Nmap scan report for relay-1ec46041.net.anydesk.com (216.144.253.178) Host is up (0.031s latency). Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open ssl/http anydesk | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 303 See Other | access-control-allow-origin: * | connection: close | content-length: 0 | date: Mon, 20 Nov 2023 00:00:59 GMT | location: https://anydesk.com/ | server: anydesk | GetRequest, HTTPOptions: | HTTP/1.1 303 See Other | access-control-allow-origin: * | connection: close | content-length: 0 | date: Mon, 20 Nov 2023 00:00:33 GMT | location: https://anydesk.com/ | server: anydesk | Help, Kerberos, LDAPSearchReq, LPDString, SIPOptions, SSLSessionReq, TLSSessionReq: | HTTP/1.1 400 Bad Request | connection: close | content-length: 0 | RTSPRequest: | HTTP/1.1 505 HTTP Version Not Supported | connection: close |_ content-length: 0 | http-robots.txt: 1 disallowed entry |_/ |_http-server-header: anydesk |_http-title: Did not follow redirect to https://anydesk.com/ | ssl-cert: Subject: commonName=AnyNet Relay/organizationName=philandro Software GmbH/countryName=DE | Not valid before: 2018-11-18T02:14:23 |_Not valid after: 2028-11-15T02:14:23 |_ssl-date: TLS randomness does not represent time | tls-alpn: |_ http/1.1 443/tcp open ssl/https anydesk | fingerprint-strings: | FourOhFourRequest, HTTPOptions: | HTTP/1.1 303 See Other | access-control-allow-origin: * | connection: close | content-length: 0 | date: Mon, 20 Nov 2023 00:00:28 GMT | location: https://anydesk.com/ | server: anydesk | GetRequest: | HTTP/1.1 303 See Other | access-control-allow-origin: * | connection: close | content-length: 0 | date: Mon, 20 Nov 2023 00:00:27 GMT | location: https://anydesk.com/ | server: anydesk | Help, Kerberos, LDAPSearchReq, LPDString, SIPOptions, SSLSessionReq, TLSSessionReq: | HTTP/1.1 400 Bad Request | connection: close | content-length: 0 | RTSPRequest: | HTTP/1.1 505 HTTP Version Not Supported | connection: close |_ content-length: 0 | http-robots.txt: 1 disallowed entry |_/ |_http-server-header: anydesk |_http-title: Did not follow redirect to https://anydesk.com/ | ssl-cert: Subject: commonName=AnyNet Relay/organizationName=philandro Software GmbH/countryName=DE | Not valid before: 2018-11-18T02:14:23 |_Not valid after: 2028-11-15T02:14:23 |_ssl-date: TLS randomness does not represent time | tls-alpn: |_ http/1.1 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655AA1A1%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,B6,"HTTP/1\.1\x20303\x20See\x20Other\r\naccess-contro SF:l-allow-origin:\x20\*\r\nconnection:\x20close\r\ncontent-length:\x200\r SF:\ndate:\x20Mon,\x2020\x20Nov\x202023\x2000:00:33\x20GMT\r\nlocation:\x2 SF:0https://anydesk\.com/\r\nserver:\x20anydesk\r\n\r\n")%r(HTTPOptions,B6 SF:,"HTTP/1\.1\x20303\x20See\x20Other\r\naccess-control-allow-origin:\x20\ SF:*\r\nconnection:\x20close\r\ncontent-length:\x200\r\ndate:\x20Mon,\x202 SF:0\x20Nov\x202023\x2000:00:33\x20GMT\r\nlocation:\x20https://anydesk\.co SF:m/\r\nserver:\x20anydesk\r\n\r\n")%r(RTSPRequest,51,"HTTP/1\.1\x20505\x SF:20HTTP\x20Version\x20Not\x20Supported\r\nconnection:\x20close\r\nconten SF:t-length:\x200\r\n\r\n")%r(Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(SSLSessionR SF:eq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\nco SF:ntent-length:\x200\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Ba SF:d\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")% SF:r(Kerberos,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20clo SF:se\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,B6,"HTTP/1\.1\ SF:x20303\x20See\x20Other\r\naccess-control-allow-origin:\x20\*\r\nconnect SF:ion:\x20close\r\ncontent-length:\x200\r\ndate:\x20Mon,\x2020\x20Nov\x20 SF:2023\x2000:00:59\x20GMT\r\nlocation:\x20https://anydesk\.com/\r\nserver SF::\x20anydesk\r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Reque SF:st\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(LDAPSear SF:chReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ SF:ncontent-length:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20Ba SF:d\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655AA19C%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,B6,"HTTP/1\.1\x20303\x20See\x20Other\r\naccess-contr SF:ol-allow-origin:\x20\*\r\nconnection:\x20close\r\ncontent-length:\x200\ SF:r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2000:00:27\x20GMT\r\nlocation:\x SF:20https://anydesk\.com/\r\nserver:\x20anydesk\r\n\r\n")%r(HTTPOptions,B SF:6,"HTTP/1\.1\x20303\x20See\x20Other\r\naccess-control-allow-origin:\x20 SF:\*\r\nconnection:\x20close\r\ncontent-length:\x200\r\ndate:\x20Mon,\x20 SF:20\x20Nov\x202023\x2000:00:28\x20GMT\r\nlocation:\x20https://anydesk\.c SF:om/\r\nserver:\x20anydesk\r\n\r\n")%r(FourOhFourRequest,B6,"HTTP/1\.1\x SF:20303\x20See\x20Other\r\naccess-control-allow-origin:\x20\*\r\nconnecti SF:on:\x20close\r\ncontent-length:\x200\r\ndate:\x20Mon,\x2020\x20Nov\x202 SF:023\x2000:00:28\x20GMT\r\nlocation:\x20https://anydesk\.com/\r\nserver: SF:\x20anydesk\r\n\r\n")%r(RTSPRequest,51,"HTTP/1\.1\x20505\x20HTTP\x20Ver SF:sion\x20Not\x20Supported\r\nconnection:\x20close\r\ncontent-length:\x20 SF:0\r\n\r\n")%r(Help,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection SF::\x20close\r\ncontent-length:\x200\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1 SF:\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent-length: SF:\x200\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(Kerberos,42 SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r\ncontent SF:-length:\x200\r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20Requ SF:est\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(LDAPSea SF:rchReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconnection:\x20close\r SF:\ncontent-length:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20B SF:ad\x20Request\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 2.6.32 (93%), Linux 3.10 (93%), Linux 3.10 - 4.11 (93%), Linux 3.2 - 4.9 (93%), Linux 3.4 - 3.10 (93%), Linux 2.6.32 - 3.10 (93%), Linux 2.6.32 - 3.13 (93%), Synology DiskStation Manager 5.2-5644 (92%), Linux 2.6.22 - 2.6.36 (90%), Linux 2.6.39 (90%) No exact OS matches for host (test conditions non-ideal). Network Distance: 11 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 19.57 ms 208.76.251.177 2 0.60 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.79 ms multacom.com (96.45.162.9) 4 ... 5 17.44 ms port-channel9.core1.phx2.he.net (184.104.194.98) 6 30.32 ms port-channel11.core4.dal1.he.net (184.104.199.245) 7 35.71 ms 38.122.186.58 8 27.50 ms 10.6.2.6 9 30.07 ms 10.6.2.70 10 ... 11 29.71 ms relay-1ec46041.net.anydesk.com (216.144.253.178) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 148.47 seconds