Ports
Duration
Date
IP
Nmap scan report for goodyear.d2.sc.omtrdc.net (63.140.36.51) Host is up (0.027s latency). Other addresses for goodyear.d2.sc.omtrdc.net (not scanned): 63.140.37.206 63.140.37.126 63.140.37.158 63.140.37.145 63.140.36.145 63.140.37.244 63.140.37.33 rDNS record for 63.140.36.51: ip-63-140-36-51.data.adobedc.net Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http jag | fingerprint-strings: | DNSStatusRequestTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 05 Feb 2025 18:43:01 GMT | server: jag | connection: close | Request | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 05 Feb 2025 18:43:00 GMT | server: jag | connection: close | Request | FourOhFourRequest: | HTTP/1.0 404 Not Found | date: Wed, 05 Feb 2025 18:42:52 GMT | server: jag | connection: close | content-length: 0 | GetRequest: | HTTP/1.0 200 OK | cache-control: no-cache, no-store, max-age=0, no-transform, private | x-xss-protection: 1; mode=block | x-content-type-options: nosniff | date: Wed, 05 Feb 2025 18:42:51 GMT | server: jag | connection: close | content-length: 0 | HTTPOptions: | HTTP/1.0 200 OK | cache-control: no-cache, no-store, max-age=0, no-transform, private | x-xss-protection: 1; mode=block | x-content-type-options: nosniff | date: Wed, 05 Feb 2025 18:42:50 GMT | server: jag | connection: close | content-length: 0 | RPCCheck: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 05 Feb 2025 18:42:59 GMT | server: jag | connection: close | Request | RTSPRequest, X11Probe: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 05 Feb 2025 18:42:51 GMT | server: jag | connection: close |_ Request |_http-title: Site doesn't have a title. |_http-server-header: jag 443/tcp open ssl/https jag |_http-title: Site doesn't have a title. | ssl-cert: Subject: commonName=*.d2.sc.omtrdc.net/organizationName=Adobe Inc./stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:*.d2.sc.omtrdc.net | Not valid before: 2024-02-07T00:00:00 |_Not valid after: 2025-03-09T23:59:59 | tls-alpn: | h2 |_ http/1.1 | fingerprint-strings: | DNSStatusRequestTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 05 Feb 2025 18:43:08 GMT | server: jag | connection: close | Request | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 05 Feb 2025 18:43:06 GMT | server: jag | connection: close | Request | FourOhFourRequest: | HTTP/1.0 404 Not Found | date: Wed, 05 Feb 2025 18:42:57 GMT | server: jag | connection: close | content-length: 0 | GetRequest: | HTTP/1.0 200 OK | cache-control: no-cache, no-store, max-age=0, no-transform, private | x-xss-protection: 1; mode=block | x-content-type-options: nosniff | date: Wed, 05 Feb 2025 18:42:56 GMT | server: jag | connection: close | content-length: 0 | HTTPOptions: | HTTP/1.0 200 OK | cache-control: no-cache, no-store, max-age=0, no-transform, private | x-xss-protection: 1; mode=block | x-content-type-options: nosniff | date: Wed, 05 Feb 2025 18:42:57 GMT | server: jag | connection: close | content-length: 0 | RPCCheck: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 05 Feb 2025 18:43:05 GMT | server: jag | connection: close | Request | RTSPRequest: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 05 Feb 2025 18:43:04 GMT | server: jag | connection: close | Request | tor-versions: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 05 Feb 2025 18:42:58 GMT | server: jag | connection: close |_ Request |_ssl-date: TLS randomness does not represent time |_http-server-header: jag 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=2/5%Time=67A3B12A%P=x86_64-redhat-linux-gnu%r(G SF:etRequest,F2,"HTTP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cache,\x20 SF:no-store,\x20max-age=0,\x20no-transform,\x20private\r\nx-xss-protection SF::\x201;\x20mode=block\r\nx-content-type-options:\x20nosniff\r\ndate:\x2 SF:0Wed,\x2005\x20Feb\x202025\x2018:42:51\x20GMT\r\nserver:\x20jag\r\nconn SF:ection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,F2,"HT SF:TP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cache,\x20no-store,\x20max SF:-age=0,\x20no-transform,\x20private\r\nx-xss-protection:\x201;\x20mode= SF:block\r\nx-content-type-options:\x20nosniff\r\ndate:\x20Wed,\x2005\x20F SF:eb\x202025\x2018:42:50\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close SF:\r\ncontent-length:\x200\r\n\r\n")%r(RTSPRequest,9A,"HTTP/1\.1\x20400\x SF:20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plai SF:n\r\ndate:\x20Wed,\x2005\x20Feb\x202025\x2018:42:51\x20GMT\r\nserver:\x SF:20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9A,"HT SF:TP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-ty SF:pe:\x20text/plain\r\ndate:\x20Wed,\x2005\x20Feb\x202025\x2018:42:51\x20 SF:GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r SF:(FourOhFourRequest,72,"HTTP/1\.0\x20404\x20Not\x20Found\r\ndate:\x20Wed SF:,\x2005\x20Feb\x202025\x2018:42:52\x20GMT\r\nserver:\x20jag\r\nconnecti SF:on:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9A,"HTTP/1\.1 SF:\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20 SF:text/plain\r\ndate:\x20Wed,\x2005\x20Feb\x202025\x2018:42:59\x20GMT\r\n SF:server:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(DNSVer SF:sionBindReqTCP,9A,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length SF::\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2005\x20Feb\x2 SF:02025\x2018:43:00\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\n\ SF:r\nBad\x20Request")%r(DNSStatusRequestTCP,9A,"HTTP/1\.1\x20400\x20Bad\x SF:20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\nda SF:te:\x20Wed,\x2005\x20Feb\x202025\x2018:43:01\x20GMT\r\nserver:\x20jag\r SF:\nconnection:\x20close\r\n\r\nBad\x20Request"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=2/5%Time=67A3B130%P=x86_64-redhat-linux- SF:gnu%r(GetRequest,F2,"HTTP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cac SF:he,\x20no-store,\x20max-age=0,\x20no-transform,\x20private\r\nx-xss-pro SF:tection:\x201;\x20mode=block\r\nx-content-type-options:\x20nosniff\r\nd SF:ate:\x20Wed,\x2005\x20Feb\x202025\x2018:42:56\x20GMT\r\nserver:\x20jag\ SF:r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions SF:,F2,"HTTP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cache,\x20no-store, SF:\x20max-age=0,\x20no-transform,\x20private\r\nx-xss-protection:\x201;\x SF:20mode=block\r\nx-content-type-options:\x20nosniff\r\ndate:\x20Wed,\x20 SF:05\x20Feb\x202025\x2018:42:57\x20GMT\r\nserver:\x20jag\r\nconnection:\x SF:20close\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,72,"HTTP/ SF:1\.0\x20404\x20Not\x20Found\r\ndate:\x20Wed,\x2005\x20Feb\x202025\x2018 SF::42:57\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\ncontent-leng SF:th:\x200\r\n\r\n")%r(tor-versions,9A,"HTTP/1\.1\x20400\x20Bad\x20Reques SF:t\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20W SF:ed,\x2005\x20Feb\x202025\x2018:42:58\x20GMT\r\nserver:\x20jag\r\nconnec SF:tion:\x20close\r\n\r\nBad\x20Request")%r(RTSPRequest,9A,"HTTP/1\.1\x204 SF:00\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/ SF:plain\r\ndate:\x20Wed,\x2005\x20Feb\x202025\x2018:43:04\x20GMT\r\nserve SF:r:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(RPCCheck,9A SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\nconten SF:t-type:\x20text/plain\r\ndate:\x20Wed,\x2005\x20Feb\x202025\x2018:43:05 SF:\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request SF:")%r(DNSVersionBindReqTCP,9A,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncon SF:tent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x200 SF:5\x20Feb\x202025\x2018:43:06\x20GMT\r\nserver:\x20jag\r\nconnection:\x2 SF:0close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9A,"HTTP/1\.1\x204 SF:00\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/ SF:plain\r\ndate:\x20Wed,\x2005\x20Feb\x202025\x2018:43:08\x20GMT\r\nserve SF:r:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 13 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.59 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 3.42 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.90 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146) 5 ... 12 13 28.33 ms ip-63-140-36-51.data.adobedc.net (63.140.36.51) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 63.52 seconds
Features
5 scans/day
Daily API Calls - 20 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.
Lifetime
Features
10 000 scans/day
Daily API Calls - 100 000 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is best for professionals who need to test their host's open ports from an external source.
Billed Annually @ $45.00 - 50% discount