Ports
Durée
Date
IP
Nmap scan report for v10-sr-01-403.five9-wfo.com (147.124.190.5) Host is up (0.047s latency). Not shown: 999 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 443/tcp open ssl/https Unknown |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=*.five9-wfo.com/organizationName=Five9, Inc/stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:*.five9-wfo.com | Not valid before: 2024-05-23T00:00:00 |_Not valid after: 2025-05-22T23:59:59 | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Tue, 10 Sep 2024 16:27:01 GMT | Server: Unknown | X-XSS-Protection: 0 | X-Content-Type-Options: nosniff | Strict-Transport-Security: max-age=31536000; includeSubDomains | Content-Length: 226 | Connection: close | Content-Type: text/html; charset=iso-8859-1 | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | <html><head> | <title>400 Bad Request</title> | </head><body> | <h1>Bad Request</h1> | <p>Your browser sent a request that this server could not understand.<br /> | </p> |_ </body></html> |_http-server-header: Unknown |_http-generator: Microsoft Word 14 (filtered) |_http-title: WFO Secure Web Gateway 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/10%Time=66E07355%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,1FF,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20T SF:ue,\x2010\x20Sep\x202024\x2016:27:01\x20GMT\r\nServer:\x20Unknown\r\nX- SF:XSS-Protection:\x200\r\nX-Content-Type-Options:\x20nosniff\r\nStrict-Tr SF:ansport-Security:\x20max-age=31536000;\x20includeSubDomains\r\nContent- SF:Length:\x20226\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x SF:20charset=iso-8859-1\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//D SF:TD\x20HTML\x202\.0//EN\">\n<html><head>\n<title>400\x20Bad\x20Request</ SF:title>\n</head><body>\n<h1>Bad\x20Request</h1>\n<p>Your\x20browser\x20s SF:ent\x20a\x20request\x20that\x20this\x20server\x20could\x20not\x20unders SF:tand\.<br\x20/>\n</p>\n</body></html>\n")%r(HTTPOptions,1FF,"HTTP/1\.1\ SF:x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2010\x20Sep\x202024\x2016:27 SF::01\x20GMT\r\nServer:\x20Unknown\r\nX-XSS-Protection:\x200\r\nX-Content SF:-Type-Options:\x20nosniff\r\nStrict-Transport-Security:\x20max-age=3153 SF:6000;\x20includeSubDomains\r\nContent-Length:\x20226\r\nConnection:\x20 SF:close\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1\r\n\r\n<!DOC SF:TYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\n<html> SF:<head>\n<title>400\x20Bad\x20Request</title>\n</head><body>\n<h1>Bad\x2 SF:0Request</h1>\n<p>Your\x20browser\x20sent\x20a\x20request\x20that\x20th SF:is\x20server\x20could\x20not\x20understand\.<br\x20/>\n</p>\n</body></h SF:tml>\n")%r(FourOhFourRequest,1FF,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:nDate:\x20Tue,\x2010\x20Sep\x202024\x2016:27:01\x20GMT\r\nServer:\x20Un SF:known\r\nX-XSS-Protection:\x200\r\nX-Content-Type-Options:\x20nosniff\r SF:\nStrict-Transport-Security:\x20max-age=31536000;\x20includeSubDomains\ SF:r\nContent-Length:\x20226\r\nConnection:\x20close\r\nContent-Type:\x20t SF:ext/html;\x20charset=iso-8859-1\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\ SF:"-//IETF//DTD\x20HTML\x202\.0//EN\">\n<html><head>\n<title>400\x20Bad\x SF:20Request</title>\n</head><body>\n<h1>Bad\x20Request</h1>\n<p>Your\x20b SF:rowser\x20sent\x20a\x20request\x20that\x20this\x20server\x20could\x20no SF:t\x20understand\.<br\x20/>\n</p>\n</body></html>\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: broadband router Running (JUST GUESSING): OneAccess embedded (86%) OS CPE: cpe:/h:oneaccess:1641 Aggressive OS guesses: OneAccess 1641 router (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 5 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.25 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 295.65 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.15 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.53 ms google.as15169.any2ix.coresite.com (206.72.210.41) 5 47.03 ms 147.124.190.5 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 122.46 seconds