Puertos
Duración
Fecha
IP
Nmap scan report for euem.apm.bcbssc.com (208.60.144.14) Host is up (0.058s latency). Not shown: 994 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp closed ssh 80/tcp closed http 443/tcp open ssl/https | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 404 Not Found | Date: Sat, 17 Feb 2024 00:10:24 GMT | AppD-Request-Id: c3dda072a8d925ed | Content-Type: application/json | X-Content-Type-Options: nosniff | Content-Length: 43 | {"code":404,"message":"HTTP 404 Not Found"} | GetRequest: | HTTP/1.1 404 Not Found | Date: Sat, 17 Feb 2024 00:10:23 GMT | AppD-Request-Id: 4b8467cc4b248ac0 | Content-Type: application/json | X-Content-Type-Options: nosniff | Content-Length: 43 | {"code":404,"message":"HTTP 404 Not Found"} | HTTPOptions: | HTTP/1.1 404 Not Found | Date: Sat, 17 Feb 2024 00:10:23 GMT | AppD-Request-Id: f4d76c9eb4ccb539 | Content-Type: application/json | X-Content-Type-Options: nosniff | Content-Length: 43 | {"code":404,"message":"HTTP 404 Not Found"} | RTSPRequest, SIPOptions: | HTTP/1.1 400 Unknown Version | Content-Type: text/html;charset=iso-8859-1 | Content-Length: 58 | Connection: close | <h1>Bad Message 400</h1><pre>reason: Unknown Version</pre> | TerminalServerCookie: | HTTP/1.1 400 Illegal character CNTL=0x3 | Content-Type: text/html;charset=iso-8859-1 | Content-Length: 69 | Connection: close |_ <h1>Bad Message 400</h1><pre>reason: Illegal character CNTL=0x3</pre> |_ssl-date: TLS randomness does not represent time |_http-title: Site doesn't have a title (application/json). | ssl-cert: Subject: commonName=euem.apm.bcbssc.com/organizationName=Blue Cross and Blue Shield of South Carolina/stateOrProvinceName=South Carolina/countryName=US | Subject Alternative Name: DNS:euem.apm.bcbssc.com | Not valid before: 2023-11-20T00:00:00 |_Not valid after: 2024-12-06T23:59:59 8080/tcp closed http-proxy 8081/tcp closed blackice-icecap 8443/tcp closed https-alt 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=2/16%Time=65CFF96F%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,E2,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Sat, SF:\x2017\x20Feb\x202024\x2000:10:23\x20GMT\r\nAppD-Request-Id:\x204b8467c SF:c4b248ac0\r\nContent-Type:\x20application/json\r\nX-Content-Type-Option SF:s:\x20nosniff\r\nContent-Length:\x2043\r\n\r\n{\"code\":404,\"message\" SF::\"HTTP\x20404\x20Not\x20Found\"}")%r(HTTPOptions,E2,"HTTP/1\.1\x20404\ SF:x20Not\x20Found\r\nDate:\x20Sat,\x2017\x20Feb\x202024\x2000:10:23\x20GM SF:T\r\nAppD-Request-Id:\x20f4d76c9eb4ccb539\r\nContent-Type:\x20applicati SF:on/json\r\nX-Content-Type-Options:\x20nosniff\r\nContent-Length:\x2043\ SF:r\n\r\n{\"code\":404,\"message\":\"HTTP\x20404\x20Not\x20Found\"}")%r(F SF:ourOhFourRequest,E2,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Sat,\ SF:x2017\x20Feb\x202024\x2000:10:24\x20GMT\r\nAppD-Request-Id:\x20c3dda072 SF:a8d925ed\r\nContent-Type:\x20application/json\r\nX-Content-Type-Options SF::\x20nosniff\r\nContent-Length:\x2043\r\n\r\n{\"code\":404,\"message\": SF:\"HTTP\x20404\x20Not\x20Found\"}")%r(RTSPRequest,AD,"HTTP/1\.1\x20400\x SF:20Unknown\x20Version\r\nContent-Type:\x20text/html;charset=iso-8859-1\r SF:\nContent-Length:\x2058\r\nConnection:\x20close\r\n\r\n<h1>Bad\x20Messa SF:ge\x20400</h1><pre>reason:\x20Unknown\x20Version</pre>")%r(TerminalServ SF:erCookie,C3,"HTTP/1\.1\x20400\x20Illegal\x20character\x20CNTL=0x3\r\nCo SF:ntent-Type:\x20text/html;charset=iso-8859-1\r\nContent-Length:\x2069\r\ SF:nConnection:\x20close\r\n\r\n<h1>Bad\x20Message\x20400</h1><pre>reason: SF:\x20Illegal\x20character\x20CNTL=0x3</pre>")%r(SIPOptions,AD,"HTTP/1\.1 SF:\x20400\x20Unknown\x20Version\r\nContent-Type:\x20text/html;charset=iso SF:-8859-1\r\nContent-Length:\x2058\r\nConnection:\x20close\r\n\r\n<h1>Bad SF:\x20Message\x20400</h1><pre>reason:\x20Unknown\x20Version</pre>"); Device type: WAP|router|switch Running (JUST GUESSING): Linksys embedded (88%), Cisco IOS 12.X|15.X (86%) OS CPE: cpe:/h:linksys:befw11s4 cpe:/o:cisco:ios:12.4 cpe:/h:cisco:catalyst_2960 cpe:/o:cisco:ios:12.2 cpe:/h:cisco:880_router cpe:/o:cisco:ios:15.0 Aggressive OS guesses: Linksys BEFW11S4 WAP (88%), Cisco 3925 router (IOS 12.4) (86%), Cisco C2960 switch (IOS 12.2) (86%), Cisco 880 router (IOS 15.0) or 3750 switch (IOS 12.2) (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 18 hops TRACEROUTE (using port 22/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.60 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.67 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.99 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57) 5 0.69 ms be3359.ccr41.lax05.atlas.cogentco.com (154.54.3.70) 6 1.57 ms 192.205.37.29 7 ... 11 12 57.58 ms 32.130.24.137 13 55.39 ms 12.123.138.117 14 60.57 ms 12.90.192.210 15 60.14 ms 12.11.59.18 16 ... 17 58.26 ms f208-83-151-239.bcbssc.com (208.83.151.239) 18 57.54 ms 208.60.144.14 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 156.64 seconds