Scan OS information and Traceroute (nmap -A pingan.com)
Nmap scan report for pingan.com (27.36.113.150)
Host is up (0.20s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http loading
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.0 404 NOT FOUND
| Content-Type: text/html; charset=UTF-8
| Cache-Control: no-cache
| Pragma: no-cache
| Expires: 0
| Connection: close
| <!DOCTYPE html>
| <html>
| <head>
| <meta charset='UTF-8'>
| <meta name="viewport" content="width=device-width,initial-scale=1.0,maximum-scale=1.0,user-scalable=0">
| <meta http-equiv="X-UA-Compatible" content="ie=edge">
| <title>
| </title>
| <style>
| html,body,button,div,a{
| padding:0;margin:0;
| -moz-appearance:none;
| -ms-progress-appearance:none;
| -webkit-appearance:none;
| appearance:none;
| -webkit-tap-highlight-color:transparent;
| #box{
| margin-top:100px;
| text-align:center
| .img-404{
| width:600px
| GetRequest, HTTPOptions:
| HTTP/1.1 301 Moved Permanently
| Server: loading
| Date: Sun, 19 Nov 2023 08:21:57 GMT
| Content-Type: text/html
| Content-Length: 164
| Connection: close
| Location: https://www.pingan.com/
| <html>
| <head><title>301 Moved Permanently</title></head>
| <body>
| <center><h1>301 Moved Permanently</h1></center>
| <hr><center>loading</center>
| </body>
| </html>
| RTSPRequest:
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>loading</center>
| </body>
|_ </html>
|_http-server-header: loading
|_http-title: Did not follow redirect to https://www.pingan.com/
443/tcp open ssl/https?
|_ssl-date: TLS randomness does not represent time
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=6559C5A5%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,160,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x2
SF:0loading\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2008:21:57\x20GMT\r\nCo
SF:ntent-Type:\x20text/html\r\nContent-Length:\x20164\r\nConnection:\x20cl
SF:ose\r\nLocation:\x20https://www\.pingan\.com/\r\n\r\n<html>\r\n<head><t
SF:itle>301\x20Moved\x20Permanently</title></head>\r\n<body>\r\n<center><h
SF:1>301\x20Moved\x20Permanently</h1></center>\r\n<hr><center>loading</cen
SF:ter>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,160,"HTTP/1\.1\x20301\x2
SF:0Moved\x20Permanently\r\nServer:\x20loading\r\nDate:\x20Sun,\x2019\x20N
SF:ov\x202023\x2008:21:57\x20GMT\r\nContent-Type:\x20text/html\r\nContent-
SF:Length:\x20164\r\nConnection:\x20close\r\nLocation:\x20https://www\.pin
SF:gan\.com/\r\n\r\n<html>\r\n<head><title>301\x20Moved\x20Permanently</ti
SF:tle></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20Permanently</h1></
SF:center>\r\n<hr><center>loading</center>\r\n</body>\r\n</html>\r\n")%r(R
SF:TSPRequest,98,"<html>\r\n<head><title>400\x20Bad\x20Request</title></he
SF:ad>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr
SF:><center>loading</center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourReque
SF:st,D27,"HTTP/1\.0\x20404\x20NOT\x20FOUND\r\nContent-Type:\x20text/html;
SF:\x20charset=UTF-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\
SF:r\nExpires:\x200\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20html>\n<ht
SF:ml>\n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20c
SF:harset='UTF-8'>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20name=\"viewpo
SF:rt\"\x20content=\"width=device-width,initial-scale=1\.0,maximum-scale=1
SF:\.0,user-scalable=0\">\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20http-e
SF:quiv=\"X-UA-Compatible\"\x20content=\"ie=edge\">\n\x20\x20\x20\x20\x20\
SF:x20\x20\x20<title>\xe9\xa1\xb5\xe9\x9d\xa2\xe6\x9c\xaa\xe6\x89\xbe\xe5\
SF:x88\xb0</title>\n\x20\x20\x20\x20\x20\x20\x20\x20<style>\n\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20html,body,button,div,a{\n\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20padding:0;margin:0;\n\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20-moz-app
SF:earance:none;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20
SF:\x20\x20-ms-progress-appearance:none;\n\x20\x20\x20\x20\x20\x20\x20\x20
SF:\x20\x20\x20\x20\x20\x20\x20\x20-webkit-appearance:none;\n\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20appearance:none;\n\x
SF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20-webkit-t
SF:ap-highlight-color:transparent;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20\x20\x20}\x20\x20\x20\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20#box{\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20margin-top:100px;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20\x20\x20\x20text-align:center\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20\x20\x20}\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\.img-404{
SF:\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20width
SF::600px\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20}");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: load balancer|firewall
Running (JUST GUESSING): F5 Networks TMOS 11.6.X|11.4.X (98%)
OS CPE: cpe:/o:f5:tmos:11.6 cpe:/o:f5:tmos:11.4
Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (98%), F5 BIG-IP AFM firewall (93%), F5 BIG-IP load balancer (TMOS 11.4) (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 21 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.52 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.82 ms multacom.com (96.45.162.9)
4 0.30 ms 182.54.129.90
5 11.71 ms 10.31.0.238
6 157.48 ms 219.158.33.77
7 178.71 ms 219.158.96.41
8 182.49 ms 219.158.16.77
9 ... 10
11 191.85 ms 112.91.0.210
12 211.58 ms 120.83.180.2
13 ... 15
16 202.51 ms 27.36.224.198
17 ... 20
21 195.04 ms 27.36.113.150
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 234.81 seconds
Color Scheme
-
Target
-
Target IP
27.36.113.150
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A pingan.com
-
Scan date
19 Nov 2023 03:25
-
Copy scan report
-
Download report
-
Remove scan result
-
Total scans