Ports
Durée
Date
IP
Nmap scan report for deloitte.d2.sc.omtrdc.net (63.140.36.51) Host is up (0.026s latency). Other addresses for deloitte.d2.sc.omtrdc.net (not scanned): 63.140.37.206 63.140.36.145 63.140.37.126 rDNS record for 63.140.36.51: ip-63-140-36-51.data.adobedc.net Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http jag |_http-server-header: jag | fingerprint-strings: | DNSStatusRequestTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Thu, 11 Jul 2024 00:13:00 GMT | server: jag | connection: close | Request | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Thu, 11 Jul 2024 00:12:58 GMT | server: jag | connection: close | Request | FourOhFourRequest: | HTTP/1.0 404 Not Found | date: Thu, 11 Jul 2024 00:12:52 GMT | server: jag | connection: close | content-length: 0 | GetRequest, HTTPOptions: | HTTP/1.0 200 OK | cache-control: no-cache, no-store, max-age=0, no-transform, private | x-xss-protection: 1; mode=block | x-content-type-options: nosniff | date: Thu, 11 Jul 2024 00:12:49 GMT | server: jag | connection: close | content-length: 0 | RPCCheck: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Thu, 11 Jul 2024 00:12:57 GMT | server: jag | connection: close | Request | RTSPRequest: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Thu, 11 Jul 2024 00:12:49 GMT | server: jag | connection: close | Request | X11Probe: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Thu, 11 Jul 2024 00:12:50 GMT | server: jag | connection: close |_ Request |_http-title: Site doesn't have a title. 443/tcp open ssl/https jag |_http-server-header: jag |_http-title: Site doesn't have a title. |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=*.d2.sc.omtrdc.net/organizationName=Adobe Inc./stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:*.d2.sc.omtrdc.net | Not valid before: 2024-02-07T00:00:00 |_Not valid after: 2025-03-09T23:59:59 | tls-alpn: | h2 |_ http/1.1 | fingerprint-strings: | DNSStatusRequestTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Thu, 11 Jul 2024 00:13:07 GMT | server: jag | connection: close | Request | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Thu, 11 Jul 2024 00:13:05 GMT | server: jag | connection: close | Request | FourOhFourRequest: | HTTP/1.0 404 Not Found | date: Thu, 11 Jul 2024 00:12:55 GMT | server: jag | connection: close | content-length: 0 | GetRequest, HTTPOptions: | HTTP/1.0 200 OK | cache-control: no-cache, no-store, max-age=0, no-transform, private | x-xss-protection: 1; mode=block | x-content-type-options: nosniff | date: Thu, 11 Jul 2024 00:12:55 GMT | server: jag | connection: close | content-length: 0 | RPCCheck: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Thu, 11 Jul 2024 00:13:04 GMT | server: jag | connection: close | Request | RTSPRequest: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Thu, 11 Jul 2024 00:13:03 GMT | server: jag | connection: close | Request | tor-versions: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Thu, 11 Jul 2024 00:12:57 GMT | server: jag | connection: close |_ Request 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=7/10%Time=668F2381%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,F2,"HTTP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cache,\x2 SF:0no-store,\x20max-age=0,\x20no-transform,\x20private\r\nx-xss-protectio SF:n:\x201;\x20mode=block\r\nx-content-type-options:\x20nosniff\r\ndate:\x SF:20Thu,\x2011\x20Jul\x202024\x2000:12:49\x20GMT\r\nserver:\x20jag\r\ncon SF:nection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,F2,"H SF:TTP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cache,\x20no-store,\x20ma SF:x-age=0,\x20no-transform,\x20private\r\nx-xss-protection:\x201;\x20mode SF:=block\r\nx-content-type-options:\x20nosniff\r\ndate:\x20Thu,\x2011\x20 SF:Jul\x202024\x2000:12:49\x20GMT\r\nserver:\x20jag\r\nconnection:\x20clos SF:e\r\ncontent-length:\x200\r\n\r\n")%r(RTSPRequest,9A,"HTTP/1\.1\x20400\ SF:x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/pla SF:in\r\ndate:\x20Thu,\x2011\x20Jul\x202024\x2000:12:49\x20GMT\r\nserver:\ SF:x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9A,"H SF:TTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-t SF:ype:\x20text/plain\r\ndate:\x20Thu,\x2011\x20Jul\x202024\x2000:12:50\x2 SF:0GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")% SF:r(FourOhFourRequest,72,"HTTP/1\.0\x20404\x20Not\x20Found\r\ndate:\x20Th SF:u,\x2011\x20Jul\x202024\x2000:12:52\x20GMT\r\nserver:\x20jag\r\nconnect SF:ion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9A,"HTTP/1\. SF:1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x2 SF:0text/plain\r\ndate:\x20Thu,\x2011\x20Jul\x202024\x2000:12:57\x20GMT\r\ SF:nserver:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(DNSVe SF:rsionBindReqTCP,9A,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-lengt SF:h:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Thu,\x2011\x20Jul\x SF:202024\x2000:12:58\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\n SF:\r\nBad\x20Request")%r(DNSStatusRequestTCP,9A,"HTTP/1\.1\x20400\x20Bad\ SF:x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\nd SF:ate:\x20Thu,\x2011\x20Jul\x202024\x2000:13:00\x20GMT\r\nserver:\x20jag\ SF:r\nconnection:\x20close\r\n\r\nBad\x20Request"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=7/10%Time=668F2387%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,F2,"HTTP/1\.0\x20200\x20OK\r\ncache-control:\x20no-ca SF:che,\x20no-store,\x20max-age=0,\x20no-transform,\x20private\r\nx-xss-pr SF:otection:\x201;\x20mode=block\r\nx-content-type-options:\x20nosniff\r\n SF:date:\x20Thu,\x2011\x20Jul\x202024\x2000:12:55\x20GMT\r\nserver:\x20jag SF:\r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOption SF:s,F2,"HTTP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cache,\x20no-store SF:,\x20max-age=0,\x20no-transform,\x20private\r\nx-xss-protection:\x201;\ SF:x20mode=block\r\nx-content-type-options:\x20nosniff\r\ndate:\x20Thu,\x2 SF:011\x20Jul\x202024\x2000:12:55\x20GMT\r\nserver:\x20jag\r\nconnection:\ SF:x20close\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,72,"HTTP SF:/1\.0\x20404\x20Not\x20Found\r\ndate:\x20Thu,\x2011\x20Jul\x202024\x200 SF:0:12:55\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\ncontent-len SF:gth:\x200\r\n\r\n")%r(tor-versions,9A,"HTTP/1\.1\x20400\x20Bad\x20Reque SF:st\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20 SF:Thu,\x2011\x20Jul\x202024\x2000:12:57\x20GMT\r\nserver:\x20jag\r\nconne SF:ction:\x20close\r\n\r\nBad\x20Request")%r(RTSPRequest,9A,"HTTP/1\.1\x20 SF:400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text SF:/plain\r\ndate:\x20Thu,\x2011\x20Jul\x202024\x2000:13:03\x20GMT\r\nserv SF:er:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(RPCCheck,9 SF:A,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\nconte SF:nt-type:\x20text/plain\r\ndate:\x20Thu,\x2011\x20Jul\x202024\x2000:13:0 SF:4\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Reques SF:t")%r(DNSVersionBindReqTCP,9A,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nco SF:ntent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Thu,\x20 SF:11\x20Jul\x202024\x2000:13:05\x20GMT\r\nserver:\x20jag\r\nconnection:\x SF:20close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9A,"HTTP/1\.1\x20 SF:400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text SF:/plain\r\ndate:\x20Thu,\x2011\x20Jul\x202024\x2000:13:07\x20GMT\r\nserv SF:er:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.80 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.72 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146) 5 ... 6 7 31.96 ms 52.93.15.42 8 25.50 ms 52.93.14.181 9 24.31 ms 52.93.14.214 10 28.65 ms 52.93.12.211 11 26.80 ms 52.93.246.83 12 ... 30 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 69.64 seconds