Nmap scan report for resourceguruapp.com (35.188.253.237) Host is up (0.064s latency). rDNS record for 35.188.253.237: 237.253.188.35.bc.googleusercontent.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 500 Internal Server Error | Content-Type: text/plain; charset=utf-8 | X-Content-Type-Options: nosniff | Date: Wed, 15 May 2024 20:34:52 GMT | Content-Length: 22 | Internal Server Error | GenericLines, Help, Kerberos, LPDString, RTSPRequest, SSLSessionReq, TLSSessionReq, TerminalServerCookie: | HTTP/1.1 400 Bad Request | Content-Type: text/plain; charset=utf-8 | Connection: close | Request | GetRequest, HTTPOptions: | HTTP/1.0 500 Internal Server Error | Content-Type: text/plain; charset=utf-8 | X-Content-Type-Options: nosniff | Date: Wed, 15 May 2024 20:34:46 GMT | Content-Length: 22 |_ Internal Server Error |_http-title: Did not follow redirect to https://resourceguruapp.com/ 443/tcp open ssl/https | ssl-cert: Subject: commonName=resourceguruapp.com | Subject Alternative Name: DNS:*.resourceguruapp.com, DNS:resourceguruapp.com | Not valid before: 2024-04-21T03:47:43 |_Not valid after: 2024-07-20T03:47:42 | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.0 500 Internal Server Error | Content-Type: text/plain; charset=utf-8 | X-Content-Type-Options: nosniff | Date: Wed, 15 May 2024 20:34:53 GMT | Content-Length: 22 | Internal Server Error | GenericLines, Help, Kerberos, LPDString, RTSPRequest, SSLSessionReq, TLSSessionReq, TerminalServerCookie: | HTTP/1.1 400 Bad Request | Content-Type: text/plain; charset=utf-8 | Connection: close |_ Request |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 |_http-title: Site doesn't have a title (text/html; charset=utf-8). 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=5/15%Time=66451C66%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,BF,"HTTP/1\.0\x20500\x20Internal\x20Server\x20Error\r\nConte SF:nt-Type:\x20text/plain;\x20charset=utf-8\r\nX-Content-Type-Options:\x20 SF:nosniff\r\nDate:\x20Wed,\x2015\x20May\x202024\x2020:34:46\x20GMT\r\nCon SF:tent-Length:\x2022\r\n\r\nInternal\x20Server\x20Error\n")%r(HTTPOptions SF:,BF,"HTTP/1\.0\x20500\x20Internal\x20Server\x20Error\r\nContent-Type:\x SF:20text/plain;\x20charset=utf-8\r\nX-Content-Type-Options:\x20nosniff\r\ SF:nDate:\x20Wed,\x2015\x20May\x202024\x2020:34:46\x20GMT\r\nContent-Lengt SF:h:\x2022\r\n\r\nInternal\x20Server\x20Error\n")%r(RTSPRequest,67,"HTTP/ SF:1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charse SF:t=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(FourOh SF:FourRequest,BF,"HTTP/1\.0\x20500\x20Internal\x20Server\x20Error\r\nCont SF:ent-Type:\x20text/plain;\x20charset=utf-8\r\nX-Content-Type-Options:\x2 SF:0nosniff\r\nDate:\x20Wed,\x2015\x20May\x202024\x2020:34:52\x20GMT\r\nCo SF:ntent-Length:\x2022\r\n\r\nInternal\x20Server\x20Error\n")%r(GenericLin SF:es,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plai SF:n;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Reques SF:t")%r(Help,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20t SF:ext/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x SF:20Request")%r(SSLSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nC SF:ontent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\ SF:n\r\n400\x20Bad\x20Request")%r(TerminalServerCookie,67,"HTTP/1\.1\x2040 SF:0\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\ SF:nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(TLSSessionReq,67 SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x2 SF:0charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r SF:(Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20te SF:xt/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x2 SF:0Request")%r(LPDString,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConten SF:t-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n SF:400\x20Bad\x20Request"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=5/15%Time=66451C6D%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,BF,"HTTP/1\.0\x20500\x20Internal\x20Server\x20Error\r SF:\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nX-Content-Type-Optio SF:ns:\x20nosniff\r\nDate:\x20Wed,\x2015\x20May\x202024\x2020:34:53\x20GMT SF:\r\nContent-Length:\x2022\r\n\r\nInternal\x20Server\x20Error\n")%r(HTTP SF:Options,BF,"HTTP/1\.0\x20500\x20Internal\x20Server\x20Error\r\nContent- SF:Type:\x20text/plain;\x20charset=utf-8\r\nX-Content-Type-Options:\x20nos SF:niff\r\nDate:\x20Wed,\x2015\x20May\x202024\x2020:34:53\x20GMT\r\nConten SF:t-Length:\x2022\r\n\r\nInternal\x20Server\x20Error\n")%r(FourOhFourRequ SF:est,BF,"HTTP/1\.0\x20500\x20Internal\x20Server\x20Error\r\nContent-Type SF::\x20text/plain;\x20charset=utf-8\r\nX-Content-Type-Options:\x20nosniff SF:\r\nDate:\x20Wed,\x2015\x20May\x202024\x2020:34:53\x20GMT\r\nContent-Le SF:ngth:\x2022\r\n\r\nInternal\x20Server\x20Error\n")%r(GenericLines,67,"H SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20ch SF:arset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(RT SF:SPRequest,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20te SF:xt/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x2 SF:0Request")%r(Help,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Typ SF:e:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x SF:20Bad\x20Request")%r(SSLSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Reque SF:st\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20c SF:lose\r\n\r\n400\x20Bad\x20Request")%r(TerminalServerCookie,67,"HTTP/1\. SF:1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=u SF:tf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(TLSSessio SF:nReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/pl SF:ain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Requ SF:est")%r(Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type SF::\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x2 SF:0Bad\x20Request")%r(LPDString,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\ SF:r\n\r\n400\x20Bad\x20Request"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 5 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.56 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.78 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.39 ms google.as15169.any2ix.coresite.com (206.72.210.41) 5 64.06 ms 237.253.188.35.bc.googleusercontent.com (35.188.253.237) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 122.03 seconds