Nmap scan report for widgets.oddschecker.com (34.160.176.88) Host is up (0.00041s latency). rDNS record for 34.160.176.88: 88.176.160.34.bc.googleusercontent.com Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http openresty | fingerprint-strings: | DNSVersionBindReqTCP: | HTTP/1.0 400 Bad Request | Content-Length: 54 | Content-Type: text/html; charset=UTF-8 | Date: Sun, 19 Nov 2023 22:32:35 GMT | Error 400 (Bad Request)!!1 | FourOhFourRequest: | HTTP/1.0 404 Not Found | Server: openresty | Date: Sun, 19 Nov 2023 22:32:25 GMT | Content-Type: text/html | Content-Length: 166 | Vary: Accept-Encoding | Via: 1.1 google | | 404 Not Found | |

404 Not Found

|
openresty
| | | GetRequest, HTTPOptions: | HTTP/1.0 404 Not Found | Server: openresty | Date: Sun, 19 Nov 2023 22:32:19 GMT | Content-Type: text/html | Content-Length: 166 | Vary: Accept-Encoding | Via: 1.1 google | | 404 Not Found | |

404 Not Found

|
openresty
| | | RTSPRequest: | HTTP/1.0 400 Bad Request | Content-Type: text/html; charset=UTF-8 | Referrer-Policy: no-referrer | Content-Length: 273 | Date: Sun, 19 Nov 2023 22:32:19 GMT | | | 400 Bad Request | | |

Error: Bad Request

|

Your client has issued a malformed or illegal request.

|

|_ |_http-server-header: openresty |_http-title: 404 Not Found 443/tcp open ssl/https openresty | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 404 Not Found | Server: openresty | Date: Sun, 19 Nov 2023 22:32:26 GMT | Content-Type: text/html | Content-Length: 166 | Vary: Accept-Encoding | Via: 1.1 google | Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000 | | 404 Not Found | |

404 Not Found

|
openresty
| | | GetRequest, HTTPOptions: | HTTP/1.0 404 Not Found | Server: openresty | Date: Sun, 19 Nov 2023 22:32:25 GMT | Content-Type: text/html | Content-Length: 166 | Vary: Accept-Encoding | Via: 1.1 google | Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000 | | 404 Not Found | |

404 Not Found

|
openresty
| | | RTSPRequest: | HTTP/1.0 400 Bad Request | Content-Type: text/html; charset=UTF-8 | Referrer-Policy: no-referrer | Content-Length: 273 | Date: Sun, 19 Nov 2023 22:32:31 GMT | | | 400 Bad Request | | |

Error: Bad Request

|

Your client has issued a malformed or illegal request.

|

| | tor-versions: | HTTP/1.0 400 Bad Request | Content-Length: 54 | Content-Type: text/html; charset=UTF-8 | Date: Sun, 19 Nov 2023 22:32:26 GMT |_ Error 400 (Bad Request)!!1 |_http-server-header: openresty |_http-title: 404 Not Found | ssl-cert: Subject: commonName=www.oddschecker.com/organizationName=Cyan Blue Odds USA Limited/stateOrProvinceName=London, City of/countryName=GB | Subject Alternative Name: DNS:www.oddschecker.com, DNS:api.oddschecker.com, DNS:clickout.cloud.oddschecker.com, DNS:clickout.oddschecker.com, DNS:clients.oddschecker.com, DNS:diffusion.oddschecker.com, DNS:downloads.oddschecker.com, DNS:live-analytics.oddschecker.com, DNS:m.oddschecker.com, DNS:oc-connect.oddschecker.com, DNS:oddschecker.com, DNS:secure.oddschecker.com, DNS:static.oddschecker.com, DNS:widgets.oddschecker.com | Not valid before: 2022-11-16T00:00:00 |_Not valid after: 2023-11-21T23:59:59 |_ssl-date: 2023-11-19T22:33:35+00:00; 0s from scanner time. | tls-alpn: | grpc-exp | h2 |_ http/1.1 | tls-nextprotoneg: | grpc-exp | h2 |_ http/1.1 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=655A8CF3%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,14E,"HTTP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20openres SF:ty\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:19\x20GMT\r\nContent- SF:Type:\x20text/html\r\nContent-Length:\x20166\r\nVary:\x20Accept-Encodin SF:g\r\nVia:\x201\.1\x20google\r\n\r\n\r\n404\x20Not\x2 SF:0Found\r\n\r\n

404 SF:\x20Not\x20Found

\r\n
openresty
\r\n\r\n\r\n")%r(HTTPOptions,14E,"HTTP/1\.0\x20404\x20Not\x20Fou SF:nd\r\nServer:\x20openresty\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2022: SF:32:19\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20166\r\ SF:nVary:\x20Accept-Encoding\r\nVia:\x201\.1\x20google\r\n\r\n\r\n404\x20Not\x20Found\r\n\r\n

404\x20Not\x20Found

\r\n
o SF:penresty
\r\n\r\n\r\n")%r(RTSPRequest,1AD,"HTTP/1 SF:\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset= SF:UTF-8\r\nReferrer-Policy:\x20no-referrer\r\nContent-Length:\x20273\r\nD SF:ate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:19\x20GMT\r\n\r\n\n\n\n400\x20Bad\x20Request\n\n\n

Error:\x20Bad\x20Request

\n

Y SF:our\x20client\x20has\x20issued\x20a\x20malformed\x20or\x20illegal\x20re SF:quest\.

\n

\n\n")%r(FourOhFourRequest,14E,"HT SF:TP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20openresty\r\nDate:\x20Sun, SF:\x2019\x20Nov\x202023\x2022:32:25\x20GMT\r\nContent-Type:\x20text/html\ SF:r\nContent-Length:\x20166\r\nVary:\x20Accept-Encoding\r\nVia:\x201\.1\x SF:20google\r\n\r\n\r\n404\x20Not\x20Found\r\n\r\n

404\x20Not\x20Found

\r\n
openresty
\r\n\r\n\r\n SF:")%r(DNSVersionBindReqTCP,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nCon SF:tent-Length:\x2054\r\nContent-Type:\x20text/html;\x20charset=UTF-8\r\nD SF:ate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:35\x20GMT\r\n\r\nError\x20400\x20\(Bad\x20Request\)!!1"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655A8CF9%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,187,"HTTP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20 SF:openresty\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:25\x20GMT\r\nC SF:ontent-Type:\x20text/html\r\nContent-Length:\x20166\r\nVary:\x20Accept- SF:Encoding\r\nVia:\x201\.1\x20google\r\nAlt-Svc:\x20h3=\":443\";\x20ma=25 SF:92000,h3-29=\":443\";\x20ma=2592000\r\n\r\n\r\n404\x SF:20Not\x20Found\r\n\r\n

404\x20Not\x20Found

\r\n
openresty
\r\n\r\n\r\n")%r(HTTPOptions,187,"HTTP/1\.0\x20404\x20No SF:t\x20Found\r\nServer:\x20openresty\r\nDate:\x20Sun,\x2019\x20Nov\x20202 SF:3\x2022:32:25\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x SF:20166\r\nVary:\x20Accept-Encoding\r\nVia:\x201\.1\x20google\r\nAlt-Svc: SF:\x20h3=\":443\";\x20ma=2592000,h3-29=\":443\";\x20ma=2592000\r\n\r\n\r\n404\x20Not\x20Found\r\n\r\n

404\x20Not\x20Found

\r\n
SF:
openresty
\r\n\r\n\r\n")%r(FourOhFourRequ SF:est,187,"HTTP/1\.0\x20404\x20Not\x20Found\r\nServer:\x20openresty\r\nDa SF:te:\x20Sun,\x2019\x20Nov\x202023\x2022:32:26\x20GMT\r\nContent-Type:\x2 SF:0text/html\r\nContent-Length:\x20166\r\nVary:\x20Accept-Encoding\r\nVia SF::\x201\.1\x20google\r\nAlt-Svc:\x20h3=\":443\";\x20ma=2592000,h3-29=\": SF:443\";\x20ma=2592000\r\n\r\n\r\n404\x20Not\x20Found< SF:/title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>404\x20Not SF:\x20Found</h1></center>\r\n<hr><center>openresty</center>\r\n</body>\r\ SF:n</html>\r\n")%r(tor-versions,B3,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ SF:nContent-Length:\x2054\r\nContent-Type:\x20text/html;\x20charset=UTF-8\ SF:r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:26\x20GMT\r\n\r\n<html>< SF:title>Error\x20400\x20\(Bad\x20Request\)!!1")%r(RTSPRequ SF:est,1AD,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/ht SF:ml;\x20charset=UTF-8\r\nReferrer-Policy:\x20no-referrer\r\nContent-Leng SF:th:\x20273\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2022:32:31\x20GMT\r\n SF:\r\n\n\n\n400\x20Bad\x20Request\n\n\n

Error:\x20Bad\x20Requ SF:est

\n

Your\x20client\x20has\x20issued\x20a\x20malformed\x20or\x SF:20illegal\x20request\.

\n

\n\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 7 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177 2 0.53 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.68 ms multacom.com (96.45.162.9) 4 0.39 ms 206.72.211.148.any2ix.coresite.com (206.72.211.148) 5 1.48 ms 108.170.247.129 6 0.32 ms 209.85.248.131 7 0.36 ms 88.176.160.34.bc.googleusercontent.com (34.160.176.88) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 94.17 seconds