Nmap scan report for deutschlandcard01.wt-eu02.net (185.54.150.20) Host is up (0.15s latency). Not shown: 998 closed tcp ports (reset) PORT STATE SERVICE VERSION 80/tcp open http c81e728d |_http-title: Site doesn't have a title. | http-robots.txt: 1 disallowed entry |_/ | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 404 | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:36:59 GMT | Connection: close | Server: c81e728d | Set-Cookie: ; SameSite=Lax | GetRequest: | HTTP/1.1 404 | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:36:53 GMT | Connection: close | Server: c81e728d | Set-Cookie: ; SameSite=Lax | HTTPOptions: | HTTP/1.1 200 | Allow: GET, HEAD, POST, OPTIONS | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:36:53 GMT | Connection: close | Server: c81e728d | Set-Cookie: ; SameSite=Lax | RTSPRequest: | HTTP/1.1 400 | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:36:53 GMT | Connection: close | Server: c81e728d | Set-Cookie: ; SameSite=Lax | SIPOptions: | HTTP/1.1 400 | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:38:04 GMT | Connection: close | Server: c81e728d | Set-Cookie: ; SameSite=Lax | TerminalServerCookie: | HTTP/1.1 400 | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:37:32 GMT | Connection: close | Server: c81e728d |_ Set-Cookie: ; SameSite=Lax | http-server-header: | a87ff679 |_ c81e728d 443/tcp open ssl/https eccbc87e |_http-title: Site doesn't have a title. | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 404 | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:37:01 GMT | Connection: close | Server: eccbc87e | Set-Cookie: ; SameSite=None | GetRequest: | HTTP/1.1 404 | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:36:59 GMT | Connection: close | Server: eccbc87e | Set-Cookie: ; SameSite=None | HTTPOptions: | HTTP/1.1 200 | Allow: GET, HEAD, POST, OPTIONS | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:37:00 GMT | Connection: close | Server: eccbc87e | Set-Cookie: ; SameSite=None | RTSPRequest: | HTTP/1.1 400 | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:37:12 GMT | Connection: close | Server: eccbc87e | Set-Cookie: ; SameSite=None | SIPOptions: | HTTP/1.1 400 | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:38:19 GMT | Connection: close | Server: eccbc87e | Set-Cookie: ; SameSite=None | TerminalServerCookie: | HTTP/1.1 400 | Content-Length: 0 | Date: Wed, 16 Apr 2025 11:37:41 GMT | Connection: close | Server: eccbc87e |_ Set-Cookie: ; SameSite=None | http-robots.txt: 1 disallowed entry |_/ | ssl-cert: Subject: commonName=*.wt-eu02.net | Subject Alternative Name: DNS:*.wt-eu02.net, DNS:wt-eu02.net | Not valid before: 2025-01-27T00:00:00 |_Not valid after: 2026-01-26T23:59:59 | http-server-header: | d3d94468 |_ eccbc87e 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=4/16%Time=67FF9654%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,8A,"HTTP/1\.1\x20404\x20\r\nContent-Length:\x200\r\nDate:\x2 SF:0Wed,\x2016\x20Apr\x202025\x2011:36:53\x20GMT\r\nConnection:\x20close\r SF:\nServer:\x20c81e728d\r\nSet-Cookie:\x20;\x20SameSite=Lax\r\n\r\n")%r(H SF:TTPOptions,AB,"HTTP/1\.1\x20200\x20\r\nAllow:\x20GET,\x20HEAD,\x20POST, SF:\x20OPTIONS\r\nContent-Length:\x200\r\nDate:\x20Wed,\x2016\x20Apr\x2020 SF:25\x2011:36:53\x20GMT\r\nConnection:\x20close\r\nServer:\x20c81e728d\r\ SF:nSet-Cookie:\x20;\x20SameSite=Lax\r\n\r\n")%r(RTSPRequest,8A,"HTTP/1\.1 SF:\x20400\x20\r\nContent-Length:\x200\r\nDate:\x20Wed,\x2016\x20Apr\x2020 SF:25\x2011:36:53\x20GMT\r\nConnection:\x20close\r\nServer:\x20c81e728d\r\ SF:nSet-Cookie:\x20;\x20SameSite=Lax\r\n\r\n")%r(FourOhFourRequest,8A,"HTT SF:P/1\.1\x20404\x20\r\nContent-Length:\x200\r\nDate:\x20Wed,\x2016\x20Apr SF:\x202025\x2011:36:59\x20GMT\r\nConnection:\x20close\r\nServer:\x20c81e7 SF:28d\r\nSet-Cookie:\x20;\x20SameSite=Lax\r\n\r\n")%r(TerminalServerCooki SF:e,8A,"HTTP/1\.1\x20400\x20\r\nContent-Length:\x200\r\nDate:\x20Wed,\x20 SF:16\x20Apr\x202025\x2011:37:32\x20GMT\r\nConnection:\x20close\r\nServer: SF:\x20c81e728d\r\nSet-Cookie:\x20;\x20SameSite=Lax\r\n\r\n")%r(SIPOptions SF:,8A,"HTTP/1\.1\x20400\x20\r\nContent-Length:\x200\r\nDate:\x20Wed,\x201 SF:6\x20Apr\x202025\x2011:38:04\x20GMT\r\nConnection:\x20close\r\nServer:\ SF:x20c81e728d\r\nSet-Cookie:\x20;\x20SameSite=Lax\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=4/16%Time=67FF965B%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,8B,"HTTP/1\.1\x20404\x20\r\nContent-Length:\x200\r\nD SF:ate:\x20Wed,\x2016\x20Apr\x202025\x2011:36:59\x20GMT\r\nConnection:\x20 SF:close\r\nServer:\x20eccbc87e\r\nSet-Cookie:\x20;\x20SameSite=None\r\n\r SF:\n")%r(HTTPOptions,AC,"HTTP/1\.1\x20200\x20\r\nAllow:\x20GET,\x20HEAD,\ SF:x20POST,\x20OPTIONS\r\nContent-Length:\x200\r\nDate:\x20Wed,\x2016\x20A SF:pr\x202025\x2011:37:00\x20GMT\r\nConnection:\x20close\r\nServer:\x20ecc SF:bc87e\r\nSet-Cookie:\x20;\x20SameSite=None\r\n\r\n")%r(FourOhFourReques SF:t,8B,"HTTP/1\.1\x20404\x20\r\nContent-Length:\x200\r\nDate:\x20Wed,\x20 SF:16\x20Apr\x202025\x2011:37:01\x20GMT\r\nConnection:\x20close\r\nServer: SF:\x20eccbc87e\r\nSet-Cookie:\x20;\x20SameSite=None\r\n\r\n")%r(RTSPReque SF:st,8B,"HTTP/1\.1\x20400\x20\r\nContent-Length:\x200\r\nDate:\x20Wed,\x2 SF:016\x20Apr\x202025\x2011:37:12\x20GMT\r\nConnection:\x20close\r\nServer SF::\x20eccbc87e\r\nSet-Cookie:\x20;\x20SameSite=None\r\n\r\n")%r(Terminal SF:ServerCookie,8B,"HTTP/1\.1\x20400\x20\r\nContent-Length:\x200\r\nDate:\ SF:x20Wed,\x2016\x20Apr\x202025\x2011:37:41\x20GMT\r\nConnection:\x20close SF:\r\nServer:\x20eccbc87e\r\nSet-Cookie:\x20;\x20SameSite=None\r\n\r\n")% SF:r(SIPOptions,8B,"HTTP/1\.1\x20400\x20\r\nContent-Length:\x200\r\nDate:\ SF:x20Wed,\x2016\x20Apr\x202025\x2011:38:19\x20GMT\r\nConnection:\x20close SF:\r\nServer:\x20eccbc87e\r\nSet-Cookie:\x20;\x20SameSite=None\r\n\r\n"); Device type: load balancer|firewall Running (JUST GUESSING): F5 Networks TMOS 11.6.X|11.4.X (95%), F5 Networks embedded (86%) OS CPE: cpe:/o:f5:tmos:11.6 cpe:/o:f5:tmos:11.4 Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (95%), F5 BIG-IP AFM firewall (93%), F5 BIG-IP load balancer (TMOS 11.4) (90%), F5 BIG-IP 3650 Local Traffic Manager load balancer (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 16 hops TRACEROUTE (using port 1720/tcp) HOP RTT ADDRESS 1 0.40 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.73 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 0.90 ms be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102) 6 0.69 ms lax-b22-link.ip.twelve99.net (80.239.160.64) 7 58.00 ms ash-bb2-link.ip.twelve99.net (62.115.121.221) 8 ... 9 10 146.08 ms ffm-b16-link.ip.twelve99.net (62.115.132.229) 11 155.15 ms wiit-ic-383474.ip.twelve99-cust.net (213.248.73.187) 12 144.24 ms lag0-vl6.core1-fra-ix.bb.wiit.network (89.163.136.206) 13 155.19 ms lag0-vl1001.core1-nbg-ncd.bb.wiit.network (85.14.244.114) 14 ... 15 16 155.42 ms 185.54.150.20 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 180.13 seconds