Nmap scan report for www.fairmont.com (152.195.19.25) Host is up (0.00032s latency). Not shown: 996 filtered ports PORT STATE SERVICE VERSION 80/tcp open http ECAcc (lac/55D2) | fingerprint-strings: | GetRequest: | HTTP/1.0 404 Not Found | Content-Type: text/html | Date: Tue, 21 Nov 2023 06:10:33 GMT | Server: ECAcc (lac/55D2) | Content-Length: 345 | Connection: close | | | | | 404 - Not Found | | |

404 - Not Found

| | | HTTPOptions: | HTTP/1.0 200 OK | Allow: OPTIONS, GET, HEAD, POST | Date: Tue, 21 Nov 2023 06:10:33 GMT | Server: ECAcc (lac/55D2) | Content-Length: 0 | Connection: close | RTSPRequest: | HTTP/1.0 400 Bad Request | Content-Type: text/html | Content-Length: 349 | Connection: close | Date: Tue, 21 Nov 2023 06:10:33 GMT | Server: ECLF (lac/5584) | | | | | 400 - Bad Request | | |

400 - Bad Request

| | | X11Probe: | HTTP/1.0 501 Not Implemented | Content-Type: text/html | Content-Length: 357 | Connection: close | Date: Tue, 21 Nov 2023 06:10:33 GMT | Server: ECLF (lac/55AA) | | | | | 501 - Not Implemented | | |

501 - Not Implemented

| |_ | http-server-header: | ECAcc (lac/55D2) |_ ECLF (lac/5584) |_http-title: Did not follow redirect to https://www.fairmont.com/ 443/tcp open ssl/https ECAcc (lac/55D2) | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 404 Not Found | Content-Type: text/html | Date: Tue, 21 Nov 2023 06:10:39 GMT | Server: ECAcc (lac/55B3) | Content-Length: 345 | Connection: close | | | | | 404 - Not Found | | |

404 - Not Found

| | | GetRequest: | HTTP/1.0 404 Not Found | Content-Type: text/html | Date: Tue, 21 Nov 2023 06:10:39 GMT | Server: ECAcc (lac/55D2) | Content-Length: 345 | Connection: close | | | | | 404 - Not Found | | |

404 - Not Found

| | | HTTPOptions: | HTTP/1.0 200 OK | Allow: OPTIONS, GET, HEAD, POST | Date: Tue, 21 Nov 2023 06:10:39 GMT | Server: ECAcc (lac/55D2) | Content-Length: 0 | Connection: close | tor-versions: | HTTP/1.0 501 Not Implemented | Content-Type: text/html | Content-Length: 357 | Connection: close | Date: Tue, 21 Nov 2023 06:10:39 GMT | Server: ECLF (lac/5594) | | | | | 501 - Not Implemented | | |

501 - Not Implemented

| |_ | http-robots.txt: 11 disallowed entries | /my-fpc/ /workarea/ /reservations/ /templates/ /pdf/ |_/nr/ /NR/ /search/ /fa/ /FA/ / | http-server-header: | | ECAcc (lac/55B3) |_ ECAcc (lac/55D2) |_http-title: Fairmont Hotels and Resorts - Luxury hotels | ssl-cert: Subject: commonName=accor.com/organizationName=ACCOR SA/stateOrProvinceName=Hauts-de-Seine/countryName=FR | Subject Alternative Name: DNS:accor.com, DNS:www.raffles.com, DNS:www.fairmont.com, DNS:www.swissotel.com, DNS:www.raffles-hotels.de, DNS:www.raffles.es, DNS:www.raffles.fr, DNS:www.raffles-tr.com, DNS:www.raffles.ru, DNS:www.raffles-ae.com, DNS:www.raffles-cn.com, DNS:www.raffles.jp, DNS:www.fairmont.fr, DNS:www.fairmont.de, DNS:www.fairmont-tr.com, DNS:www.fairmont-ru.com, DNS:www.fairmont.ae, DNS:www.fairmont.jp, DNS:www.fairmont.mx, DNS:www.fairmont.net.br, DNS:www.fairmont.co.kr, DNS:www.fairmont.cn, DNS:www.swissotel.de, DNS:www.swissotel.fr, DNS:www.swissotel.es, DNS:www.swissotel-hotels.ru, DNS:www.swissotel.ae, DNS:www.swissotel.cn, DNS:www.swissotel.jp, DNS:www.swissotel.com.tr | Not valid before: 2023-05-31T12:55:20 |_Not valid after: 2024-07-01T12:55:19 |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 | tls-nextprotoneg: | h2 | http/1.1 | http/1.0 | h3 |_ h3-29 1119/tcp closed bnetgame 1935/tcp closed rtmp 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=11/20%Time=655C49D9%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,1F3,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20t SF:ext/html\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2006:10:33\x20GMT\r\nSe SF:rver:\x20ECAcc\x20\(lac/55D2\)\r\nContent-Length:\x20345\r\nConnection: SF:\x20close\r\n\r\n<\?xml\x20version=\"1\.0\"\x20encoding=\"iso-8859-1\"\ SF:?>\n\n\n\t SF:\n\t\t404\x20-\x20Not\x20Found\n\t\n\t\n\t\ SF:t

404\x20-\x20Not\x20Found

\n\t\n\n")%r(HTTPOption SF:s,99,"HTTP/1\.0\x20200\x20OK\r\nAllow:\x20OPTIONS,\x20GET,\x20HEAD,\x20 SF:POST\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2006:10:33\x20GMT\r\nServer SF::\x20ECAcc\x20\(lac/55D2\)\r\nContent-Length:\x200\r\nConnection:\x20cl SF:ose\r\n\r\n")%r(RTSPRequest,1F8,"HTTP/1\.0\x20400\x20Bad\x20Request\r\n SF:Content-Type:\x20text/html\r\nContent-Length:\x20349\r\nConnection:\x20 SF:close\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2006:10:33\x20GMT\r\nServe SF:r:\x20ECLF\x20\(lac/5584\)\r\n\r\n<\?xml\x20version=\"1\.0\"\x20encodin SF:g=\"iso-8859-1\"\?>\n\n\n\t\n\t\t400\x20-\x20Bad\x20Request\n\t\n\t\n\t\t

400\x20-\x20Bad\x20Request

\n\t\n\n")%r(X11Probe,204,"HTTP/1\.0\x20501\x20Not\x20Implemented\r\nCont SF:ent-Type:\x20text/html\r\nContent-Length:\x20357\r\nConnection:\x20clos SF:e\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2006:10:33\x20GMT\r\nServer:\x SF:20ECLF\x20\(lac/55AA\)\r\n\r\n<\?xml\x20version=\"1\.0\"\x20encoding=\" SF:iso-8859-1\"\?>\n\n\n\t\n\t\t501\x20-\x20Not\x20Implemented\n\t\n\t\n\t\t

501\x20-\x20Not\x20Implemented

\n\t\ SF:n\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655C49DF%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,1F3,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Typ SF:e:\x20text/html\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2006:10:39\x20GM SF:T\r\nServer:\x20ECAcc\x20\(lac/55D2\)\r\nContent-Length:\x20345\r\nConn SF:ection:\x20close\r\n\r\n<\?xml\x20version=\"1\.0\"\x20encoding=\"iso-88 SF:59-1\"\?>\n\n\n\ SF:t\n\t\t404\x20-\x20Not\x20Found\n\t\n\t\n\t\t

404\x20-\x20Not\x20Found

\n\t\n\n")%r(HTT SF:POptions,99,"HTTP/1\.0\x20200\x20OK\r\nAllow:\x20OPTIONS,\x20GET,\x20HE SF:AD,\x20POST\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2006:10:39\x20GMT\r\ SF:nServer:\x20ECAcc\x20\(lac/55D2\)\r\nContent-Length:\x200\r\nConnection SF::\x20close\r\n\r\n")%r(FourOhFourRequest,1F3,"HTTP/1\.0\x20404\x20Not\x SF:20Found\r\nContent-Type:\x20text/html\r\nDate:\x20Tue,\x2021\x20Nov\x20 SF:2023\x2006:10:39\x20GMT\r\nServer:\x20ECAcc\x20\(lac/55B3\)\r\nContent- SF:Length:\x20345\r\nConnection:\x20close\r\n\r\n<\?xml\x20version=\"1\.0\ SF:"\x20encoding=\"iso-8859-1\"\?>\n\n\n\t\n\t\t404\x20-\x20Not\x20Found</tit SF:le>\n\t</head>\n\t<body>\n\t\t<h1>404\x20-\x20Not\x20Found</h1>\n\t</bo SF:dy>\n</html>\n")%r(tor-versions,204,"HTTP/1\.0\x20501\x20Not\x20Impleme SF:nted\r\nContent-Type:\x20text/html\r\nContent-Length:\x20357\r\nConnect SF:ion:\x20close\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2006:10:39\x20GMT\ SF:r\nServer:\x20ECLF\x20\(lac/5594\)\r\n\r\n<\?xml\x20version=\"1\.0\"\x2 SF:0encoding=\"iso-8859-1\"\?>\n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//D SF:TD\x20XHTML\x201\.0\x20Transitional//EN\"\n\x20\x20\x20\x20\x20\x20\x20 SF:\x20\x20\"http://www\.w3\.org/TR/xhtml1/DTD/xhtml1-transitional\.dtd\"> SF:\n<html\x20xmlns=\"http://www\.w3\.org/1999/xhtml\"\x20xml:lang=\"en\"\ SF:x20lang=\"en\">\n\t<head>\n\t\t<title>501\x20-\x20Not\x20Implemented</t SF:itle>\n\t</head>\n\t<body>\n\t\t<h1>501\x20-\x20Not\x20Implemented</h1> SF:\n\t</body>\n</html>\n"); Aggressive OS guesses: FreeBSD 11.0-STABLE (93%), Linux 3.1 (92%), Linux 3.2 (92%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (92%), Linux 2.6.32 (91%), Linux 3.2 - 4.9 (91%), Android 4.1 - 6.0 (Linux 3.4 - 3.14) (91%), Android 5.0 - 6.0.1 (Linux 3.4) (91%), Android 5.0 - 7.0 (Linux 3.4 - 3.10) (91%), Linux 2.6.32 - 3.10 (91%) No exact OS matches for host (test conditions non-ideal). Network Distance: 8 hops TRACEROUTE (using port 1935/tcp) HOP RTT ADDRESS 1 0.22 ms 208.76.251.177 2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.71 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1) 4 0.90 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57) 5 1.02 ms be3360.ccr41.lax04.atlas.cogentco.com (154.54.25.150) 6 1.05 ms 38.122.147.170 7 0.32 ms po-65.core1.lac.edgecastcdn.net (152.195.76.135) 8 0.26 ms 152.195.19.25 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 67.21 seconds