(RPCCheck,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nS
SF:erver:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:26\x20GMT\
SF:r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\
SF:x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head><ti
SF:tle>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x
SF:20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=4/3%Time=660E27B9%P=x86_64-redhat-linux-
SF:gnu%r(GetRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20
SF:ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:26\x20GMT\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r
SF:\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head><title>400\x2
SF:0Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20R
SF:equest</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,128,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Thu,\x200
SF:4\x20Apr\x202024\x2004:08:27\x20GMT\r\nContent-Type:\x20text/html\r\nCo
SF:ntent-Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_c
SF:onfigured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></
SF:head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<
SF:/body>\r\n</html>\r\n")%r(FourOhFourRequest,128,"HTTP/1\.1\x20400\x20Ba
SF:d\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2
SF:004:08:27\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2012
SF:2\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n<h
SF:tml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n
SF:<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r
SF:\n")%r(tor-versions,109,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\
SF:x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:28\x20GMT\r\nCont
SF:ent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20clos
SF:e\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\
SF:n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r
SF:\n</html>\r\n")%r(RTSPRequest,109,"HTTP/1\.1\x20400\x20Bad\x20Request\r
SF:\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:34\x20G
SF:MT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnectio
SF:n:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title>
SF:</head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\
SF:n</body>\r\n</html>\r\n")%r(RPCCheck,109,"HTTP/1\.1\x20400\x20Bad\x20Re
SF:quest\r\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:
SF:34\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nCo
SF:nnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request<
SF:/title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cen
SF:ter>\r\n</body>\r\n</html>\r\n");
Device type: general purpose|phone
Running (JUST GUESSING): FreeBSD 11.X (86%), Google Android 5.X (85%)
OS CPE: cpe:/o:freebsd:freebsd:11.0 cpe:/o:google:android:5.0.1
Aggressive OS guesses: FreeBSD 11.0-RELEASE (86%), FreeBSD 11.2-STABLE (86%), Android 5.0.1 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 9 hops
TRACEROUTE (using port 113/tcp)
HOP RTT ADDRESS
1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.57 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.79 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4 0.52 ms vocus-connect-pty.as4826.any2ix.coresite.com (206.72.210.136)
5 156.37 ms be101.bdr03.sjc01.ca.us.vocus.network (114.31.199.34)
6 ...
7 156.79 ms be2.bdr01.syd11.nsw.vocus.network (114.31.192.107)
8 156.32 ms 203-129-134-218.sta.ip.vocus.au (203.129.134.218)
9 156.36 ms 103.138.128.98
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 64.08 seconds
Color Scheme
-
Target
-
Target IP
103.138.128.98
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A www.zoho.com.au
-
Scan date
04 Apr 2024 00:09
-
Copy scan report
-
Download report
-
Remove scan result
-
Total scans