Scan report for "www.zoho.com.au"

Membership level: Free member
Scan OS information and Traceroute (nmap -A www.zoho.com.au)
Nmap scan report for www.zoho.com.au (103.138.128.98)
Host is up (0.16s latency).
Not shown: 997 filtered tcp ports (no-response)
PORT    STATE  SERVICE   VERSION
80/tcp  open   http      ZGS
|_http-server-header: ZGS
|_http-title: Did not follow redirect to https://www.zoho.com.au/
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 400 Bad Request
|     Server: ZGS
|     Date: Thu, 04 Apr 2024 04:08:21 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     zproxy: domain_not_configured
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     Server: ZGS
|     Date: Thu, 04 Apr 2024 04:08:19 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     zproxy: domain_not_configured
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   HTTPOptions, RTSPRequest, X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: ZGS
|     Date: Thu, 04 Apr 2024 04:08:20 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     zproxy: domain_not_configured
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: ZGS
|     Date: Thu, 04 Apr 2024 04:08:26 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     zproxy: domain_not_configured
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
113/tcp closed ident
443/tcp open   ssl/https ZGS
| fingerprint-strings: 
|   FourOhFourRequest, HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     Server: ZGS
|     Date: Thu, 04 Apr 2024 04:08:27 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     zproxy: domain_not_configured
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     Server: ZGS
|     Date: Thu, 04 Apr 2024 04:08:26 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     zproxy: domain_not_configured
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   RPCCheck, RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Server: ZGS
|     Date: Thu, 04 Apr 2024 04:08:34 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Server: ZGS
|     Date: Thu, 04 Apr 2024 04:08:28 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
| ssl-cert: Subject: commonName=*.zoho.com.au
| Subject Alternative Name: DNS:*.zoho.com.au, DNS:zoho.com.au
| Not valid before: 2023-04-30T00:00:00
|_Not valid after:  2024-05-24T23:59:59
|_http-server-header: ZGS
|_http-title: Did not follow redirect to https://www.zoho.com/
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=4/3%Time=660E27B3%P=x86_64-redhat-linux-gnu%r(G
SF:etRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\n
SF:Date:\x20Thu,\x2004\x20Apr\x202024\x2004:08:19\x20GMT\r\nContent-Type:\
SF:x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nzprox
SF:y:\x20domain_not_configured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x2
SF:0Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request<
SF:/h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,128,"HTTP/1\.1\
SF:x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Ap
SF:r\x202024\x2004:08:20\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L
SF:ength:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configur
SF:ed\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r
SF:\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\
SF:r\n</html>\r\n")%r(RTSPRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request\
SF:r\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:20\x20
SF:GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnecti
SF:on:\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head
SF:><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>4
SF:00\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(X11Pro
SF:be,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x
SF:20Thu,\x2004\x20Apr\x202024\x2004:08:20\x20GMT\r\nContent-Type:\x20text
SF:/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20d
SF:omain_not_configured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Reques
SF:t</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></c
SF:enter>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,128,"HTTP/1\.1\x
SF:20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr
SF:\x202024\x2004:08:21\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Le
SF:ngth:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configure
SF:d\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\
SF:n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r
SF:\n</html>\r\n")%r(RPCCheck,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nS
SF:erver:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:26\x20GMT\
SF:r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\
SF:x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head><ti
SF:tle>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x
SF:20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=4/3%Time=660E27B9%P=x86_64-redhat-linux-
SF:gnu%r(GetRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20
SF:ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:26\x20GMT\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r
SF:\nzproxy:\x20domain_not_configured\r\n\r\n<html>\r\n<head><title>400\x2
SF:0Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20R
SF:equest</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,128,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Thu,\x200
SF:4\x20Apr\x202024\x2004:08:27\x20GMT\r\nContent-Type:\x20text/html\r\nCo
SF:ntent-Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_c
SF:onfigured\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></
SF:head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<
SF:/body>\r\n</html>\r\n")%r(FourOhFourRequest,128,"HTTP/1\.1\x20400\x20Ba
SF:d\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2
SF:004:08:27\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2012
SF:2\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n<h
SF:tml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n
SF:<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r
SF:\n")%r(tor-versions,109,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\
SF:x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:28\x20GMT\r\nCont
SF:ent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20clos
SF:e\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\
SF:n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r
SF:\n</html>\r\n")%r(RTSPRequest,109,"HTTP/1\.1\x20400\x20Bad\x20Request\r
SF:\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:34\x20G
SF:MT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnectio
SF:n:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title>
SF:</head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\
SF:n</body>\r\n</html>\r\n")%r(RPCCheck,109,"HTTP/1\.1\x20400\x20Bad\x20Re
SF:quest\r\nServer:\x20ZGS\r\nDate:\x20Thu,\x2004\x20Apr\x202024\x2004:08:
SF:34\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nCo
SF:nnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request<
SF:/title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cen
SF:ter>\r\n</body>\r\n</html>\r\n");
Device type: general purpose|phone
Running (JUST GUESSING): FreeBSD 11.X (86%), Google Android 5.X (85%)
OS CPE: cpe:/o:freebsd:freebsd:11.0 cpe:/o:google:android:5.0.1
Aggressive OS guesses: FreeBSD 11.0-RELEASE (86%), FreeBSD 11.2-STABLE (86%), Android 5.0.1 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 9 hops

TRACEROUTE (using port 113/tcp)
HOP RTT       ADDRESS
1   0.22 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.57 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.79 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.52 ms   vocus-connect-pty.as4826.any2ix.coresite.com (206.72.210.136)
5   156.37 ms be101.bdr03.sjc01.ca.us.vocus.network (114.31.199.34)
6   ...
7   156.79 ms be2.bdr01.syd11.nsw.vocus.network (114.31.192.107)
8   156.32 ms 203-129-134-218.sta.ip.vocus.au (203.129.134.218)
9   156.36 ms 103.138.128.98

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 64.08 seconds
Color Scheme
Target
www.zoho.com.au
Target IP
103.138.128.98
Target Country
AU
Scan method
Scan OS information and Traceroute
Run command
nmap -A www.zoho.com.au
Scan date
04 Apr 2024 00:09
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: