Nmap scan report for omc.dten.com (34.236.205.69)
Host is up (0.058s latency).
rDNS record for 34.236.205.69: ec2-34-236-205-69.compute-1.amazonaws.com
Not shown: 996 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
443/tcp open ssl/https
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 404 Not Found
| Cache-Control: must-revalidate,no-cache,no-store
| Content-Type: text/html;charset=iso-8859-1
| Content-Length: 387
|
|
|
| Error 404 Not Found
|
| HTTP ERROR 404 Not Found
|
| | URI: | /nice%20ports%2C/Tri%6Eity.txt%2ebak |
| | STATUS: | 404 |
| | MESSAGE: | Not Found |
| | SERVLET: | - |
|
|
|
| GetRequest:
| HTTP/1.1 404 Not Found
| Cache-Control: must-revalidate,no-cache,no-store
| Content-Type: text/html;charset=iso-8859-1
| Content-Length: 352
|
|
|
| Error 404 Not Found
|
| HTTP ERROR 404 Not Found
|
| | URI: | / |
| | STATUS: | 404 |
| | MESSAGE: | Not Found |
| | SERVLET: | - |
|
|
|
| HTTPOptions:
| HTTP/1.1 404 Not Found
| RPCCheck:
| HTTP/1.1 400 Illegal character OTEXT=0x80
| Content-Type: text/html;charset=iso-8859-1
| Content-Length: 71
| Connection: close
| Bad Message 400
reason: Illegal character OTEXT=0x80
| RTSPRequest:
| HTTP/1.1 505 Unknown Version
| Content-Type: text/html;charset=iso-8859-1
| Content-Length: 58
| Connection: close
| Bad Message 505
reason: Unknown Version
| tor-versions:
| HTTP/1.1 400 Illegal character CNTL=0x0
| Content-Type: text/html;charset=iso-8859-1
| Content-Length: 69
| Connection: close
|_ Bad Message 400
reason: Illegal character CNTL=0x0
|_http-title: Error 404 Not Found
| ssl-cert: Subject: commonName=dten.com
| Subject Alternative Name: DNS:dten.com, DNS:*.int.dten.com, DNS:*.int-qa.dten.com, DNS:*.dten.com
| Not valid before: 2024-11-12T00:00:00
|_Not valid after: 2025-12-11T23:59:59
|_ssl-date: TLS randomness does not represent time
5222/tcp closed xmpp-client
7443/tcp closed oracleas-https
9091/tcp open ssl/xmltec-xmlmail?
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP:
| HTTP/1.1 400 Illegal character CNTL=0x0
| Content-Type: text/html;charset=iso-8859-1
| Content-Length: 69
| Connection: close
| Bad Message 400
reason: Illegal character CNTL=0x0
| GetRequest:
| HTTP/1.1 200 OK
| Date: Sun, 11 May 2025 03:13:51 GMT
| Last-Modified: Tue, 23 May 2023 15:15:45 GMT
| Content-Type: text/html
| Accept-Ranges: bytes
| Content-Length: 115
|
|
|
|
|
|
|
| HTTPOptions:
| HTTP/1.1 200 OK
| Date: Sun, 11 May 2025 03:13:51 GMT
| Allow: GET,HEAD,POST,OPTIONS
| Help:
| HTTP/1.1 400 No URI
| Content-Type: text/html;charset=iso-8859-1
| Content-Length: 49
| Connection: close
| Bad Message 400
reason: No URI
| RPCCheck:
| HTTP/1.1 400 Illegal character OTEXT=0x80
| Content-Type: text/html;charset=iso-8859-1
| Content-Length: 71
| Connection: close
| Bad Message 400
reason: Illegal character OTEXT=0x80
| RTSPRequest:
| HTTP/1.1 505 Unknown Version
| Content-Type: text/html;charset=iso-8859-1
| Content-Length: 58
| Connection: close
| Bad Message 505
reason: Unknown Version
| SSLSessionReq:
| HTTP/1.1 400 Illegal character CNTL=0x16
| Content-Type: text/html;charset=iso-8859-1
| Content-Length: 70
| Connection: close
|_ Bad Message 400
reason: Illegal character CNTL=0x16
| ssl-cert: Subject: commonName=dten.com
| Subject Alternative Name: DNS:dten.com, DNS:*.int.dten.com, DNS:*.int-qa.dten.com, DNS:*.dten.com
| Not valid before: 2024-11-12T00:00:00
|_Not valid after: 2025-12-11T23:59:59
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=5/10%Time=682015B9%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,1ED,"HTTP/1\.1\x20404\x20Not\x20Found\r\nCache-Contro
SF:l:\x20must-revalidate,no-cache,no-store\r\nContent-Type:\x20text/html;c
SF:harset=iso-8859-1\r\nContent-Length:\x20352\r\n\r\n\n\n\nError\x20404\x20Not\x20Found\n\nHTT
SF:P\x20ERROR\x20404\x20Not\x20Found
\n\n| URI: | /
SF: |
\n| STATUS: | 404 |
\n| MESSAGE: | Not\x20Found |
\n| SERVLET: | - |
\n\n\n\n\n")%r(HTTPOptions,1A,"HTTP/1\.1\x20404\x20Not\
SF:x20Found\r\n\r\n")%r(FourOhFourRequest,210,"HTTP/1\.1\x20404\x20Not\x20
SF:Found\r\nCache-Control:\x20must-revalidate,no-cache,no-store\r\nContent
SF:-Type:\x20text/html;charset=iso-8859-1\r\nContent-Length:\x20387\r\n\r\
SF:n\n\n\nError\x20404\x20Not\x20Found\n<
SF:/head>\nHTTP\x20ERROR\x20404\x20Not\x20Found
\n\n<
SF:tr>| URI: | /nice%20ports%2C/Tri%6Eity\.txt%2ebak | \nSTATUS: | 404 | \n| MESSAGE: | Not\x20Fo
SF:und |
\n| SERVLET: | - |
\n
\n\n\n\n")%r(tor-versions,C3,"HTTP/1\.1\x20400\x20Illegal\x20charac
SF:ter\x20CNTL=0x0\r\nContent-Type:\x20text/html;charset=iso-8859-1\r\nCon
SF:tent-Length:\x2069\r\nConnection:\x20close\r\n\r\nBad\x20Message\x2
SF:0400
reason:\x20Illegal\x20character\x20CNTL=0x0
")%r(RTS
SF:PRequest,AD,"HTTP/1\.1\x20505\x20Unknown\x20Version\r\nContent-Type:\x2
SF:0text/html;charset=iso-8859-1\r\nContent-Length:\x2058\r\nConnection:\x
SF:20close\r\n\r\nBad\x20Message\x20505
reason:\x20Unknown\x2
SF:0Version
")%r(RPCCheck,C7,"HTTP/1\.1\x20400\x20Illegal\x20characte
SF:r\x20OTEXT=0x80\r\nContent-Type:\x20text/html;charset=iso-8859-1\r\nCon
SF:tent-Length:\x2071\r\nConnection:\x20close\r\n\r\nBad\x20Message\x2
SF:0400
reason:\x20Illegal\x20character\x20OTEXT=0x80
");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port9091-TCP:V=7.92%T=SSL%I=7%D=5/10%Time=682015EF%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,11D,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Sun,\x2011\x
SF:20May\x202025\x2003:13:51\x20GMT\r\nLast-Modified:\x20Tue,\x2023\x20May
SF:\x202023\x2015:15:45\x20GMT\r\nContent-Type:\x20text/html\r\nAccept-Ran
SF:ges:\x20bytes\r\nContent-Length:\x20115\r\n\r\n\n\n
SF:\n\n\n\n\n\n")%r(HTTPOptions,56,"HTTP/1\.1\x
SF:20200\x20OK\r\nDate:\x20Sun,\x2011\x20May\x202025\x2003:13:51\x20GMT\r\
SF:nAllow:\x20GET,HEAD,POST,OPTIONS\r\n\r\n")%r(RTSPRequest,AD,"HTTP/1\.1\
SF:x20505\x20Unknown\x20Version\r\nContent-Type:\x20text/html;charset=iso-
SF:8859-1\r\nContent-Length:\x2058\r\nConnection:\x20close\r\n\r\nBad\
SF:x20Message\x20505
reason:\x20Unknown\x20Version
")%r(RPCC
SF:heck,C7,"HTTP/1\.1\x20400\x20Illegal\x20character\x20OTEXT=0x80\r\nCont
SF:ent-Type:\x20text/html;charset=iso-8859-1\r\nContent-Length:\x2071\r\nC
SF:onnection:\x20close\r\n\r\nBad\x20Message\x20400
reason:\x
SF:20Illegal\x20character\x20OTEXT=0x80
")%r(DNSVersionBindReqTCP,C3,
SF:"HTTP/1\.1\x20400\x20Illegal\x20character\x20CNTL=0x0\r\nContent-Type:\
SF:x20text/html;charset=iso-8859-1\r\nContent-Length:\x2069\r\nConnection:
SF:\x20close\r\n\r\nBad\x20Message\x20400
reason:\x20Illegal\
SF:x20character\x20CNTL=0x0
")%r(DNSStatusRequestTCP,C3,"HTTP/1\.1\x2
SF:0400\x20Illegal\x20character\x20CNTL=0x0\r\nContent-Type:\x20text/html;
SF:charset=iso-8859-1\r\nContent-Length:\x2069\r\nConnection:\x20close\r\n
SF:\r\nBad\x20Message\x20400
reason:\x20Illegal\x20character\
SF:x20CNTL=0x0
")%r(Help,9B,"HTTP/1\.1\x20400\x20No\x20URI\r\nContent
SF:-Type:\x20text/html;charset=iso-8859-1\r\nContent-Length:\x2049\r\nConn
SF:ection:\x20close\r\n\r\nBad\x20Message\x20400
reason:\x20N
SF:o\x20URI
")%r(SSLSessionReq,C5,"HTTP/1\.1\x20400\x20Illegal\x20cha
SF:racter\x20CNTL=0x16\r\nContent-Type:\x20text/html;charset=iso-8859-1\r\
SF:nContent-Length:\x2070\r\nConnection:\x20close\r\n\r\nBad\x20Messag
SF:e\x20400
reason:\x20Illegal\x20character\x20CNTL=0x16
");
OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
No OS matches for host
Network Distance: 16 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.64 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.68 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4 ...
5 10.81 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6 19.86 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7 31.41 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8 31.11 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74)
9 ... 15
16 57.23 ms ec2-34-236-205-69.compute-1.amazonaws.com (34.236.205.69)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 89.17 seconds