Ports
Duration
Date
IP
Nmap scan report for data.polygraph.net (159.89.210.29) Host is up (0.18s latency). Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Ubuntu 5ubuntu1.2 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 e0:b7:65:c6:ce:77:35:45:55:44:69:f8:69:b0:98:83 (RSA) | 256 e5:95:ed:bc:76:53:0c:8e:c1:ed:dc:d1:89:33:0d:1f (ECDSA) |_ 256 bf:51:69:80:bf:b6:df:cf:4f:5f:d8:0e:f3:39:cd:98 (ED25519) 80/tcp closed http 443/tcp open ssl/http-proxy (bad gateway) |_http-cors: GET POST OPTIONS | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 204 No Content | date: Wed, 21 May 2025 07:35:07 GMT | access-control-allow-origin: * | access-control-allow-headers: Origin, X-Requested-With, Content-Type, Accept | access-control-allow-methods: OPTIONS,GET,POST | etag: W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI" | connection: close | GetRequest: | HTTP/1.1 204 No Content | date: Wed, 21 May 2025 07:35:05 GMT | access-control-allow-origin: * | access-control-allow-headers: Origin, X-Requested-With, Content-Type, Accept | access-control-allow-methods: OPTIONS,GET,POST | etag: W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI" | connection: close | HTTPOptions: | HTTP/1.1 204 No Content | date: Wed, 21 May 2025 07:35:06 GMT | access-control-allow-origin: * | access-control-allow-headers: Origin, X-Requested-With, Content-Type, Accept | access-control-allow-methods: OPTIONS,GET,POST | etag: W/"a-bAsFyilMr4Ra1hIU5PyoyFRunpI" | connection: close | Help, tor-versions: | HTTP/1.0 400 Bad request | cache-control: no-cache | content-type: text/html | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | NULL: | HTTP/1.0 408 Request Time-out | cache-control: no-cache | content-type: text/html | <html><body><h1>408 Request Time-out</h1> | Your browser didn't send a complete request in time. | </body></html> | RTSPRequest: | HTTP/1.0 502 Bad Gateway | cache-control: no-cache | content-type: text/html | <html><body><h1>502 Bad Gateway</h1> | server returned an invalid or incomplete response. |_ </body></html> |_http-title: Site doesn't have a title. | ssl-cert: Subject: commonName=data.polygraph.net | Subject Alternative Name: DNS:data.polygraph.net | Not valid before: 2025-05-01T00:06:13 |_Not valid after: 2025-07-30T00:06:12 |_ssl-date: TLS randomness does not represent time 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=5/21%Time=682D8228%P=x86_64-redhat-linux SF:-gnu%r(NULL,C2,"HTTP/1\.0\x20408\x20Request\x20Time-out\r\ncache-contro SF:l:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\n<html><body><h1>408 SF:\x20Request\x20Time-out</h1>\nYour\x20browser\x20didn't\x20send\x20a\x2 SF:0complete\x20request\x20in\x20time\.\n</body></html>\n\n")%r(GetRequest SF:,11A,"HTTP/1\.1\x20204\x20No\x20Content\r\ndate:\x20Wed,\x2021\x20May\x SF:202025\x2007:35:05\x20GMT\r\naccess-control-allow-origin:\x20\*\r\nacce SF:ss-control-allow-headers:\x20Origin,\x20X-Requested-With,\x20Content-Ty SF:pe,\x20Accept\r\naccess-control-allow-methods:\x20OPTIONS,GET,POST\r\ne SF:tag:\x20W/\"a-bAsFyilMr4Ra1hIU5PyoyFRunpI\"\r\nconnection:\x20close\r\n SF:\r\n")%r(HTTPOptions,11A,"HTTP/1\.1\x20204\x20No\x20Content\r\ndate:\x2 SF:0Wed,\x2021\x20May\x202025\x2007:35:06\x20GMT\r\naccess-control-allow-o SF:rigin:\x20\*\r\naccess-control-allow-headers:\x20Origin,\x20X-Requested SF:-With,\x20Content-Type,\x20Accept\r\naccess-control-allow-methods:\x20O SF:PTIONS,GET,POST\r\netag:\x20W/\"a-bAsFyilMr4Ra1hIU5PyoyFRunpI\"\r\nconn SF:ection:\x20close\r\n\r\n")%r(FourOhFourRequest,11A,"HTTP/1\.1\x20204\x2 SF:0No\x20Content\r\ndate:\x20Wed,\x2021\x20May\x202025\x2007:35:07\x20GMT SF:\r\naccess-control-allow-origin:\x20\*\r\naccess-control-allow-headers: SF:\x20Origin,\x20X-Requested-With,\x20Content-Type,\x20Accept\r\naccess-c SF:ontrol-allow-methods:\x20OPTIONS,GET,POST\r\netag:\x20W/\"a-bAsFyilMr4R SF:a1hIU5PyoyFRunpI\"\r\nconnection:\x20close\r\n\r\n")%r(tor-versions,A9, SF:"HTTP/1\.0\x20400\x20Bad\x20request\r\ncache-control:\x20no-cache\r\nco SF:ntent-type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request</ SF:h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></ht SF:ml>\n\n")%r(RTSPRequest,BA,"HTTP/1\.0\x20502\x20Bad\x20Gateway\r\ncache SF:-control:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\n<html><body> SF:<h1>502\x20Bad\x20Gateway</h1>\nThe\x20server\x20returned\x20an\x20inva SF:lid\x20or\x20incomplete\x20response\.\n</body></html>\n\n")%r(Help,A9," SF:HTTP/1\.0\x20400\x20Bad\x20request\r\ncache-control:\x20no-cache\r\ncon SF:tent-type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request</h SF:1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></htm SF:l>\n\n"); Device type: general purpose Running: Linux 5.X OS CPE: cpe:/o:linux:linux_kernel:5 OS details: Linux 5.0 - 5.4 Network Distance: 16 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.55 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.65 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 2.81 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.35 ms ae-3.r26.lsanca07.us.bb.gin.ntt.net (129.250.3.130) 6 110.84 ms ae-5.r27.osakjp02.jp.bb.gin.ntt.net (129.250.2.177) 7 182.10 ms ae-7.r24.sngpsi07.sg.bb.gin.ntt.net (129.250.2.66) 8 178.02 ms ae-4.a02.sngpsi07.sg.bb.gin.ntt.net (129.250.6.63) 9 172.24 ms ae-0.r24.sngpsi07.sg.bb.gin.ntt.net (129.250.6.60) 10 184.65 ms 143.244.224.206 11 ... 15 16 179.14 ms 159.89.210.29 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 51.08 seconds
Features
5 scans/day
Daily API Calls - 20 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.
Lifetime
Features
10 000 scans/day
Daily API Calls - 100 000 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is best for professionals who need to test their host's open ports from an external source.
Billed Annually @ $45.00 - 50% discount