Nmap scan report for us-atl-06-04.cloudbackup.management (38.101.214.26) Host is up (0.045s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp closed http 443/tcp open ssl/https cloud-backup-web-server | fingerprint-strings: | FourOhFourRequest, HTTPOptions: | HTTP/1.1 403 Forbidden | Server: cloud-backup-web-server | Date: Fri, 01 Aug 2025 23:56:59 GMT | Content-Type: text/html | Content-Length: 164 | Connection: close | | 403 Forbidden | |

403 Forbidden

|
cloud-backup-web-server
| | | GetRequest: | HTTP/1.1 403 Forbidden | Server: cloud-backup-web-server | Date: Fri, 01 Aug 2025 23:56:58 GMT | Content-Type: text/html | Content-Length: 164 | Connection: close | | 403 Forbidden | |

403 Forbidden

|
cloud-backup-web-server
| | | RTSPRequest: | HTTP/1.1 400 Bad Request | Server: cloud-backup-web-server | Date: Fri, 01 Aug 2025 23:57:04 GMT | Content-Type: text/html | Content-Length: 168 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
cloud-backup-web-server
| | | tor-versions: | HTTP/1.1 400 Bad Request | Server: cloud-backup-web-server | Date: Fri, 01 Aug 2025 23:56:59 GMT | Content-Type: text/html | Content-Length: 168 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
cloud-backup-web-server
| |_ | ssl-cert: Subject: commonName=*.cloudbackup.management | Subject Alternative Name: DNS:*.cloudbackup.management, DNS:cloudbackup.management | Not valid before: 2025-04-01T00:00:00 |_Not valid after: 2026-05-02T23:59:59 |_http-title: 403 Forbidden |_http-server-header: cloud-backup-web-server |_ssl-date: TLS randomness does not represent time 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=8/1%Time=688D544A%P=x86_64-redhat-linux- SF:gnu%r(GetRequest,145,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloud SF:-backup-web-server\r\nDate:\x20Fri,\x2001\x20Aug\x202025\x2023:56:58\x2 SF:0GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20164\r\nConnect SF:ion:\x20close\r\n\r\n\r\n403\x20Forbidden\r\n\r\n

403\x20Forbidden

\r\n
cloud-backup-web-server\r\n\r\n\r\n")%r(HTT SF:POptions,145,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloud-backup- SF:web-server\r\nDate:\x20Fri,\x2001\x20Aug\x202025\x2023:56:59\x20GMT\r\n SF:Content-Type:\x20text/html\r\nContent-Length:\x20164\r\nConnection:\x20 SF:close\r\n\r\n\r\n403\x20Forbidden\r\n SF:\r\n

403\x20Forbidden

\r\n
clo SF:ud-backup-web-server
\r\n\r\n\r\n")%r(FourOhFourR SF:equest,145,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloud-backup-we SF:b-server\r\nDate:\x20Fri,\x2001\x20Aug\x202025\x2023:56:59\x20GMT\r\nCo SF:ntent-Type:\x20text/html\r\nContent-Length:\x20164\r\nConnection:\x20cl SF:ose\r\n\r\n\r\n403\x20Forbidden\r\n\r\n

403\x20Forbidden

\r\n
cloud SF:-backup-web-server
\r\n\r\n\r\n")%r(tor-versions, SF:14B,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20cloud-backup-web- SF:server\r\nDate:\x20Fri,\x2001\x20Aug\x202025\x2023:56:59\x20GMT\r\nCont SF:ent-Type:\x20text/html\r\nContent-Length:\x20168\r\nConnection:\x20clos SF:e\r\n\r\n\r\n400\x20Bad\x20Request\r\ SF:n\r\n

400\x20Bad\x20Request

\r\n
cloud-backup-web-server\r\n\r\n\r\n")%r(RTSPR SF:equest,14B,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20cloud-back SF:up-web-server\r\nDate:\x20Fri,\x2001\x20Aug\x202025\x2023:57:04\x20GMT\ SF:r\nContent-Type:\x20text/html\r\nContent-Length:\x20168\r\nConnection:\ SF:x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
cloud-backup-web-server
\r\n\r\n\r\n"); Aggressive OS guesses: Linux 2.6.32 - 3.13 (95%), Linux 2.6.32 (92%), Linux 3.2 - 4.9 (92%), Linux 2.6.32 - 3.10 (91%), HP P2000 G3 NAS device (91%), Oracle VM Server 3.4.2 (Linux 4.1) (90%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (90%), Linux 5.0 - 5.4 (90%), Linux 5.1 (90%), Ubiquiti Pico Station WAP (AirOS 5.2.6) (90%) No exact OS matches for host (test conditions non-ideal). Network Distance: 12 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.92 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.75 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 10.85 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 19.79 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 30.96 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 37.79 ms port-channel8121.ccr91.jan02.atlas.cogentco.com (154.54.40.250) 9 67.00 ms be3009.ccr41.atl01.atlas.cogentco.com (154.54.29.133) 10 46.01 ms be4189.rcr51.b006503-1.atl01.atlas.cogentco.com (154.54.30.242) 11 45.47 ms 38.142.96.18 12 45.48 ms 38.101.214.26 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 39.39 seconds