Nmap scan report for adx-winners-ap-southeast-1-rtb.adroll.com (13.213.135.117) Host is up (0.18s latency). Other addresses for adx-winners-ap-southeast-1-rtb.adroll.com (not scanned): 13.251.214.96 rDNS record for 13.213.135.117: ec2-13-213-135-117.ap-southeast-1.compute.amazonaws.com Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, NCP, NotesRPC, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, X11Probe: | HTTP/1.1 400 BAD_REQUEST | Content-Length: 0 | Connection: Close | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 404 Not Found | Content-Length: 9 | Connection: Close |_ Found |_http-title: Site doesn't have a title. 443/tcp open ssl/https | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, NCP, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, X11Probe, tor-versions: | HTTP/1.1 400 BAD_REQUEST | Content-Length: 0 | Connection: Close | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 404 Not Found | Content-Length: 9 | Connection: Close |_ Found |_http-title: Site doesn't have a title. | ssl-cert: Subject: commonName=*.adroll.com | Subject Alternative Name: DNS:*.adroll.com | Not valid before: 2023-02-02T00:00:00 |_Not valid after: 2023-12-29T23:59:59 |_ssl-date: TLS randomness does not represent time 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=11/21%Time=655CD8C6%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,49,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x20 SF:9\r\nConnection:\x20Close\r\n\r\nNot\x20Found")%r(HTTPOptions,49,"HTTP/ SF:1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x209\r\nConnection:\x20C SF:lose\r\n\r\nNot\x20Found")%r(RTSPRequest,42,"HTTP/1\.1\x20400\x20BAD_RE SF:QUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(X11Pr SF:obe,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConn SF:ection:\x20Close\r\n\r\n")%r(FourOhFourRequest,49,"HTTP/1\.1\x20404\x20 SF:Not\x20Found\r\nContent-Length:\x209\r\nConnection:\x20Close\r\n\r\nNot SF:\x20Found")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-L SF:ength:\x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSVersionBindReqTCP,42 SF:,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection SF::\x20Close\r\n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x20400\x20BAD_ SF:REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SSL SF:SessionReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\ SF:r\nConnection:\x20Close\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\ SF:x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n" SF:)%r(Kerberos,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x20 SF:0\r\nConnection:\x20Close\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x SF:20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n") SF:%r(LDAPSearchReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length: SF:\x200\r\nConnection:\x20Close\r\n\r\n")%r(LDAPBindReq,42,"HTTP/1\.1\x20 SF:400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\ SF:r\n")%r(SIPOptions,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Lengt SF:h:\x200\r\nConnection:\x20Close\r\n\r\n")%r(LANDesk-RC,42,"HTTP/1\.1\x2 SF:0400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n SF:\r\n")%r(TerminalServer,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent- SF:Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(NCP,42,"HTTP/1\.1\x204 SF:00\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r SF:\n")%r(NotesRPC,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\ SF:x200\r\nConnection:\x20Close\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655CD8D1%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,49,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Leng SF:th:\x209\r\nConnection:\x20Close\r\n\r\nNot\x20Found")%r(HTTPOptions,49 SF:,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x209\r\nConnectio SF:n:\x20Close\r\n\r\nNot\x20Found")%r(FourOhFourRequest,49,"HTTP/1\.1\x20 SF:404\x20Not\x20Found\r\nContent-Length:\x209\r\nConnection:\x20Close\r\n SF:\r\nNot\x20Found")%r(tor-versions,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r SF:\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(RTSPRequest, SF:42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnecti SF:on:\x20Close\r\n\r\n")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r SF:\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSVersionBi SF:ndReqTCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\ SF:nConnection:\x20Close\r\n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x20 SF:400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\ SF:r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Le SF:ngth:\x200\r\nConnection:\x20Close\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1 SF:\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clo SF:se\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent- SF:Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\ SF:.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clos SF:e\r\n\r\n")%r(X11Probe,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-L SF:ength:\x200\r\nConnection:\x20Close\r\n\r\n")%r(LDAPSearchReq,42,"HTTP/ SF:1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Cl SF:ose\r\n\r\n")%r(LDAPBindReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nCont SF:ent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SIPOptions,42,"HTT SF:P/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20 SF:Close\r\n\r\n")%r(LANDesk-RC,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nCon SF:tent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(TerminalServer,42 SF:,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection SF::\x20Close\r\n\r\n")%r(NCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nConte SF:nt-Length:\x200\r\nConnection:\x20Close\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|PBX Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%), Vodavi embedded (87%) OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:vodavi:xts-ip Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Vodavi XTS-IP PBX (87%), Linux 3.10 - 3.13 (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 24 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.21 ms 208.76.251.177 2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.71 ms multacom.com (96.45.162.9) 4 1.07 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121) 5 ... 6 106.09 ms ae-5.r27.osakjp02.jp.bb.gin.ntt.net (129.250.2.177) 7 104.58 ms ae-2.r03.osakjp02.jp.bb.gin.ntt.net (129.250.7.33) 8 109.31 ms ae-1.amazon.osakjp02.jp.bb.gin.ntt.net (61.200.80.86) 9 ... 11 12 107.59 ms 54.239.53.12 13 ... 14 185.89 ms 52.93.8.68 15 174.99 ms 52.93.11.49 16 181.65 ms 52.93.11.46 17 178.18 ms 150.222.3.215 18 182.43 ms 150.222.3.222 19 ... 23 24 171.80 ms ec2-13-213-135-117.ap-southeast-1.compute.amazonaws.com (13.213.135.117) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 199.68 seconds