Scan report for "glosoft.net"
Port scan (nmap -sV -p 21,22,25,80,110,143,443,445 glosoft.net)
Starting Nmap 7.80 ( https://nmap.org ) at 2023-11-21 04:33 EST Nmap scan report for glosoft.net (172.67.198.117) Host is up (0.0014s latency). Other addresses for glosoft.net (not scanned): 2606:4700:3031::6815:44cd 2606:4700:3031::ac43:c675 104.21.68.205 PORT STATE SERVICE VERSION 21/tcp filtered ftp 22/tcp filtered ssh 25/tcp filtered smtp 80/tcp open http cloudflare 110/tcp filtered pop3 143/tcp filtered imap 443/tcp open ssl/https cloudflare 445/tcp filtered microsoft-ds 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.80%I=7%D=11/21%Time=655C7954%P=x86_64-pc-linux-gnu%r(Get SF:Request,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2021\ SF:x20Nov\x202023\x2009:33:08\x20GMT\r\nContent-Type:\x20text/html\r\nCont SF:ent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x20cloudflare\r\n SF:CF-RAY:\x208297edf28fa96c82-DFW\r\n\r\n<html>\r\n<head><title>400\x20Ba SF:d\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Requ SF:est</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</ht SF:ml>\r\n")%r(HTTPOptions,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate SF::\x20Tue,\x2021\x20Nov\x202023\x2009:33:08\x20GMT\r\nContent-Type:\x20t SF:ext/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x SF:20cloudflare\r\nCF-RAY:\x208297edf29e58eaf2-DFW\r\n\r\n<html>\r\n<head> SF:<title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>40 SF:0\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\ SF:n</body>\r\n</html>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>400\ SF:x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x2 SF:0Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\ SF:n</html>\r\n")%r(X11Probe,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSe SF:rver:\x20cloudflare\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:08\x SF:20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnec SF:tion:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad SF:\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reque SF:st</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</htm SF:l>\r\n")%r(FourOhFourRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:08\x20GMT\r\nContent-Type: SF:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServ SF:er:\x20cloudflare\r\nCF-RAY:\x208297edf2aaf66b1c-DFW\r\n\r\n<html>\r\n< SF:head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center>< SF:h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</cente SF:r>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,13C,"HTTP/1\.1\x20400\x20Bad\ SF:x20Request\r\nServer:\x20cloudflare\r\nDate:\x20Tue,\x2021\x20Nov\x2020 SF:23\x2009:33:13\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\ SF:x20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head>< SF:title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400 SF:\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n SF:</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.80%T=SSL%I=7%D=11/21%Time=655C795A%P=x86_64-pc-linux-gn SF:u%r(GetRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloudfl SF:are\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:14\x20GMT\r\nContent SF:-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20close\r SF:\nCF-RAY:\x208297ee182a6a6b3a-DFW\r\n\r\n<html>\r\n<head><title>403\x20 SF:Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden</h1> SF:</center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n" SF:)%r(HTTPOptions,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloudf SF:lare\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:14\x20GMT\r\nConten SF:t-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20close\ SF:r\nCF-RAY:\x208297ee187f60e736-DFW\r\n\r\n<html>\r\n<head><title>403\x2 SF:0Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden</h1 SF:></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n SF:")%r(FourOhFourRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x2 SF:0cloudflare\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:15\x20GMT\r\ SF:nContent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x2 SF:0close\r\nCF-RAY:\x208297ee18db37aa6a-DFW\r\n\r\n<html>\r\n<head><title SF:>403\x20Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbid SF:den</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</ht SF:ml>\r\n")%r(tor-versions,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSer SF:ver:\x20cloudflare\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:15\x2 SF:0GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnect SF:ion:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\ SF:x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reques SF:t</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html SF:>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>400\x20Bad\x20Request< SF:/title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cen SF:ter>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n")%r(R SF:PCCheck,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20cloudflar SF:e\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:20\x20GMT\r\nContent-T SF:ype:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\n SF:CF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title SF:></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r SF:\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n"); Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 21.73 seconds
Color Scheme
- Target
-
Scan type
Port scan
-
Nmap Command
nmap -sV -p 21,22,25,80,110,143,443,445 glosoft.net
-
Scan date
21 Nov 2023 04:32
- API - Scan ID
-
Copy scan report
- Download report
- Remove scan result
- Total scans