Ports
Durée
Date
IP
Nmap scan report for nysiis-qa.health.state.ny.us (150.142.196.9) Host is up (0.075s latency). Not shown: 999 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 443/tcp open ssl/https | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.0 302 Processed | X-Backside-Transport: FAIL FAIL | Location: https:///hcs/index.html | Pragma: no-cache | Expires: -1 | Cache-Control: max-age=0, no-cache, no-store | X-Frame-Options: SAMEORIGIN | Content-Security-Policy: frame-ancestors 'self'; | Connection: close | Content-Length: 0 | Strict-Transport-Security: max-age=31536000 | RTSPRequest: | HTTP/1.1 400 Invalid Request | Date: Mon, 01 Apr 2024 22:43:43 GMT | X-Frame-Options: SAMEORIGIN | X-XSS-Protection: 1; mode=block | X-Content-Type-Options: nosniff | Connection: close | Content-Length: 87 | Content-Type: text/html | <html><head><title>400 Invalid Request</title></head><body>Invalid Request: ??</body> | SIPOptions: | HTTP/1.1 400 Invalid Request | Date: Mon, 01 Apr 2024 22:44:54 GMT | X-Frame-Options: SAMEORIGIN | X-XSS-Protection: 1; mode=block | X-Content-Type-Options: nosniff | Connection: close | Content-Length: 87 | Content-Type: text/html |_ <html><head><title>400 Invalid Request</title></head><body>Invalid Request: ??</body> | http-title: Submit Form |_Requested resource was /relogin?dest=/ |_http-trane-info: Problem with XML parsing of /evox/about | ssl-cert: Subject: commonName=*.health.ny.gov/organizationName=New York State Department of Health/stateOrProvinceName=New York/countryName=US | Subject Alternative Name: DNS:*.health.ny.gov, DNS:*.health.state.ny.us, DNS:health.ny.gov, DNS:health.state.ny.us | Not valid before: 2023-08-08T00:00:00 |_Not valid after: 2024-09-07T23:59:59 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=4/1%Time=660B38C8%P=x86_64-redhat-linux- SF:gnu%r(GetRequest,14D,"HTTP/1\.0\x20302\x20Processed\r\nX-Backside-Trans SF:port:\x20FAIL\x20FAIL\r\nLocation:\x20https:///hcs/index\.html\r\nPragm SF:a:\x20no-cache\r\nExpires:\x20-1\r\nCache-Control:\x20max-age=0,\x20no- SF:cache,\x20no-store\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Securit SF:y-Policy:\x20frame-ancestors\x20'self';\r\nConnection:\x20close\r\nCont SF:ent-Length:\x200\r\nStrict-Transport-Security:\x20max-age=31536000\r\n\ SF:r\n")%r(HTTPOptions,14D,"HTTP/1\.0\x20302\x20Processed\r\nX-Backside-Tr SF:ansport:\x20FAIL\x20FAIL\r\nLocation:\x20https:///hcs/index\.html\r\nPr SF:agma:\x20no-cache\r\nExpires:\x20-1\r\nCache-Control:\x20max-age=0,\x20 SF:no-cache,\x20no-store\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Secu SF:rity-Policy:\x20frame-ancestors\x20'self';\r\nConnection:\x20close\r\nC SF:ontent-Length:\x200\r\nStrict-Transport-Security:\x20max-age=31536000\r SF:\n\r\n")%r(FourOhFourRequest,14D,"HTTP/1\.0\x20302\x20Processed\r\nX-Ba SF:ckside-Transport:\x20FAIL\x20FAIL\r\nLocation:\x20https:///hcs/index\.h SF:tml\r\nPragma:\x20no-cache\r\nExpires:\x20-1\r\nCache-Control:\x20max-a SF:ge=0,\x20no-cache,\x20no-store\r\nX-Frame-Options:\x20SAMEORIGIN\r\nCon SF:tent-Security-Policy:\x20frame-ancestors\x20'self';\r\nConnection:\x20c SF:lose\r\nContent-Length:\x200\r\nStrict-Transport-Security:\x20max-age=3 SF:1536000\r\n\r\n")%r(RTSPRequest,13B,"HTTP/1\.1\x20400\x20Invalid\x20Req SF:uest\r\nDate:\x20Mon,\x2001\x20Apr\x202024\x2022:43:43\x20GMT\r\nX-Fram SF:e-Options:\x20SAMEORIGIN\r\nX-XSS-Protection:\x201;\x20mode=block\r\nX- SF:Content-Type-Options:\x20nosniff\r\nConnection:\x20close\r\nContent-Len SF:gth:\x2087\r\nContent-Type:\x20text/html\r\n\r\n<html><head><title>400\ SF:x20Invalid\x20Request</title></head><body>Invalid\x20Request:\x20\?\?</ SF:body>\r\n")%r(SIPOptions,13B,"HTTP/1\.1\x20400\x20Invalid\x20Request\r\ SF:nDate:\x20Mon,\x2001\x20Apr\x202024\x2022:44:54\x20GMT\r\nX-Frame-Optio SF:ns:\x20SAMEORIGIN\r\nX-XSS-Protection:\x201;\x20mode=block\r\nX-Content SF:-Type-Options:\x20nosniff\r\nConnection:\x20close\r\nContent-Length:\x2 SF:087\r\nContent-Type:\x20text/html\r\n\r\n<html><head><title>400\x20Inva SF:lid\x20Request</title></head><body>Invalid\x20Request:\x20\?\?</body>\r SF:\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: firewall Running (JUST GUESSING): Palo Alto embedded (86%) OS CPE: cpe:/h:paloalto:pa-500 Aggressive OS guesses: Palo Alto PA-500 firewall (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 14 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 131.99 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.55 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.89 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 2.99 ms port-channel1.core3.lax2.he.net (184.105.223.225) 6 ... 7 66.89 ms port-channel9.core2.nyc5.he.net (184.105.213.218) 8 ... 9 66.22 ms 100ge0-36.core1.ewr2.he.net (184.104.196.82) 10 75.09 ms firstlight-fiber.e0-49.switch1.ewr2.he.net (209.51.161.118) 11 74.66 ms be24.albynypscr1.ip.firstlight.net (66.152.97.42) 12 74.87 ms be1.albynypser2.ip.firstlight.net (66.109.52.58) 13 73.69 ms 216-107-192-102.static.firstlight.net (216.107.192.102) 14 73.88 ms 150.142.196.9 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 167.87 seconds