Nmap scan report for crl.duosecurity.com (52.167.190.23)
Host is up (0.058s latency).
Not shown: 999 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http Microsoft-Azure-Application-Gateway/v2
| http-robots.txt: 1 disallowed entry
|_/
| http-server-header:
| Microsoft-Azure-Application-Gateway/v2
|_ Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0
| fingerprint-strings:
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.1 500 Internal Server Error
| Server: Microsoft-Azure-Application-Gateway/v2
| Date: Wed, 16 Apr 2025 10:32:54 GMT
| Content-Type: text/html
| Content-Length: 203
| Connection: close
|
|
500 Internal Server Error
|
| 500 Internal Server Error
|
Microsoft-Azure-Application-Gateway/v2
|
|
| RTSPRequest:
|
| 400 Bad Request
|
| 400 Bad Request
|
Microsoft-Azure-Application-Gateway/v2
|
|
| X11Probe:
| HTTP/1.1 400 Bad Request
| Server: Microsoft-Azure-Application-Gateway/v2
| Date: Wed, 16 Apr 2025 10:32:54 GMT
| Content-Type: text/html
| Content-Length: 183
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
Microsoft-Azure-Application-Gateway/v2
|
|_
|_http-title: Site doesn't have a title (text/html).
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=4/16%Time=67FF8755%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,187,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nServ
SF:er:\x20Microsoft-Azure-Application-Gateway/v2\r\nDate:\x20Wed,\x2016\x2
SF:0Apr\x202025\x2010:32:54\x20GMT\r\nContent-Type:\x20text/html\r\nConten
SF:t-Length:\x20203\r\nConnection:\x20close\r\n\r\n\r\n
SF:500\x20Internal\x20Server\x20Error\r\n\r\n
SF:500\x20Internal\x20Server\x20Error
\r\n
Mic
SF:rosoft-Azure-Application-Gateway/v2\r\n\r\n\r\n"
SF:)%r(HTTPOptions,187,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\
SF:nServer:\x20Microsoft-Azure-Application-Gateway/v2\r\nDate:\x20Wed,\x20
SF:16\x20Apr\x202025\x2010:32:54\x20GMT\r\nContent-Type:\x20text/html\r\nC
SF:ontent-Length:\x20203\r\nConnection:\x20close\r\n\r\n\r\n500\x20Internal\x20Server\x20Error\r\n\r\n500\x20Internal\x20Server\x20Error
\r\n
Microsoft-Azure-Application-Gateway/v2\r\n\r\n
SF:\r\n")%r(RTSPRequest,B7,"\r\n400\x20Bad\x20Request
SF:title>\r\n\r\n400\x20Bad\x20Request
\r\n
Microsoft-Azure-Application-Gateway/v2\r\n<
SF:/body>\r\n\r\n")%r(X11Probe,169,"HTTP/1\.1\x20400\x20Bad\x20Requ
SF:est\r\nServer:\x20Microsoft-Azure-Application-Gateway/v2\r\nDate:\x20We
SF:d,\x2016\x20Apr\x202025\x2010:32:54\x20GMT\r\nContent-Type:\x20text/htm
SF:l\r\nContent-Length:\x20183\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request\r\n
Microsoft-Azure-Ap
SF:plication-Gateway/v2\r\n\r\n\r\n")%r(FourOhFourR
SF:equest,187,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nServer:\
SF:x20Microsoft-Azure-Application-Gateway/v2\r\nDate:\x20Wed,\x2016\x20Apr
SF:\x202025\x2010:32:54\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Le
SF:ngth:\x20203\r\nConnection:\x20close\r\n\r\n\r\n500\
SF:x20Internal\x20Server\x20Error\r\n\r\n
SF:500\x20Internal\x20Server\x20Error
\r\n
Microso
SF:ft-Azure-Application-Gateway/v2\r\n\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): OpenBSD 4.X (86%)
OS CPE: cpe:/o:openbsd:openbsd:4.0
Aggressive OS guesses: OpenBSD 4.0 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 23 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.61 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 2.26 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4 1.33 ms microsoft.as8075.any2ix.coresite.com (206.72.210.143)
5 0.88 ms ae24-0.ear03.lax30.ntwk.msn.net (104.44.41.128)
6 55.61 ms be-23-0.ibr01.lax30.ntwk.msn.net (104.44.33.173)
7 60.32 ms 51.10.19.169
8 55.53 ms be-10-0.ibr01.atl30.ntwk.msn.net (104.44.18.220)
9 59.92 ms 104.44.31.87
10 57.02 ms 104.44.51.190
11 ...
12 60.43 ms 104.44.50.112
13 ... 22
23 59.41 ms 52.167.190.23
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 36.59 seconds