Nmap scan report for us-east-edge-4.e-volution.ai (8.2.110.240) Host is up (0.067s latency). Not shown: 978 closed tcp ports (reset) PORT STATE SERVICE VERSION 80/tcp open http |_http-title: Site doesn't have a title (text/plain). | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, X11Probe: | HTTP/1.1 400 Bad Request | Connection: close | FourOhFourRequest, RTSPRequest: | HTTP/1.1 404 Not Found | Content-Type: text/plain | Date: Sat, 02 Aug 2025 00:02:55 GMT | Connection: close | GetRequest, HTTPOptions: | HTTP/1.1 404 Not Found | Content-Type: text/plain | Date: Sat, 02 Aug 2025 00:02:54 GMT |_ Connection: close 443/tcp open ssl/https |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=*.e-volution.ai | Subject Alternative Name: DNS:*.e-volution.ai, DNS:e-volution.ai | Not valid before: 2024-11-22T00:00:00 |_Not valid after: 2025-12-23T23:59:59 | tls-alpn: |_ http/1.1 |_http-title: Site doesn't have a title (text/plain). | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe, tor-versions: | HTTP/1.1 400 Bad Request | Connection: close | FourOhFourRequest, HTTPOptions: | HTTP/1.1 404 Not Found | Content-Type: text/plain | Date: Sat, 02 Aug 2025 00:03:02 GMT | Connection: close | GetRequest: | HTTP/1.1 404 Not Found | Content-Type: text/plain | Date: Sat, 02 Aug 2025 00:03:01 GMT | Connection: close | RTSPRequest: | HTTP/1.1 404 Not Found | Content-Type: text/plain | Date: Sat, 02 Aug 2025 00:03:08 GMT |_ Connection: close 587/tcp filtered submission 801/tcp filtered device 3000/tcp filtered ppp 3001/tcp filtered nessus 3003/tcp filtered cgms 3300/tcp filtered ceph 3306/tcp filtered mysql 4004/tcp filtered pxc-roid 4045/tcp filtered lockd 8000/tcp filtered http-alt 8080/tcp filtered http-proxy 8081/tcp filtered blackice-icecap 8090/tcp filtered opsmessaging 9000/tcp filtered cslistener 9001/tcp filtered tor-orport 9003/tcp filtered unknown 9009/tcp filtered pichat 9100/tcp filtered jetdirect 12345/tcp filtered netbus 49152/tcp filtered unknown 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=8/1%Time=688D55AE%P=x86_64-redhat-linux-gnu%r(G SF:etRequest,6C,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Type:\x20text SF:/plain\r\nDate:\x20Sat,\x2002\x20Aug\x202025\x2000:02:54\x20GMT\r\nConn SF:ection:\x20close\r\n\r\n")%r(HTTPOptions,6C,"HTTP/1\.1\x20404\x20Not\x2 SF:0Found\r\nContent-Type:\x20text/plain\r\nDate:\x20Sat,\x2002\x20Aug\x20 SF:2025\x2000:02:54\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(RTSPRequest SF:,6C,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Type:\x20text/plain\r\ SF:nDate:\x20Sat,\x2002\x20Aug\x202025\x2000:02:55\x20GMT\r\nConnection:\x SF:20close\r\n\r\n")%r(X11Probe,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n SF:Connection:\x20close\r\n\r\n")%r(FourOhFourRequest,6C,"HTTP/1\.1\x20404 SF:\x20Not\x20Found\r\nContent-Type:\x20text/plain\r\nDate:\x20Sat,\x2002\ SF:x20Aug\x202025\x2000:02:55\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(R SF:PCCheck,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\ SF:r\n\r\n")%r(DNSVersionBindReqTCP,2F,"HTTP/1\.1\x20400\x20Bad\x20Request SF:\r\nConnection:\x20close\r\n\r\n")%r(DNSStatusRequestTCP,2F,"HTTP/1\.1\ SF:x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(Help,2F,"H SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(S SF:SLSessionReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20c SF:lose\r\n\r\n")%r(TerminalServerCookie,2F,"HTTP/1\.1\x20400\x20Bad\x20Re SF:quest\r\nConnection:\x20close\r\n\r\n")%r(TLSSessionReq,2F,"HTTP/1\.1\x SF:20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(Kerberos,2F SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")% SF:r(SMBProgNeg,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20c SF:lose\r\n\r\n")%r(LPDString,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCo SF:nnection:\x20close\r\n\r\n")%r(LDAPSearchReq,2F,"HTTP/1\.1\x20400\x20Ba SF:d\x20Request\r\nConnection:\x20close\r\n\r\n")%r(LDAPBindReq,2F,"HTTP/1 SF:\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(SIPOpt SF:ions,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n SF:\r\n")%r(LANDesk-RC,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnectio SF:n:\x20close\r\n\r\n")%r(TerminalServer,2F,"HTTP/1\.1\x20400\x20Bad\x20R SF:equest\r\nConnection:\x20close\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=8/1%Time=688D55B5%P=x86_64-redhat-linux- SF:gnu%r(GetRequest,6C,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Type:\ SF:x20text/plain\r\nDate:\x20Sat,\x2002\x20Aug\x202025\x2000:03:01\x20GMT\ SF:r\nConnection:\x20close\r\n\r\n")%r(HTTPOptions,6C,"HTTP/1\.1\x20404\x2 SF:0Not\x20Found\r\nContent-Type:\x20text/plain\r\nDate:\x20Sat,\x2002\x20 SF:Aug\x202025\x2000:03:02\x20GMT\r\nConnection:\x20close\r\n\r\n")%r(Four SF:OhFourRequest,6C,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Type:\x20 SF:text/plain\r\nDate:\x20Sat,\x2002\x20Aug\x202025\x2000:03:02\x20GMT\r\n SF:Connection:\x20close\r\n\r\n")%r(tor-versions,2F,"HTTP/1\.1\x20400\x20B SF:ad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(RTSPRequest,6C,"HTTP/ SF:1\.1\x20404\x20Not\x20Found\r\nContent-Type:\x20text/plain\r\nDate:\x20 SF:Sat,\x2002\x20Aug\x202025\x2000:03:08\x20GMT\r\nConnection:\x20close\r\ SF:n\r\n")%r(RPCCheck,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection SF::\x20close\r\n\r\n")%r(DNSVersionBindReqTCP,2F,"HTTP/1\.1\x20400\x20Bad SF:\x20Request\r\nConnection:\x20close\r\n\r\n")%r(DNSStatusRequestTCP,2F, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r SF:(Help,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\ SF:n\r\n")%r(SSLSessionReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConne SF:ction:\x20close\r\n\r\n")%r(TerminalServerCookie,2F,"HTTP/1\.1\x20400\x SF:20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(TLSSessionReq,2F," SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r( SF:Kerberos,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close SF:\r\n\r\n")%r(SMBProgNeg,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConne SF:ction:\x20close\r\n\r\n")%r(X11Probe,2F,"HTTP/1\.1\x20400\x20Bad\x20Req SF:uest\r\nConnection:\x20close\r\n\r\n")%r(LPDString,2F,"HTTP/1\.1\x20400 SF:\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")%r(LDAPSearchReq,2F SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\n\r\n")% SF:r(LDAPBindReq,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20 SF:close\r\n\r\n")%r(SIPOptions,2F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n SF:Connection:\x20close\r\n\r\n"); Aggressive OS guesses: Linux 3.2 - 4.9 (96%), Linux 2.6.32 - 3.10 (96%), Linux 5.3 - 5.4 (96%), Linux 3.2 (95%), Linux 3.1 (95%), Sony X75CH-series Android TV (Android 5.0) (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), Symantec Web Gateway 5.2.0.361 (Linux 2.6) (94%), Linux 3.8 (94%), Linux 2.6.32 - 3.5 (94%) No exact OS matches for host (test conditions non-ideal). Network Distance: 15 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.64 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.90 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 0.83 ms be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102) 6 0.90 ms telia.lax05.atlas.cogentco.com (154.54.10.10) 7 0.69 ms lax-bb1-link.ip.twelve99.net (62.115.137.62) 8 69.05 ms dls-bb1-link.ip.twelve99.net (62.115.140.237) 9 68.34 ms atl-b24-link.ip.twelve99.net (62.115.116.213) 10 72.22 ms atl-bb1-link.ip.twelve99.net (62.115.137.54) 11 57.28 ms ash-bb2-link.ip.twelve99.net (62.115.137.132) 12 65.69 ms allusonline-ic-387036.ip.twelve99-cust.net (62.115.11.173) 13 66.44 ms ewr-b1-link.ip.twelve99.net (62.115.126.179) 14 70.62 ms allusonline-ic-387036.ip.twelve99-cust.net (62.115.11.173) 15 65.43 ms 8.2.110.240 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 51.28 seconds