Ports
Durée
Date
IP
Nmap scan report for 20844000p.rfihub.com (198.8.71.131) Host is up (0.021s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | FourOhFourRequest, GetRequest: | HTTP/1.1 404 Not Found | P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" | Cache-Control: must-revalidate,no-cache,no-store | Content-Type: text/html;charset=iso-8859-1 | Content-Length: 153 | <html> | <head> | <meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"/> | </head> | <body> <!-- Error: 404 | Found --></body> | </html> | HTTPOptions: | HTTP/1.1 200 OK | Date: Wed, 04 Sep 2024 14:46:55 GMT | P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" | Allow: GET, HEAD, TRACE, OPTIONS | RTSPRequest, SIPOptions: | HTTP/1.1 505 Unknown Version | Content-Type: text/html;charset=iso-8859-1 | Content-Length: 58 | Connection: close | <h1>Bad Message 505</h1><pre>reason: Unknown Version</pre> | TerminalServerCookie: | HTTP/1.1 400 Illegal character CNTL=0x3 | Content-Type: text/html;charset=iso-8859-1 | Content-Length: 69 | Connection: close |_ <h1>Bad Message 400</h1><pre>reason: Illegal character CNTL=0x3</pre> | http-robots.txt: 1 disallowed entry |_/ | http-methods: |_ Potentially risky methods: TRACE |_http-title: Site doesn't have a title (text/html;charset=iso-8859-1). 443/tcp open ssl/http Jetty 9.4.51.v20230217 | http-robots.txt: 1 disallowed entry |_/ |_ssl-date: TLS randomness does not represent time |_http-server-header: Jetty(9.4.51.v20230217) | ssl-cert: Subject: commonName=*.rfihub.com | Subject Alternative Name: DNS:*.rfihub.com, DNS:rfihub.com | Not valid before: 2024-04-08T00:00:00 |_Not valid after: 2025-04-27T23:59:59 | http-methods: |_ Potentially risky methods: TRACE |_http-title: Site doesn't have a title (text/html;charset=iso-8859-1). 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.92%I=7%D=9/4%Time=66D872E0%P=x86_64-redhat-linux-gnu%r(G SF:etRequest,165,"HTTP/1\.1\x20404\x20Not\x20Found\r\nP3P:\x20CP=\"NOI\x20 SF:CURa\x20ADMa\x20DEVa\x20TAIa\x20OUR\x20BUS\x20IND\x20UNI\x20COM\x20NAV\ SF:x20INT\"\r\nCache-Control:\x20must-revalidate,no-cache,no-store\r\nCont SF:ent-Type:\x20text/html;charset=iso-8859-1\r\nContent-Length:\x20153\r\n SF:\r\n<html>\x20\n<head>\x20\n<meta\x20http-equiv=\"Content-Type\"\x20con SF:tent=\"text/html;\x20charset=ISO-8859-1\"/>\x20\n</head>\x20\n<body>\x2 SF:0<!--\x20Error:\x20404\nNot\x20Found\x20--></body>\x20\n</html>\x20")%r SF:(HTTPOptions,99,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Wed,\x2004\x20Sep\x SF:202024\x2014:46:55\x20GMT\r\nP3P:\x20CP=\"NOI\x20CURa\x20ADMa\x20DEVa\x SF:20TAIa\x20OUR\x20BUS\x20IND\x20UNI\x20COM\x20NAV\x20INT\"\r\nAllow:\x20 SF:GET,\x20HEAD,\x20TRACE,\x20OPTIONS\r\n\r\n")%r(RTSPRequest,AD,"HTTP/1\. SF:1\x20505\x20Unknown\x20Version\r\nContent-Type:\x20text/html;charset=is SF:o-8859-1\r\nContent-Length:\x2058\r\nConnection:\x20close\r\n\r\n<h1>Ba SF:d\x20Message\x20505</h1><pre>reason:\x20Unknown\x20Version</pre>")%r(Fo SF:urOhFourRequest,165,"HTTP/1\.1\x20404\x20Not\x20Found\r\nP3P:\x20CP=\"N SF:OI\x20CURa\x20ADMa\x20DEVa\x20TAIa\x20OUR\x20BUS\x20IND\x20UNI\x20COM\x SF:20NAV\x20INT\"\r\nCache-Control:\x20must-revalidate,no-cache,no-store\r SF:\nContent-Type:\x20text/html;charset=iso-8859-1\r\nContent-Length:\x201 SF:53\r\n\r\n<html>\x20\n<head>\x20\n<meta\x20http-equiv=\"Content-Type\"\ SF:x20content=\"text/html;\x20charset=ISO-8859-1\"/>\x20\n</head>\x20\n<bo SF:dy>\x20<!--\x20Error:\x20404\nNot\x20Found\x20--></body>\x20\n</html>\x SF:20")%r(TerminalServerCookie,C3,"HTTP/1\.1\x20400\x20Illegal\x20characte SF:r\x20CNTL=0x3\r\nContent-Type:\x20text/html;charset=iso-8859-1\r\nConte SF:nt-Length:\x2069\r\nConnection:\x20close\r\n\r\n<h1>Bad\x20Message\x204 SF:00</h1><pre>reason:\x20Illegal\x20character\x20CNTL=0x3</pre>")%r(SIPOp SF:tions,AD,"HTTP/1\.1\x20505\x20Unknown\x20Version\r\nContent-Type:\x20te SF:xt/html;charset=iso-8859-1\r\nContent-Length:\x2058\r\nConnection:\x20c SF:lose\r\n\r\n<h1>Bad\x20Message\x20505</h1><pre>reason:\x20Unknown\x20Ve SF:rsion</pre>"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 8 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.71 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.75 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.52 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 1.43 ms ae-0.gtt.lsanca07.us.bb.gin.ntt.net (129.250.9.106) 6 12.60 ms ae28.cr2-sjc1.ip4.gtt.net (89.149.136.149) 7 12.68 ms ip4.gtt.net (69.174.3.190) 8 12.57 ms 198.8.71.131 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 152.61 seconds