Ports
Duration
Date
IP
Nmap scan report for p11509.therapy.nethealth.com (74.63.137.114) Host is up (0.037s latency). Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 7/tcp closed echo 80/tcp closed http 82/tcp closed xfer 443/tcp open ssl/https? |_ssl-date: TLS randomness does not represent time | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, SSLSessionReq, TerminalServerCookie, tor-versions: | HTTP/1.1 400 Bad Request | Connection: Close | Content-Type: text/html; charset=iso-8859-1 | <HTML><HEAD> | <TITLE>400 Bad Request</TITLE> | </HEAD><BODY> | <H1>Bad Request</H1> | Your browser sent a request that this server could not understand.<P><HR> |_ </BODY></HTML> | ssl-cert: Subject: commonName=*.therapy.nethealth.com/organizationName=Net Health Systems, Inc./stateOrProvinceName=Pennsylvania/countryName=US | Subject Alternative Name: DNS:*.therapy.nethealth.com | Not valid before: 2024-07-30T00:00:00 |_Not valid after: 2025-08-30T23:59:59 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=10/7%Time=67039A64%P=x86_64-redhat-linux SF:-gnu%r(tor-versions,104,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnecti SF:on:\x20Close\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1\r\n\r SF:\n<HTML><HEAD>\n<TITLE>400\x20Bad\x20Request</TITLE>\n</HEAD><BODY>\n<H SF:1>Bad\x20Request</H1>\nYour\x20browser\x20sent\x20a\x20request\x20that\ SF:x20this\x20server\x20could\x20not\x20understand\.<P><HR>\n</BODY></HTML SF:>\n")%r(RPCCheck,104,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection: SF:\x20Close\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1\r\n\r\n< SF:HTML><HEAD>\n<TITLE>400\x20Bad\x20Request</TITLE>\n</HEAD><BODY>\n<H1>B SF:ad\x20Request</H1>\nYour\x20browser\x20sent\x20a\x20request\x20that\x20 SF:this\x20server\x20could\x20not\x20understand\.<P><HR>\n</BODY></HTML>\n SF:")%r(DNSVersionBindReqTCP,104,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCo SF:nnection:\x20Close\r\nContent-Type:\x20text/html;\x20charset=iso-8859-1 SF:\r\n\r\n<HTML><HEAD>\n<TITLE>400\x20Bad\x20Request</TITLE>\n</HEAD><BOD SF:Y>\n<H1>Bad\x20Request</H1>\nYour\x20browser\x20sent\x20a\x20request\x2 SF:0that\x20this\x20server\x20could\x20not\x20understand\.<P><HR>\n</BODY> SF:</HTML>\n")%r(DNSStatusRequestTCP,104,"HTTP/1\.1\x20400\x20Bad\x20Reque SF:st\r\nConnection:\x20Close\r\nContent-Type:\x20text/html;\x20charset=is SF:o-8859-1\r\n\r\n<HTML><HEAD>\n<TITLE>400\x20Bad\x20Request</TITLE>\n</H SF:EAD><BODY>\n<H1>Bad\x20Request</H1>\nYour\x20browser\x20sent\x20a\x20re SF:quest\x20that\x20this\x20server\x20could\x20not\x20understand\.<P><HR>\ SF:n</BODY></HTML>\n")%r(SSLSessionReq,104,"HTTP/1\.1\x20400\x20Bad\x20Req SF:uest\r\nConnection:\x20Close\r\nContent-Type:\x20text/html;\x20charset= SF:iso-8859-1\r\n\r\n<HTML><HEAD>\n<TITLE>400\x20Bad\x20Request</TITLE>\n< SF:/HEAD><BODY>\n<H1>Bad\x20Request</H1>\nYour\x20browser\x20sent\x20a\x20 SF:request\x20that\x20this\x20server\x20could\x20not\x20understand\.<P><HR SF:>\n</BODY></HTML>\n")%r(TerminalServerCookie,104,"HTTP/1\.1\x20400\x20B SF:ad\x20Request\r\nConnection:\x20Close\r\nContent-Type:\x20text/html;\x2 SF:0charset=iso-8859-1\r\n\r\n<HTML><HEAD>\n<TITLE>400\x20Bad\x20Request</ SF:TITLE>\n</HEAD><BODY>\n<H1>Bad\x20Request</H1>\nYour\x20browser\x20sent SF:\x20a\x20request\x20that\x20this\x20server\x20could\x20not\x20understan SF:d\.<P><HR>\n</BODY></HTML>\n"); Aggressive OS guesses: Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (98%), Linux 2.6.18 (98%), AXIS 211A Network Camera (Linux 2.6.20) (98%), Linux 2.6.16 (98%), Linux 3.0 - 3.1 (94%), Asus RT-AC66U router (Linux 2.6) (94%), HP MSL4048 tape library (94%), Linux 2.6.32 - 3.10 (94%), Citrix XenServer 5.5 (Linux 2.6.18) (94%), Linux 2.6.16 - 2.6.21 (94%) No exact OS matches for host (test conditions non-ideal). Network Distance: 19 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.24 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.11 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.50 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 26.48 ms ae-0.gtt.lsanca07.us.bb.gin.ntt.net (129.250.9.106) 6 0.57 ms ae6.cr8-lax2.ip4.gtt.net (89.149.183.38) 7 1.17 ms 72.29.215.55 8 31.65 ms be22.bbrt02.lax10.flexential.net (148.66.237.204) 9 31.86 ms be154.bbrt02.las05.flexential.net (148.66.236.2) 10 30.00 ms be10.bbrt01.las05.flexential.net (66.51.7.89) 11 29.91 ms be102.bbrt02.slc09.flexential.net (66.51.5.41) 12 30.17 ms be150.bbrt01.slc04.flexential.net (66.51.9.125) 13 30.34 ms be10.bbrt02.slc04.flexential.net (66.51.5.18) 14 31.79 ms be151.bbrt01.slc07.flexential.net (66.51.9.130) 15 29.78 ms be103.bbrt01.den03.flexential.net (66.51.5.45) 16 30.18 ms 66.51.5.56 17 29.92 ms vl60.aggm03.den05.viawest.net (66.51.2.109) 18 31.51 ms 74.63.137.100 19 36.95 ms 74.63.137.114 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 51.85 seconds