Scan report for "toi.s.llnwi.net"

Membership level: Free member
Scan OS information and Traceroute (nmap -A toi.s.llnwi.net)
Nmap scan report for toi.s.llnwi.net (68.142.107.88)
Host is up (0.00042s latency).
Other addresses for toi.s.llnwi.net (not scanned): 68.142.107.154
rDNS record for 68.142.107.88: https-68-142-107-88.lax.llnw.net
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http      EdgePrism/5.2.1.0
|_http-server-header: EdgePrism/5.2.1.0
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 400 Bad Request
|     Server: EdgePrism/5.2.1.0
|     Mime-Version: 1.0
|     Date: Tue, 11 Jun 2024 07:54:56 GMT
|     Content-Type: text/plain
|     Expires: Tue, 11 Jun 2024 07:54:56 GMT
|     X-LLID: 2e980074f50bb9dee778caef96cc313f
|     Content-Length: 0
|     Connection: close
|   GetRequest: 
|     HTTP/1.0 400 Bad Request
|     Server: EdgePrism/5.2.1.0
|     Mime-Version: 1.0
|     Date: Tue, 11 Jun 2024 07:54:56 GMT
|     Content-Type: text/plain
|     Expires: Tue, 11 Jun 2024 07:54:56 GMT
|     X-LLID: a1bb39484f983fa43582732e4cac4e11
|     Content-Length: 0
|     Connection: close
|   HTTPOptions: 
|     HTTP/1.0 400 Bad Request
|     Server: EdgePrism/5.2.1.0
|     Mime-Version: 1.0
|     Date: Tue, 11 Jun 2024 07:54:56 GMT
|     Content-Type: text/plain
|     Expires: Tue, 11 Jun 2024 07:54:56 GMT
|     X-LLID: 2d9026e253c4fa87b54a61808e5dfb0e
|     Content-Length: 0
|     Connection: close
|   RPCCheck: 
|     HTTP/1.0 400 Bad Request
|     Server: EdgePrism/5.2.1.0
|     Mime-Version: 1.0
|     Date: Tue, 11 Jun 2024 07:55:01 GMT
|     Content-Type: text/plain
|     Expires: Tue, 11 Jun 2024 07:55:01 GMT
|     Content-Length: 0
|     Connection: close
|   RTSPRequest, X11Probe: 
|     HTTP/1.0 400 Bad Request
|     Server: EdgePrism/5.2.1.0
|     Mime-Version: 1.0
|     Date: Tue, 11 Jun 2024 07:54:56 GMT
|     Content-Type: text/plain
|     Expires: Tue, 11 Jun 2024 07:54:56 GMT
|     Content-Length: 0
|_    Connection: close
|_http-title: Site doesn't have a title (text/plain).
443/tcp open  ssl/https EdgePrism/5.2.1.0
|_http-title: Site doesn't have a title (text/plain).
|_http-server-header: EdgePrism/5.2.1.0
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| ssl-cert: Subject: commonName=*.hs.llnwd.net
| Subject Alternative Name: DNS:*.hs.llnwd.net, DNS:*.assets.delvenetworks.com, DNS:*.content.video.llnw.net, DNS:*.cpl.delvenetworks.com, DNS:*.cs.lldns.net, DNS:*.delvenetworks.com, DNS:*.limelight.com, DNS:*.lldns.net, DNS:*.llnw-trials.com, DNS:*.llnw.com, DNS:*.llnw.net, DNS:*.llnwi.net, DNS:*.loris.llnwd.net, DNS:*.lvp.llnw.net, DNS:*.mfs.lvp.llnw.net, DNS:*.mfs.video.llnw.net, DNS:*.mmdlive.lldns.net, DNS:*.phx2.llnw.net, DNS:*.phx3.llnw.net, DNS:*.phx7.llnw.net, DNS:*.s.content.video.llnw.net, DNS:*.s.cpl.delvenetworks.com, DNS:*.s.delvenetworks.com, DNS:*.s.llnwi.net, DNS:*.s.loris.llnwd.net, DNS:*.s.mfs.lvp.llnw.net, DNS:*.s.mfs.video.llnw.net, DNS:*.smedia.lvp.llnw.net, DNS:*.storage.llnwd.net, DNS:*.upload.llnw.net, DNS:*.video.limelight.com, DNS:*.video.llnw.net, DNS:*.videoplatform.limelight.com, DNS:*.vo.llnwd.net, DNS:*.vp.llnw.com, DNS:limelight.com, DNS:llnw.com
| Not valid before: 2023-10-24T00:00:00
|_Not valid after:  2024-10-23T23:59:59
| fingerprint-strings: 
|   DNSVersionBindReqTCP, RPCCheck, tor-versions: 
|     HTTP/1.1 400 Bad request
|     Content-length: 90
|     Cache-Control: no-cache
|     Connection: close
|     Content-Type: text/html
|     <html><body><h1>400 Bad request</h1>
|     Your browser sent an invalid request.
|     </body></html>
|   FourOhFourRequest: 
|     HTTP/1.0 400 Bad Request
|     Server: EdgePrism/5.2.1.0
|     Mime-Version: 1.0
|     Date: Tue, 11 Jun 2024 07:55:02 GMT
|     Content-Type: text/plain
|     Expires: Tue, 11 Jun 2024 07:55:02 GMT
|     X-LLID: b64b25052587dbb0b61841b8ab99ef94
|     Content-Length: 0
|   GetRequest: 
|     HTTP/1.0 400 Bad Request
|     Server: EdgePrism/5.2.1.0
|     Mime-Version: 1.0
|     Date: Tue, 11 Jun 2024 07:55:02 GMT
|     Content-Type: text/plain
|     Expires: Tue, 11 Jun 2024 07:55:02 GMT
|     X-LLID: 07b435ce3736219936e1086af206dd2e
|     Content-Length: 0
|   HTTPOptions: 
|     HTTP/1.0 400 Bad Request
|     Server: EdgePrism/5.2.1.0
|     Mime-Version: 1.0
|     Date: Tue, 11 Jun 2024 07:55:02 GMT
|     Content-Type: text/plain
|     Expires: Tue, 11 Jun 2024 07:55:02 GMT
|     X-LLID: 5f4db71f5eee15e2c3e4ab93d3713d54
|     Content-Length: 0
|   RTSPRequest: 
|     HTTP/1.0 400 Bad Request
|     Server: EdgePrism/5.2.1.0
|     Mime-Version: 1.0
|     Date: Tue, 11 Jun 2024 07:55:07 GMT
|     Content-Type: text/plain
|     Expires: Tue, 11 Jun 2024 07:55:07 GMT
|_    Content-Length: 0
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=6/11%Time=666802CF%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,101,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nServer:\x20EdgePr
SF:ism/5\.2\.1\.0\r\nMime-Version:\x201\.0\r\nDate:\x20Tue,\x2011\x20Jun\x
SF:202024\x2007:54:56\x20GMT\r\nContent-Type:\x20text/plain\r\nExpires:\x2
SF:0Tue,\x2011\x20Jun\x202024\x2007:54:56\x20GMT\r\nX-LLID:\x20a1bb39484f9
SF:83fa43582732e4cac4e11\r\nContent-Length:\x200\r\nConnection:\x20close\r
SF:\n\r\n")%r(HTTPOptions,101,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nServe
SF:r:\x20EdgePrism/5\.2\.1\.0\r\nMime-Version:\x201\.0\r\nDate:\x20Tue,\x2
SF:011\x20Jun\x202024\x2007:54:56\x20GMT\r\nContent-Type:\x20text/plain\r\
SF:nExpires:\x20Tue,\x2011\x20Jun\x202024\x2007:54:56\x20GMT\r\nX-LLID:\x2
SF:02d9026e253c4fa87b54a61808e5dfb0e\r\nContent-Length:\x200\r\nConnection
SF::\x20close\r\n\r\n")%r(RTSPRequest,D7,"HTTP/1\.0\x20400\x20Bad\x20Reque
SF:st\r\nServer:\x20EdgePrism/5\.2\.1\.0\r\nMime-Version:\x201\.0\r\nDate:
SF:\x20Tue,\x2011\x20Jun\x202024\x2007:54:56\x20GMT\r\nContent-Type:\x20te
SF:xt/plain\r\nExpires:\x20Tue,\x2011\x20Jun\x202024\x2007:54:56\x20GMT\r\
SF:nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(X11Probe,D7,"
SF:HTTP/1\.0\x20400\x20Bad\x20Request\r\nServer:\x20EdgePrism/5\.2\.1\.0\r
SF:\nMime-Version:\x201\.0\r\nDate:\x20Tue,\x2011\x20Jun\x202024\x2007:54:
SF:56\x20GMT\r\nContent-Type:\x20text/plain\r\nExpires:\x20Tue,\x2011\x20J
SF:un\x202024\x2007:54:56\x20GMT\r\nContent-Length:\x200\r\nConnection:\x2
SF:0close\r\n\r\n")%r(FourOhFourRequest,101,"HTTP/1\.0\x20400\x20Bad\x20Re
SF:quest\r\nServer:\x20EdgePrism/5\.2\.1\.0\r\nMime-Version:\x201\.0\r\nDa
SF:te:\x20Tue,\x2011\x20Jun\x202024\x2007:54:56\x20GMT\r\nContent-Type:\x2
SF:0text/plain\r\nExpires:\x20Tue,\x2011\x20Jun\x202024\x2007:54:56\x20GMT
SF:\r\nX-LLID:\x202e980074f50bb9dee778caef96cc313f\r\nContent-Length:\x200
SF:\r\nConnection:\x20close\r\n\r\n")%r(RPCCheck,D7,"HTTP/1\.0\x20400\x20B
SF:ad\x20Request\r\nServer:\x20EdgePrism/5\.2\.1\.0\r\nMime-Version:\x201\
SF:.0\r\nDate:\x20Tue,\x2011\x20Jun\x202024\x2007:55:01\x20GMT\r\nContent-
SF:Type:\x20text/plain\r\nExpires:\x20Tue,\x2011\x20Jun\x202024\x2007:55:0
SF:1\x20GMT\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=6/11%Time=666802D5%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,EE,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nServer:\x20
SF:EdgePrism/5\.2\.1\.0\r\nMime-Version:\x201\.0\r\nDate:\x20Tue,\x2011\x2
SF:0Jun\x202024\x2007:55:02\x20GMT\r\nContent-Type:\x20text/plain\r\nExpir
SF:es:\x20Tue,\x2011\x20Jun\x202024\x2007:55:02\x20GMT\r\nX-LLID:\x2007b43
SF:5ce3736219936e1086af206dd2e\r\nContent-Length:\x200\r\n\r\n")%r(HTTPOpt
SF:ions,EE,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nServer:\x20EdgePrism/5\.
SF:2\.1\.0\r\nMime-Version:\x201\.0\r\nDate:\x20Tue,\x2011\x20Jun\x202024\
SF:x2007:55:02\x20GMT\r\nContent-Type:\x20text/plain\r\nExpires:\x20Tue,\x
SF:2011\x20Jun\x202024\x2007:55:02\x20GMT\r\nX-LLID:\x205f4db71f5eee15e2c3
SF:e4ab93d3713d54\r\nContent-Length:\x200\r\n\r\n")%r(FourOhFourRequest,EE
SF:,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nServer:\x20EdgePrism/5\.2\.1\.0
SF:\r\nMime-Version:\x201\.0\r\nDate:\x20Tue,\x2011\x20Jun\x202024\x2007:5
SF:5:02\x20GMT\r\nContent-Type:\x20text/plain\r\nExpires:\x20Tue,\x2011\x2
SF:0Jun\x202024\x2007:55:02\x20GMT\r\nX-LLID:\x20b64b25052587dbb0b61841b8a
SF:b99ef94\r\nContent-Length:\x200\r\n\r\n")%r(tor-versions,CF,"HTTP/1\.1\
SF:x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20
SF:no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<
SF:html><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20a
SF:n\x20invalid\x20request\.\n</body></html>\n")%r(RTSPRequest,C4,"HTTP/1\
SF:.0\x20400\x20Bad\x20Request\r\nServer:\x20EdgePrism/5\.2\.1\.0\r\nMime-
SF:Version:\x201\.0\r\nDate:\x20Tue,\x2011\x20Jun\x202024\x2007:55:07\x20G
SF:MT\r\nContent-Type:\x20text/plain\r\nExpires:\x20Tue,\x2011\x20Jun\x202
SF:024\x2007:55:07\x20GMT\r\nContent-Length:\x200\r\n\r\n")%r(RPCCheck,CF,
SF:"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-C
SF:ontrol:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/ht
SF:ml\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x
SF:20sent\x20an\x20invalid\x20request\.\n</body></html>\n")%r(DNSVersionBi
SF:ndReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x209
SF:0\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Type
SF::\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\
SF:x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></html>\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Crestron XPanel control system (92%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (91%), ASUS RT-N56U WAP (Linux 3.4) (90%), Linux 3.1 (90%), Linux 3.16 (90%), Linux 3.2 (90%), Android 4.3 (89%), Linux 2.6.32 (89%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (89%), Ubiquiti AirOS 5.6.2 (Linux 2.6.32) (89%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 7 hops

TRACEROUTE (using port 443/tcp)
HOP RTT     ADDRESS
1   0.40 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   2.08 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.87 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   1.11 ms be2197.rcr21.b020604-0.lax01.atlas.cogentco.com (154.54.0.166)
6   0.42 ms 38.104.233.34
7   0.37 ms https-68-142-107-88.lax.llnw.net (68.142.107.88)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 41.26 seconds
Color Scheme
Target
toi.s.llnwi.net
Target IP
68.142.107.88
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A toi.s.llnwi.net
Scan date
11 Jun 2024 03:55
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: