Scan report for "lactalis.us"

Membership level: Free member
Scan OS information and Traceroute (nmap -A lactalis.us)
Nmap scan report for lactalis.us (206.57.124.147)
Host is up (0.077s latency).
Not shown: 996 filtered tcp ports (no-response)
PORT    STATE  SERVICE    VERSION
21/tcp  open   tcpwrapped
80/tcp  open   http
|_http-title: Attack Detected
| fingerprint-strings: 
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 200 OK
|     Content-Length: 4401
|     Connection: Close
|     Cache-Control: no-cache
|     Content-Type: text/html; charset=utf-8
|     X-Frame-Options: SAMEORIGIN
|     <!DOCTYPE html>
|     <html lang="en">
|     <head>
|     <meta charset="UTF-8">
|     <meta http-equiv="X-UA-Compatible" content="IE=8; IE=EDGE">
|     <meta name="viewport" content="width=device-width, initial-scale=1">
|     <style type="text/css">
|     body {
|     height: 100%;
|     font-family: Helvetica, Arial, sans-serif;
|     color: #6a6a6a;
|     margin: 0;
|     display: flex;
|     align-items: center;
|     justify-content: center;
|_    input[type=date], input[type=email], input[type=number], input[type=password], input[type=search], input[type=tel], input[type=text], input[type=time], input[type=url], select, textarea {
113/tcp closed ident
443/tcp open   tcpwrapped
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=6/11%Time=6668BA17%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,11CB,"HTTP/1\.1\x20200\x20OK\r\nContent-Length:\x204401\r\nC
SF:onnection:\x20Close\r\nCache-Control:\x20no-cache\r\nContent-Type:\x20t
SF:ext/html;\x20charset=utf-8\r\nX-Frame-Options:\x20SAMEORIGIN\r\n\r\n<!D
SF:OCTYPE\x20html>\n<html\x20lang=\"en\">\n\x20\x20\x20\x20<head>\n\x20\x2
SF:0\x20\x20\x20\x20\x20\x20<meta\x20charset=\"UTF-8\">\n\x20\x20\x20\x20\
SF:x20\x20\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=
SF:8;\x20IE=EDGE\">\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20name=\"viewp
SF:ort\"\x20content=\"width=device-width,\x20initial-scale=1\">\n\x20\x20\
SF:x20\x20\x20\x20\x20\x20<style\x20type=\"text/css\">\n\x20\x20\x20\x20\x
SF:20\x20\x20\x20\x20\x20\x20\x20body\x20{\n\x20\x20\x20\x20\x20\x20\x20\x
SF:20\x20\x20\x20\x20\x20\x20\x20\x20height:\x20100%;\n\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20font-family:\x20Helvetica,
SF:\x20Arial,\x20sans-serif;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20
SF:\x20\x20\x20\x20\x20color:\x20#6a6a6a;\n\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20margin:\x200;\n\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20display:\x20flex;\n\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20align-items:\x20ce
SF:nter;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20
SF:justify-content:\x20center;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20\x20}\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20input\[type=da
SF:te\],\x20input\[type=email\],\x20input\[type=number\],\x20input\[type=p
SF:assword\],\x20input\[type=search\],\x20input\[type=tel\],\x20input\[typ
SF:e=text\],\x20input\[type=time\],\x20input\[type=url\],\x20select,\x20te
SF:xtarea\x20{\n\x20\x20\x20\x20")%r(HTTPOptions,11CB,"HTTP/1\.1\x20200\x2
SF:0OK\r\nContent-Length:\x204401\r\nConnection:\x20Close\r\nCache-Control
SF::\x20no-cache\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nX-Fram
SF:e-Options:\x20SAMEORIGIN\r\n\r\n<!DOCTYPE\x20html>\n<html\x20lang=\"en\
SF:">\n\x20\x20\x20\x20<head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20ch
SF:arset=\"UTF-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20http-equiv=\
SF:"X-UA-Compatible\"\x20content=\"IE=8;\x20IE=EDGE\">\n\x20\x20\x20\x20\x
SF:20\x20\x20\x20<meta\x20name=\"viewport\"\x20content=\"width=device-widt
SF:h,\x20initial-scale=1\">\n\x20\x20\x20\x20\x20\x20\x20\x20<style\x20typ
SF:e=\"text/css\">\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20body\x
SF:20{\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20he
SF:ight:\x20100%;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20font-family:\x20Helvetica,\x20Arial,\x20sans-serif;\n\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20color:\x20#6a6a6
SF:a;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20mar
SF:gin:\x200;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20display:\x20flex;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20align-items:\x20center;\n\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20justify-content:\x20center;\n\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20}\n\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20input\[type=date\],\x20input\[type=email\],\x20inp
SF:ut\[type=number\],\x20input\[type=password\],\x20input\[type=search\],\
SF:x20input\[type=tel\],\x20input\[type=text\],\x20input\[type=time\],\x20
SF:input\[type=url\],\x20select,\x20textarea\x20{\n\x20\x20\x20\x20");
Device type: general purpose
Running (JUST GUESSING): Linux 3.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:3
Aggressive OS guesses: Linux 3.2 - 3.8 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 8 hops

TRACEROUTE (using port 113/tcp)
HOP RTT      ADDRESS
1   0.21 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   1.17 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.64 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   1.07 ms  be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102)
6   ...
7   64.01 ms ae4.4.bar1.Buffalo1.level3.net (4.69.214.218)
8   76.28 ms 206.57.124.147

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 226.20 seconds
Color Scheme
Target
lactalis.us
Target IP
206.57.124.147
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A lactalis.us
Scan date
11 Jun 2024 17:00
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: