Ports
Duration
Date
IP
Nmap scan report for amer4.vpn.nielsen.com (149.97.222.116) Host is up (0.010s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 301 Moved Permanently | Date: Fri, 27 Sep 2024 02:19:04 GMT | Content-Type: text/html | Content-Length: 157 | Connection: close | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak | Strict-Transport-Security: max-age=31536000; | <html> | <head><title>301 Moved Permanently</title></head> | <body> | <center><h1>301 Moved Permanently</h1></center> | <hr><center></center> | </body> | </html> | GetRequest, HTTPOptions: | HTTP/1.1 301 Moved Permanently | Date: Fri, 27 Sep 2024 02:19:04 GMT | Content-Type: text/html | Content-Length: 157 | Connection: close | Location: https:/// | Strict-Transport-Security: max-age=31536000; | <html> | <head><title>301 Moved Permanently</title></head> | <body> | <center><h1>301 Moved Permanently</h1></center> | <hr><center></center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Fri, 27 Sep 2024 02:19:10 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Date: Fri, 27 Sep 2024 02:19:04 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> |_ </html> 443/tcp open ssl/https | ssl-cert: Subject: commonName=amer4.vpn.nielsen.com/organizationName=GRACENOTE INC./stateOrProvinceName=New york/countryName=US | Subject Alternative Name: DNS:amer4.vpn.nielsen.com | Not valid before: 2024-07-11T14:11:05 |_Not valid after: 2025-08-12T14:11:04 | fingerprint-strings: | DNSVersionBindReqTCP, RPCCheck: | HTTP/1.1 400 Bad Request | Date: Fri, 27 Sep 2024 02:19:16 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> | </html> | FourOhFourRequest: | HTTP/1.1 404 Not Found | Date: Fri, 27 Sep 2024 02:19:11 GMT | Content-Type: text/html | Content-Length: 141 | Connection: close | <html> | <head><title>404 Not Found</title></head> | <body> | <center><h1>404 Not Found</h1></center> | <hr><center></center> | </body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request: missing required Host header | Date: Fri, 27 Sep 2024 02:19:10 GMT | Content-Type: text/plain; charset=utf-8 | Connection: close | Request: missing required Host header | HTTPOptions: | HTTP/1.1 405 Not Allowed | Date: Fri, 27 Sep 2024 02:19:10 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | Allow: GET, POST | <html> | <head><title>405 Not Allowed</title></head> | <body> | <center><h1>405 Not Allowed</h1></center> | <hr><center></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Date: Fri, 27 Sep 2024 02:19:11 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> |_ </html> |_ssl-date: 2024-09-27T02:20:50+00:00; +10s from scanner time. 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=9/26%Time=66F61618%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,168,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nDate:\x20Fr SF:i,\x2027\x20Sep\x202024\x2002:19:04\x20GMT\r\nContent-Type:\x20text/htm SF:l\r\nContent-Length:\x20157\r\nConnection:\x20close\r\nLocation:\x20htt SF:ps:///\r\nStrict-Transport-Security:\x20max-age=31536000;\r\n\r\n<html> SF:\r\n<head><title>301\x20Moved\x20Permanently</title></head>\r\n<body>\r SF:\n<center><h1>301\x20Moved\x20Permanently</h1></center>\r\n<hr><center> SF:</center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,168,"HTTP/1\.1\x203 SF:01\x20Moved\x20Permanently\r\nDate:\x20Fri,\x2027\x20Sep\x202024\x2002: SF:19:04\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20157\r\ SF:nConnection:\x20close\r\nLocation:\x20https:///\r\nStrict-Transport-Sec SF:urity:\x20max-age=31536000;\r\n\r\n<html>\r\n<head><title>301\x20Moved\ SF:x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20 SF:Permanently</h1></center>\r\n<hr><center></center>\r\n</body>\r\n</html SF:>\r\n")%r(RTSPRequest,91,"<html>\r\n<head><title>400\x20Bad\x20Request< SF:/title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cen SF:ter>\r\n<hr><center></center>\r\n</body>\r\n</html>\r\n")%r(X11Probe,11 SF:3,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Fri,\x2027\x20Sep\x20 SF:2024\x2002:19:04\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length SF::\x20145\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20B SF:ad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Req SF:uest</h1></center>\r\n<hr><center></center>\r\n</body>\r\n</html>\r\n") SF:%r(FourOhFourRequest,18B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nD SF:ate:\x20Fri,\x2027\x20Sep\x202024\x2002:19:04\x20GMT\r\nContent-Type:\x SF:20text/html\r\nContent-Length:\x20157\r\nConnection:\x20close\r\nLocati SF:on:\x20https:///nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\nStrict-Transpor SF:t-Security:\x20max-age=31536000;\r\n\r\n<html>\r\n<head><title>301\x20M SF:oved\x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\x20Move SF:d\x20Permanently</h1></center>\r\n<hr><center></center>\r\n</body>\r\n< SF:/html>\r\n")%r(RPCCheck,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate SF::\x20Fri,\x2027\x20Sep\x202024\x2002:19:10\x20GMT\r\nContent-Type:\x20t SF:ext/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\n\r\n<html SF:>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<ce SF:nter><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center></center>\r SF:\n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/26%Time=66F6161E%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,C8,"HTTP/1\.1\x20400\x20Bad\x20Request:\x20missing\x2 SF:0required\x20Host\x20header\r\nDate:\x20Fri,\x2027\x20Sep\x202024\x2002 SF::19:10\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConne SF:ction:\x20close\r\n\r\n400\x20Bad\x20Request:\x20missing\x20required\x2 SF:0Host\x20header")%r(HTTPOptions,125,"HTTP/1\.1\x20405\x20Not\x20Allowed SF:\r\nDate:\x20Fri,\x2027\x20Sep\x202024\x2002:19:10\x20GMT\r\nContent-Ty SF:pe:\x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\nA SF:llow:\x20GET,\x20POST\r\n\r\n<html>\r\n<head><title>405\x20Not\x20Allow SF:ed</title></head>\r\n<body>\r\n<center><h1>405\x20Not\x20Allowed</h1></ SF:center>\r\n<hr><center></center>\r\n</body>\r\n</html>\r\n")%r(FourOhFo SF:urRequest,10D,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Fri,\x2027\ SF:x20Sep\x202024\x2002:19:11\x20GMT\r\nContent-Type:\x20text/html\r\nCont SF:ent-Length:\x20141\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><titl SF:e>404\x20Not\x20Found</title></head>\r\n<body>\r\n<center><h1>404\x20No SF:t\x20Found</h1></center>\r\n<hr><center></center>\r\n</body>\r\n</html> SF:\r\n")%r(tor-versions,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\ SF:x20Fri,\x2027\x20Sep\x202024\x2002:19:11\x20GMT\r\nContent-Type:\x20tex SF:t/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\n\r\n<html>\ SF:r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cent SF:er><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center></center>\r\n SF:</body>\r\n</html>\r\n")%r(RTSPRequest,91,"<html>\r\n<head><title>400\x SF:20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20 SF:Request</h1></center>\r\n<hr><center></center>\r\n</body>\r\n</html>\r\ SF:n")%r(RPCCheck,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Fri, SF:\x2027\x20Sep\x202024\x2002:19:16\x20GMT\r\nContent-Type:\x20text/html\ SF:r\nContent-Length:\x20145\r\nConnection:\x20close\r\n\r\n<html>\r\n<hea SF:d><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1> SF:400\x20Bad\x20Request</h1></center>\r\n<hr><center></center>\r\n</body> SF:\r\n</html>\r\n")%r(DNSVersionBindReqTCP,113,"HTTP/1\.1\x20400\x20Bad\x SF:20Request\r\nDate:\x20Fri,\x2027\x20Sep\x202024\x2002:19:16\x20GMT\r\nC SF:ontent-Type:\x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20c SF:lose\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head> SF:\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><c SF:enter></center>\r\n</body>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 4.X OS CPE: cpe:/o:linux:linux_kernel:4.0 OS details: Linux 4.0, Linux 4.4 Network Distance: 12 hops Host script results: |_clock-skew: 9s TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.21 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.68 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.75 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.44 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 ... 6 9.60 ms ae-3.r24.snjsca04.us.bb.gin.ntt.net (129.250.4.150) 7 9.32 ms ae-0.a04.snjsca04.us.bb.gin.ntt.net (129.250.2.123) 8 13.94 ms 199.245.24.69 9 ... 10 12.27 ms 51.163.136.122 11 9.48 ms 149.97.222.100 12 12.43 ms 149.97.222.116 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 121.08 seconds