Scan report for "bbg.sc.omtrdc.net"

Membership level: Free member
Scan OS information and Traceroute (nmap -A bbg.sc.omtrdc.net)
Nmap scan report for bbg.sc.omtrdc.net (63.140.37.126)
Host is up (0.027s latency).
Other addresses for bbg.sc.omtrdc.net (not scanned): 63.140.36.145 63.140.36.51 63.140.37.206
rDNS record for 63.140.37.126: ip-63-140-37-126.data.adobedc.net
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http      jag
|_http-title: Site doesn't have a title.
|_http-server-header: jag
| fingerprint-strings: 
|   DNSStatusRequestTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 03 Apr 2024 20:06:24 GMT
|     server: jag
|     connection: close
|     Request
|   DNSVersionBindReqTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 03 Apr 2024 20:06:23 GMT
|     server: jag
|     connection: close
|     Request
|   FourOhFourRequest: 
|     HTTP/1.0 404 Not Found
|     date: Wed, 03 Apr 2024 20:06:16 GMT
|     server: jag
|     connection: close
|     content-length: 0
|   GetRequest, HTTPOptions: 
|     HTTP/1.0 200 OK
|     cache-control: no-cache, no-store, max-age=0, no-transform, private
|     x-xss-protection: 1; mode=block
|     x-content-type-options: nosniff
|     date: Wed, 03 Apr 2024 20:06:14 GMT
|     server: jag
|     connection: close
|     content-length: 0
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 03 Apr 2024 20:06:22 GMT
|     server: jag
|     connection: close
|     Request
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 03 Apr 2024 20:06:14 GMT
|     server: jag
|     connection: close
|     Request
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 03 Apr 2024 20:06:15 GMT
|     server: jag
|     connection: close
|_    Request
443/tcp open  ssl/https jag
|_http-title: Site doesn't have a title.
|_http-server-header: jag
|_ssl-date: TLS randomness does not represent time
| fingerprint-strings: 
|   DNSStatusRequestTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 03 Apr 2024 20:06:31 GMT
|     server: jag
|     connection: close
|     Request
|   DNSVersionBindReqTCP: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 03 Apr 2024 20:06:30 GMT
|     server: jag
|     connection: close
|     Request
|   FourOhFourRequest: 
|     HTTP/1.0 404 Not Found
|     date: Wed, 03 Apr 2024 20:06:20 GMT
|     server: jag
|     connection: close
|     content-length: 0
|   GetRequest, HTTPOptions: 
|     HTTP/1.0 200 OK
|     cache-control: no-cache, no-store, max-age=0, no-transform, private
|     x-xss-protection: 1; mode=block
|     x-content-type-options: nosniff
|     date: Wed, 03 Apr 2024 20:06:20 GMT
|     server: jag
|     connection: close
|     content-length: 0
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 03 Apr 2024 20:06:29 GMT
|     server: jag
|     connection: close
|     Request
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 03 Apr 2024 20:06:28 GMT
|     server: jag
|     connection: close
|     Request
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     content-length: 11
|     content-type: text/plain
|     date: Wed, 03 Apr 2024 20:06:21 GMT
|     server: jag
|     connection: close
|_    Request
| tls-alpn: 
|   h2
|_  http/1.1
| ssl-cert: Subject: commonName=*.sc.omtrdc.net/organizationName=Adobe Inc./stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.sc.omtrdc.net
| Not valid before: 2024-02-07T00:00:00
|_Not valid after:  2025-03-09T23:59:59
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=4/3%Time=660DB6B5%P=x86_64-redhat-linux-gnu%r(G
SF:etRequest,F2,"HTTP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cache,\x20
SF:no-store,\x20max-age=0,\x20no-transform,\x20private\r\nx-xss-protection
SF::\x201;\x20mode=block\r\nx-content-type-options:\x20nosniff\r\ndate:\x2
SF:0Wed,\x2003\x20Apr\x202024\x2020:06:14\x20GMT\r\nserver:\x20jag\r\nconn
SF:ection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,F2,"HT
SF:TP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cache,\x20no-store,\x20max
SF:-age=0,\x20no-transform,\x20private\r\nx-xss-protection:\x201;\x20mode=
SF:block\r\nx-content-type-options:\x20nosniff\r\ndate:\x20Wed,\x2003\x20A
SF:pr\x202024\x2020:06:14\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close
SF:\r\ncontent-length:\x200\r\n\r\n")%r(RTSPRequest,9A,"HTTP/1\.1\x20400\x
SF:20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plai
SF:n\r\ndate:\x20Wed,\x2003\x20Apr\x202024\x2020:06:14\x20GMT\r\nserver:\x
SF:20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9A,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-ty
SF:pe:\x20text/plain\r\ndate:\x20Wed,\x2003\x20Apr\x202024\x2020:06:15\x20
SF:GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r
SF:(FourOhFourRequest,72,"HTTP/1\.0\x20404\x20Not\x20Found\r\ndate:\x20Wed
SF:,\x2003\x20Apr\x202024\x2020:06:16\x20GMT\r\nserver:\x20jag\r\nconnecti
SF:on:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9A,"HTTP/1\.1
SF:\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20
SF:text/plain\r\ndate:\x20Wed,\x2003\x20Apr\x202024\x2020:06:22\x20GMT\r\n
SF:server:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(DNSVer
SF:sionBindReqTCP,9A,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length
SF::\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2003\x20Apr\x2
SF:02024\x2020:06:23\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\n\
SF:r\nBad\x20Request")%r(DNSStatusRequestTCP,9A,"HTTP/1\.1\x20400\x20Bad\x
SF:20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\nda
SF:te:\x20Wed,\x2003\x20Apr\x202024\x2020:06:24\x20GMT\r\nserver:\x20jag\r
SF:\nconnection:\x20close\r\n\r\nBad\x20Request");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=4/3%Time=660DB6BC%P=x86_64-redhat-linux-
SF:gnu%r(GetRequest,F2,"HTTP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cac
SF:he,\x20no-store,\x20max-age=0,\x20no-transform,\x20private\r\nx-xss-pro
SF:tection:\x201;\x20mode=block\r\nx-content-type-options:\x20nosniff\r\nd
SF:ate:\x20Wed,\x2003\x20Apr\x202024\x2020:06:20\x20GMT\r\nserver:\x20jag\
SF:r\nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions
SF:,F2,"HTTP/1\.0\x20200\x20OK\r\ncache-control:\x20no-cache,\x20no-store,
SF:\x20max-age=0,\x20no-transform,\x20private\r\nx-xss-protection:\x201;\x
SF:20mode=block\r\nx-content-type-options:\x20nosniff\r\ndate:\x20Wed,\x20
SF:03\x20Apr\x202024\x2020:06:20\x20GMT\r\nserver:\x20jag\r\nconnection:\x
SF:20close\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,72,"HTTP/
SF:1\.0\x20404\x20Not\x20Found\r\ndate:\x20Wed,\x2003\x20Apr\x202024\x2020
SF::06:20\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\ncontent-leng
SF:th:\x200\r\n\r\n")%r(tor-versions,9A,"HTTP/1\.1\x20400\x20Bad\x20Reques
SF:t\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20W
SF:ed,\x2003\x20Apr\x202024\x2020:06:21\x20GMT\r\nserver:\x20jag\r\nconnec
SF:tion:\x20close\r\n\r\nBad\x20Request")%r(RTSPRequest,9A,"HTTP/1\.1\x204
SF:00\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/
SF:plain\r\ndate:\x20Wed,\x2003\x20Apr\x202024\x2020:06:28\x20GMT\r\nserve
SF:r:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(RPCCheck,9A
SF:,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\nconten
SF:t-type:\x20text/plain\r\ndate:\x20Wed,\x2003\x20Apr\x202024\x2020:06:29
SF:\x20GMT\r\nserver:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request
SF:")%r(DNSVersionBindReqTCP,9A,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncon
SF:tent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x200
SF:3\x20Apr\x202024\x2020:06:30\x20GMT\r\nserver:\x20jag\r\nconnection:\x2
SF:0close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9A,"HTTP/1\.1\x204
SF:00\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/
SF:plain\r\ndate:\x20Wed,\x2003\x20Apr\x202024\x2020:06:31\x20GMT\r\nserve
SF:r:\x20jag\r\nconnection:\x20close\r\n\r\nBad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 18 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   12.01 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.73 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.79 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.28 ms  206.72.211.146.any2ix.coresite.com (206.72.211.146)
5   ... 6
7   26.16 ms 52.93.14.78
8   26.82 ms 52.93.14.109
9   27.16 ms 52.93.12.36
10  27.91 ms 52.93.14.209
11  55.70 ms 52.93.240.51
12  ... 17
18  27.93 ms ip-63-140-37-126.data.adobedc.net (63.140.37.126)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 63.29 seconds
Color Scheme
Target
bbg.sc.omtrdc.net
Target IP
63.140.37.126
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A bbg.sc.omtrdc.net
Scan date
03 Apr 2024 16:07
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: