Ports
Duration
Date
IP
Nmap scan report for aconex-oraclegbuprod.uscom-central-1.oraclecloud.com (138.1.33.225) Host is up (0.035s latency). Not shown: 999 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-title: Did not follow redirect to https://idcs-b5252c3476c64882b198158417823d69.identity.oraclecloud.com/oauth2/v1/authorize?response_mode=form_post&response_type=id_token&scope=openid&state=E2ibeHlodzWXCSNEPJMQTjuwlHuLHoQ51tK66Kkign4&nonce=emkov8jU9hW_-9nhQLP_3ZnvnH0JN1xI-OwCLq3Byas&IDCS_IS_CLOUDGATE=true&X-HOST-IDENTIFIER-NAME=aconex-oraclegbuprod.uscom-central-1.oraclecloud.com&idcs_app_name=8a2eebb7c239486aaec12221418a6ac2_APPID&policyAppTenant=idcs-b5252c3476c64882b198158417823d69&idcs_app_resource_url=https%3A%2F%2Faconex-oraclegbuprod.uscom-central-1.oraclecloud.com%2F&IDCS_CLIENT_TENANT=idcsomcphxcomprod&client_id=omc20190311171609204guid_APPID&IDCS_CG_ENC=true&enc=e5GroEsHom-kAgAAagIAABAgagIAAFACAAAQAD0pggWCIxppcmOgypAa55hhlmSEWQdSSI0ja4D-Ve6-1ZqOoEfSdUcaJpU2XOlrTqhG3bD9B5w7t5WMTCPLdXFqUY-o5uHBPn2Vui2T4hYgnhjFiENH3ZvAeH03b7KiAjUEyxxUJNCltBk5G6Odz5jOBQofyKZLFYZPpuld5RDOCCcmicy1OHmehPfL9P5CYMhREbOHZ3ad1aI-2X3Kva6f19BGgffhk9fur55aaWMcw4Wt02XJYUYhTlcEIhXcNvcFBM8DoPt65aVYTmRCkEkhQ8jLlTyxV_GNn53O4Kxt_tPyOS6KsyTj9xv0pHPksxKpAFDaR_UjQyvFTib1aWrh6TlJ7iYbjcIBsgNhZ1Bms0-WnGwxQcgr2hje1JomqCjurg2S0nSsAsnm-urhMmGeGvhZHdt__T2xW7Kf0qlduRSaL19lG_2W4AF1mNrCe701K_wm5_TaZ3mDSQ56HIcPGCseB1YPFtFDu4H4nag0OpxdJB0yOmtNZKSyiq9CIF764b9JyNR9geDPLJZ4sJwAC1Hi75PU-GDsJbGsBPNrvmkGj_3Wv4m95esKe8zB55q3UlABTllF5lQweDun1keygq4U8mRdd_kiZnUpQ6rfANxZT_nFej6em5oDFWKAfRxqLc6vuJVbLhsSINPgCEk55HCmg6mswXv6sNWZqiPznZn0dwoxtSFdkn3RYTfZM4iAB9q5kdQ5RxN-L5VNFaq1EgN-dJq1aV-aQZcw5YxchWwFuMS3BhY5fOm1sNplhKw8ooQn2yKfZM72LQdyCc-ALNSmC8fltrxIoAmzKYQTmMEejkfnW1TioTaa0qDZTDfS2-IrLCAYOHGbJ85cwGlGjCZf8ZJ5dOK7Z9HqfKxm | ssl-cert: Subject: commonName=*.uscom-central-1.oraclecloud.com/organizationName=Oracle Corporation/stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:*.uscom-central-1.oraclecloud.com | Not valid before: 2024-02-26T00:00:00 |_Not valid after: 2025-03-26T23:59:59 | fingerprint-strings: | FourOhFourRequest, GetRequest: | HTTP/1.1 400 Bad Request | Date: Wed, 09 Oct 2024 03:17:01 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | ETag: "60f210a1-9b" | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | <hr><center> </center> | </body> | </html> | HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Wed, 09 Oct 2024 03:17:01 GMT | Content-Type: text/html | Content-Length: 155 | Connection: close | ETag: "60f210a1-9b" | X-Request-ID: 69e54810426d168670b97bd32ee24a70 | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | <hr><center> </center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Wed, 09 Oct 2024 03:17:06 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Date: Wed, 09 Oct 2024 03:17:01 GMT | Content-Type: text/html | Content-Length: 145 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | <hr><center></center> | </body> |_ </html> 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=10/8%Time=6705F5AC%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,132,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20W SF:ed,\x2009\x20Oct\x202024\x2003:17:01\x20GMT\r\nContent-Type:\x20text/ht SF:ml\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nETag:\x20\"60f2 SF:10a1-9b\"\r\n\r\n<html>\n<head><title>400\x20Bad\x20Request</title></he SF:ad>\n<body\x20bgcolor=\"white\">\n<center><h1>400\x20Bad\x20Request</h1 SF:></center>\n<hr><center>\x20</center>\n</body>\n</html>\n")%r(HTTPOptio SF:ns,162,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2009\x20Oc SF:t\x202024\x2003:17:01\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L SF:ength:\x20155\r\nConnection:\x20close\r\nETag:\x20\"60f210a1-9b\"\r\nX- SF:Request-ID:\x2069e54810426d168670b97bd32ee24a70\r\n\r\n<html>\n<head><t SF:itle>400\x20Bad\x20Request</title></head>\n<body\x20bgcolor=\"white\">\ SF:n<center><h1>400\x20Bad\x20Request</h1></center>\n<hr><center>\x20</cen SF:ter>\n</body>\n</html>\n")%r(FourOhFourRequest,132,"HTTP/1\.1\x20400\x2 SF:0Bad\x20Request\r\nDate:\x20Wed,\x2009\x20Oct\x202024\x2003:17:01\x20GM SF:T\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnection SF::\x20close\r\nETag:\x20\"60f210a1-9b\"\r\n\r\n<html>\n<head><title>400\ SF:x20Bad\x20Request</title></head>\n<body\x20bgcolor=\"white\">\n<center> SF:<h1>400\x20Bad\x20Request</h1></center>\n<hr><center>\x20</center>\n</b SF:ody>\n</html>\n")%r(tor-versions,113,"HTTP/1\.1\x20400\x20Bad\x20Reques SF:t\r\nDate:\x20Wed,\x2009\x20Oct\x202024\x2003:17:01\x20GMT\r\nContent-T SF:ype:\x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\n SF:\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<bod SF:y>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center></ SF:center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,91,"<html>\r\n<head>< SF:title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400 SF:\x20Bad\x20Request</h1></center>\r\n<hr><center></center>\r\n</body>\r\ SF:n</html>\r\n")%r(RPCCheck,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDa SF:te:\x20Wed,\x2009\x20Oct\x202024\x2003:17:06\x20GMT\r\nContent-Type:\x2 SF:0text/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\n\r\n<ht SF:ml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n< SF:center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center></center> SF:\r\n</body>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: specialized|storage-misc Running (JUST GUESSING): Crestron 2-Series (87%), HP embedded (85%) OS CPE: cpe:/o:crestron:2_series cpe:/h:hp:p2000_g3 Aggressive OS guesses: Crestron XPanel control system (87%), HP P2000 G3 NAS device (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 8 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.64 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.74 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.65 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 1.08 ms ae-16.r24.lsanca07.us.bb.gin.ntt.net (129.250.3.78) 6 9.86 ms ae-0.a03.lsanca07.us.bb.gin.ntt.net (129.250.3.140) 7 31.89 ms 140.91.195.173 8 35.34 ms 138.1.33.225 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 34.74 seconds