Nmap scan report for telegraph.grapeshot.co.uk (130.162.180.138) Host is up (0.14s latency). Not shown: 996 filtered ports PORT STATE SERVICE VERSION 53/tcp closed domain 80/tcp open http | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 302 Moved Temporarily | Date: Sun, 19 Nov 2023 15:43:24 GMT | Content-Type: text/html | Content-Length: 133 | Connection: close | Location: https://:443/nice%20ports%2C/Tri%6Eity.txt%2ebak | | 302 Found | |

302 Found

|
| | | GetRequest, HTTPOptions: | HTTP/1.1 302 Moved Temporarily | Date: Sun, 19 Nov 2023 15:43:23 GMT | Content-Type: text/html | Content-Length: 133 | Connection: close | Location: https://:443/ | | 302 Found | |

302 Found

|
| | | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Nov 2023 15:43:29 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
| | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

|
| | | X11Probe: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Nov 2023 15:43:24 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
| |_ |_http-title: Did not follow redirect to https://telegraph.grapeshot.co.uk:443/ 443/tcp open ssl/https | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Nov 2023 15:43:31 GMT | Content-Type: text/html; charset=iso-8859-1 | Content-Length: 226 | Connection: close | | | 400 Bad Request | |

Bad Request

|

Your browser sent a request that this server could not understand.
|

| | GetRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Nov 2023 15:43:30 GMT | Content-Type: text/html; charset=iso-8859-1 | Content-Length: 226 | Connection: close | | | 400 Bad Request | |

Bad Request

|

Your browser sent a request that this server could not understand.
|

| | HTTPOptions: | HTTP/1.1 405 Not Allowed | Date: Sun, 19 Nov 2023 15:43:30 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | Allow: GET, POST | | 405 Not Allowed | |

405 Not Allowed

|
| | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

|
| | | tor-versions: | HTTP/1.1 400 Bad Request | Date: Sun, 19 Nov 2023 15:43:31 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
| |_ | http-robots.txt: 1 disallowed entry |_/ |_http-title: Site doesn't have a title (text/html; charset=iso-8859-1). | ssl-cert: Subject: commonName=*.grapeshot.co.uk/organizationName=Oracle Corporation/stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:*.grapeshot.co.uk | Not valid before: 2023-03-09T00:00:00 |_Not valid after: 2024-04-08T23:59:59 636/tcp closed ldapssl 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=655A2D1B%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,126,"HTTP/1\.1\x20302\x20Moved\x20Temporarily\r\nDate:\x20S SF:un,\x2019\x20Nov\x202023\x2015:43:23\x20GMT\r\nContent-Type:\x20text/ht SF:ml\r\nContent-Length:\x20133\r\nConnection:\x20close\r\nLocation:\x20ht SF:tps://:443/\r\n\r\n\r\n302\x20Found\r SF:\n\r\n

302\x20Found

\r\n
\r\n\r\n\r\n")%r(HTTPOptions,126,"HTTP/1\.1\x20302\x2 SF:0Moved\x20Temporarily\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2015:43:23 SF:\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20133\r\nConn SF:ection:\x20close\r\nLocation:\x20https://:443/\r\n\r\n\r\n< SF:title>302\x20Found\r\n\r\n

302\x20Found SF:

\r\n
\r\n\r\n\r\n")%r(R SF:TSPRequest,91,"\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
\r\n\r\n\r\n")%r(X11Probe,113,"HTTP/1\. SF:1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2015: SF:43:24\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20145\r\ SF:nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Reque SF:st\r\n\r\n

400\x20Bad\x20Request

\r\n
\r\n\r\n\r\n")%r(FourOhFo SF:urRequest,149,"HTTP/1\.1\x20302\x20Moved\x20Temporarily\r\nDate:\x20Sun SF:,\x2019\x20Nov\x202023\x2015:43:24\x20GMT\r\nContent-Type:\x20text/html SF:\r\nContent-Length:\x20133\r\nConnection:\x20close\r\nLocation:\x20http SF:s://:443/nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\n\r\n\r\n302\x20Found\r\n\r\n

302\x20Found< SF:/h1>

\r\n
\r\n\r\n\r\n")%r(RP SF:CCheck,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x SF:20Nov\x202023\x2015:43:29\x20GMT\r\nContent-Type:\x20text/html\r\nConte SF:nt-Length:\x20145\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20B SF:ad\x20Request

\r\n
\r\n\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655A2D21%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,178,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20 SF:Sun,\x2019\x20Nov\x202023\x2015:43:30\x20GMT\r\nContent-Type:\x20text/h SF:tml;\x20charset=iso-8859-1\r\nContent-Length:\x20226\r\nConnection:\x20 SF:close\r\n\r\n\n\n400\x20Bad\x20Request\n SF:\n

Bad\x20Request

\n

Your\x20browser\x20sent\x20a\x20req SF:uest\x20that\x20this\x20server\x20could\x20not\x20understand\. SF:\n

\n\n")%r(HTTPOptions,125,"HTTP/1\.1\x20405\x20Not\x SF:20Allowed\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2015:43:30\x20GMT\r\nC SF:ontent-Type:\x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20c SF:lose\r\nAllow:\x20GET,\x20POST\r\n\r\n\r\n405\x20Not SF:\x20Allowed\r\n\r\n

405\x20Not\x20Allow SF:ed

\r\n
\r\n\r\n\r\n")%r SF:(FourOhFourRequest,178,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20 SF:Sun,\x2019\x20Nov\x202023\x2015:43:31\x20GMT\r\nContent-Type:\x20text/h SF:tml;\x20charset=iso-8859-1\r\nContent-Length:\x20226\r\nConnection:\x20 SF:close\r\n\r\n\n\n400\x20Bad\x20Request\n SF:\n

Bad\x20Request

\n

Your\x20browser\x20sent\x20a\x20req SF:uest\x20that\x20this\x20server\x20could\x20not\x20understand\. SF:\n

\n\n")%r(tor-versions,113,"HTTP/1\.1\x20400\x20Bad\ SF:x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2015:43:31\x20GMT\r\n SF:Content-Type:\x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20 SF:close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
< SF:center>
\r\n\r\n\r\n")%r(RTSPRequest,91,"\r SF:\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
\r\n< SF:/body>\r\n\r\n"); Aggressive OS guesses: Linux 3.1 (92%), Linux 3.2 (92%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (92%), Crestron XPanel control system (90%), ASUS RT-N56U WAP (Linux 3.4) (90%), Linux 3.16 (90%), Linux 3.12 (89%), Linux 3.14 (88%), Linux 4.1 (88%), Linux 4.10 (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 10 hops TRACEROUTE (using port 53/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177 2 0.62 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.70 ms multacom.com (96.45.162.9) 4 0.68 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121) 5 ... 6 64.75 ms ae-5.r25.asbnva02.us.bb.gin.ntt.net (129.250.3.188) 7 133.93 ms ae-7.r21.londen12.uk.bb.gin.ntt.net (129.250.2.110) 8 135.94 ms ae-3.a02.londen14.uk.bb.gin.ntt.net (129.250.3.191) 9 134.79 ms 140.91.200.50 10 136.65 ms 130.162.180.138 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 76.44 seconds