Nmap scan report for edc.taleo.net (192.29.65.95) Host is up (0.067s latency). Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp closed ssh 80/tcp open http | fingerprint-strings: | DNSVersionBindReqTCP, RPCCheck: | HTTP/1.1 400 Bad Request | Date: Sat, 10 May 2025 12:10:58 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
| | | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Sat, 10 May 2025 12:10:53 GMT | Content-Type: text/html; charset=iso-8859-1 | Content-Length: 11 | Connection: close | Request | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

|
| | | X11Probe: | HTTP/1.1 400 Bad Request | Date: Sat, 10 May 2025 12:10:53 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
| |_ |_http-title: Did not follow redirect to https://edc.taleo.net/ 443/tcp open ssl/https | fingerprint-strings: | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | Date: Sat, 10 May 2025 12:11:06 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
| | | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Sat, 10 May 2025 12:10:59 GMT | Content-Type: text/html; charset=iso-8859-1 | Content-Length: 11 | Connection: close | Request | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Sat, 10 May 2025 12:11:05 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
| | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

|
| | | tor-versions: | HTTP/1.1 400 Bad Request | Date: Sat, 10 May 2025 12:11:00 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
| |_ | http-title: htmlredirection |_Requested resource was https://edc.taleo.net/smartorg/smartorg/common/toc.jsf?lang=en | http-methods: |_ Potentially risky methods: | ssl-cert: Subject: commonName=*.taleo.net/organizationName=Oracle Corporation/stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:*.taleo.net | Not valid before: 2025-04-07T00:00:00 |_Not valid after: 2026-05-06T23:59:59 |_ssl-date: TLS randomness does not represent time 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=5/10%Time=681F424C%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,A0,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sat,\x201 SF:0\x20May\x202025\x2012:10:53\x20GMT\r\nContent-Type:\x20text/html;\x20c SF:harset=iso-8859-1\r\nContent-Length:\x2011\r\nConnection:\x20close\r\n\ SF:r\nBad\x20Request")%r(HTTPOptions,A0,"HTTP/1\.1\x20400\x20Bad\x20Reques SF:t\r\nDate:\x20Sat,\x2010\x20May\x202025\x2012:10:53\x20GMT\r\nContent-T SF:ype:\x20text/html;\x20charset=iso-8859-1\r\nContent-Length:\x2011\r\nCo SF:nnection:\x20close\r\n\r\nBad\x20Request")%r(RTSPRequest,91,"\r\n SF:400\x20Bad\x20Request\r\n\r\n
SF:

400\x20Bad\x20Request

\r\n
\r\n\r\n\r\n")%r(X11Probe,113,"HTTP/1\.1\x20400\x20Bad\x20Reques SF:t\r\nDate:\x20Sat,\x2010\x20May\x202025\x2012:10:53\x20GMT\r\nContent-T SF:ype:\x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\n SF:\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
\r\n\r\n\r\n")%r(FourOhFourRequest,A0,"HTTP/1\.1\x SF:20400\x20Bad\x20Request\r\nDate:\x20Sat,\x2010\x20May\x202025\x2012:10: SF:53\x20GMT\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1\r\nConte SF:nt-Length:\x2011\r\nConnection:\x20close\r\n\r\nBad\x20Request")%r(RPCC SF:heck,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sat,\x2010\x20 SF:May\x202025\x2012:10:58\x20GMT\r\nContent-Type:\x20text/html\r\nContent SF:-Length:\x20145\r\nConnection:\x20close\r\n\r\n\r\n4 SF:00\x20Bad\x20Request\r\n\r\n

400\x20Bad SF:\x20Request

\r\n
\r\n\r\n\r\n")%r(DNSVersionBindReqTCP,113,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\nDate:\x20Sat,\x2010\x20May\x202025\x2012:10:58\x20GMT\r\nContent-Typ SF:e:\x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\n\r SF:\n\r\n400\x20Bad\x20Request\r\n SF:\r\n

400\x20Bad\x20Request

\r\n
\r\n\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=5/10%Time=681F4252%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,A0,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sa SF:t,\x2010\x20May\x202025\x2012:10:59\x20GMT\r\nContent-Type:\x20text/htm SF:l;\x20charset=iso-8859-1\r\nContent-Length:\x2011\r\nConnection:\x20clo SF:se\r\n\r\nBad\x20Request")%r(HTTPOptions,A0,"HTTP/1\.1\x20400\x20Bad\x2 SF:0Request\r\nDate:\x20Sat,\x2010\x20May\x202025\x2012:10:59\x20GMT\r\nCo SF:ntent-Type:\x20text/html;\x20charset=iso-8859-1\r\nContent-Length:\x201 SF:1\r\nConnection:\x20close\r\n\r\nBad\x20Request")%r(FourOhFourRequest,A SF:0,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sat,\x2010\x20May\x20 SF:2025\x2012:10:59\x20GMT\r\nContent-Type:\x20text/html;\x20charset=iso-8 SF:859-1\r\nContent-Length:\x2011\r\nConnection:\x20close\r\n\r\nBad\x20Re SF:quest")%r(tor-versions,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate: SF:\x20Sat,\x2010\x20May\x202025\x2012:11:00\x20GMT\r\nContent-Type:\x20te SF:xt/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\n\r\n SF:\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
\r\ SF:n\r\n\r\n")%r(RTSPRequest,91,"\r\n400\ SF:x20Bad\x20Request\r\n\r\n

400\x20Bad\x2 SF:0Request

\r\n
\r\n\r\n\r SF:\n")%r(RPCCheck,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sat SF:,\x2010\x20May\x202025\x2012:11:05\x20GMT\r\nContent-Type:\x20text/html SF:\r\nContent-Length:\x20145\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
\r\n\r\n\r\n")%r(DNSVersionBindReqTCP,113,"HTTP/1\.1\x20400\x20Bad\ SF:x20Request\r\nDate:\x20Sat,\x2010\x20May\x202025\x2012:11:06\x20GMT\r\n SF:Content-Type:\x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20 SF:close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
< SF:center>
\r\n\r\n\r\n"); Aggressive OS guesses: Linux 3.1 (92%), Linux 3.2 (92%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (91%), Crestron XPanel control system (89%), ASUS RT-N56U WAP (Linux 3.4) (89%), Linux 3.16 (89%), Linux 3.12 (88%), Linux 3.14 (87%), Linux 4.1 (87%), Linux 4.10 (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 15 hops TRACEROUTE (using port 22/tcp) HOP RTT ADDRESS 1 0.21 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.68 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.82 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 0.97 ms be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102) 6 0.90 ms lax-b22-link.ip.twelve99.net (80.239.160.64) 7 94.68 ms palo-b24-link.ip.twelve99.net (62.115.119.90) 8 78.30 ms dls-b24-link.ip.twelve99.net (62.115.136.83) 9 62.35 ms dls-b24-link.ip.twelve99.net (62.115.139.131) 10 ... 11 52.84 ms chi-bb2-link.ip.twelve99.net (62.115.136.102) 12 80.95 ms dls-b23-link.ip.twelve99.net (62.115.138.65) 13 63.68 ms oracle-ic-360329.ip.twelve99-cust.net (62.115.174.54) 14 92.26 ms dls-b24-link.ip.twelve99.net (62.115.136.83) 15 66.21 ms 192.29.65.95 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 42.84 seconds