Puertos
Duración
Fecha
IP
Nmap scan report for tryhackme.com (172.67.27.10) Host is up (0.00087s latency). Other addresses for tryhackme.com (not scanned): 2606:4700:10::6816:37e4 2606:4700:10::ac43:1b0a 2606:4700:10::6816:36e4 104.22.54.228 104.22.55.228 Not shown: 996 filtered ports PORT STATE SERVICE VERSION 80/tcp open http cloudflare | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 21:32:44 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb709a93d8e0910-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 21:32:44 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb709a908fb7d6e-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 21:32:44 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb709a91c0c7cf1-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:49 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:44 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> |_ </html> |_http-server-header: cloudflare |_http-title: Did not follow redirect to https://tryhackme.com/ 443/tcp open ssl/https cloudflare | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 403 Forbidden | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:50 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | CF-RAY: 7eb709cf6f5a08de-LAX | <html> | <head><title>403 Forbidden</title></head> | <body> | <center><h1>403 Forbidden</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | GetRequest: | HTTP/1.1 403 Forbidden | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:50 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | CF-RAY: 7eb709cebe441039-LAX | <html> | <head><title>403 Forbidden</title></head> | <body> | <center><h1>403 Forbidden</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | HTTPOptions: | HTTP/1.1 403 Forbidden | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:50 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | CF-RAY: 7eb709cf196408c6-LAX | <html> | <head><title>403 Forbidden</title></head> | <body> | <center><h1>403 Forbidden</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:55 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:50 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> |_ </html> | http-robots.txt: 2 disallowed entries |_/api/* /voucher/stats/* |_http-server-header: cloudflare |_http-title: TryHackMe | Cyber Security Training |_http-trane-info: Problem with XML parsing of /evox/about | ssl-cert: Subject: commonName=tryhackme.com | Subject Alternative Name: DNS:*.tryhackme.com, DNS:tryhackme.com | Not valid before: 2023-05-25T21:41:30 |_Not valid after: 2023-08-23T21:41:29 8080/tcp open http-proxy cloudflare | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 21:32:44 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb709a93bf8dbd1-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 21:32:44 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb709a909c10fe9-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Sun, 23 Jul 2023 21:32:44 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | Server: cloudflare | CF-RAY: 7eb709a92fed2b5a-LAX | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | Socks4, Socks5: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:44 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> |_ </html> |_http-server-header: cloudflare |_http-title: Did not follow redirect to https://tryhackme.com/ 8443/tcp open ssl/https-alt cloudflare | fingerprint-strings: | DNSVersionBindReqTCP, RPCCheck: | HTTP/1.1 400 Bad Request | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:55 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | CF-RAY: - | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | FourOhFourRequest: | HTTP/1.1 403 Forbidden | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:50 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | CF-RAY: 7eb709cf6b0614f2-LAX | <html> | <head><title>403 Forbidden</title></head> | <body> | <center><h1>403 Forbidden</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | GetRequest: | HTTP/1.1 403 Forbidden | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:50 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | CF-RAY: 7eb709cebdce0924-LAX | <html> | <head><title>403 Forbidden</title></head> | <body> | <center><h1>403 Forbidden</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | HTTPOptions: | HTTP/1.1 403 Forbidden | Server: cloudflare | Date: Sun, 23 Jul 2023 21:32:50 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | CF-RAY: 7eb709cf1fad100c-LAX | <html> | <head><title>403 Forbidden</title></head> | <body> | <center><h1>403 Forbidden</h1></center> | <hr><center>cloudflare</center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center>cloudflare</center> | </body> |_ </html> |_http-server-header: cloudflare |_http-title: 400 The plain HTTP request was sent to HTTPS port | ssl-cert: Subject: commonName=tryhackme.com | Subject Alternative Name: DNS:*.tryhackme.com, DNS:tryhackme.com | Not valid before: 2023-05-25T21:41:30 |_Not valid after: 2023-08-23T21:41:29 4 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=7/23%Time=64BD9C7C%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x20 SF:23\x20Jul\x202023\x2021:32:44\x20GMT\r\nContent-Type:\x20text/html\r\nC SF:ontent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x20cloudflare\ SF:r\nCF-RAY:\x207eb709a908fb7d6e-LAX\r\n\r\n<html>\r\n<head><title>400\x2 SF:0Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20R SF:equest</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n< SF:/html>\r\n")%r(HTTPOptions,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nD SF:ate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:44\x20GMT\r\nContent-Type:\x SF:20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServer SF::\x20cloudflare\r\nCF-RAY:\x207eb709a91c0c7cf1-LAX\r\n\r\n<html>\r\n<he SF:ad><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1 SF:>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center> SF:\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>4 SF:00\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad SF:\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body> SF:\r\n</html>\r\n")%r(X11Probe,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:nServer:\x20cloudflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:4 SF:4\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nCon SF:nection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20 SF:Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Re SF:quest</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</ SF:html>\r\n")%r(FourOhFourRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request SF:\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:44\x20GMT\r\nContent-Ty SF:pe:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nS SF:erver:\x20cloudflare\r\nCF-RAY:\x207eb709a93d8e0910-LAX\r\n\r\n<html>\r SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cente SF:r><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</ce SF:nter>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,13C,"HTTP/1\.1\x20400\x20B SF:ad\x20Request\r\nServer:\x20cloudflare\r\nDate:\x20Sun,\x2023\x20Jul\x2 SF:02023\x2021:32:49\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Lengt SF:h:\x20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<hea SF:d><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1> SF:400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\ SF:r\n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=7/23%Time=64BD9C82%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20clou SF:dflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:50\x20GMT\r\nCont SF:ent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20clos SF:e\r\nCF-RAY:\x207eb709cebe441039-LAX\r\n\r\n<html>\r\n<head><title>403\ SF:x20Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden</ SF:h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r SF:\n")%r(HTTPOptions,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20clo SF:udflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:50\x20GMT\r\nCon SF:tent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20clo SF:se\r\nCF-RAY:\x207eb709cf196408c6-LAX\r\n\r\n<html>\r\n<head><title>403 SF:\x20Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden< SF:/h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\ SF:r\n")%r(FourOhFourRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer: SF:\x20cloudflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:50\x20GMT SF:\r\nContent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection: SF:\x20close\r\nCF-RAY:\x207eb709cf6f5a08de-LAX\r\n\r\n<html>\r\n<head><ti SF:tle>403\x20Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20For SF:bidden</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n< SF:/html>\r\n")%r(tor-versions,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n SF:Server:\x20cloudflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:50 SF:\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConn SF:ection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20B SF:ad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Req SF:uest</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</h SF:tml>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>400\x20Bad\x20Reque SF:st</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></ SF:center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n")% SF:r(RPCCheck,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20cloudf SF:lare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:55\x20GMT\r\nConten SF:t-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\ SF:r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</ti SF:tle></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center SF:>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8080-TCP:V=7.70%I=7%D=7/23%Time=64BD9C7C%P=x86_64-redhat-linux-gnu% SF:r(GetRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x SF:2023\x20Jul\x202023\x2021:32:44\x20GMT\r\nContent-Type:\x20text/html\r\ SF:nContent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x20cloudflar SF:e\r\nCF-RAY:\x207eb709a909c10fe9-LAX\r\n\r\n<html>\r\n<head><title>400\ SF:x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x2 SF:0Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\ SF:n</html>\r\n")%r(HTTPOptions,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:44\x20GMT\r\nContent-Type: SF:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServ SF:er:\x20cloudflare\r\nCF-RAY:\x207eb709a92fed2b5a-LAX\r\n\r\n<html>\r\n< SF:head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center>< SF:h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</cente SF:r>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title SF:>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20B SF:ad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\n</bod SF:y>\r\n</html>\r\n")%r(FourOhFourRequest,14F,"HTTP/1\.1\x20400\x20Bad\x2 SF:0Request\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:44\x20GMT\r\nCo SF:ntent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20cl SF:ose\r\nServer:\x20cloudflare\r\nCF-RAY:\x207eb709a93bf8dbd1-LAX\r\n\r\n SF:<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r SF:\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudf SF:lare</center>\r\n</body>\r\n</html>\r\n")%r(Socks5,13C,"HTTP/1\.1\x2040 SF:0\x20Bad\x20Request\r\nServer:\x20cloudflare\r\nDate:\x20Sun,\x2023\x20 SF:Jul\x202023\x2021:32:44\x20GMT\r\nContent-Type:\x20text/html\r\nContent SF:-Length:\x20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cente SF:r><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</ce SF:nter>\r\n</body>\r\n</html>\r\n")%r(Socks4,13C,"HTTP/1\.1\x20400\x20Bad SF:\x20Request\r\nServer:\x20cloudflare\r\nDate:\x20Sun,\x2023\x20Jul\x202 SF:023\x2021:32:44\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length: SF:\x20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head> SF:<title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>40 SF:0\x20Bad\x20Request</h1></center>\r\n<hr><center>cloudflare</center>\r\ SF:n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8443-TCP:V=7.70%T=SSL%I=7%D=7/23%Time=64BD9C82%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20clo SF:udflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:50\x20GMT\r\nCon SF:tent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20clo SF:se\r\nCF-RAY:\x207eb709cebdce0924-LAX\r\n\r\n<html>\r\n<head><title>403 SF:\x20Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden< SF:/h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\ SF:r\n")%r(HTTPOptions,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cl SF:oudflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:50\x20GMT\r\nCo SF:ntent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20cl SF:ose\r\nCF-RAY:\x207eb709cf1fad100c-LAX\r\n\r\n<html>\r\n<head><title>40 SF:3\x20Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden SF:</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html> SF:\r\n")%r(FourOhFourRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer SF::\x20cloudflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:50\x20GM SF:T\r\nContent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection SF::\x20close\r\nCF-RAY:\x207eb709cf6b0614f2-LAX\r\n\r\n<html>\r\n<head><t SF:itle>403\x20Forbidden</title></head>\r\n<body>\r\n<center><h1>403\x20Fo SF:rbidden</h1></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n SF:</html>\r\n")%r(RTSPRequest,9B,"<html>\r\n<head><title>400\x20Bad\x20Re SF:quest</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1 SF:></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n SF:")%r(RPCCheck,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20clo SF:udflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:55\x20GMT\r\nCon SF:tent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20clo SF:se\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request< SF:/title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cen SF:ter>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n")%r(D SF:NSVersionBindReqTCP,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\ SF:x20cloudflare\r\nDate:\x20Sun,\x2023\x20Jul\x202023\x2021:32:55\x20GMT\ SF:r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\ SF:x20close\r\nCF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Re SF:quest</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1 SF:></center>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n SF:"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 3.1 (91%), Linux 3.2 (91%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (91%), Crestron XPanel control system (88%), ASUS RT-N56U WAP (Linux 3.4) (88%), Linux 3.16 (88%), Linux 2.6.32 (87%), Linux 4.10 (87%), Vodavi XTS-IP PBX (86%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 8 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.21 ms 208.76.251.177 2 0.65 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.64 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1) 4 1.10 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57) 5 0.91 ms be3359.ccr41.lax05.atlas.cogentco.com (154.54.3.70) 6 1.35 ms 38.104.84.254 7 0.88 ms 172.70.208.2 8 0.77 ms 172.67.27.10 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 119.74 seconds 7.44 seconds