Ports
Duration
Date
IP
Nmap scan report for marketing.travelmarketreport.com (44.245.47.0) Host is up (0.030s latency). rDNS record for 44.245.47.0: aorpci11.actonsoftware.com Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http-proxy F5 BIG-IP load balancer http proxy |_http-open-proxy: Proxy might be redirecting requests |_http-server-header: BigIP |_http-title: Did not follow redirect to https://marketing.travelmarketreport.com/ 443/tcp open ssl/https | ssl-cert: Subject: commonName=marketing.travelmarketreport.com | Subject Alternative Name: DNS:marketing.travelmarketreport.com | Not valid before: 2025-08-25T01:22:21 |_Not valid after: 2025-11-23T01:22:20 | http-robots.txt: 4 disallowed entries | /acton/beacon/ /acton/contacts/ /acton/reports/ |_/acton/_reports/ |_http-title: Did not follow redirect to https://www.travelmarketreport.com?ao=1 |_ssl-date: TLS randomness does not represent time | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 404 | Content-Length: 0 | Date: Thu, 11 Sep 2025 00:29:01 GMT | Connection: close | Keep-Alive: timeout=10 | Strict-Transport-Security: max-age=16070400 | GetRequest: | HTTP/1.1 301 | Set-Cookie: JSESSIONID=B62926280926B8B4769AB1C939790CA9; Path=/; Secure; HttpOnly | Location: https://www.act-on.com | Connection: close | Content-Type: text/html;charset=ISO-8859-1 | Content-Length: 6 | Date: Thu, 11 Sep 2025 00:29:01 GMT | Strict-Transport-Security: max-age=16070400 | Vary: Accept-Encoding | HTTPOptions: | HTTP/1.1 403 | Cache-Control: private | Content-Type: text/html;charset=utf-8 | Content-Language: en | Content-Length: 431 | Date: Thu, 11 Sep 2025 00:29:01 GMT | Connection: close | Keep-Alive: timeout=10 | Strict-Transport-Security: max-age=16070400 | Vary: Accept-Encoding | <!doctype html><html lang="en"><head><title>HTTP Status 403 | Forbidden</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 403 | Forbidden</h1></body></html> | RTSPRequest: | HTTP/1.1 400 | Content-Type: text/html;charset=utf-8 | Content-Language: en | Content-Length: 435 | Date: Thu, 11 Sep 2025 00:29:10 GMT | Connection: close | Strict-Transport-Security: max-age=16070400 | Vary: Accept-Encoding | <!doctype html><html lang="en"><head><title>HTTP Status 400 | Request</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 400 |_ Request</h1></body></html> 8080/tcp closed http-proxy 8443/tcp closed https-alt 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/10%Time=68C217CD%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,147,"HTTP/1\.1\x20301\x20\r\nSet-Cookie:\x20JSESSIONI SF:D=B62926280926B8B4769AB1C939790CA9;\x20Path=/;\x20Secure;\x20HttpOnly\r SF:\nLocation:\x20https://www\.act-on\.com\r\nConnection:\x20close\r\nCont SF:ent-Type:\x20text/html;charset=ISO-8859-1\r\nContent-Length:\x206\r\nDa SF:te:\x20Thu,\x2011\x20Sep\x202025\x2000:29:01\x20GMT\r\nStrict-Transport SF:-Security:\x20max-age=16070400\r\nVary:\x20Accept-Encoding\r\n\r\n\n\n\ SF:n\n\n\n")%r(HTTPOptions,2BE,"HTTP/1\.1\x20403\x20\r\nCache-Control:\x20 SF:private\r\nContent-Type:\x20text/html;charset=utf-8\r\nContent-Language SF::\x20en\r\nContent-Length:\x20431\r\nDate:\x20Thu,\x2011\x20Sep\x202025 SF:\x2000:29:01\x20GMT\r\nConnection:\x20close\r\nKeep-Alive:\x20timeout=1 SF:0\r\nStrict-Transport-Security:\x20max-age=16070400\r\nVary:\x20Accept- SF:Encoding\r\n\r\n<!doctype\x20html><html\x20lang=\"en\"><head><title>HTT SF:P\x20Status\x20403\x20\xe2\x80\x93\x20Forbidden</title><style\x20type=\ SF:"text/css\">body\x20{font-family:Tahoma,Arial,sans-serif;}\x20h1,\x20h2 SF:,\x20h3,\x20b\x20{color:white;background-color:#525D76;}\x20h1\x20{font SF:-size:22px;}\x20h2\x20{font-size:16px;}\x20h3\x20{font-size:14px;}\x20p SF:\x20{font-size:12px;}\x20a\x20{color:black;}\x20\.line\x20{height:1px;b SF:ackground-color:#525D76;border:none;}</style></head><body><h1>HTTP\x20S SF:tatus\x20403\x20\xe2\x80\x93\x20Forbidden</h1></body></html>")%r(FourOh SF:FourRequest,A1,"HTTP/1\.1\x20404\x20\r\nContent-Length:\x200\r\nDate:\x SF:20Thu,\x2011\x20Sep\x202025\x2000:29:01\x20GMT\r\nConnection:\x20close\ SF:r\nKeep-Alive:\x20timeout=10\r\nStrict-Transport-Security:\x20max-age=1 SF:6070400\r\n\r\n")%r(RTSPRequest,292,"HTTP/1\.1\x20400\x20\r\nContent-Ty SF:pe:\x20text/html;charset=utf-8\r\nContent-Language:\x20en\r\nContent-Le SF:ngth:\x20435\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2000:29:10\x20GMT\r SF:\nConnection:\x20close\r\nStrict-Transport-Security:\x20max-age=1607040 SF:0\r\nVary:\x20Accept-Encoding\r\n\r\n<!doctype\x20html><html\x20lang=\" SF:en\"><head><title>HTTP\x20Status\x20400\x20\xe2\x80\x93\x20Bad\x20Reque SF:st</title><style\x20type=\"text/css\">body\x20{font-family:Tahoma,Arial SF:,sans-serif;}\x20h1,\x20h2,\x20h3,\x20b\x20{color:white;background-colo SF:r:#525D76;}\x20h1\x20{font-size:22px;}\x20h2\x20{font-size:16px;}\x20h3 SF:\x20{font-size:14px;}\x20p\x20{font-size:12px;}\x20a\x20{color:black;}\ SF:x20\.line\x20{height:1px;background-color:#525D76;border:none;}</style> SF:</head><body><h1>HTTP\x20Status\x20400\x20\xe2\x80\x93\x20Bad\x20Reques SF:t</h1></body></html>"); Device type: load balancer|firewall Running (JUST GUESSING): F5 Networks TMOS 11.6.X|11.4.X (95%) OS CPE: cpe:/o:f5:tmos:11.6 cpe:/o:f5:tmos:11.4 Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (95%), F5 BIG-IP AFM firewall (92%), F5 BIG-IP load balancer (TMOS 11.4) (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 11 hops Service Info: Device: load balancer TRACEROUTE (using port 8080/tcp) HOP RTT ADDRESS 1 9.85 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 437.60 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 2.24 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 1.48 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146) 5 ... 10 11 30.69 ms aorpci11.actonsoftware.com (44.245.47.0) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 154.19 seconds
Features
5 scans/day
Daily API Calls - 20 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.
Lifetime
Features
10 000 scans/day
Daily API Calls - 100 000 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is best for professionals who need to test their host's open ports from an external source.
Billed Annually @ $45.00 - 50% discount