Escanear informe para "104.21.75.24"
Escanear información del SO y Traceroute (nmap -A 104.21.75.24)
Starting Nmap 7.80 ( https://nmap.org ) at 2023-03-19 13:12 EDT Nmap scan report for 104.21.75.24 Host is up (0.0018s latency). Not shown: 996 filtered ports PORT STATE SERVICE VERSION 80/tcp open http cloudflare | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Mar 2023 17:13:09 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7aa7582bc9362cab-DFW | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Mar 2023 17:13:09 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7aa7582b8a94e70a-DFW | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Mar 2023 17:13:09 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7aa7582baaa8e836-DFW | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 19 Mar 2023 17:13:14 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 19 Mar 2023 17:13:09 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> |_ </html> |_http-server-header: cloudflare |_http-title: Site doesn't have a title (text/plain; charset=UTF-8). 443/tcp open ssl/https cloudflare |_http-server-header: cloudflare |_http-title: 400 The plain HTTP request was sent to HTTPS port 8080/tcp open http-proxy cloudflare | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Mar 2023 17:13:09 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7aa7582bbe652fe8-DFW | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Mar 2023 17:13:09 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7aa7582b8e5c2c91-DFW | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Mar 2023 17:13:09 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7aa7582bad78e7c7-DFW | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | Socks4, Socks5: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 19 Mar 2023 17:13:09 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> |_ </html> |_http-server-header: cloudflare |_http-title: Site doesn't have a title (text/plain; charset=UTF-8). 8443/tcp open ssl/https-alt cloudflare |_http-server-header: cloudflare |_http-title: 400 The plain HTTP request was sent to HTTPS port 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.80%I=7%D=3/19%Time=641742A5%P=x86_64-pc-linux-gnu%r(GetR SF:equest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x SF:20Mar\x202023\x2017:13:09\x20GMT\r\nContent-Type:\x20text/html\r\nConte SF:nt-Length:\x20155\r\nConnection:\x20close\r\nServer:\x20cloudflare\r\nC SF:F-RAY:\x207aa7582b8a94e70a-DFW\r\n\r\n<html>\r\n<head><title>400\x20Bad SF:\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reque SF:st</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</htm SF:l>\r\n")%r(HTTPOptions,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate: SF:\x20Sun,\x2019\x20Mar\x202023\x2017:13:09\x20GMT\r\nContent-Type:\x20te SF:xt/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x2 SF:0cloudflare\r\nCF-RAY:\x207aa7582baaa8e836-DFW\r\n\r\n<html>\r\n<head>< SF:title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400 SF:\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n SF:</body>\r\n</html>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>400\x SF:20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20 SF:Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n SF:</html>\r\n")%r(X11Probe,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSer SF:ver:\x20cloudflare\r\nDate:\x20Sun,\x2019\x20Mar\x202023\x2017:13:09\x2 SF:0GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnect SF:ion:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\ SF:x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reques SF:t</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html SF:>\r\n")%r(FourOhFourRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n SF:Date:\x20Sun,\x2019\x20Mar\x202023\x2017:13:09\x20GMT\r\nContent-Type:\ SF:x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServe SF:r:\x20cloudflare\r\nCF-RAY:\x207aa7582bc9362cab-DFW\r\n\r\n<html>\r\n<h SF:ead><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h SF:1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center SF:>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,13C,"HTTP/1\.1\x20400\x20Bad\x SF:20Request\r\nServer:\x20cloudflare\r\nDate:\x20Sun,\x2019\x20Mar\x20202 SF:3\x2017:13:14\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x SF:20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><t SF:itle>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\ SF:x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n< SF:/body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8080-TCP:V=7.80%I=7%D=3/19%Time=641742A5%P=x86_64-pc-linux-gnu%r(Ge SF:tRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019 SF:\x20Mar\x202023\x2017:13:09\x20GMT\r\nContent-Type:\x20text/html\r\nCon SF:tent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x20cloudflare\r\ SF:nCF-RAY:\x207aa7582b8e5c2c91-DFW\r\n\r\n<html>\r\n<head><title>400\x20B SF:ad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Req SF:uest</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</h SF:tml>\r\n")%r(HTTPOptions,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDat SF:e:\x20Sun,\x2019\x20Mar\x202023\x2017:13:09\x20GMT\r\nContent-Type:\x20 SF:text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServer:\ SF:x20cloudflare\r\nCF-RAY:\x207aa7582bad78e7c7-DFW\r\n\r\n<html>\r\n<head SF:><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>4 SF:00\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r SF:\n</body>\r\n</html>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>400 SF:\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x SF:20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r SF:\n</html>\r\n")%r(FourOhFourRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Req SF:uest\r\nDate:\x20Sun,\x2019\x20Mar\x202023\x2017:13:09\x20GMT\r\nConten SF:t-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\ SF:r\nServer:\x20cloudflare\r\nCF-RAY:\x207aa7582bbe652fe8-DFW\r\n\r\n<htm SF:l>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<c SF:enter><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare SF:</center>\r\n</body>\r\n</html>\r\n")%r(Socks5,13C,"HTTP/1\.1\x20400\x2 SF:0Bad\x20Request\r\nServer:\x20cloudflare\r\nDate:\x20Sun,\x2019\x20Mar\ SF:x202023\x2017:13:09\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Len SF:gth:\x20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<h SF:ead><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h SF:1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center SF:>\r\n</body>\r\n</html>\r\n")%r(Socks4,13C,"HTTP/1\.1\x20400\x20Bad\x20 SF:Request\r\nServer:\x20cloudflare\r\nDate:\x20Sun,\x2019\x20Mar\x202023\ SF:x2017:13:09\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20 SF:155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><tit SF:le>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x2 SF:0Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</b SF:ody>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: PBX|general purpose|webcam Running (JUST GUESSING): Vodavi embedded (86%), Linux 3.X|2.6.X|2.4.X (86%), FreeBSD 11.X (85%), AXIS embedded (85%) OS CPE: cpe:/h:vodavi:xts-ip cpe:/o:linux:linux_kernel:3.1 cpe:/o:freebsd:freebsd:11.0 cpe:/o:linux:linux_kernel:2.6.17 cpe:/h:axis:210a_network_camera cpe:/h:axis:211_network_camera cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:2.4.26 Aggressive OS guesses: Vodavi XTS-IP PBX (86%), Linux 3.1 (86%), Linux 3.2 (86%), FreeBSD 11.0-STABLE (85%), Linux 3.2 - 3.5 (85%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (85%), Linux 2.6.32 (85%), Linux 2.4.26 (Slackware 10.0.0) (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 8 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.46 ms 207.231.108.193 2 ... 3 0.45 ms 10.9.9.5 4 0.62 ms ae8-244.cr7-dal3.ip4.gtt.net (69.174.22.113) 5 1.44 ms ae10.cr8-dal3.ip4.gtt.net (213.200.119.198) 6 1.43 ms ip4.gtt.net (208.116.142.210) 7 2.31 ms 141.101.74.100 8 1.21 ms 104.21.75.24 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 206.46 seconds
Esquema de color
- Objetivo
-
Tipo de scaneado
Escanear información del SO y Traceroute
-
Comando Nmap
nmap -A 104.21.75.24
-
Fecha de escaneo
19 Mar 2023 13:12
- API - Scan ID
-
Copiar resultado de escaneo
- Descargar resultado
- Eliminar resultado de escaneo