Starting Nmap 7.80 ( https://nmap.org ) at 2025-01-30 01:57 CET Nmap scan report for wafa.ps (104.26.6.113) Host is up (0.030s latency). Other addresses for wafa.ps (not scanned): 172.67.71.233 104.26.7.113 Not shown: 996 filtered ports PORT STATE SERVICE VERSION 80/tcp open http cloudflare 443/tcp open ssl/https cloudflare 8080/tcp open http-proxy cloudflare 8443/tcp open ssl/https-alt cloudflare 4 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.80%I=7%D=1/30%Time=679ACF4E%P=x86_64-pc-linux-gnu%r(GetR SF:equest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x2030\x SF:20Jan\x202025\x2001:01:03\x20GMT\r\nContent-Type:\x20text/html\r\nConte SF:nt-Length:\x20155\r\nConnection:\x20close\r\nServer:\x20cloudflare\r\nC SF:F-RAY:\x20909d87527d47afd8-MAD\r\n\r\n<html>\r\n<head><title>400\x20Bad SF:\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reque SF:st</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</htm SF:l>\r\n")%r(HTTPOptions,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate: SF:\x20Thu,\x2030\x20Jan\x202025\x2001:01:04\x20GMT\r\nContent-Type:\x20te SF:xt/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x2 SF:0cloudflare\r\nCF-RAY:\x20909d8755ade0ec96-MAD\r\n\r\n<html>\r\n<head>< SF:title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400 SF:\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n SF:</body>\r\n</html>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>400\x SF:20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20 SF:Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n SF:</html>\r\n")%r(X11Probe,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSer SF:ver:\x20cloudflare\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:04\x2 SF:0GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnect SF:ion:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\ SF:x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reques SF:t</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html SF:>\r\n")%r(FourOhFourRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n SF:Date:\x20Thu,\x2030\x20Jan\x202025\x2001:01:04\x20GMT\r\nContent-Type:\ SF:x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServe SF:r:\x20cloudflare\r\nCF-RAY:\x20909d8756fffbb0f3-MAD\r\n\r\n<html>\r\n<h SF:ead><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h SF:1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center SF:>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,13C,"HTTP/1\.1\x20400\x20Bad\x SF:20Request\r\nServer:\x20cloudflare\r\nDate:\x20Thu,\x2030\x20Jan\x20202 SF:5\x2001:01:09\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x SF:20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><t SF:itle>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\ SF:x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n< SF:/body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.80%T=SSL%I=7%D=1/30%Time=679ACF55%P=x86_64-pc-linux-gnu SF:%r(GetRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloudfla SF:re\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:10\x20GMT\r\nContent- SF:Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20close\r\ SF:nCF-RAY:\x20909d877bcfcf2fc9-MAD\r\n\r\n<html>\r\n<head><title>403\x20F SF:orbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden</h1>< SF:/center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n") SF:%r(HTTPOptions,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloudfl SF:are\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:10\x20GMT\r\nContent SF:-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20close\r SF:\nCF-RAY:\x20909d877d5f9bec9b-MAD\r\n\r\n<html>\r\n<head><title>403\x20 SF:Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden</h1> SF:</center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n" SF:)%r(FourOhFourRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20 SF:cloudflare\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:10\x20GMT\r\n SF:Content-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20 SF:close\r\nCF-RAY:\x20909d877ef8d5384f-MAD\r\n\r\n<html>\r\n<head><title> SF:403\x20Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidd SF:en</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</htm SF:l>\r\n")%r(tor-versions,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServ SF:er:\x20cloudflare\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:11\x20 SF:GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnecti SF:on:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\x SF:20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request SF:</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html> SF:\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>400\x20Bad\x20Request</ SF:title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cent SF:er>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n")%r(RP SF:CCheck,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20cloudflare SF:\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:16\x20GMT\r\nContent-Ty SF:pe:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nC SF:F-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title> SF:</head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\ SF:n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8080-TCP:V=7.80%I=7%D=1/30%Time=679ACF4E%P=x86_64-pc-linux-gnu%r(Ge SF:tRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x2030 SF:\x20Jan\x202025\x2001:01:03\x20GMT\r\nContent-Type:\x20text/html\r\nCon SF:tent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x20cloudflare\r\ SF:nCF-RAY:\x20909d87527b57b0fd-MAD\r\n\r\n<html>\r\n<head><title>400\x20B SF:ad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Req SF:uest</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</h SF:tml>\r\n")%r(HTTPOptions,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDat SF:e:\x20Thu,\x2030\x20Jan\x202025\x2001:01:04\x20GMT\r\nContent-Type:\x20 SF:text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServer:\ SF:x20cloudflare\r\nCF-RAY:\x20909d8755ade3ec96-MAD\r\n\r\n<html>\r\n<head SF:><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>4 SF:00\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r SF:\n</body>\r\n</html>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>400 SF:\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x SF:20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r SF:\n</html>\r\n")%r(FourOhFourRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Req SF:uest\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:04\x20GMT\r\nConten SF:t-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\ SF:r\nServer:\x20cloudflare\r\nCF-RAY:\x20909d8756d988b0f4-MAD\r\n\r\n<htm SF:l>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<c SF:enter><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare SF:</center>\r\n</body>\r\n</html>\r\n")%r(Socks5,13C,"HTTP/1\.1\x20400\x2 SF:0Bad\x20Request\r\nServer:\x20cloudflare\r\nDate:\x20Thu,\x2030\x20Jan\ SF:x202025\x2001:01:04\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Len SF:gth:\x20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<h SF:ead><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h SF:1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center SF:>\r\n</body>\r\n</html>\r\n")%r(Socks4,13C,"HTTP/1\.1\x20400\x20Bad\x20 SF:Request\r\nServer:\x20cloudflare\r\nDate:\x20Thu,\x2030\x20Jan\x202025\ SF:x2001:01:04\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20 SF:155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><tit SF:le>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x2 SF:0Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</b SF:ody>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8443-TCP:V=7.80%T=SSL%I=7%D=1/30%Time=679ACF55%P=x86_64-pc-linux-gn SF:u%r(GetRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloudfl SF:are\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:10\x20GMT\r\nContent SF:-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20close\r SF:\nCF-RAY:\x20909d877bcaa6eca9-MAD\r\n\r\n<html>\r\n<head><title>403\x20 SF:Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden</h1> SF:</center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n" SF:)%r(HTTPOptions,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloudf SF:lare\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:10\x20GMT\r\nConten SF:t-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20close\ SF:r\nCF-RAY:\x20909d877d6af3e0a6-MAD\r\n\r\n<html>\r\n<head><title>403\x2 SF:0Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden</h1 SF:></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n SF:")%r(FourOhFourRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x2 SF:0cloudflare\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:10\x20GMT\r\ SF:nContent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x2 SF:0close\r\nCF-RAY:\x20909d877f0cb7217e-MAD\r\n\r\n<html>\r\n<head><title SF:>403\x20Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbid SF:den</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</ht SF:ml>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>400\x20Bad\x20Reques SF:t</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></c SF:enter>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n")%r SF:(RPCCheck,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20cloudfl SF:are\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:16\x20GMT\r\nContent SF:-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r SF:\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</tit SF:le></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center> SF:\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n")%r(DNSVe SF:rsionBindReqTCP,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20c SF:loudflare\r\nDate:\x20Thu,\x2030\x20Jan\x202025\x2001:01:16\x20GMT\r\nC SF:ontent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20c SF:lose\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Reques SF:t</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></c SF:enter>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: phone|PBX|general purpose Running (JUST GUESSING): Google Android 6.X|7.X (87%), Linux 3.X|4.X (87%), Vodavi embedded (86%), FreeBSD 11.X (86%), Apple iOS 11.X (85%) OS CPE: cpe:/o:google:android:6 cpe:/o:google:android:7 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:vodavi:xts-ip cpe:/o:freebsd:freebsd:11.0 cpe:/o:apple:iphone_os:11.0 Aggressive OS guesses: Android 6.0 - 7.1.2 (Linux 3.18 - 4.4.1) (87%), Vodavi XTS-IP PBX (86%), FreeBSD 11.0-RELEASE (86%), Android 7.0 (Linux 3.18) (86%), Android 7.1.2 (Linux 3.4) (86%), FreeBSD 11.0-STABLE (86%), Apple iOS 11.0 (85%) No exact OS matches for host (test conditions non-ideal). OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 225.74 seconds
La ip escaneada no es la ip del host real que contiene la página web sino una ip del Cloudfare, que actúa como un proxy, todo el tráfico pasa por cloudfare, protegiendo al host de ataques DDoS o intentos de escaneo directo. El escaneo solo revela servidores de Cloudflare, no muestra información sobre el servidor real que aloja la página.
Para descubrir la ip real del servidor se necesitan técnicas como:
Buscar registros DNS históricos. (herramientas como SecurityTrails o crt.sh)
Revisar cabeceras HTTP que puedan revelar información.
Analizar respuestas en subdominios o servicios mal configurados. Subdominios filtrados en servicios como Shodan o Censys
Probar con User-Agents o Headers específicos
Algunas configuraciones de Cloudflare bloquean escaneos automatizados, por lo que modificar el User-Agent de las solicitudes HTTP podría permitir ver más información.
Verificar si hay otros puertos abiertos
Nmap solo muestra 4 puertos abiertos, un escaneo más profundo con -p- podría revelar más servicios.