Nmap scan report for mailb3.zgpl.zcsend.net (204.141.42.241) Host is up (0.031s latency). Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http ZGS |_http-title: Did not follow redirect to https://mailb3.zgpl.zcsend.net/ | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, X11Probe: | HTTP/1.1 400 Bad Request | Server: ZGS | Date: Wed, 26 Mar 2025 20:04:56 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | zproxy: domain_not_configured | | 400 Bad Request | |

400 Bad Request

| | | RPCCheck: | HTTP/1.1 400 Bad Request | Server: ZGS | Date: Wed, 26 Mar 2025 20:05:01 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | zproxy: domain_not_configured | | 400 Bad Request | |

400 Bad Request

| |_ |_http-server-header: ZGS 113/tcp closed ident 443/tcp open ssl/https ZGS | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Server: ZGS | Date: Wed, 26 Mar 2025 20:05:02 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Strict-Transport-Security: max-age=64072000; includeSubDomains; preload | zproxy: domain_not_configured | | 400 Bad Request | |

400 Bad Request

| | | RTSPRequest: | HTTP/1.1 400 Bad Request | Server: ZGS | Date: Wed, 26 Mar 2025 20:05:08 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Strict-Transport-Security: max-age=64072000; includeSubDomains; preload | | 400 Bad Request | |

400 Bad Request

| | | tor-versions: | HTTP/1.1 400 Bad Request | Server: ZGS | Date: Wed, 26 Mar 2025 20:05:02 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Strict-Transport-Security: max-age=64072000; includeSubDomains; preload | | 400 Bad Request | |

400 Bad Request

| |_ |_http-title: Did not follow redirect to https://www.zoho.com/emailsender/ | tls-alpn: | http/1.1 | http/1.0 |_ http/0.9 |_ssl-date: TLS randomness does not represent time |_http-server-header: ZGS | ssl-cert: Subject: commonName=mail1.psnd.zcsend.net | Subject Alternative Name: DNS:benk.zcsend.net, DNS:comu.psnd.zcsend.net, DNS:ewno.psnd.zcsend.net, DNS:faircape.zcsend.net, DNS:fjuv.psnd.zcsend.net, DNS:gunn.zcsend.net, DNS:incmm.psnd.zcsend.net, DNS:karm.bnws.zcsend.net, DNS:mail1.bnws.zcsend.net, DNS:mail1.fedm.zcsend.net, DNS:mail1.frp.zcsend.net, DNS:mail1.hcsnd.zcsend.net, DNS:mail1.psnd.zcsend.net, DNS:mail1.rsen.zcsend.net, DNS:mail1.stamats.zcsend.net, DNS:mail1.tripbam.zcsend.net, DNS:mail10.bnws.zcsend.net, DNS:mail10.psnd.zcsend.net, DNS:mail11.psnd.zcsend.net, DNS:mail12.psnd.zcsend.net, DNS:mail1z.psnd.zcsend.net, DNS:mail2.bnws.zcsend.net, DNS:mail2.fedm.zcsend.net, DNS:mail2.frp.zcsend.net, DNS:mail2.hcsnd.zcsend.net, DNS:mail2.psnd.zcsend.net, DNS:mail2.rsen.zcsend.net, DNS:mail3.bnws.zcsend.net, DNS:mail3.fedm.zcsend.net, DNS:mail3.frp.zcsend.net, DNS:mail3.hcsnd.zcsend.net, DNS:mail3.psnd.zcsend.net, DNS:mail3.rsen.zcsend.net, DNS:mail4.bnws.zcsend.net, DNS:mail4.fedm.zcsend.net, DNS:mail4.frp.zcsend.net, DNS:mail4.psnd.zcsend.net, DNS:mail4.rsen.zcsend.net, DNS:mail41.psnd.zcsend.net, DNS:mail42.psnd.zcsend.net, DNS:mail43.psnd.zcsend.net, DNS:mail44.psnd.zcsend.net, DNS:mail45.psnd.zcsend.net, DNS:mail46.psnd.zcsend.net, DNS:mail47.psnd.zcsend.net, DNS:mail48.psnd.zcsend.net, DNS:mail49.psnd.zcsend.net, DNS:mail5.bnws.zcsend.net, DNS:mail5.frp.zcsend.net, DNS:mail5.hcsnd.zcsend.net, DNS:mail5.psnd.zcsend.net, DNS:mail50.psnd.zcsend.net, DNS:mail6.bnws.zcsend.net, DNS:mail6.frp.zcsend.net, DNS:mail6.hcsnd.zcsend.net, DNS:mail6.psnd.zcsend.net, DNS:mail7.bnws.zcsend.net, DNS:mail7.hcsnd.zcsend.net, DNS:mail7.psnd.zcsend.net, DNS:mail7.zgpm.zcsend.net, DNS:mail8.bnws.zcsend.net, DNS:mail8.psnd.zcsend.net, DNS:mail9.bnws.zcsend.net, DNS:mailhp1.psnd.zcsend.net, DNS:mailrp1.psnd.zcsend.net, DNS:mailrp2.psnd.zcsend.net, DNS:mozgw.psnd.zcsend.net, DNS:netz.rsen.zcsend.net, DNS:norsweet.psnd.zcsend.net, DNS:nuvasuite.zcsend.net, DNS:psd.bnws.zcsend.net, DNS:rpms.psnd.zcsend.net, DNS:send.zcsend.net, DNS:setw.psnd.zcsend.net, DNS:sqad.psnd.zcsend.net, DNS:stamats.zcsend.net, DNS:tgwf.psnd.zcsend.net, DNS:usvotefoundation.zcsend.net, DNS:vivo.psnd.zcsend.net, DNS:zohocreator.com, DNS:zohosurvey.com, DNS:zstmaill.psnd.zcsend.net, DNS:zstmaill1.psnd.zcsend.net, DNS:zstmaill2.psnd.zcsend.net, DNS:ztmaill.psnd.zcsend.net, DNS:ztmaill1.psnd.zcsend.net, DNS:ztmaill2.psnd.zcsend.net, DNS:ztmaill3.psnd.zcsend.net | Not valid before: 2025-02-12T06:04:33 |_Not valid after: 2025-05-13T06:04:32 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=3/26%Time=67E45DE7%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\ SF:nDate:\x20Wed,\x2026\x20Mar\x202025\x2020:04:56\x20GMT\r\nContent-Type: SF:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nzpro SF:xy:\x20domain_not_configured\r\n\r\n\r\n400\x20Bad\x SF:20Request\r\n\r\n

400\x20Bad\x20Request SF:

\r\n\r\n\r\n")%r(HTTPOptions,128,"HTTP/1\.1 SF:\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Wed,\x2026\x20M SF:ar\x202025\x2020:04:56\x20GMT\r\nContent-Type:\x20text/html\r\nContent- SF:Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configu SF:red\r\n\r\n\r\n400\x20Bad\x20Request\ SF:r\n\r\n

400\x20Bad\x20Request

\r\n SF:\r\n\r\n")%r(RTSPRequest,128,"HTTP/1\.1\x20400\x20Bad\x20Request SF:\r\nServer:\x20ZGS\r\nDate:\x20Wed,\x2026\x20Mar\x202025\x2020:04:56\x2 SF:0GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnect SF:ion:\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

SF:400\x20Bad\x20Request

\r\n\r\n\r\n")%r(X11Pr SF:obe,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\ SF:x20Wed,\x2026\x20Mar\x202025\x2020:04:56\x20GMT\r\nContent-Type:\x20tex SF:t/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nzproxy:\x20 SF:domain_not_configured\r\n\r\n\r\n400\x20Bad\x20Reque SF:st\r\n\r\n

400\x20Bad\x20Request

\r\n\r\n\r\n")%r(FourOhFourRequest,128,"HTTP/1\.1\ SF:x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Wed,\x2026\x20Ma SF:r\x202025\x2020:04:56\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L SF:ength:\x20122\r\nConnection:\x20close\r\nzproxy:\x20domain_not_configur SF:ed\r\n\r\n\r\n400\x20Bad\x20Request\r SF:\n\r\n

400\x20Bad\x20Request

\r\n\ SF:r\n\r\n")%r(RPCCheck,128,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n SF:Server:\x20ZGS\r\nDate:\x20Wed,\x2026\x20Mar\x202025\x2020:05:01\x20GMT SF:\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection: SF:\x20close\r\nzproxy:\x20domain_not_configured\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\ SF:x20Bad\x20Request

\r\n\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=3/26%Time=67E45DED%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,171,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x2 SF:0ZGS\r\nDate:\x20Wed,\x2026\x20Mar\x202025\x2020:05:02\x20GMT\r\nConten SF:t-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\ SF:r\nStrict-Transport-Security:\x20max-age=64072000;\x20includeSubDomains SF:;\x20preload\r\nzproxy:\x20domain_not_configured\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

4 SF:00\x20Bad\x20Request

\r\n\r\n\r\n")%r(HTTPOp SF:tions,171,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate SF::\x20Wed,\x2026\x20Mar\x202025\x2020:05:02\x20GMT\r\nContent-Type:\x20t SF:ext/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nStrict-Tr SF:ansport-Security:\x20max-age=64072000;\x20includeSubDomains;\x20preload SF:\r\nzproxy:\x20domain_not_configured\r\n\r\n\r\n400\ SF:x20Bad\x20Request\r\n\r\n

400\x20Bad\x2 SF:0Request

\r\n\r\n\r\n")%r(FourOhFourRequest, SF:171,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20W SF:ed,\x2026\x20Mar\x202025\x2020:05:02\x20GMT\r\nContent-Type:\x20text/ht SF:ml\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nStrict-Transpor SF:t-Security:\x20max-age=64072000;\x20includeSubDomains;\x20preload\r\nzp SF:roxy:\x20domain_not_configured\r\n\r\n\r\n400\x20Bad SF:\x20Request\r\n\r\n

400\x20Bad\x20Reque SF:st

\r\n\r\n\r\n")%r(tor-versions,152,"HTTP/1 SF:\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r\nDate:\x20Wed,\x2026\x SF:20Mar\x202025\x2020:05:02\x20GMT\r\nContent-Type:\x20text/html\r\nConte SF:nt-Length:\x20122\r\nConnection:\x20close\r\nStrict-Transport-Security: SF:\x20max-age=64072000;\x20includeSubDomains;\x20preload\r\n\r\n\r\ SF:n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n\r\n\r\n")%r( SF:RTSPRequest,152,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZGS\r SF:\nDate:\x20Wed,\x2026\x20Mar\x202025\x2020:05:08\x20GMT\r\nContent-Type SF::\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nStr SF:ict-Transport-Security:\x20max-age=64072000;\x20includeSubDomains;\x20p SF:reload\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n\r\n\r\n"); Device type: general purpose|phone Running (JUST GUESSING): FreeBSD 11.X (87%), Google Android 5.X (85%) OS CPE: cpe:/o:freebsd:freebsd:11.0 cpe:/o:google:android:5.0.1 Aggressive OS guesses: FreeBSD 11.0-STABLE or 11.0-RELEASE (87%), FreeBSD 11.0-RELEASE (86%), FreeBSD 11.2-STABLE (86%), Android 5.0.1 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 11 hops TRACEROUTE (using port 113/tcp) HOP RTT ADDRESS 1 0.24 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.53 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.56 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.43 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.37 ms ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242) 6 ... 7 8 24.06 ms ae-6.r27.sttlwa01.us.bb.gin.ntt.net (129.250.3.125) 9 27.55 ms ae-20.a03.sttlwa01.us.bb.gin.ntt.net (129.250.2.159) 10 28.21 ms xe-2-5-3-1.a02.sttlwa01.us.ce.gin.ntt.net (168.143.191.5) 11 30.87 ms 204.141.42.241 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 40.28 seconds