Nmap scan report for wdm.gov.ciscospark.com (52.61.169.22) Host is up (0.026s latency). Other addresses for wdm.gov.ciscospark.com (not scanned): 15.200.11.244 52.222.116.92 rDNS record for 52.61.169.22: ec2-52-61-169-22.us-gov-west-1.compute.amazonaws.com Not shown: 997 filtered ports PORT STATE SERVICE VERSION 80/tcp open http-proxy HAProxy http proxy 1.3.1 or later |_http-title: Site doesn't have a title (text/html). 443/tcp open ssl/http-proxy HAProxy http proxy 1.3.1 or later | http-auth: | HTTP/1.1 401 Unauthorized\x0D |_ Server returned status 401 but no WWW-Authenticate header. |_http-server-header: Redacted |_http-title: HTTP Status 401 \xE2\x80\x93 Unauthorized | ssl-cert: Subject: commonName=*.gov.ciscospark.com | Subject Alternative Name: DNS:*.gov.ciscospark.com, DNS:gov.ciscospark.com | Not valid before: 2023-06-02T16:12:08 |_Not valid after: 2024-07-03T16:12:08 5061/tcp open ssl/sip-tls? | ssl-cert: Subject: commonName=l2sip-agovw1a1-01.gov.wbx2.com/organizationName=Cisco Systems Inc./stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:sip.webex.com, DNS:l2sip-agovw1a1-01.gov.wbx2.com, DNS:l2sip-agovw1a1-02.gov.wbx2.com, DNS:l2sip-agovw1a1-03.gov.wbx2.com | Not valid before: 2023-09-19T20:46:24 |_Not valid after: 2024-09-18T20:45:24 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 19 hops Service Info: Device: load balancer TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.18 ms 208.76.251.177 2 0.54 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.76 ms multacom.com (96.45.162.9) 4 2.92 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146) 5 ... 6 7 39.64 ms 52.93.15.38 8 26.71 ms 52.93.12.69 9 45.78 ms 52.93.14.146 10 26.03 ms 52.93.14.135 11 28.67 ms 54.239.48.193 12 28.44 ms 52.94.120.195 13 ... 18 19 24.35 ms ec2-52-61-169-22.us-gov-west-1.compute.amazonaws.com (52.61.169.22) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 195.19 seconds