Ports
Durée
Date
IP
Nmap scan report for api.bankinformation.1c.ru (185.12.154.11) Host is up (0.00100s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http ddos-guard | http-server-header: | ddos-guard |_ ngjit |_http-title: Did not follow redirect to https://api.bankinformation.1c.ru/ | fingerprint-strings: | GetRequest: | HTTP/1.1 301 Moved Permanently | Server: ddos-guard | Date: Mon, 23 Sep 2024 16:18:53 GMT | Connection: close | Location: https:/// | Content-Type: text/html; charset=utf-8 | Content-Length: 568 | <!DOCTYPE html><html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 301</title><style>*{margin:0;padding:0}html{font:15px/22px arial,sans-serif;background: #fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}p{margin:11px 0 22px;overflow :hidden}ins{color:#777;text-decoration :none;}</style><p><b>301 - Moved Permanently .</b> <ins>That | error.</ins><p>Requested content has been permanently moved. <ins>That | know.</ins> | HTTPOptions: | HTTP/1.1 308 Permanent Redirect | Server: ddos-guard | Date: Mon, 23 Sep 2024 16:18:53 GMT | Connection: close | Location: https:/// | Content-Type: text/html; charset=utf-8 | Content-Length: 569 | <!DOCTYPE html><html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 308</title><style>*{margin:0;padding:0}html{font:15px/22px arial,sans-serif;background: #fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}p{margin:11px 0 22px;overflow :hidden}ins{color:#777;text-decoration :none;}</style><p><b>308 - Permanent Redirect .</b> <ins>That | error.</ins><p>Requested content has been permanently moved. <ins>That | know.</ins> | RTSPRequest: | HTTP/1.1 400 Bad Request | Server: ngjit | Date: Mon, 23 Sep 2024 16:18:53 GMT | Connection: close | Content-Type: text/html; charset=utf-8 | Content-Length: 579 | <!DOCTYPE html><html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 400</title><style>*{margin:0;padding:0}html{font:15px/22px arial,sans-serif;background: #fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}p{margin:11px 0 22px;overflow :hidden}ins{color:#777;text-decoration :none;}</style><p><b>400 - Bad Request .</b> <ins>That | error.</ins><p>Server could not understand the request due to invalid syntax. <ins>That |_ know.</ins> 443/tcp open ssl/https ddos-guard | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Server: ddos-guard | Connection: close | Content-Security-Policy: upgrade-insecure-requests; | Set-Cookie: __ddg1_=5MroalhaFQeFsn26YT5J; Domain=.; HttpOnly; Path=/; Expires=Tue, 23-Sep-2025 16:19:01 GMT | Date: Mon, 23 Sep 2024 16:19:01 GMT | Content-Type: text/html | Content-Length: 166 | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | <hr><center>nginx</center> | </body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request | Server: ddos-guard | Connection: close | Content-Security-Policy: upgrade-insecure-requests; | Set-Cookie: __ddg1_=B2sFFQvXh0BiAvivEy0T; Domain=.; HttpOnly; Path=/; Expires=Tue, 23-Sep-2025 16:18:59 GMT | Date: Mon, 23 Sep 2024 16:19:00 GMT | Content-Type: text/html | Content-Length: 166 | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | <hr><center>nginx</center> | </body> | </html> | HTTPOptions: | HTTP/1.1 400 Bad Request | Server: ddos-guard | Connection: close | Content-Security-Policy: upgrade-insecure-requests; | Set-Cookie: __ddg1_=3lKEaLveiJiHloZ7XoTJ; Domain=.; HttpOnly; Path=/; Expires=Tue, 23-Sep-2025 16:19:00 GMT | Date: Mon, 23 Sep 2024 16:19:01 GMT | Content-Type: text/html | Content-Length: 166 | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | <hr><center>nginx</center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Server: ngjit | Date: Mon, 23 Sep 2024 16:19:01 GMT | Connection: close | Content-Type: text/html; charset=utf-8 | Content-Length: 579 | <!DOCTYPE html><html lang=en><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 400</title><style>*{margin:0;padding:0}html{font:15px/22px arial,sans-serif;background: #fff;color:#222;padding:15px}body{margin:7% auto 0;max-width:390px;min-height:180px;padding:30px 0 15px}p{margin:11px 0 22px;overflow :hidden}ins{color:#777;text-decoration :none;}</style><p><b>400 - Bad Request .</b> <ins>That | error.</ins><p>Server could not understand the request due to invalid syntax. <ins>That |_ know.</ins> |_http-title: 403 Forbidden | ssl-cert: Subject: commonName=api.bankinformation.1c.ru/organizationName=1C LLC/stateOrProvinceName=Moscow/countryName=RU | Subject Alternative Name: DNS:api.bankinformation.1c.ru | Not valid before: 2023-10-03T09:01:18 |_Not valid after: 2024-11-03T09:01:17 | tls-alpn: | h2 |_ http/1.1 |_http-server-header: ddos-guard |_ssl-date: TLS randomness does not represent time 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=9/23%Time=66F194ED%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,2F8,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x20 SF:ddos-guard\r\nDate:\x20Mon,\x2023\x20Sep\x202024\x2016:18:53\x20GMT\r\n SF:Connection:\x20close\r\nLocation:\x20https:///\r\nContent-Type:\x20text SF:/html;\x20charset=utf-8\r\nContent-Length:\x20568\r\n\r\n<!DOCTYPE\x20h SF:tml><html\x20lang=en><meta\x20charset=utf-8><meta\x20name=viewport\x20c SF:ontent=\"initial-scale=1,\x20minimum-scale=1,\x20width=device-width\">< SF:title>Error\x20301</title><style>\*{margin:0;padding:0}html{font:15px/2 SF:2px\x20arial,sans-serif;background:\x20#fff;color:#222;padding:15px}bod SF:y{margin:7%\x20auto\x200;max-width:390px;min-height:180px;padding:30px\ SF:x200\x2015px}p{margin:11px\x200\x2022px;overflow\x20:hidden}ins{color:# SF:777;text-decoration\x20:none;}</style><p><b>301\x20-\x20Moved\x20Perman SF:ently\x20\.</b>\x20<ins>That\xe2\x80\x99s\x20an\x20error\.</ins><p>Requ SF:ested\x20content\x20has\x20been\x20permanently\x20moved\.\x20\x20<ins>T SF:hat\xe2\x80\x99s\x20all\x20we\x20know\.</ins>")%r(HTTPOptions,2FA,"HTTP SF:/1\.1\x20308\x20Permanent\x20Redirect\r\nServer:\x20ddos-guard\r\nDate: SF:\x20Mon,\x2023\x20Sep\x202024\x2016:18:53\x20GMT\r\nConnection:\x20clos SF:e\r\nLocation:\x20https:///\r\nContent-Type:\x20text/html;\x20charset=u SF:tf-8\r\nContent-Length:\x20569\r\n\r\n<!DOCTYPE\x20html><html\x20lang=e SF:n><meta\x20charset=utf-8><meta\x20name=viewport\x20content=\"initial-sc SF:ale=1,\x20minimum-scale=1,\x20width=device-width\"><title>Error\x20308< SF:/title><style>\*{margin:0;padding:0}html{font:15px/22px\x20arial,sans-s SF:erif;background:\x20#fff;color:#222;padding:15px}body{margin:7%\x20auto SF:\x200;max-width:390px;min-height:180px;padding:30px\x200\x2015px}p{marg SF:in:11px\x200\x2022px;overflow\x20:hidden}ins{color:#777;text-decoration SF:\x20:none;}</style><p><b>308\x20-\x20Permanent\x20Redirect\x20\.</b>\x2 SF:0<ins>That\xe2\x80\x99s\x20an\x20error\.</ins><p>Requested\x20content\x SF:20has\x20been\x20permanently\x20moved\.\x20\x20<ins>That\xe2\x80\x99s\x SF:20all\x20we\x20know\.</ins>")%r(RTSPRequest,2E3,"HTTP/1\.1\x20400\x20Ba SF:d\x20Request\r\nServer:\x20ngjit\r\nDate:\x20Mon,\x2023\x20Sep\x202024\ SF:x2016:18:53\x20GMT\r\nConnection:\x20close\r\nContent-Type:\x20text/htm SF:l;\x20charset=utf-8\r\nContent-Length:\x20579\r\n\r\n<!DOCTYPE\x20html> SF:<html\x20lang=en><meta\x20charset=utf-8><meta\x20name=viewport\x20conte SF:nt=\"initial-scale=1,\x20minimum-scale=1,\x20width=device-width\"><titl SF:e>Error\x20400</title><style>\*{margin:0;padding:0}html{font:15px/22px\ SF:x20arial,sans-serif;background:\x20#fff;color:#222;padding:15px}body{ma SF:rgin:7%\x20auto\x200;max-width:390px;min-height:180px;padding:30px\x200 SF:\x2015px}p{margin:11px\x200\x2022px;overflow\x20:hidden}ins{color:#777; SF:text-decoration\x20:none;}</style><p><b>400\x20-\x20Bad\x20Request\x20\ SF:.</b>\x20<ins>That\xe2\x80\x99s\x20an\x20error\.</ins><p>Server\x20coul SF:d\x20not\x20understand\x20the\x20request\x20due\x20to\x20invalid\x20syn SF:tax\.\x20\x20<ins>That\xe2\x80\x99s\x20all\x20we\x20know\.</ins>"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/23%Time=66F194F4%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,1DE,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x2 SF:0ddos-guard\r\nConnection:\x20close\r\nContent-Security-Policy:\x20upgr SF:ade-insecure-requests;\r\nSet-Cookie:\x20__ddg1_=B2sFFQvXh0BiAvivEy0T;\ SF:x20Domain=\.;\x20HttpOnly;\x20Path=/;\x20Expires=Tue,\x2023-Sep-2025\x2 SF:016:18:59\x20GMT\r\nDate:\x20Mon,\x2023\x20Sep\x202024\x2016:19:00\x20G SF:MT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20166\r\n\r\n<html SF:>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgco SF:lor=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<h SF:r><center>nginx</center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,1DE, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ddos-guard\r\nConnect SF:ion:\x20close\r\nContent-Security-Policy:\x20upgrade-insecure-requests; SF:\r\nSet-Cookie:\x20__ddg1_=3lKEaLveiJiHloZ7XoTJ;\x20Domain=\.;\x20HttpO SF:nly;\x20Path=/;\x20Expires=Tue,\x2023-Sep-2025\x2016:19:00\x20GMT\r\nDa SF:te:\x20Mon,\x2023\x20Sep\x202024\x2016:19:01\x20GMT\r\nContent-Type:\x2 SF:0text/html\r\nContent-Length:\x20166\r\n\r\n<html>\r\n<head><title>400\ SF:x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<cen SF:ter><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>nginx</cente SF:r>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,1DE,"HTTP/1\.1\x2040 SF:0\x20Bad\x20Request\r\nServer:\x20ddos-guard\r\nConnection:\x20close\r\ SF:nContent-Security-Policy:\x20upgrade-insecure-requests;\r\nSet-Cookie:\ SF:x20__ddg1_=5MroalhaFQeFsn26YT5J;\x20Domain=\.;\x20HttpOnly;\x20Path=/;\ SF:x20Expires=Tue,\x2023-Sep-2025\x2016:19:01\x20GMT\r\nDate:\x20Mon,\x202 SF:3\x20Sep\x202024\x2016:19:01\x20GMT\r\nContent-Type:\x20text/html\r\nCo SF:ntent-Length:\x20166\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Reques SF:t</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>400\x20B SF:ad\x20Request</h1></center>\r\n<hr><center>nginx</center>\r\n</body>\r\ SF:n</html>\r\n")%r(tor-versions,2E3,"HTTP/1\.1\x20400\x20Bad\x20Request\r SF:\nServer:\x20ngjit\r\nDate:\x20Mon,\x2023\x20Sep\x202024\x2016:19:01\x2 SF:0GMT\r\nConnection:\x20close\r\nContent-Type:\x20text/html;\x20charset= SF:utf-8\r\nContent-Length:\x20579\r\n\r\n<!DOCTYPE\x20html><html\x20lang= SF:en><meta\x20charset=utf-8><meta\x20name=viewport\x20content=\"initial-s SF:cale=1,\x20minimum-scale=1,\x20width=device-width\"><title>Error\x20400 SF:</title><style>\*{margin:0;padding:0}html{font:15px/22px\x20arial,sans- SF:serif;background:\x20#fff;color:#222;padding:15px}body{margin:7%\x20aut SF:o\x200;max-width:390px;min-height:180px;padding:30px\x200\x2015px}p{mar SF:gin:11px\x200\x2022px;overflow\x20:hidden}ins{color:#777;text-decoratio SF:n\x20:none;}</style><p><b>400\x20-\x20Bad\x20Request\x20\.</b>\x20<ins> SF:That\xe2\x80\x99s\x20an\x20error\.</ins><p>Server\x20could\x20not\x20un SF:derstand\x20the\x20request\x20due\x20to\x20invalid\x20syntax\.\x20\x20< SF:ins>That\xe2\x80\x99s\x20all\x20we\x20know\.</ins>"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: specialized|WAP|bridge Running (JUST GUESSING): Crestron 2-Series (87%), Linux 2.4.X|2.6.X (86%), Digi embedded (86%) OS CPE: cpe:/o:crestron:2_series cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 Aggressive OS guesses: Crestron XPanel control system (87%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), OpenWrt White Russian 0.9 (Linux 2.4.30) (86%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (86%), Digi PortServer TS serial-to-Ethernet bridge (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 9 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 9.44 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.62 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.62 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.53 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 ... 6 2.21 ms ae-0.a02.lsanca20.us.bb.gin.ntt.net (129.250.2.180) 7 ... 8 9 1.14 ms 185.12.154.11 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 39.13 seconds