Ports
Durée
Date
IP
Nmap scan report for fledge-usa.creativecdn.com (185.184.10.30) Host is up (0.065s latency). rDNS record for 185.184.10.30: ip-185-184-10-30.rtbhouse.net Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, RTSPRequest, X11Probe: | HTTP/1.1 400 Bad request | Content-length: 90 | Cache-Control: no-cache | Connection: close | Content-Type: text/html | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | FourOhFourRequest, GetRequest: | HTTP/1.1 204 No Content | connection: close | HTTPOptions: | HTTP/1.1 200 OK | date: Sun, 01 Oct 2023 23:29:48 GMT | allow: GET, HEAD, TRACE, OPTIONS | content-length: 0 |_ connection: close | http-methods: |_ Potentially risky methods: TRACE | http-robots.txt: 1 disallowed entry |_/ |_http-title: Site doesn't have a title. 443/tcp open ssl/https | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, RTSPRequest, tor-versions: | HTTP/1.1 400 Bad request | Content-length: 90 | Cache-Control: no-cache | Connection: close | Content-Type: text/html | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | FourOhFourRequest, GetRequest: | HTTP/1.1 204 No Content | connection: close | HTTPOptions: | HTTP/1.1 200 OK | date: Sun, 01 Oct 2023 23:29:54 GMT | allow: GET, HEAD, TRACE, OPTIONS | content-length: 0 |_ connection: close | http-methods: |_ Potentially risky methods: TRACE | http-robots.txt: 1 disallowed entry |_/ |_http-title: Site doesn't have a title. | ssl-cert: Subject: commonName=*.creativecdn.com | Subject Alternative Name: DNS:*.creativecdn.com, DNS:creativecdn.com | Not valid before: 2023-03-29T00:00:00 |_Not valid after: 2024-04-28T23:59:59 | tls-alpn: | h2 |_ http/1.1 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=10/1%Time=651A00EB%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,2E,"HTTP/1\.1\x20204\x20No\x20Content\r\nconnection:\x20clos SF:e\r\n\r\n")%r(HTTPOptions,80,"HTTP/1\.1\x20200\x20OK\r\ndate:\x20Sun,\x SF:2001\x20Oct\x202023\x2023:29:48\x20GMT\r\nallow:\x20GET,\x20HEAD,\x20TR SF:ACE,\x20OPTIONS\r\ncontent-length:\x200\r\nconnection:\x20close\r\n\r\n SF:")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-leng SF:th:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nCont SF:ent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1 SF:>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></html SF:>\n")%r(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-leng SF:th:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nCont SF:ent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1 SF:>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></html SF:>\n")%r(FourOhFourRequest,2E,"HTTP/1\.1\x20204\x20No\x20Content\r\nconn SF:ection:\x20close\r\n\r\n")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20re SF:quest\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnect SF:ion:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\ SF:x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20req SF:uest\.\n</body></html>\n")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\ SF:x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cach SF:e\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><b SF:ody><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20in SF:valid\x20request\.\n</body></html>\n")%r(DNSStatusRequestTCP,CF,"HTTP/1 SF:\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control: SF:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\ SF:r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\ SF:x20an\x20invalid\x20request\.\n</body></html>\n")%r(Help,CF,"HTTP/1\.1\ SF:x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20 SF:no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n< SF:html><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20a SF:n\x20invalid\x20request\.\n</body></html>\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=10/1%Time=651A00F2%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,2E,"HTTP/1\.1\x20204\x20No\x20Content\r\nconnection:\ SF:x20close\r\n\r\n")%r(HTTPOptions,80,"HTTP/1\.1\x20200\x20OK\r\ndate:\x2 SF:0Sun,\x2001\x20Oct\x202023\x2023:29:54\x20GMT\r\nallow:\x20GET,\x20HEAD SF:,\x20TRACE,\x20OPTIONS\r\ncontent-length:\x200\r\nconnection:\x20close\ SF:r\n\r\n")%r(FourOhFourRequest,2E,"HTTP/1\.1\x20204\x20No\x20Content\r\n SF:connection:\x20close\r\n\r\n")%r(tor-versions,CF,"HTTP/1\.1\x20400\x20B SF:ad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\ SF:nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body> SF:<h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invali SF:d\x20request\.\n</body></html>\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x SF:20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache SF:\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><bo SF:dy><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20inv SF:alid\x20request\.\n</body></html>\n")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x SF:20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache SF:\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><bo SF:dy><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20inv SF:alid\x20request\.\n</body></html>\n")%r(DNSVersionBindReqTCP,CF,"HTTP/1 SF:\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control: SF:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\ SF:r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\ SF:x20an\x20invalid\x20request\.\n</body></html>\n")%r(DNSStatusRequestTCP SF:,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCac SF:he-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20tex SF:t/html\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20brows SF:er\x20sent\x20an\x20invalid\x20request\.\n</body></html>\n")%r(Help,CF, SF:"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-C SF:ontrol:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/ht SF:ml\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x SF:20sent\x20an\x20invalid\x20request\.\n</body></html>\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Crestron XPanel control system (89%), Linux 3.10 (87%), HP P2000 G3 NAS device (86%), Linux 4.10 (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.16 (86%), Linux 3.2 (86%), Linux 3.11 (86%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 10 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.21 ms 208.76.251.177 2 0.59 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.72 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1) 4 0.86 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57) 5 0.81 ms be3360.ccr41.lax04.atlas.cogentco.com (154.54.25.150) 6 ... 7 65.03 ms ae1.3501.edge2.Washington111.level3.net (4.69.136.62) 8 65.51 ms 8.45.62.42 9 65.72 ms ip-185-184-10-68.rtbhouse.net (185.184.10.68) 10 65.64 ms ip-185-184-10-30.rtbhouse.net (185.184.10.30) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 62.07 seconds