Ports
Duration
Date
IP
Nmap scan report for p1cfaui.renxt.blackbaud.com (209.160.103.43) Host is up (0.025s latency). Other addresses for p1cfaui.renxt.blackbaud.com (not scanned): 209.160.103.156 209.160.103.110 Not shown: 983 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | GetRequest: | HTTP/1.1 409 Conflict | Date: Wed, 08 Jan 2025 18:20:56 GMT | Content-Type: text/html | Content-Length: 26622 | Connection: close | ETag: "66a1970b-67fe" | section-ingress: not-configured | section-io-id: db2868643969af88708576d163388641 | <!DOCTYPE html> | <html> | <head> | <meta charset="utf-8"> | <title>Status 409</title> | <meta name="viewport" content="width=device-width, initial-scale=1"> | <style> | html, body { | font-family: 'Roboto', sans-serif; | height: 100vh; | font-size: 16px; | color: #495057; | width: 100%; | margin: 0 auto; | background: #f8f9fa; | font-weight: 400; | line-height: 1.625rem; | .header { | padding-top: 3rem; | padding-bottom: 3rem; | .header .image { | display: flex; | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Wed, 08 Jan 2025 18:21:01 GMT | Content-Type: text/html | Content-Length: 116 | Connection: close | ETag: "670de762-74" | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-title: 406 Not Acceptable 443/tcp open ssl/https |_http-title: 406 Not Acceptable | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck: | HTTP/1.1 400 Bad Request | Date: Wed, 08 Jan 2025 18:21:07 GMT | Content-Type: text/html | Content-Length: 116 | Connection: close | ETag: "670de762-74" | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | Help, SSLSessionReq: | HTTP/1.1 400 Bad Request | Date: Wed, 08 Jan 2025 18:21:08 GMT | Content-Type: text/html | Content-Length: 116 | Connection: close | ETag: "670de762-74" | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Date: Wed, 08 Jan 2025 18:21:02 GMT | Content-Type: text/html | Content-Length: 116 | Connection: close | ETag: "670de762-74" | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> | ssl-cert: Subject: commonName=*.renxt.blackbaud.com/organizationName=Blackbaud, Inc./stateOrProvinceName=South Carolina/countryName=US | Subject Alternative Name: DNS:*.renxt.blackbaud.com, DNS:renxt.blackbaud.com | Not valid before: 2024-03-14T00:00:00 |_Not valid after: 2025-04-14T23:59:59 |_ssl-date: TLS randomness does not represent time 20000/tcp closed dnp 20005/tcp closed btx 20031/tcp closed unknown 20221/tcp closed unknown 20222/tcp closed ipulse-ics 20828/tcp closed unknown 21571/tcp closed unknown 22939/tcp closed unknown 23502/tcp closed unknown 24444/tcp closed unknown 24800/tcp closed unknown 25734/tcp closed unknown 25735/tcp closed unknown 26214/tcp closed unknown 27000/tcp closed flexlm0 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=1/8%Time=677EC208%P=x86_64-redhat-linux-gnu%r(G SF:etRequest,3890,"HTTP/1\.1\x20409\x20Conflict\r\nDate:\x20Wed,\x2008\x20 SF:Jan\x202025\x2018:20:56\x20GMT\r\nContent-Type:\x20text/html\r\nContent SF:-Length:\x2026622\r\nConnection:\x20close\r\nETag:\x20\"66a1970b-67fe\" SF:\r\nsection-ingress:\x20not-configured\r\nsection-io-id:\x20db286864396 SF:9af88708576d163388641\r\n\r\n<!DOCTYPE\x20html>\n<html>\n<head>\n\x20\x SF:20\x20\x20<meta\x20charset=\"utf-8\">\n\x20\x20\x20\x20<title>Status\x2 SF:0409</title>\n\x20\x20\x20\x20<meta\x20name=\"viewport\"\x20content=\"w SF:idth=device-width,\x20initial-scale=1\">\n\n\x20\x20\x20\x20<style>\n\x SF:20\x20\x20\x20\x20\x20\x20\x20html,\x20body\x20{\n\x20\x20\x20\x20\x20\ SF:x20\x20\x20\x20\x20\x20\x20font-family:\x20'Roboto',\x20sans-serif;\n\x SF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20height:\x20100vh;\n\x20\x SF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20font-size:\x2016px;\n\x20\x20 SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20color:\x20#495057;\n\x20\x20\x2 SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20width:\x20100%;\n\x20\x20\x20\x20\ SF:x20\x20\x20\x20\x20\x20\x20\x20margin:\x200\x20auto;\n\x20\x20\x20\x20\ SF:x20\x20\x20\x20\x20\x20\x20\x20background:\x20#f8f9fa;\n\x20\x20\x20\x2 SF:0\x20\x20\x20\x20}\n\n\x20\x20\x20\x20\x20\x20\x20\x20p\x20{\n\x20\x20\ SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20font-weight:\x20400;\n\x20\x20\x SF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20line-height:\x201\.625rem;\n\x20\ SF:x20\x20\x20\x20\x20\x20\x20}\n\n\x20\x20\x20\x20\x20\x20\x20\x20\.heade SF:r\x20{\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20padding-top:\x2 SF:03rem;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20padding-bottom: SF:\x203rem;\n\x20\x20\x20\x20\x20\x20\x20\x20}\n\n\x20\x20\x20\x20\x20\x2 SF:0\x20\x20\.header\x20\.image\x20{\n\x20\x20\x20\x20\x20\x20\x20\x20\x20 SF:\x20\x20\x20display:\x20flex;\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20 SF:")%r(RPCCheck,10B,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\ SF:x2008\x20Jan\x202025\x2018:21:01\x20GMT\r\nContent-Type:\x20text/html\r SF:\nContent-Length:\x20116\r\nConnection:\x20close\r\nETag:\x20\"670de762 SF:-74\"\r\n\r\n<html>\n<head><title>400\x20Bad\x20Request</title></head>\ SF:n<body>\n<center><h1>400\x20Bad\x20Request</h1></center>\n</body>\n</ht SF:ml>\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=1/8%Time=677EC20E%P=x86_64-redhat-linux- SF:gnu%r(tor-versions,10B,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20 SF:Wed,\x2008\x20Jan\x202025\x2018:21:02\x20GMT\r\nContent-Type:\x20text/h SF:tml\r\nContent-Length:\x20116\r\nConnection:\x20close\r\nETag:\x20\"670 SF:de762-74\"\r\n\r\n<html>\n<head><title>400\x20Bad\x20Request</title></h SF:ead>\n<body>\n<center><h1>400\x20Bad\x20Request</h1></center>\n</body>\ SF:n</html>\n")%r(RTSPRequest,74,"<html>\n<head><title>400\x20Bad\x20Reque SF:st</title></head>\n<body>\n<center><h1>400\x20Bad\x20Request</h1></cent SF:er>\n</body>\n</html>\n")%r(RPCCheck,10B,"HTTP/1\.1\x20400\x20Bad\x20Re SF:quest\r\nDate:\x20Wed,\x2008\x20Jan\x202025\x2018:21:07\x20GMT\r\nConte SF:nt-Type:\x20text/html\r\nContent-Length:\x20116\r\nConnection:\x20close SF:\r\nETag:\x20\"670de762-74\"\r\n\r\n<html>\n<head><title>400\x20Bad\x20 SF:Request</title></head>\n<body>\n<center><h1>400\x20Bad\x20Request</h1>< SF:/center>\n</body>\n</html>\n")%r(DNSVersionBindReqTCP,10B,"HTTP/1\.1\x2 SF:0400\x20Bad\x20Request\r\nDate:\x20Wed,\x2008\x20Jan\x202025\x2018:21:0 SF:7\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20116\r\nCon SF:nection:\x20close\r\nETag:\x20\"670de762-74\"\r\n\r\n<html>\n<head><tit SF:le>400\x20Bad\x20Request</title></head>\n<body>\n<center><h1>400\x20Bad SF:\x20Request</h1></center>\n</body>\n</html>\n")%r(DNSStatusRequestTCP,1 SF:0B,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2008\x20Jan\x2 SF:02025\x2018:21:07\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Lengt SF:h:\x20116\r\nConnection:\x20close\r\nETag:\x20\"670de762-74\"\r\n\r\n<h SF:tml>\n<head><title>400\x20Bad\x20Request</title></head>\n<body>\n<cente SF:r><h1>400\x20Bad\x20Request</h1></center>\n</body>\n</html>\n")%r(Help, SF:10B,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2008\x20Jan\x SF:202025\x2018:21:08\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Leng SF:th:\x20116\r\nConnection:\x20close\r\nETag:\x20\"670de762-74\"\r\n\r\n< SF:html>\n<head><title>400\x20Bad\x20Request</title></head>\n<body>\n<cent SF:er><h1>400\x20Bad\x20Request</h1></center>\n</body>\n</html>\n")%r(SSLS SF:essionReq,10B,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x200 SF:8\x20Jan\x202025\x2018:21:08\x20GMT\r\nContent-Type:\x20text/html\r\nCo SF:ntent-Length:\x20116\r\nConnection:\x20close\r\nETag:\x20\"670de762-74\ SF:"\r\n\r\n<html>\n<head><title>400\x20Bad\x20Request</title></head>\n<bo SF:dy>\n<center><h1>400\x20Bad\x20Request</h1></center>\n</body>\n</html>\ SF:n"); Aggressive OS guesses: Linux 2.6.32 (94%), Linux 2.6.32 or 3.10 (93%), Linux 4.4 (93%), Linux 2.6.32 - 2.6.35 (92%), Linux 2.6.32 - 2.6.39 (92%), Linux 4.0 (91%), Linux 3.11 - 4.1 (89%), Linux 3.2 - 3.8 (89%), Linux 5.0 - 5.4 (89%), Linux 2.6.18 (89%) No exact OS matches for host (test conditions non-ideal). Network Distance: 11 hops TRACEROUTE (using port 20000/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.47 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.66 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 1.26 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146) 5 ... 10 11 24.29 ms 209.160.103.43 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 38.43 seconds