169.143.8.15


hostname: 169.143.8.15
open ports: [80, 443]
# Nmap 7.80 scan initiated Sat Sep 19 01:40:19 2020 as: nmap -oA data/nweb.l5sble4924 -sC -sV --open -Pn --system-dns -p "80, 443" 169.143.8.15
Nmap scan report for 169.143.8.15
Host is up (0.14s latency).

PORT    STATE SERVICE    VERSION
80/tcp  open  http       Citrix NetScaler https redirect
|_http-title: Did not follow redirect to https://myapps-sea.jeppesen.com/
443/tcp open  ssl/https?
| http-title: Netscaler Gateway
|_Requested resource was /vpn/index.html
|_http-trane-info: Problem with XML parsing of /evox/about
| ssl-cert: Subject: commonName=myapps-sea.jeppesen.com/organizationName=Boeing Digital Solutions, Inc/stateOrProvinceName=Colorado/countryName=US
| Subject Alternative Name: DNS:myapps-sea.jeppesen.com
| Not valid before: 2020-06-18T13:21:23
|_Not valid after:  2022-06-18T13:21:22
|_ssl-date: 2020-09-19T01:41:34+00:00; -37s from scanner time.
| tls-alpn: 
|_  http/1.1
Service Info: Device: load balancer

Host script results:
|_clock-skew: -37s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:42:12 2020 -- 1 IP address (1 host up) scanned in 113.63 seconds

107.80.62.37


hostname: mobile-107-80-62-37.mycingular.net
open ports: [3000]
# Nmap 7.80 scan initiated Sat Sep 19 01:41:58 2020 as: nmap -oA data/nweb.zz6nu87cfw -sC -sV --open -Pn --system-dns -p 3000 107.80.62.37
Nmap scan report for mobile-107-80-62-37.mycingular.net (107.80.62.37)
Host is up (0.14s latency).

PORT     STATE SERVICE VERSION
3000/tcp open  ssh     OpenSSH 6.0p1 Debian 4 (protocol 2.0)
| ssh-hostkey: 
|   1024 a3:d5:55:fb:9d:36:a7:13:e8:2c:d3:8a:17:4b:c9:39 (DSA)
|_  2048 93:b6:89:1c:47:c1:be:9a:29:4a:22:47:91:08:65:bb (RSA)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:42:03 2020 -- 1 IP address (1 host up) scanned in 5.66 seconds

141.47.140.3


hostname: vpnstud02.hs-pforzheim.de
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:40:07 2020 as: nmap -oA data/nweb.c69uhlmi22 -sC -sV --open -Pn --system-dns -p 443 141.47.140.3
Nmap scan report for vpnstud02.hs-pforzheim.de (141.47.140.3)
Host is up (0.0054s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?
|_ssl-date: 2020-09-19T01:40:53+00:00; 0s from scanner time.

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:41:53 2020 -- 1 IP address (1 host up) scanned in 105.87 seconds

166.111.25.33


hostname: 166.111.25.33
open ports: [22]
# Nmap 7.80 scan initiated Sat Sep 19 01:41:32 2020 as: nmap -oA data/nweb.p9lvxby4x7 -sC -sV --open -Pn --system-dns -p 22 166.111.25.33
Nmap scan report for 166.111.25.33
Host is up (0.35s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.4 (protocol 2.0)
| ssh-hostkey: 
|   2048 52:93:40:a2:d1:3c:87:95:af:8f:d8:14:9d:2d:02:22 (RSA)
|   256 43:eb:37:4d:aa:e9:71:9e:00:63:7c:e6:d9:2a:5d:cb (ECDSA)
|_  256 5d:e1:08:f3:6a:03:e3:76:35:6d:22:5c:3a:eb:07:6e (ED25519)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:41:44 2020 -- 1 IP address (1 host up) scanned in 11.94 seconds

141.63.4.48


hostname: www.amf.bam.de
open ports: [80]
HTTP

# Nmap 7.80 scan initiated Sat Sep 19 01:41:33 2020 as: nmap -oA data/nweb.jdjrnqmhzs -sC -sV --open -Pn --system-dns -p 80 141.63.4.48
Nmap scan report for www.amf.bam.de (141.63.4.48)
Host is up (0.016s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd
|_http-server-header: Apache
|_http-title: Site doesn't have a title (text/html).

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:41:40 2020 -- 1 IP address (1 host up) scanned in 7.32 seconds

210.190.157.235


hostname: kansai-kinzoku.jp
open ports: [21, 80, 110, 143, 443, 993, 995]
HTTP

HTTPS

# Nmap 7.80 scan initiated Sat Sep 19 01:38:21 2020 as: nmap -oA data/nweb.b7oleavxu1 -sC -sV --open -Pn --system-dns -p "21, 25, 80, 110, 143, 443, 587, 993, 995" 210.190.157.235
Nmap scan report for kansai-kinzoku.jp (210.190.157.235)
Host is up (0.26s latency).
Not shown: 2 filtered ports
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE    VERSION
21/tcp  open  ftp        ProFTPD or KnFTPD
|_ssl-date: 2020-09-19T01:38:56+00:00; 0s from scanner time.
80/tcp  open  http       Apache httpd
|_http-server-header: Apache
|_http-title: \xE9\x96\xA2\xE8\xA5\xBF\xE9\x87\x91\xE5\xB1\x9E\xE6\xA0\xAA\xE5\xBC\x8F\xE4\xBC\x9A\xE7\xA4\xBE | \xE9\x9D\x9E\xE9\x89\x84\xE9\x87\x91\xE5\xB1\x9E\xE7\xB4\xA0\xE6\x9D\x90\xE3\x81\xAE\xE5\xB0\x82\xE9\x96\x80\xE5\x95\x86\xE7\xA4\xBE
110/tcp open  pop3       Dovecot pop3d
|_pop3-capabilities: SASL(PLAIN LOGIN) STLS CAPA AUTH-RESP-CODE RESP-CODES USER TOP UIDL PIPELINING
|_ssl-date: 2020-09-19T01:38:56+00:00; 0s from scanner time.
| sslv2: 
|   SSLv2 supported
|_  ciphers: none
143/tcp open  imap       Dovecot imapd
|_imap-capabilities: more AUTH=PLAIN Pre-login LITERAL+ ENABLE IDLE LOGIN-REFERRALS post-login ID listed STARTTLS AUTH=LOGINA0001 have OK SASL-IR capabilities IMAP4rev1
|_ssl-date: 2020-09-19T01:38:56+00:00; -1s from scanner time.
| sslv2: 
|   SSLv2 supported
|_  ciphers: none
443/tcp open  ssl/http   Apache httpd
|_http-title: \xE9\x96\xA2\xE8\xA5\xBF\xE9\x87\x91\xE5\xB1\x9E\xE6\xA0\xAA\xE5\xBC\x8F\xE4\xBC\x9A\xE7\xA4\xBE | \xE9\x9D\x9E\xE9\x89\x84\xE9\x87\x91\xE5\xB1\x9E\xE7\xB4\xA0\xE6\x9D\x90\xE3\x81\xAE\xE5\xB0\x82\xE9\x96\x80\xE5\x95\x86\xE7\xA4\xBE
| ssl-cert: Subject: commonName=*.bizmw.com/organizationName=NTT Communications Corporation/stateOrProvinceName=TOKYO/countryName=JP
| Subject Alternative Name: DNS:*.bizmw.com, DNS:bizmw.com
| Not valid before: 2019-10-16T06:50:43
|_Not valid after:  2021-10-31T14:59:59
|_ssl-date: 2020-09-19T01:38:55+00:00; 0s from scanner time.
993/tcp open  ssl/imaps?
|_ssl-date: 2020-09-19T01:38:56+00:00; 0s from scanner time.
| sslv2: 
|   SSLv2 supported
|_  ciphers: none
995/tcp open  ssl/pop3s?
|_ssl-date: 2020-09-19T01:38:56+00:00; 0s from scanner time.
| sslv2: 
|   SSLv2 supported
|_  ciphers: none
Service Info: OS: Unix

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:41:19 2020 -- 1 IP address (1 host up) scanned in 177.18 seconds

197.252.255.245


hostname: 197.252.255.245
open ports: [21, 23]
# Nmap 7.80 scan initiated Sat Sep 19 01:41:10 2020 as: nmap -oA data/nweb.fdg30w5k12 -sC -sV --open -Pn --system-dns -p "21, 23" 197.252.255.245
Nmap scan report for 197.252.255.245
Host is up (0.080s latency).

PORT   STATE SERVICE    VERSION
21/tcp open  ftp        vsftpd 2.0.8 or later
23/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:41:29 2020 -- 1 IP address (1 host up) scanned in 18.58 seconds

212.126.19.180


hostname: 212.126.19.180
open ports: [2000]
# Nmap 7.80 scan initiated Sat Sep 19 01:38:07 2020 as: nmap -oA data/nweb.cuttt8a513 -sC -sV --open -Pn --system-dns -p 2000 212.126.19.180
Nmap scan report for 212.126.19.180
Host is up (0.020s latency).

PORT     STATE SERVICE     VERSION
2000/tcp open  cisco-sccp?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:41:04 2020 -- 1 IP address (1 host up) scanned in 177.86 seconds

141.194.40.1


hostname: 141.194.40.1
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:40:42 2020 as: nmap -oA data/nweb.1wwecdtw08 -sC -sV --open -Pn --system-dns -p 443 141.194.40.1
Nmap scan report for 141.194.40.1
Host is up (0.011s latency).

PORT    STATE SERVICE        VERSION
443/tcp open  ssl/http-proxy F5 BIG-IP load balancer http proxy
|_http-server-header: BigIP
|_http-title: PAX-RNH-ADC-DMZPUB 400 Bad Request
| ssl-cert: Subject: commonName=blr-indus.michelin.com/organizationName=Manufacture Francaise des Pneumatiques Michelin/countryName=FR
| Subject Alternative Name: DNS:blr-indus.michelin.com
| Not valid before: 2020-06-26T00:00:00
|_Not valid after:  2021-06-26T12:00:00
Service Info: Device: load balancer

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:40:56 2020 -- 1 IP address (1 host up) scanned in 13.81 seconds

104.74.195.37


hostname: a104-74-195-37.deploy.static.akamaitechnologies.com
open ports: [80]
# Nmap 7.80 scan initiated Sat Sep 19 01:40:28 2020 as: nmap -oA data/nweb.dgdi0yiibc -sC -sV --open -Pn --system-dns -p 80 104.74.195.37
Nmap scan report for a104-74-195-37.deploy.static.akamaitechnologies.com (104.74.195.37)
Host is up (0.27s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    AkamaiGHost (Akamai's HTTP Acceleration/Mirror service)
|_http-title: Invalid URL

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:40:42 2020 -- 1 IP address (1 host up) scanned in 14.64 seconds

108.48.173.43


hostname: static-108-48-173-43.washdc.fios.verizon.net
open ports: [8080]
# Nmap 7.80 scan initiated Sat Sep 19 01:39:11 2020 as: nmap -oA data/nweb.a4l60s38wp -sC -sV --open -Pn --system-dns -p 8080 108.48.173.43
Nmap scan report for static-108-48-173-43.washdc.fios.verizon.net (108.48.173.43)
Host is up (0.10s latency).

PORT     STATE SERVICE VERSION
8080/tcp open  http    DD-WRT milli_httpd
|_http-server-header: httpd
|_http-title: Glenn Stunkel (build 27858) - Info
Service Info: OS: Linux; Device: broadband router; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:39:30 2020 -- 1 IP address (1 host up) scanned in 18.90 seconds

186.129.255.166


hostname: 186-129-255-166.static.speedy.com.ar
open ports: [1433]
# Nmap 7.80 scan initiated Sat Sep 19 01:40:09 2020 as: nmap -oA data/nweb.n5nqkkn9u6 -sC -sV --open -Pn --system-dns -p 1433 186.129.255.166
Nmap scan report for 186-129-255-166.static.speedy.com.ar (186.129.255.166)
Host is up (0.26s latency).

PORT     STATE SERVICE  VERSION
1433/tcp open  ms-sql-s Microsoft SQL Server 2012 11.00.2100.00; RTM
| ms-sql-ntlm-info: 
|   Target_Name: DOMINIO
|   NetBIOS_Domain_Name: DOMINIO
|   NetBIOS_Computer_Name: SERVERGECLISA
|   DNS_Domain_Name: dominio.local
|   DNS_Computer_Name: ServerGeclisa.dominio.local
|   DNS_Tree_Name: dominio.local
|_  Product_Version: 6.3.9600
| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback
| Not valid before: 2020-08-29T15:20:28
|_Not valid after:  2050-08-29T15:20:28
|_ssl-date: 2020-09-19T01:40:25+00:00; 0s from scanner time.
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| ms-sql-info: 
|   186.129.255.166:1433: 
|     Version: 
|       name: Microsoft SQL Server 2012 RTM
|       number: 11.00.2100.00
|       Product: Microsoft SQL Server 2012
|       Service pack level: RTM
|       Post-SP patches applied: false
|_    TCP port: 1433

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:40:25 2020 -- 1 IP address (1 host up) scanned in 15.85 seconds

204.191.127.202


hostname: 204.191.127.202
open ports: [22]
# Nmap 7.80 scan initiated Sat Sep 19 01:40:16 2020 as: nmap -oA data/nweb.samcnbcvnk -sC -sV --open -Pn --system-dns -p 22 204.191.127.202
Nmap scan report for 204.191.127.202
Host is up (0.15s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     Cisco SSH 1.25 (protocol 2.0)
| ssh-hostkey: 
|_  2048 65:53:7e:2f:2e:fb:9a:11:3b:10:12:6b:e9:ce:81:27 (RSA)
Service Info: OS: IOS; CPE: cpe:/o:cisco:ios

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:40:22 2020 -- 1 IP address (1 host up) scanned in 5.49 seconds

211.140.204.54


hostname: 211.140.204.54
open ports: [646, 1723]
# Nmap 7.80 scan initiated Sat Sep 19 01:38:28 2020 as: nmap -oA data/nweb.6jdaj5ngu3 -sC -sV --open -Pn --system-dns -p "646, 1723" 211.140.204.54
Nmap scan report for 211.140.204.54
Host is up (0.20s latency).

PORT     STATE SERVICE    VERSION
646/tcp  open  ldp?
1723/tcp open  tcpwrapped
|_pptp-version: ERROR: Script execution failed (use -d to debug)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:40:15 2020 -- 1 IP address (1 host up) scanned in 107.66 seconds

99.141.153.232


hostname: 99-141-153-232.lightspeed.dgvlga.sbcglobal.net
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:38:11 2020 as: nmap -oA data/nweb.mn2az1qz5o -sC -sV --open -Pn --system-dns -p 443 99.141.153.232
Nmap scan report for 99-141-153-232.lightspeed.dgvlga.sbcglobal.net (99.141.153.232)
Host is up (0.14s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:39:59 2020 -- 1 IP address (1 host up) scanned in 108.17 seconds

46.162.118.64


hostname: 46-162-118-64.cust.bredband2.com
open ports: [3389]
# Nmap 7.80 scan initiated Sat Sep 19 01:39:55 2020 as: nmap -oA data/nweb.cu9f1hzp0h -sC -sV --open -Pn --system-dns -p 3389 46.162.118.64
Nmap scan report for 46-162-118-64.cust.bredband2.com (46.162.118.64)
Host is up (0.037s latency).

PORT     STATE SERVICE       VERSION
3389/tcp open  ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info: 
|   Target_Name: DESKTOP-EQCA051
|   NetBIOS_Domain_Name: DESKTOP-EQCA051
|   NetBIOS_Computer_Name: DESKTOP-EQCA051
|   DNS_Domain_Name: DESKTOP-EQCA051
|   DNS_Computer_Name: DESKTOP-EQCA051
|   Product_Version: 10.0.18362
|_  System_Time: 2020-09-19T01:40:02+00:00
| ssl-cert: Subject: commonName=DESKTOP-EQCA051
| Not valid before: 2020-08-20T17:45:24
|_Not valid after:  2021-02-19T17:45:24
|_ssl-date: 2020-09-19T01:40:02+00:00; -1s from scanner time.
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: -1s, deviation: 0s, median: -1s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:40:03 2020 -- 1 IP address (1 host up) scanned in 7.95 seconds

75.144.15.222


hostname: 75-144-15-222-Naples.hfc.comcastbusiness.net
open ports: [80, 8000]
HTTP

# Nmap 7.80 scan initiated Sat Sep 19 01:37:18 2020 as: nmap -oA data/nweb.t2fzowmptp -sC -sV --open -Pn --system-dns -p "80, 8000" 75.144.15.222
Nmap scan report for 75-144-15-222-Naples.hfc.comcastbusiness.net (75.144.15.222)
Host is up (0.13s latency).

PORT     STATE SERVICE   VERSION
80/tcp   open  http      Webs
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 404 Not Found
|     Date: Fri, 18 Sep 2020 21:36:07 GMT
|     Server: Webs
|     X-Frame-Options: SAMEORIGIN
|     Cache-Control: no-cache
|     Content-Length: 166
|     Content-Type: text/html
|     Connection: close
|     <!DOCTYPE html>
|     <html><head><title>Document Error: Not Found</title></head>
|     <body><h2>Access Error: 404 -- Not Found</h2>
|     <p>Can't open URL</p>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.0 200 OK
|     Date: Fri, 18 Sep 2020 21:36:00 GMT
|     Server: Webs
|     X-Frame-Options: SAMEORIGIN
|     ETag: "0-177-1e0"
|     Content-Length: 480
|     Content-Type: text/html
|     Connection: close
|     Last-Modified: Sun, 05 May 2019 05:58:22 GMT
|     <!doctype html>
|     <html>
|     <head>
|     <title></title>
|     <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|     <meta http-equiv="X-UA-Compatible" content="IE=edge" >
|     <meta http-equiv="Pragma" content="no-cache" />
|     <meta http-equiv="Cache-Control" content="no-cache, must-revalidate" />
|     <meta http-equiv="Expires" content="0" />
|     </head>
|     <body>
|     </body>
|     <script>
|     window.location.href = "/doc/page/login.asp?_" + (new Date()).getTime();
|     </script>
|     </html>
|   HTTPOptions: 
|     HTTP/1.0 200 OK
|     Date: Fri, 18 Sep 2020 21:36:01 GMT
|     Server: Webs
|     X-Frame-Options: SAMEORIGIN
|     Content-Length: 0
|     Content-Type: text/html
|     Connection: close
|_    Allow: OPTIONS,GET,HEAD,POST,PUT,DELETE
|_http-favicon: Hikvision DVR
| http-methods: 
|_  Potentially risky methods: PUT DELETE
|_http-server-header: Webs
|_http-title: Site doesn't have a title (text/html).
8000/tcp open  http-alt?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.80%I=7%D=9/19%Time=5F6560D6%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,2C5,"HTTP/1\.0\x20200\x20OK\r\nDate:\x20Fri,\x2018\x20Sep\x20202
SF:0\x2021:36:00\x20GMT\r\nServer:\x20Webs\r\nX-Frame-Options:\x20SAMEORIG
SF:IN\r\nETag:\x20\"0-177-1e0\"\r\nContent-Length:\x20480\r\nContent-Type:
SF:\x20text/html\r\nConnection:\x20close\r\nLast-Modified:\x20Sun,\x2005\x
SF:20May\x202019\x2005:58:22\x20GMT\r\n\r\n\xef\xbb\xbf<!doctype\x20html>\
SF:r\n<html>\r\n<head>\r\n\t<title></title>\r\n\t<meta\x20http-equiv=\"Con
SF:tent-Type\"\x20content=\"text/html;\x20charset=utf-8\"\x20/>\r\n\t<meta
SF:\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=edge\"\x20>\r\n\t<me
SF:ta\x20http-equiv=\"Pragma\"\x20content=\"no-cache\"\x20/>\r\n\t<meta\x2
SF:0http-equiv=\"Cache-Control\"\x20content=\"no-cache,\x20must-revalidate
SF:\"\x20/>\r\n\t<meta\x20http-equiv=\"Expires\"\x20content=\"0\"\x20/>\r\
SF:n</head>\r\n<body>\r\n</body>\r\n<script>\r\n\twindow\.location\.href\x
SF:20=\x20\"/doc/page/login\.asp\?_\"\x20\+\x20\(new\x20Date\(\)\)\.getTim
SF:e\(\);\r\n</script>\r\n</html>")%r(HTTPOptions,CB,"HTTP/1\.0\x20200\x20
SF:OK\r\nDate:\x20Fri,\x2018\x20Sep\x202020\x2021:36:01\x20GMT\r\nServer:\
SF:x20Webs\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Length:\x200\r\nCo
SF:ntent-Type:\x20text/html\r\nConnection:\x20close\r\nAllow:\x20OPTIONS,G
SF:ET,HEAD,POST,PUT,DELETE\r\n\r\n")%r(FourOhFourRequest,16A,"HTTP/1\.0\x2
SF:0404\x20Not\x20Found\r\nDate:\x20Fri,\x2018\x20Sep\x202020\x2021:36:07\
SF:x20GMT\r\nServer:\x20Webs\r\nX-Frame-Options:\x20SAMEORIGIN\r\nCache-Co
SF:ntrol:\x20no-cache\r\nContent-Length:\x20166\r\nContent-Type:\x20text/h
SF:tml\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20html>\r\n<html><head><t
SF:itle>Document\x20Error:\x20Not\x20Found</title></head>\r\n<body><h2>Acc
SF:ess\x20Error:\x20404\x20--\x20Not\x20Found</h2>\r\n<p>Can't\x20open\x20
SF:URL</p>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8000-TCP:V=7.80%I=7%D=9/19%Time=5F65610C%P=x86_64-pc-linux-gnu%r(Ke
SF:rberos,10,"\0\0\0\x10\0\0\0\r\0\0\0\r\0\0\0\0")%r(SMBProgNeg,10,"\0\0\0
SF:\x10\0\0\0\r\0\0\0\r\0\0\0\0");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:39:55 2020 -- 1 IP address (1 host up) scanned in 156.43 seconds

107.208.150.138


hostname: 107-208-150-138.lightspeed.miamfl.sbcglobal.net
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:38:08 2020 as: nmap -oA data/nweb.yjayy33xlw -sC -sV --open -Pn --system-dns -p 443 107.208.150.138
Nmap scan report for 107-208-150-138.lightspeed.miamfl.sbcglobal.net (107.208.150.138)
Host is up (0.12s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:39:55 2020 -- 1 IP address (1 host up) scanned in 107.28 seconds

66.143.203.146


hostname: seq.dluxlink.com
open ports: [23, 2000]
# Nmap 7.80 scan initiated Sat Sep 19 01:39:47 2020 as: nmap -oA data/nweb.xgqe3d0z3j -sC -sV --open -Pn --system-dns -p "23, 2000" 66.143.203.146
Nmap scan report for seq.dluxlink.com (66.143.203.146)
Host is up (0.14s latency).

PORT     STATE SERVICE        VERSION
23/tcp   open  tcpwrapped
2000/tcp open  bandwidth-test MikroTik bandwidth-test server

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:39:54 2020 -- 1 IP address (1 host up) scanned in 7.02 seconds

104.124.196.195


hostname: a104-124-196-195.deploy.static.akamaitechnologies.com
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:39:35 2020 as: nmap -oA data/nweb.4zjr4ckyj8 -sC -sV --open -Pn --system-dns -p 443 104.124.196.195
Nmap scan report for a104-124-196-195.deploy.static.akamaitechnologies.com (104.124.196.195)
Host is up (0.013s latency).

PORT    STATE SERVICE  VERSION
443/tcp open  ssl/http AkamaiGHost (Akamai's HTTP Acceleration/Mirror service)
|_http-title: Invalid URL
| ssl-cert: Subject: commonName=www.mci.gov.sg/organizationName=Ministry of Communications and Information/countryName=SG
| Subject Alternative Name: DNS:www.mci.gov.sg, DNS:mci.gov.sg
| Not valid before: 2020-02-25T00:00:00
|_Not valid after:  2022-05-25T12:00:00
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|   http/1.1
|_  http/1.0

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:39:49 2020 -- 1 IP address (1 host up) scanned in 13.74 seconds

149.38.4.44


hostname: 149.38.4.44
open ports: [5060]
# Nmap 7.80 scan initiated Sat Sep 19 01:39:18 2020 as: nmap -oA data/nweb.s3z5p6slzh -sC -sV --open -Pn --system-dns -p 5060 149.38.4.44
Nmap scan report for 149.38.4.44
Host is up (0.014s latency).

PORT     STATE SERVICE VERSION
5060/tcp open  sip     (SIP end point; Status: 200 OK)
| fingerprint-strings: 
|   SIPOptions: 
|     SIP/2.0 200 OK
|     Via: SIP/2.0/TCP nm;branch=foo;received=172.104.249.57
|     Contact: <sip:10.67.42.10:5060;transport=tcp>
|     <sip:nm2@nm2>;tag=3b305c5d
|     From: <sip:nm@nm>;tag=root
|     Call-ID: 50000
|     CSeq: 42 OPTIONS
|     Accept: application/sdp
|     Accept-Language: en
|     Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REGISTER, SUBSCRIBE, NOTIFY, REFER, INFO, MESSAGE, UPDATE
|     Supported: replaces, timer
|     Allow-Events: presence, message-summary, dialog, call-info, line-seize
|_    Content-Length: 0
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port5060-TCP:V=7.80%I=7%D=9/19%Time=5F656155%P=x86_64-pc-linux-gnu%r(SI
SF:POptions,1E1,"SIP/2\.0\x20200\x20OK\r\nVia:\x20SIP/2\.0/TCP\x20nm;branc
SF:h=foo;received=172\.104\.249\.57\r\nContact:\x20<sip:10\.67\.42\.10:506
SF:0;transport=tcp>\r\nTo:\x20<sip:nm2@nm2>;tag=3b305c5d\r\nFrom:\x20<sip:
SF:nm@nm>;tag=root\r\nCall-ID:\x2050000\r\nCSeq:\x2042\x20OPTIONS\r\nAccep
SF:t:\x20application/sdp\r\nAccept-Language:\x20en\r\nAllow:\x20INVITE,\x2
SF:0ACK,\x20CANCEL,\x20OPTIONS,\x20BYE,\x20REGISTER,\x20SUBSCRIBE,\x20NOTI
SF:FY,\x20REFER,\x20INFO,\x20MESSAGE,\x20UPDATE\r\nSupported:\x20replaces,
SF:\x20timer\r\nAllow-Events:\x20presence,\x20message-summary,\x20dialog,\
SF:x20call-info,\x20line-seize\r\nContent-Length:\x200\r\n\r\n");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:39:38 2020 -- 1 IP address (1 host up) scanned in 19.88 seconds

130.252.254.62


hostname: den2-csnfw2.hhven.net
open ports: [80, 443]
# Nmap 7.80 scan initiated Sat Sep 19 01:37:06 2020 as: nmap -oA data/nweb.ii24twglge -sC -sV --open -Pn --system-dns -p "80, 443" 130.252.254.62
Nmap scan report for den2-csnfw2.hhven.net (130.252.254.62)
Host is up (0.13s latency).

PORT    STATE SERVICE    VERSION
80/tcp  open  http       Check Point NGX Firewall-1
|_http-title: Did not follow redirect to https://den2-csnfw2.hhven.net/
|_https-redirect: ERROR: Script execution failed (use -d to debug)
443/tcp open  ssl/https?
|_ssl-date: 2020-09-18T22:12:42+00:00; -3h25m57s from scanner time.

Host script results:
|_clock-skew: -3h25m57s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:39:37 2020 -- 1 IP address (1 host up) scanned in 150.66 seconds

155.140.65.4


hostname: dc.cetelem.fr
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:37:13 2020 as: nmap -oA data/nweb.bmbrag283m -sC -sV --open -Pn --system-dns -p 443 155.140.65.4
Nmap scan report for dc.cetelem.fr (155.140.65.4)
Host is up (0.018s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?
|_http-title: Site doesn't have a title (text/html).
| ssl-cert: Subject: commonName=rct.dc.cetelem.fr/organizationName=BNP PARIBAS PERSONAL FINANCE SA/countryName=FR
| Subject Alternative Name: DNS:rct.dc.cetelem.fr
| Not valid before: 2020-02-24T14:35:38
|_Not valid after:  2022-02-23T15:05:38

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:39:32 2020 -- 1 IP address (1 host up) scanned in 138.80 seconds

5.103.27.148


hostname: 5.103.27.148.static.fibianet.dk
open ports: [21, 22, 443]
# Nmap 7.80 scan initiated Sat Sep 19 01:38:38 2020 as: nmap -oA data/nweb.4mav10met3 -sC -sV --open -Pn --system-dns -p "21, 22, 443" 5.103.27.148
Nmap scan report for 5.103.27.148.static.fibianet.dk (5.103.27.148)
Host is up (0.014s latency).

PORT    STATE SERVICE  VERSION
21/tcp  open  ftp      vsftpd 3.0.2
22/tcp  open  ssh      OpenSSH 6.6.1 (protocol 2.0)
| ssh-hostkey: 
|   2048 2d:4d:ed:db:a0:9e:7f:b7:71:a6:e5:74:a4:0c:22:63 (RSA)
|   256 74:94:8d:ea:5c:fe:21:a2:07:f0:a4:f2:a4:e1:e0:af (ECDSA)
|_  256 44:c4:30:c0:30:13:84:a7:7b:1c:b4:dd:55:de:dc:9f (ED25519)
443/tcp open  ssl/http Apache httpd 2.4.6 ((CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16)
|_http-server-header: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
|_http-title: Did not follow redirect to https://danmarksetfraluften.dk/
| ssl-cert: Subject: commonName=dsfl/organizationName=DSFL/stateOrProvinceName=Roskilde/countryName=DK
| Not valid before: 2017-09-05T18:10:00
|_Not valid after:  2018-09-05T18:10:00
|_ssl-date: TLS randomness does not represent time
Service Info: OS: Unix

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:38:57 2020 -- 1 IP address (1 host up) scanned in 19.32 seconds

99.24.32.148


hostname: 99.24.32.148
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:37:20 2020 as: nmap -oA data/nweb.4zbpfxld4x -sC -sV --open -Pn --system-dns -p 443 99.24.32.148
Nmap scan report for 99.24.32.148
Host is up (0.13s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?
|_ssl-date: 2020-09-19T01:38:06+00:00; 0s from scanner time.

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:39:06 2020 -- 1 IP address (1 host up) scanned in 105.48 seconds

130.45.35.62


hostname: 130-45-35-62.dyn.grandenetworks.net
open ports: [80, 554]
HTTP

# Nmap 7.80 scan initiated Sat Sep 19 01:35:58 2020 as: nmap -oA data/nweb.fscvegyf55 -sC -sV --open -Pn --system-dns -p "80, 554" 130.45.35.62
Nmap scan report for 130-45-35-62.dyn.grandenetworks.net (130.45.35.62)
Host is up (0.15s latency).

PORT    STATE SERVICE VERSION
80/tcp  open  http
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 200 OK
|     CONNECTION: close
|     Date: Fri, 18 Sep 2020 21:36:11 GMT
|     Last-Modified: Thu, 27 Jun 2019 01:27:29 GMT
|     Etag: "1561598849:45b2"
|     CONTENT-LENGTH: 17842
|     P3P: CP=CAO PSA OUR
|     CONTENT-TYPE: text/html
|     <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <title>WEB SERVICE</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <meta http-equiv="X-UA-Compatible" content="IE=6;IE=7; IE=8; IE=EmulateIE7"> <script type="text/javascript" src="jsBase/lib/jquery.js"></script> <script type="text/javascript" src="jsBase/widget/js/jquery.ui.core.js"></script> <script type="text/javascript" src="jsBase/widget/js/jquery.ui.widget.js"></script> <script type="text/javascript">var $j = jQuery.noConflict();</script> <script type="text/javascript" src="jsBase/lib/base64.js"></script> <script type="tex
|   HTTPOptions: 
|     HTTP/1.1 200 OK
|     CONNECTION: close
|     Date: Fri, 18 Sep 2020 21:36:14 GMT
|     Last-Modified: Thu, 27 Jun 2019 01:27:29 GMT
|     Etag: "1561598849:45b2"
|     CONTENT-LENGTH: 17842
|     P3P: CP=CAO PSA OUR
|     CONTENT-TYPE: text/html
|_    <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <title>WEB SERVICE</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <meta http-equiv="X-UA-Compatible" content="IE=6;IE=7; IE=8; IE=EmulateIE7"> <script type="text/javascript" src="jsBase/lib/jquery.js"></script> <script type="text/javascript" src="jsBase/widget/js/jquery.ui.core.js"></script> <script type="text/javascript" src="jsBase/widget/js/jquery.ui.widget.js"></script> <script type="text/javascript">var $j = jQuery.noConflict();</script> <script type="text/javascript" src="jsBase/lib/base64.js"></script> <script type="tex
|_http-title: WEB SERVICE
554/tcp open  rtsp    Lorex IP camera rtspd
|_rtsp-methods: ERROR: Script execution failed (use -d to debug)
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.80%I=7%D=9/19%Time=5F656088%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,32E8,"HTTP/1\.1\x20200\x20OK\r\nCONNECTION:\x20close\r\nDate:\x2
SF:0Fri,\x2018\x20Sep\x202020\x2021:36:11\x20GMT\r\nLast-Modified:\x20Thu,
SF:\x2027\x20Jun\x202019\x2001:27:29\x20GMT\r\nEtag:\x20\"1561598849:45b2\
SF:"\r\nCONTENT-LENGTH:\x2017842\r\nP3P:\x20CP=CAO\x20PSA\x20OUR\r\nCONTEN
SF:T-TYPE:\x20text/html\r\n\r\n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DT
SF:D\x20XHTML\x201\.0\x20Strict//EN\"\x20\"http://www\.w3\.org/TR/xhtml1/D
SF:TD/xhtml1-strict\.dtd\">\x20<html>\x20<head>\x20<title>WEB\x20SERVICE</
SF:title>\x20<meta\x20http-equiv=\"Content-Type\"\x20content=\"text/html;\
SF:x20charset=UTF-8\">\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20conte
SF:nt=\"IE=6;IE=7;\x20IE=8;\x20IE=EmulateIE7\">\x20<script\x20type=\"text/
SF:javascript\"\x20src=\"jsBase/lib/jquery\.js\"></script>\x20<script\x20t
SF:ype=\"text/javascript\"\x20src=\"jsBase/widget/js/jquery\.ui\.core\.js\
SF:"></script>\x20<script\x20type=\"text/javascript\"\x20src=\"jsBase/widg
SF:et/js/jquery\.ui\.widget\.js\"></script>\x20<script\x20type=\"text/java
SF:script\">var\x20\$j\x20=\x20jQuery\.noConflict\(\);</script>\x20<script
SF:\x20type=\"text/javascript\"\x20src=\"jsBase/lib/base64\.js\"></script>
SF:\x20<script\x20type=\"tex")%r(HTTPOptions,3890,"HTTP/1\.1\x20200\x20OK\
SF:r\nCONNECTION:\x20close\r\nDate:\x20Fri,\x2018\x20Sep\x202020\x2021:36:
SF:14\x20GMT\r\nLast-Modified:\x20Thu,\x2027\x20Jun\x202019\x2001:27:29\x2
SF:0GMT\r\nEtag:\x20\"1561598849:45b2\"\r\nCONTENT-LENGTH:\x2017842\r\nP3P
SF::\x20CP=CAO\x20PSA\x20OUR\r\nCONTENT-TYPE:\x20text/html\r\n\r\n<!DOCTYP
SF:E\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XHTML\x201\.0\x20Strict//EN\"\x
SF:20\"http://www\.w3\.org/TR/xhtml1/DTD/xhtml1-strict\.dtd\">\x20<html>\x
SF:20<head>\x20<title>WEB\x20SERVICE</title>\x20<meta\x20http-equiv=\"Cont
SF:ent-Type\"\x20content=\"text/html;\x20charset=UTF-8\">\x20<meta\x20http
SF:-equiv=\"X-UA-Compatible\"\x20content=\"IE=6;IE=7;\x20IE=8;\x20IE=Emula
SF:teIE7\">\x20<script\x20type=\"text/javascript\"\x20src=\"jsBase/lib/jqu
SF:ery\.js\"></script>\x20<script\x20type=\"text/javascript\"\x20src=\"jsB
SF:ase/widget/js/jquery\.ui\.core\.js\"></script>\x20<script\x20type=\"tex
SF:t/javascript\"\x20src=\"jsBase/widget/js/jquery\.ui\.widget\.js\"></scr
SF:ipt>\x20<script\x20type=\"text/javascript\">var\x20\$j\x20=\x20jQuery\.
SF:noConflict\(\);</script>\x20<script\x20type=\"text/javascript\"\x20src=
SF:\"jsBase/lib/base64\.js\"></script>\x20<script\x20type=\"tex");
Service Info: Host: ND021711016430; Device: webcam

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:38:45 2020 -- 1 IP address (1 host up) scanned in 167.63 seconds

113.192.125.60


hostname: 113.192.125.60
open ports: [80]
# Nmap 7.80 scan initiated Sat Sep 19 01:38:17 2020 as: nmap -oA data/nweb.flbd7oeone -sC -sV --open -Pn --system-dns -p 80 113.192.125.60
Nmap scan report for 113.192.125.60
Host is up (0.26s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    Boa HTTPd 0.94.14rc21
| http-auth: 
| HTTP/1.1 401 Unauthorized\x0D
|_  Basic realm=.
|_http-server-header: Boa/0.94.14rc21
|_http-title: 400 Bad Request

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:38:31 2020 -- 1 IP address (1 host up) scanned in 13.85 seconds

84.240.190.180


hostname: lb-portali05.nivolapiemonte.it
open ports: [80, 443]
# Nmap 7.80 scan initiated Sat Sep 19 01:36:38 2020 as: nmap -oA data/nweb.t1wj737xr6 -sC -sV --open -Pn --system-dns -p "80, 443" 84.240.190.180
Nmap scan report for lb-portali05.nivolapiemonte.it (84.240.190.180)
Host is up (0.012s latency).

PORT    STATE SERVICE    VERSION
80/tcp  open  http-proxy HAProxy http proxy 1.3.1 or later
| http-auth: 
| HTTP/1.1 401 KO\x0D
|_  Server returned status 401 but no WWW-Authenticate header.
|_http-title: Error
443/tcp open  tcpwrapped
Service Info: Device: load balancer

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:38:16 2020 -- 1 IP address (1 host up) scanned in 98.37 seconds

137.221.2.18


hostname: mail.victory-repro.co.uk
open ports: [21, 443, 990, 993, 995, 1723]
HTTPS

# Nmap 7.80 scan initiated Sat Sep 19 01:35:52 2020 as: nmap -oA data/nweb.38sxb0dt2p -sC -sV --open -Pn --system-dns -p "21, 443, 465, 990, 993, 995, 1723" 137.221.2.18
Nmap scan report for mail.victory-repro.co.uk (137.221.2.18)
Host is up (0.018s latency).
Not shown: 1 filtered port
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE   VERSION
21/tcp   open  ftp?
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, NULL, RPCCheck: 
|     220-Welcome To Victory Repro Ltd's file transfer system.
|     Service ready for new user
|   GetRequest, HTTPOptions, Help, RTSPRequest, SSLSessionReq, TLSSessionReq, TerminalServerCookie: 
|     220-Welcome To Victory Repro Ltd's file transfer system.
|     Service ready for new user
|_    USER and PASS required first
| ssl-cert: Subject: commonName=*.victory-repro.co.uk
| Subject Alternative Name: DNS:*.victory-repro.co.uk, DNS:victory-repro.co.uk
| Not valid before: 2019-10-02T15:12:29
|_Not valid after:  2020-10-02T15:12:29
|_ssl-date: TLS randomness does not represent time
443/tcp  open  ssl/http  Kerio MailServer http config
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: WebServer
| http-title: Site doesn't have a title (text/html; charset=utf-8).
|_Requested resource was https://mail.victory-repro.co.uk:443/webmail/login/
| ssl-cert: Subject: commonName=mail.victory-repro.co.uk
| Subject Alternative Name: DNS:mail.victory-repro.co.uk, DNS:www.mail.victory-repro.co.uk
| Not valid before: 2019-10-02T14:50:24
|_Not valid after:  2021-10-02T14:50:24
|_ssl-date: TLS randomness does not represent time
990/tcp  open  ssl/ftps?
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, GenericLines, NULL, RPCCheck: 
|     220-Welcome To Victory Repro Ltd's file transfer system.
|     Service ready for new user
|   GetRequest, HTTPOptions, Help, RTSPRequest, SSLSessionReq, TLSSessionReq, TerminalServerCookie: 
|     220-Welcome To Victory Repro Ltd's file transfer system.
|     Service ready for new user
|_    USER and PASS required first
| ssl-cert: Subject: commonName=*.victory-repro.co.uk
| Subject Alternative Name: DNS:*.victory-repro.co.uk, DNS:victory-repro.co.uk
| Not valid before: 2019-10-02T15:12:29
|_Not valid after:  2020-10-02T15:12:29
|_ssl-date: TLS randomness does not represent time
993/tcp  open  ssl/imap  Kerio imapd
|_imap-capabilities: IMAP4 OK LITERAL+ SORT completed UNSELECT ID AUTH=DIGEST-MD5A0001 QUOTA AUTH=PLAIN NAMESPACE XLIST IMAP4rev1 LISTEXT ANNOTATE ANNOTATEMORE STATUS-COUNTERS UIDPLUS XAPPLEPUSHSERVICE ACL AUTH=LOGIN AUTH=CRAM-MD5 CAPABILITY SPECIAL-USE IDLE
| ssl-cert: Subject: commonName=mail.victory-repro.co.uk
| Subject Alternative Name: DNS:mail.victory-repro.co.uk, DNS:www.mail.victory-repro.co.uk
| Not valid before: 2019-10-02T14:50:24
|_Not valid after:  2021-10-02T14:50:24
|_ssl-date: TLS randomness does not represent time
995/tcp  open  ssl/pop3  MailMax pop3d
|_pop3-capabilities: USER SASL(CRAM-MD5 PLAIN LOGIN DIGEST-MD5) APOP UIDL TOP
| ssl-cert: Subject: commonName=mail.victory-repro.co.uk
| Subject Alternative Name: DNS:mail.victory-repro.co.uk, DNS:www.mail.victory-repro.co.uk
| Not valid before: 2019-10-02T14:50:24
|_Not valid after:  2021-10-02T14:50:24
|_ssl-date: TLS randomness does not represent time
1723/tcp open  pptp      DrayTek (Firmware: 1)
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port21-TCP:V=7.80%I=7%D=9/19%Time=5F656080%P=x86_64-pc-linux-gnu%r(NULL
SF:,5A,"220-Welcome\x20To\x20Victory\x20Repro\x20Ltd's\x20file\x20transfer
SF:\x20system\.\r\n220\x20Service\x20ready\x20for\x20new\x20user\r\n")%r(H
SF:elp,7C,"220-Welcome\x20To\x20Victory\x20Repro\x20Ltd's\x20file\x20trans
SF:fer\x20system\.\r\n220\x20Service\x20ready\x20for\x20new\x20user\r\n530
SF:\x20USER\x20and\x20PASS\x20required\x20first\r\n")%r(GetRequest,7C,"220
SF:-Welcome\x20To\x20Victory\x20Repro\x20Ltd's\x20file\x20transfer\x20syst
SF:em\.\r\n220\x20Service\x20ready\x20for\x20new\x20user\r\n530\x20USER\x2
SF:0and\x20PASS\x20required\x20first\r\n")%r(HTTPOptions,7C,"220-Welcome\x
SF:20To\x20Victory\x20Repro\x20Ltd's\x20file\x20transfer\x20system\.\r\n22
SF:0\x20Service\x20ready\x20for\x20new\x20user\r\n530\x20USER\x20and\x20PA
SF:SS\x20required\x20first\r\n")%r(RTSPRequest,7C,"220-Welcome\x20To\x20Vi
SF:ctory\x20Repro\x20Ltd's\x20file\x20transfer\x20system\.\r\n220\x20Servi
SF:ce\x20ready\x20for\x20new\x20user\r\n530\x20USER\x20and\x20PASS\x20requ
SF:ired\x20first\r\n")%r(RPCCheck,5A,"220-Welcome\x20To\x20Victory\x20Repr
SF:o\x20Ltd's\x20file\x20transfer\x20system\.\r\n220\x20Service\x20ready\x
SF:20for\x20new\x20user\r\n")%r(DNSVersionBindReqTCP,5A,"220-Welcome\x20To
SF:\x20Victory\x20Repro\x20Ltd's\x20file\x20transfer\x20system\.\r\n220\x2
SF:0Service\x20ready\x20for\x20new\x20user\r\n")%r(DNSStatusRequestTCP,5A,
SF:"220-Welcome\x20To\x20Victory\x20Repro\x20Ltd's\x20file\x20transfer\x20
SF:system\.\r\n220\x20Service\x20ready\x20for\x20new\x20user\r\n")%r(SSLSe
SF:ssionReq,7C,"220-Welcome\x20To\x20Victory\x20Repro\x20Ltd's\x20file\x20
SF:transfer\x20system\.\r\n220\x20Service\x20ready\x20for\x20new\x20user\r
SF:\n530\x20USER\x20and\x20PASS\x20required\x20first\r\n")%r(TerminalServe
SF:rCookie,7C,"220-Welcome\x20To\x20Victory\x20Repro\x20Ltd's\x20file\x20t
SF:ransfer\x20system\.\r\n220\x20Service\x20ready\x20for\x20new\x20user\r\
SF:n530\x20USER\x20and\x20PASS\x20required\x20first\r\n")%r(TLSSessionReq,
SF:7C,"220-Welcome\x20To\x20Victory\x20Repro\x20Ltd's\x20file\x20transfer\
SF:x20system\.\r\n220\x20Service\x20ready\x20for\x20new\x20user\r\n530\x20
SF:USER\x20and\x20PASS\x20required\x20first\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port990-TCP:V=7.80%T=SSL%I=7%D=9/19%Time=5F656086%P=x86_64-pc-linux-gnu
SF:%r(NULL,5A,"220-Welcome\x20To\x20Victory\x20Repro\x20Ltd's\x20file\x20t
SF:ransfer\x20system\.\r\n220\x20Service\x20ready\x20for\x20new\x20user\r\
SF:n")%r(GenericLines,5A,"220-Welcome\x20To\x20Victory\x20Repro\x20Ltd's\x
SF:20file\x20transfer\x20system\.\r\n220\x20Service\x20ready\x20for\x20new
SF:\x20user\r\n")%r(Help,7C,"220-Welcome\x20To\x20Victory\x20Repro\x20Ltd'
SF:s\x20file\x20transfer\x20system\.\r\n220\x20Service\x20ready\x20for\x20
Click here to see the complete results for 137.221.2.18

186.159.115.146


hostname: 146-115-159-186.static.itelkom.co
open ports: [80, 1723, 2000]
HTTP

# Nmap 7.80 scan initiated Sat Sep 19 01:36:59 2020 as: nmap -oA data/nweb.od2yyygdrz -sC -sV --open -Pn --system-dns -p "80, 1723, 2000" 186.159.115.146
Nmap scan report for 146-115-159-186.static.itelkom.co (186.159.115.146)
Host is up (0.19s latency).

PORT     STATE SERVICE        VERSION
80/tcp   open  http           MikroTik router config httpd
| http-robots.txt: 1 disallowed entry 
|_/
|_http-title: RouterOS router configuration page
1723/tcp open  pptp           MikroTik (Firmware: 1)
2000/tcp open  bandwidth-test MikroTik bandwidth-test server
Service Info: Host: Borde Hotel Leblon; OS: RouterOS; Device: router; CPE: cpe:/o:mikrotik:routeros

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:38:05 2020 -- 1 IP address (1 host up) scanned in 66.47 seconds

193.97.170.163


hostname: sfbweb-extern.giz.de
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:36:22 2020 as: nmap -oA data/nweb.kky45jvfyt -sC -sV --open -Pn --system-dns -p 443 193.97.170.163
Nmap scan report for sfbweb-extern.giz.de (193.97.170.163)
Host is up (0.0029s latency).

PORT    STATE SERVICE VERSION
443/tcp open  https?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:38:05 2020 -- 1 IP address (1 host up) scanned in 103.62 seconds

85.89.167.61


hostname: staticline25580.toya.net.pl
open ports: [3389, 5900, 8080, 9999]
# Nmap 7.80 scan initiated Sat Sep 19 01:35:31 2020 as: nmap -oA data/nweb.qrtyjztday -sC -sV --open -Pn --system-dns -p "3389, 5900, 8080, 9999" 85.89.167.61
Nmap scan report for staticline25580.toya.net.pl (85.89.167.61)
Host is up (0.025s latency).

PORT     STATE SERVICE       VERSION
3389/tcp open  ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info: 
|   Target_Name: GKSRV
|   NetBIOS_Domain_Name: GKSRV
|   NetBIOS_Computer_Name: GKSRV
|   DNS_Domain_Name: GKSRV
|   DNS_Computer_Name: GKSRV
|   Product_Version: 10.0.18362
|_  System_Time: 2020-09-19T01:35:40+00:00
| ssl-cert: Subject: commonName=GKSRV
| Not valid before: 2020-06-09T11:21:09
|_Not valid after:  2020-12-09T11:21:09
|_ssl-date: 2020-09-19T01:36:02+00:00; 0s from scanner time.
5900/tcp open  vnc           VNC (protocol 3.8)
|_ssl-cert: ERROR: Script execution failed (use -d to debug)
|_ssl-date: ERROR: Script execution failed (use -d to debug)
|_sslv2: ERROR: Script execution failed (use -d to debug)
|_tls-alpn: ERROR: Script execution failed (use -d to debug)
|_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug)
|_vnc-info: ERROR: Script execution failed (use -d to debug)
8080/tcp open  http          Microsoft IIS httpd 10.0
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-open-proxy: Proxy might be redirecting requests
|_http-server-header: Microsoft-IIS/10.0
|_http-title: IIS Windows
9999/tcp open  http          TP-LINK WR841N WAP http config
|_http-server-header: Router Webserver
|_http-title: TL-WR841N
Service Info: OS: Windows; Device: WAP; CPE: cpe:/o:microsoft:windows, cpe:/h:tp-link:wr841n

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:36:04 2020 -- 1 IP address (1 host up) scanned in 33.74 seconds

218.94.206.249


hostname: 218.94.206.249
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:37:26 2020 as: nmap -oA data/nweb.so6yjfni3f -sC -sV --open -Pn --system-dns -p 443 218.94.206.249
Nmap scan report for 218.94.206.249
Host is up (0.29s latency).

PORT    STATE SERVICE  VERSION
443/tcp open  ssl/http Tengine httpd
|_http-server-header: Tengine
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=*.ucdl.pp.uc.cn/organizationName=Alibaba (China) Technology Co., Ltd./stateOrProvinceName=ZheJiang/countryName=CN
| Subject Alternative Name: DNS:*.ucdl.pp.uc.cn, DNS:ucdl.pp.uc.cn
| Not valid before: 2018-01-22T07:26:02
|_Not valid after:  2019-01-23T07:26:02
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:37:57 2020 -- 1 IP address (1 host up) scanned in 31.17 seconds

159.157.238.132


hostname: sam.wonderware.com
open ports: [80, 443]
# Nmap 7.80 scan initiated Sat Sep 19 01:36:40 2020 as: nmap -oA data/nweb.kinqn01r89 -sC -sV --open -Pn --system-dns -p "80, 443" 159.157.238.132
Nmap scan report for sam.wonderware.com (159.157.238.132)
Host is up (0.15s latency).

PORT    STATE SERVICE    VERSION
80/tcp  open  http-proxy F5 BIG-IP load balancer http proxy
|_http-open-proxy: Proxy might be redirecting requests
|_http-server-header: BigIP
|_http-title: Did not follow redirect to https://sam.wonderware.com/
|_https-redirect: ERROR: Script execution failed (use -d to debug)
443/tcp open  ssl/http   Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: No Information Available.
|_http-title: 403 - Forbidden: Access is denied.
| ssl-cert: Subject: commonName=sam.wonderware.com/organizationName=AVEVA Solutions Ltd/countryName=GB
| Subject Alternative Name: DNS:sam.wonderware.com, DNS:www.sam.wonderware.com
| Not valid before: 2020-06-05T00:00:00
|_Not valid after:  2021-08-18T12:00:00
Service Info: OS: Windows; Device: load balancer; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:37:16 2020 -- 1 IP address (1 host up) scanned in 36.28 seconds

201.205.255.33


hostname: 201.205.255.33
open ports: [22, 53, 8080]
# Nmap 7.80 scan initiated Sat Sep 19 01:37:01 2020 as: nmap -oA data/nweb.4bcqu1d37e -sC -sV --open -Pn --system-dns -p "22, 53, 8080" 201.205.255.33
Nmap scan report for 201.205.255.33
Host is up (0.16s latency).

PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 7c:c5:4d:a6:f4:0c:08:47:3f:4e:f7:65:9f:91:87:79 (RSA)
|   256 fc:a7:3f:fd:47:d5:dd:3b:b4:a8:48:62:54:17:8a:50 (ECDSA)
|_  256 85:2e:af:e5:a2:f3:51:f8:d1:36:54:c6:5b:1f:8b:58 (ED25519)
53/tcp   open  domain  ISC BIND 9.10.3-P4 (Ubuntu Linux)
| dns-nsid: 
|_  bind.version: 9.10.3-P4-Ubuntu
8080/tcp open  http    Apache Tomcat 9.0.22
|_http-favicon: Apache Tomcat
|_http-title: Apache Tomcat/9.0.22
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:37:18 2020 -- 1 IP address (1 host up) scanned in 17.08 seconds

112.181.173.189


hostname: 112.181.173.189
open ports: [80]
# Nmap 7.80 scan initiated Sat Sep 19 01:31:42 2020 as: nmap -oA data/nweb.qab2s8ifc3 -sC -sV --open -Pn --system-dns -p 80 112.181.173.189
Nmap scan report for 112.181.173.189
Host is up (0.28s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:36:10 2020 -- 1 IP address (1 host up) scanned in 267.86 seconds

93.165.154.134


hostname: 93.165.154.134
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:31:52 2020 as: nmap -oA data/nweb.embxc6276o -sC -sV --open -Pn --system-dns -p 443 93.165.154.134
Nmap scan report for 93.165.154.134
Host is up (0.019s latency).

PORT    STATE SERVICE VERSION
443/tcp open  https?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:36:09 2020 -- 1 IP address (1 host up) scanned in 257.47 seconds

219.117.204.137


hostname: 219.117.204.137.static.zoot.jp
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:35:09 2020 as: nmap -oA data/nweb.bvhx0y81ps -sC -sV --open -Pn --system-dns -p 443 219.117.204.137
Nmap scan report for 219.117.204.137.static.zoot.jp (219.117.204.137)
Host is up (0.26s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?
|_ssl-date: 2020-09-19T01:35:58+00:00; -1s from scanner time.

Host script results:
|_clock-skew: -1s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:36:59 2020 -- 1 IP address (1 host up) scanned in 109.53 seconds

65.44.66.59


hostname: ip65-44-66-59.z66-44-65.customer.algx.net
open ports: [8080]
# Nmap 7.80 scan initiated Sat Sep 19 01:36:07 2020 as: nmap -oA data/nweb.958e78knp7 -sC -sV --open -Pn --system-dns -p 8080 65.44.66.59
Nmap scan report for ip65-44-66-59.z66-44-65.customer.algx.net (65.44.66.59)
Host is up (0.13s latency).

PORT     STATE SERVICE  VERSION
8080/tcp open  ssl/http CherryPy httpd 3.6.0
| http-title: Site doesn't have a title (text/html;charset=utf-8).
|_Requested resource was https://ip65-44-66-59.z66-44-65.customer.algx.net:8080/auth/login?from_page=/
|_http-trane-info: Problem with XML parsing of /evox/about
| ssl-cert: Subject: commonName=Fireware web CA/organizationName=WatchGuard
| Not valid before: 2017-01-21T11:17:43
|_Not valid after:  2027-02-18T11:17:43
|_ssl-date: TLS randomness does not represent time

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:36:51 2020 -- 1 IP address (1 host up) scanned in 43.44 seconds

65.115.100.28


hostname: 65-115-100-28.dia.static.centurylink.net
open ports: [80, 443]
# Nmap 7.80 scan initiated Sat Sep 19 01:34:49 2020 as: nmap -oA data/nweb.d6n5m7cxob -sC -sV --open -Pn --system-dns -p "80, 443" 65.115.100.28
Nmap scan report for 65-115-100-28.dia.static.centurylink.net (65.115.100.28)
Host is up (0.15s latency).

PORT    STATE SERVICE    VERSION
80/tcp  open  http-proxy F5 BIG-IP load balancer http proxy
|_http-open-proxy: Proxy might be redirecting requests
|_http-server-header: BigIP
|_http-title: Did not follow redirect to https://65-115-100-28.dia.static.centurylink.net/
|_https-redirect: ERROR: Script execution failed (use -d to debug)
443/tcp open  ssl/https?
|_ssl-date: TLS randomness does not represent time
Service Info: Device: load balancer

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:36:36 2020 -- 1 IP address (1 host up) scanned in 107.10 seconds

139.30.98.56


hostname: 139.30.98.56
open ports: [49155]
# Nmap 7.80 scan initiated Sat Sep 19 01:35:41 2020 as: nmap -oA data/nweb.p5fhvw2ct9 -sC -sV --open -Pn --system-dns -p 49155 139.30.98.56
Nmap scan report for 139.30.98.56
Host is up (0.017s latency).

PORT      STATE SERVICE VERSION
49155/tcp open  msrpc   Microsoft Windows RPC
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:36:37 2020 -- 1 IP address (1 host up) scanned in 55.35 seconds

154.41.67.219


hostname: vm549.haisoft.net
open ports: [53, 80, 110, 143, 443, 993, 995, 2121, 3306, 5666, 8443]
HTTP

HTTPS

# Nmap 7.80 scan initiated Sat Sep 19 01:34:23 2020 as: nmap -oA data/nweb.iqwkjcwstj -sC -sV --open -Pn --system-dns -p "25, 53, 80, 110, 143, 443, 465, 587, 993, 995, 2121, 3306, 5666, 8443" 154.41.67.219
Nmap scan report for vm549.haisoft.net (154.41.67.219)
Host is up (0.011s latency).
Not shown: 3 filtered ports
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE       VERSION
53/tcp   open  domain        (unknown banner: none)
| dns-nsid: 
|_  bind.version: none
| fingerprint-strings: 
|   DNSVersionBindReqTCP: 
|     version
|     bind
|_    none
80/tcp   open  http          Apache httpd (PleskLin)
|_http-server-header: Apache
|_http-title: Did not follow redirect to https://vm549.haisoft.net/
110/tcp  open  pop3          Dovecot pop3d
|_pop3-capabilities: STLS APOP PIPELINING RESP-CODES AUTH-RESP-CODE UIDL SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) USER TOP CAPA
| ssl-cert: Subject: commonName=mail.agorinfo.fr
| Subject Alternative Name: DNS:mail.agorinfo.fr
| Not valid before: 2020-08-03T09:37:14
|_Not valid after:  2020-11-01T09:37:14
|_ssl-date: TLS randomness does not represent time
143/tcp  open  imap          Dovecot imapd
|_imap-capabilities: more ENABLE AUTH=CRAM-MD5A0001 AUTH=LOGIN STARTTLS OK AUTH=DIGEST-MD5 ID post-login SASL-IR IMAP4rev1 LOGIN-REFERRALS Pre-login capabilities AUTH=PLAIN listed have LITERAL+ IDLE
| ssl-cert: Subject: commonName=mail.agorinfo.fr
| Subject Alternative Name: DNS:mail.agorinfo.fr
| Not valid before: 2020-08-03T09:37:14
|_Not valid after:  2020-11-01T09:37:14
|_ssl-date: TLS randomness does not represent time
443/tcp  open  ssl/http      Apache httpd (PleskLin)
|_http-server-header: Apache
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=vm549.haisoft.net
| Subject Alternative Name: DNS:vm549.haisoft.net
| Not valid before: 2020-09-09T12:37:15
|_Not valid after:  2020-12-08T12:37:15
|_ssl-date: TLS randomness does not represent time
993/tcp  open  ssl/imap      Dovecot imapd
|_imap-capabilities: more ENABLE AUTH=CRAM-MD5A0001 AUTH=LOGIN OK IDLE ID post-login SASL-IR IMAP4rev1 LOGIN-REFERRALS Pre-login capabilities AUTH=PLAIN listed have AUTH=DIGEST-MD5 LITERAL+
| ssl-cert: Subject: commonName=mail.agorinfo.fr
| Subject Alternative Name: DNS:mail.agorinfo.fr
| Not valid before: 2020-08-03T09:37:14
|_Not valid after:  2020-11-01T09:37:14
|_ssl-date: TLS randomness does not represent time
995/tcp  open  ssl/pop3      Dovecot pop3d
|_pop3-capabilities: APOP PIPELINING RESP-CODES AUTH-RESP-CODE UIDL SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) USER TOP CAPA
| ssl-cert: Subject: commonName=mail.agorinfo.fr
| Subject Alternative Name: DNS:mail.agorinfo.fr
| Not valid before: 2020-08-03T09:37:14
|_Not valid after:  2020-11-01T09:37:14
|_ssl-date: TLS randomness does not represent time
2121/tcp open  ftp           ProFTPD
| ssl-cert: Subject: commonName=vm549.haisoft.net
| Subject Alternative Name: DNS:vm549.haisoft.net
| Not valid before: 2020-09-09T12:37:15
|_Not valid after:  2020-12-08T12:37:15
|_ssl-date: TLS randomness does not represent time
| tls-nextprotoneg: 
|_  ftp
3306/tcp open  mysql         MySQL 5.5.60-MariaDB
| mysql-info: 
|   Protocol: 10
|   Version: 5.5.60-MariaDB
|   Thread ID: 2768992
|   Capabilities flags: 63487
|   Some Capabilities: IgnoreSpaceBeforeParenthesis, FoundRows, InteractiveClient, IgnoreSigpipes, SupportsTransactions, Speaks41ProtocolOld, DontAllowDatabaseTableColumn, LongColumnFlag, LongPassword, Speaks41ProtocolNew, SupportsCompression, Support41Auth, ConnectWithDatabase, SupportsLoadDataLocal, ODBCClient, SupportsAuthPlugins, SupportsMultipleResults, SupportsMultipleStatments
|   Status: Autocommit
|   Salt: >d_.f;/{>cXl;})P7bjj
|_  Auth Plugin Name: mysql_native_password
5666/tcp open  tcpwrapped
8443/tcp open  ssl/https-alt sw-cp-server
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Server: sw-cp-server
|     Date: Sat, 19 Sep 2020 01:34:44 GMT
|     Content-Type: text/html
|     Content-Length: 2644
|     Connection: close
|     ETag: "5965c92a-a54"
|     <!DOCTYPE html>
|     <html lang="en">
|     <head>
|     <meta charset="utf-8">
|     <meta http-equiv="x-ua-compatible" content="ie=edge">
|     <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
|     <title>404 Not Found</title>
|     <link rel="stylesheet" href="/error_docs/styles.css">
|     </head>
|     <body>
|     <div class="page">
|     <div class="main">
|     <div class="error-description">
|     <h1>Server Error</h1>
|     <div class="error-code">404</div>
|     <h2>Page Not Found</h2>
|     class="lead">This page either doesn't exist, or it moved somewhere else.</p>
|     <hr/>
Click here to see the complete results for 154.41.67.219

144.43.254.25


hostname: 144.43.254.25
open ports: [443]
HTTPS

# Nmap 7.80 scan initiated Sat Sep 19 01:35:37 2020 as: nmap -oA data/nweb.xd3dlhgscn -sC -sV --open -Pn --system-dns -p 443 144.43.254.25
Nmap scan report for 144.43.254.25
Host is up (0.010s latency).

PORT    STATE SERVICE  VERSION
443/tcp open  ssl/http nginx
|_http-title: Did not follow redirect to https://preprod.mijn.overheid.nl
| ssl-cert: Subject: commonName=preprod.mijn.overheid.nl/organizationName=Logius/stateOrProvinceName=Zuid-Holland/countryName=NL
| Subject Alternative Name: DNS:preprod.mijn.overheid.nl
| Not valid before: 2020-02-19T14:10:50
|_Not valid after:  2021-02-19T14:20:00

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:36:00 2020 -- 1 IP address (1 host up) scanned in 23.20 seconds

24.127.4.135


hostname: c-24-127-4-135.hsd1.mi.comcast.net
open ports: [80, 443, 8080]
# Nmap 7.80 scan initiated Sat Sep 19 01:32:30 2020 as: nmap -oA data/nweb.oi5h6ho3vx -sC -sV --open -Pn --system-dns -p "80, 443, 8080" 24.127.4.135
Nmap scan report for c-24-127-4-135.hsd1.mi.comcast.net (24.127.4.135)
Host is up (0.12s latency).

PORT     STATE SERVICE         VERSION
80/tcp   open  http            D-Link DCS-5030L_73 webcam http interface
| http-auth: 
| HTTP/1.0 401 Authorization Required\x0D
|_  Basic realm=DCS-5030L_73
|_http-server-header: alphapd
|_http-title: Site doesn't have a title (text/html).
443/tcp  open  http            D-Link DCS-5030L_81 webcam http interface
| http-auth: 
| HTTP/1.0 401 Authorization Required\x0D
|_  Basic realm=DCS-5030L_81
|_http-server-header: alphapd
|_http-title: Site doesn't have a title (text/html).
8080/tcp open  ssl/http-proxy?
Service Info: Device: webcam; CPE: cpe:/h:dlink:dcs-5030l_73, cpe:/h:dlink:dcs-5030l_81

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:35:57 2020 -- 1 IP address (1 host up) scanned in 206.35 seconds

196.16.110.175


hostname: 196.16.110.175
open ports: [8000]
# Nmap 7.80 scan initiated Sat Sep 19 01:35:33 2020 as: nmap -oA data/nweb.o7grmlj2db -sC -sV --open -Pn --system-dns -p 8000 196.16.110.175
Nmap scan report for 196.16.110.175
Host is up (0.12s latency).

PORT     STATE SERVICE    VERSION
8000/tcp open  http-proxy 3Proxy http proxy
|_http-title: 407 Proxy Authentication Required

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:35:48 2020 -- 1 IP address (1 host up) scanned in 15.21 seconds

141.3.72.46


hostname: i80pc24.irf.uni-karlsruhe.de
open ports: [22]
# Nmap 7.80 scan initiated Sat Sep 19 01:35:36 2020 as: nmap -oA data/nweb.v767yabt2s -sC -sV --open -Pn --system-dns -p 22 141.3.72.46
Nmap scan report for i80pc24.irf.uni-karlsruhe.de (141.3.72.46)
Host is up (0.0097s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 c2:4b:52:58:41:6b:a7:89:54:f6:d5:ae:e5:b6:1a:c6 (RSA)
|   256 70:d0:e4:fc:86:8b:7f:f8:17:b2:28:e8:6e:08:c3:ff (ECDSA)
|_  256 d9:c6:95:71:8f:21:ca:02:5f:25:dc:40:4c:e9:47:e0 (ED25519)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:35:37 2020 -- 1 IP address (1 host up) scanned in 1.52 seconds

100.18.31.91


hostname: pool-100-18-31-91.bltmmd.fios.verizon.net
open ports: [1026]
# Nmap 7.80 scan initiated Sat Sep 19 01:35:13 2020 as: nmap -oA data/nweb.6ivamwi1qu -sC -sV --open -Pn --system-dns -p 1026 100.18.31.91
Nmap scan report for pool-100-18-31-91.bltmmd.fios.verizon.net (100.18.31.91)
Host is up (0.11s latency).

PORT     STATE SERVICE VERSION
1026/tcp open  rtsp    Vivotek FD8134V webcam rtspd
|_rtsp-methods: ERROR: Script execution failed (use -d to debug)
Service Info: Device: webcam; CPE: cpe:/h:vivotek:fd8134v

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:35:36 2020 -- 1 IP address (1 host up) scanned in 22.90 seconds

185.7.114.244


hostname: 185-7-114-244.ip272.fastwebnet.it
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:32:31 2020 as: nmap -oA data/nweb.ach0q5rwnx -sC -sV --open -Pn --system-dns -p 443 185.7.114.244
Nmap scan report for 185-7-114-244.ip272.fastwebnet.it (185.7.114.244)
Host is up (0.012s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:35:09 2020 -- 1 IP address (1 host up) scanned in 158.06 seconds

113.25.104.1


hostname: 113.25.104.1
open ports: [179, 646]
# Nmap 7.80 scan initiated Sat Sep 19 01:35:24 2020 as: nmap -oA data/nweb.mtd4m639in -sC -sV --open -Pn --system-dns -p "179, 646" 113.25.104.1
Nmap scan report for 113.25.104.1
Host is up (0.21s latency).

PORT    STATE SERVICE    VERSION
179/tcp open  tcpwrapped
646/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:35:31 2020 -- 1 IP address (1 host up) scanned in 6.90 seconds

212.72.40.145


hostname: unknown.Level3.net
open ports: [179]
# Nmap 7.80 scan initiated Sat Sep 19 01:35:22 2020 as: nmap -oA data/nweb.0237gpk3eb -sC -sV --open -Pn --system-dns -p 179 212.72.40.145
Nmap scan report for unknown.Level3.net (212.72.40.145)
Host is up (0.0079s latency).

PORT    STATE SERVICE    VERSION
179/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:35:29 2020 -- 1 IP address (1 host up) scanned in 6.41 seconds

161.150.189.156


hostname: 161.150.189.156
open ports: [2000, 5060]
# Nmap 7.80 scan initiated Sat Sep 19 01:32:14 2020 as: nmap -oA data/nweb.douqu3stu5 -sC -sV --open -Pn --system-dns -p "2000, 5060" 161.150.189.156
Nmap scan report for 161.150.189.156
Host is up (0.094s latency).

PORT     STATE SERVICE     VERSION
2000/tcp open  cisco-sccp?
5060/tcp open  sip?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:35:28 2020 -- 1 IP address (1 host up) scanned in 194.53 seconds

175.131.28.145


hostname: KD175131028145.ppp-bb.dion.ne.jp
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:34:34 2020 as: nmap -oA data/nweb.nswppzlc95 -sC -sV --open -Pn --system-dns -p 443 175.131.28.145
Nmap scan report for KD175131028145.ppp-bb.dion.ne.jp (175.131.28.145)
Host is up (0.26s latency).

PORT    STATE SERVICE  VERSION
443/tcp open  ssl/http SoftEther VPN httpd
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=jpgoodbuy.softether.net/organizationName=jpgoodbuy.softether.net/countryName=US
| Not valid before: 2018-02-05T08:06:18
|_Not valid after:  2037-12-31T08:06:18
|_sstp-discover: SSTP is supported.

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:35:17 2020 -- 1 IP address (1 host up) scanned in 42.99 seconds

203.129.223.196


hostname: 203.129.223.196
open ports: [22]
# Nmap 7.80 scan initiated Sat Sep 19 01:35:00 2020 as: nmap -oA data/nweb.65vbraqcbm -sC -sV --open -Pn --system-dns -p 22 203.129.223.196
Nmap scan report for 203.129.223.196
Host is up (0.16s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.2 (protocol 2.0)
| ssh-hostkey: 
|_  1024 a5:af:95:df:38:d0:0a:86:df:80:ae:c3:b8:35:2a:3b (RSA)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:35:14 2020 -- 1 IP address (1 host up) scanned in 13.70 seconds

133.20.97.208


hostname: sps03.csirt.dendai.ac.jp
open ports: [80, 443]
# Nmap 7.80 scan initiated Sat Sep 19 01:32:20 2020 as: nmap -oA data/nweb.fber5caff3 -sC -sV --open -Pn --system-dns -p "80, 443" 133.20.97.208
Nmap scan report for sps03.csirt.dendai.ac.jp (133.20.97.208)
Host is up (0.27s latency).

PORT    STATE SERVICE    VERSION
80/tcp  open  http       lighttpd 1.4.39
|_http-server-header: lighttpd/1.4.39
|_http-title: Did not follow redirect to https://133.20.97.208:4343
443/tcp open  ssl/https?
|_ssl-date: TLS randomness does not represent time

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:34:10 2020 -- 1 IP address (1 host up) scanned in 109.35 seconds

76.83.71.1


hostname: wifi-76-83-71-1.inf.spectrum.com
open ports: [179]
# Nmap 7.80 scan initiated Sat Sep 19 01:34:55 2020 as: nmap -oA data/nweb.zjdp3cgro4 -sC -sV --open -Pn --system-dns -p 179 76.83.71.1
Nmap scan report for wifi-76-83-71-1.inf.spectrum.com (76.83.71.1)
Host is up (0.14s latency).

PORT    STATE SERVICE VERSION
179/tcp open  bgp     (connection rejected)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:34:56 2020 -- 1 IP address (1 host up) scanned in 1.66 seconds

209.115.252.204


hostname: 209.115.252.204
open ports: [80]
HTTP

# Nmap 7.80 scan initiated Sat Sep 19 01:34:37 2020 as: nmap -oA data/nweb.oybk5tyak0 -sC -sV --open -Pn --system-dns -p 80 209.115.252.204
Nmap scan report for 209.115.252.204
Host is up (0.16s latency).

PORT   STATE SERVICE    VERSION
80/tcp open  http-proxy SonicWALL SSL-VPN http proxy
| http-open-proxy: Potentially OPEN proxy.
|_Methods supported:CONNECTION
|_http-server-header: SonicWALL SSL-VPN Web Server
|_http-title: Did not follow redirect to https://209.115.252.204/
|_https-redirect: ERROR: Script execution failed (use -d to debug)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:34:48 2020 -- 1 IP address (1 host up) scanned in 11.26 seconds

50.194.229.193


hostname: mail.certifiedfinishes.com
open ports: [80, 443]
# Nmap 7.80 scan initiated Sat Sep 19 01:32:16 2020 as: nmap -oA data/nweb.vfmlfn8usx -sC -sV --open -Pn --system-dns -p "25, 80, 443, 587" 50.194.229.193
Nmap scan report for mail.certifiedfinishes.com (50.194.229.193)
Host is up (0.11s latency).
Not shown: 2 filtered ports
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE    VERSION
80/tcp  open  http       Microsoft IIS httpd 7.5
|_http-server-header: Microsoft-IIS/7.5
|_http-title: 403 - Forbidden: Access is denied.
443/tcp open  ssl/https?
|_ssl-date: 2020-09-19T01:33:48+00:00; -1s from scanner time.
| sslv2: 
|   SSLv2 supported
|   ciphers: 
|     SSL2_RC4_128_WITH_MD5
|_    SSL2_DES_192_EDE3_CBC_WITH_MD5
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: -1s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:34:48 2020 -- 1 IP address (1 host up) scanned in 152.01 seconds

205.78.207.73


hostname: 205.78.207.73
open ports: [1110, 1755, 2121, 3986, 5009, 5432, 5666, 6646, 8009, 8081, 32768, 49152, 49153, 49154, 49155, 49156, 49157]
# Nmap 7.80 scan initiated Sat Sep 19 01:31:42 2020 as: nmap -oA data/nweb.u8eltg3m5w -sC -sV --open -Pn --system-dns -p "1110, 1755, 2121, 3986, 5009, 5432, 5666, 6646, 8009, 8081, 32768, 49152, 49153, 49154, 49155, 49156, 49157" 205.78.207.73
Nmap scan report for 205.78.207.73
Host is up (0.20s latency).

PORT      STATE SERVICE        VERSION
1110/tcp  open  nfsd-status?
1755/tcp  open  wms?
2121/tcp  open  ccproxy-ftp?
3986/tcp  open  tcpwrapped
5009/tcp  open  airport-admin?
5432/tcp  open  postgresql?
5666/tcp  open  nrpe?
6646/tcp  open  unknown
8009/tcp  open  ajp13?
|_ajp-methods: Failed to get a valid response for the OPTION request
8081/tcp  open  tcpwrapped
32768/tcp open  filenet-tms?
49152/tcp open  unknown
49153/tcp open  unknown
49154/tcp open  unknown
49155/tcp open  unknown
49156/tcp open  unknown
49157/tcp open  unknown

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:34:46 2020 -- 1 IP address (1 host up) scanned in 183.74 seconds

162.118.20.24


hostname: 162.118.20.24
open ports: [80, 443]
HTTP

HTTPS

# Nmap 7.80 scan initiated Sat Sep 19 01:33:59 2020 as: nmap -oA data/nweb.dy9iolowna -sC -sV --open -Pn --system-dns -p "80, 443" 162.118.20.24
Nmap scan report for 162.118.20.24
Host is up (0.088s latency).

PORT    STATE SERVICE  VERSION
80/tcp  open  http     Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
443/tcp open  ssl/http Microsoft IIS httpd 10.0
| http-methods: 
|_  Potentially risky methods: TRACE
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: Microsoft-IIS/10.0
|_http-title: MRIServ
| ssl-cert: Subject: commonName=mriservices.nagases.com
| Subject Alternative Name: DNS:mriservices.nagases.com, DNS:www.mriservices.nagases.com
| Not valid before: 2020-05-24T11:38:36
|_Not valid after:  2022-07-23T20:49:51
|_ssl-date: 2020-09-19T01:24:26+00:00; -9m58s from scanner time.
| tls-alpn: 
|   h2
|_  http/1.1
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: -9m58s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:34:24 2020 -- 1 IP address (1 host up) scanned in 25.60 seconds

88.223.50.226


hostname: 88-223-50-226.init.lt
open ports: [53]
# Nmap 7.80 scan initiated Sat Sep 19 01:34:15 2020 as: nmap -oA data/nweb.66v7ck546r -sC -sV --open -Pn --system-dns -p 53 88.223.50.226
Nmap scan report for 88-223-50-226.init.lt (88.223.50.226)
Host is up (0.026s latency).

PORT   STATE SERVICE    VERSION
53/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:34:21 2020 -- 1 IP address (1 host up) scanned in 5.95 seconds

164.75.8.231


hostname: 164.75.8.231
open ports: [5060]
# Nmap 7.80 scan initiated Sat Sep 19 01:31:04 2020 as: nmap -oA data/nweb.q69wtg98lk -sC -sV --open -Pn --system-dns -p 5060 164.75.8.231
Nmap scan report for 164.75.8.231
Host is up (0.28s latency).

PORT     STATE SERVICE VERSION
5060/tcp open  sip?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:34:12 2020 -- 1 IP address (1 host up) scanned in 187.66 seconds

157.62.60.131


hostname: 157.62.60.131
open ports: [80, 443]
# Nmap 7.80 scan initiated Sat Sep 19 01:33:34 2020 as: nmap -oA data/nweb.fy9er1cb4c -sC -sV --open -Pn --system-dns -p "80, 443" 157.62.60.131
Nmap scan report for 157.62.60.131
Host is up (0.10s latency).

PORT    STATE SERVICE  VERSION
80/tcp  open  http     Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
443/tcp open  ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
| ssl-cert: Subject: commonName=*.mansfield.edu
| Subject Alternative Name: DNS:*.mansfield.edu, DNS:mansfield.edu
| Not valid before: 2018-10-24T00:00:00
|_Not valid after:  2020-11-18T23:59:59
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:33:58 2020 -- 1 IP address (1 host up) scanned in 24.18 seconds

117.48.234.222


hostname: 117.48.234.222
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:32:02 2020 as: nmap -oA data/nweb.ya91w8jloq -sC -sV --open -Pn --system-dns -p 443 117.48.234.222
Nmap scan report for 117.48.234.222
Host is up (0.21s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?
|_ssl-date: TLS randomness does not represent time

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:33:49 2020 -- 1 IP address (1 host up) scanned in 107.30 seconds

98.108.226.1


hostname: 98.108.226.1
open ports: [179]
# Nmap 7.80 scan initiated Sat Sep 19 01:33:20 2020 as: nmap -oA data/nweb.09eejo3tyo -sC -sV --open -Pn --system-dns -p 179 98.108.226.1
Nmap scan report for 98.108.226.1
Host is up (0.16s latency).

PORT    STATE SERVICE    VERSION
179/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:33:27 2020 -- 1 IP address (1 host up) scanned in 6.99 seconds

184.29.43.137


hostname: a184-29-43-137.deploy.static.akamaitechnologies.com
open ports: [995]
# Nmap 7.80 scan initiated Sat Sep 19 01:32:12 2020 as: nmap -oA data/nweb.geamo9d3or -sC -sV --open -Pn --system-dns -p 995 184.29.43.137
Nmap scan report for a184-29-43-137.deploy.static.akamaitechnologies.com (184.29.43.137)
Host is up (0.16s latency).

PORT    STATE SERVICE    VERSION
995/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:33:19 2020 -- 1 IP address (1 host up) scanned in 66.75 seconds

122.115.57.177


hostname: 122.115.57.177
open ports: [21, 80]
# Nmap 7.80 scan initiated Sat Sep 19 01:30:59 2020 as: nmap -oA data/nweb.gcwibxj1o7 -sC -sV --open -Pn --system-dns -p "21, 80" 122.115.57.177
Nmap scan report for 122.115.57.177
Host is up (0.22s latency).

PORT   STATE SERVICE VERSION
21/tcp open  ftp     vsftpd (before 2.0.8) or WU-FTPD
80/tcp open  http    Tengine httpd
| http-cookie-flags: 
|   /: 
|     jsessionid_shtml: 
|_      httponly flag not set
| http-methods: 
|_  Potentially risky methods: PUT DELETE TRACE PATCH
|_http-server-header: Tengine
|_http-title: \xE6\x88\xB7\xE5\xA4\x96\xE5\xB9\xBF\xE5\x91\x8A\xE6\xA1\x88\xE4\xBE\x8B-\xE9\xB9\xB0\xE7\x9B\xAE\xE6\x88\xB7\xE5\xA4\x96\xE5\xB9\xBF\xE5\x91\x8A\xE7\xBD\x91
Service Info: Host: yingmoo

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:31:23 2020 -- 1 IP address (1 host up) scanned in 24.99 seconds

8.40.146.16


hostname: 8.40.146.16
open ports: [80]
# Nmap 7.80 scan initiated Sat Sep 19 01:32:11 2020 as: nmap -oA data/nweb.j92sfvdxr5 -sC -sV --open -Pn --system-dns -p 80 8.40.146.16
Nmap scan report for 8.40.146.16
Host is up (0.12s latency).

PORT   STATE SERVICE    VERSION
80/tcp open  http-proxy F5 BIG-IP load balancer http proxy
|_http-open-proxy: Proxy might be redirecting requests
|_http-server-header: BigIP
|_http-title: Did not follow redirect to https://www.8.40.146.16/
Service Info: Device: load balancer

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:32:21 2020 -- 1 IP address (1 host up) scanned in 10.65 seconds

81.73.123.179


hostname: host-81-73-123-179.business.telecomitalia.it
open ports: [993]
# Nmap 7.80 scan initiated Sat Sep 19 01:30:46 2020 as: nmap -oA data/nweb.mgidq6z9o3 -sC -sV --open -Pn --system-dns -p "587, 993" 81.73.123.179
Nmap scan report for host-81-73-123-179.business.telecomitalia.it (81.73.123.179)
Host is up (0.047s latency).
Not shown: 1 filtered port
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE    VERSION
993/tcp open  ssl/imaps?
|_ssl-date: TLS randomness does not represent time

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:32:14 2020 -- 1 IP address (1 host up) scanned in 88.61 seconds

198.225.158.74


hostname: 198.225.158.74
open ports: [80, 443]
HTTP

HTTPS

# Nmap 7.80 scan initiated Sat Sep 19 01:29:20 2020 as: nmap -oA data/nweb.h3w1rv00cp -sC -sV --open -Pn --system-dns -p "80, 443" 198.225.158.74
Nmap scan report for 198.225.158.74
Host is up (0.12s latency).

PORT    STATE SERVICE   VERSION
80/tcp  open  http      akka-http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 400 Bad Request
|     Server: akka-http
|     Date: Sat, 19 Sep 2020 01:29:33 GMT
|     Connection: close
|     Content-Type: text/plain; charset=UTF-8
|     Content-Length: 136
|     Set-Cookie: SERVERID=2711544262.1570.0000; path=/; Httponly
|     Cannot establish effective URI of request to `/nice%20ports,/Trinity.txt.bak`, request has a relative URI and is missing a `Host` header
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     Server: akka-http
|     Date: Sat, 19 Sep 2020 01:29:27 GMT
|     Connection: close
|     Content-Type: text/plain; charset=UTF-8
|     Content-Length: 107
|     Set-Cookie: SERVERID=2694767046.1570.0000; path=/; Httponly
|     Cannot establish effective URI of request to `/`, request has a relative URI and is missing a `Host` header
|   HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     Server: akka-http
|     Date: Sat, 19 Sep 2020 01:29:28 GMT
|     Connection: close
|     Content-Type: text/plain; charset=UTF-8
|     Content-Length: 107
|     Set-Cookie: SERVERID=2711544262.1570.0000; path=/; Httponly
|     Cannot establish effective URI of request to `/`, request has a relative URI and is missing a `Host` header
|   RTSPRequest: 
|     HTTP/1.1 505 HTTP Version Not Supported
|     Server: akka-http
|     Date: Sat, 19 Sep 2020 01:29:28 GMT
|     Connection: close
|     Content-Type: text/plain; charset=UTF-8
|     Content-Length: 74
|     Set-Cookie: SERVERID=2694767046.1570.0000; path=/; Httponly
|     server does not support the HTTP protocol version used in the request.
|   TerminalServerCookie: 
|     HTTP/1.1 400 Bad Request
|     Server: akka-http
|     Date: Sat, 19 Sep 2020 01:30:07 GMT
|     Connection: close
|     Content-Type: text/plain; charset=UTF-8
|     Content-Length: 23
|     Set-Cookie: SERVERID=2694767046.1570.0000;Path=/
|_    Unsupported HTTP method
|_http-server-header: akka-http
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
443/tcp open  ssl/https akka-http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 400 Bad Request
|     Server: akka-http
|     Date: Sat, 19 Sep 2020 01:29:35 GMT
|     Connection: close
|     Content-Type: text/plain; charset=UTF-8
|     Content-Length: 136
|     Set-Cookie: SERVERID=2711544262.1570.0000; path=/; Httponly; Secure
|     Cannot establish effective URI of request to `/nice%20ports,/Trinity.txt.bak`, request has a relative URI and is missing a `Host` header
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     Server: akka-http
|     Date: Sat, 19 Sep 2020 01:29:34 GMT
|     Connection: close
|     Content-Type: text/plain; charset=UTF-8
|     Content-Length: 107
|     Set-Cookie: SERVERID=2694767046.1570.0000; path=/; Httponly; Secure
|     Cannot establish effective URI of request to `/`, request has a relative URI and is missing a `Host` header
|   RTSPRequest: 
|     HTTP/1.1 505 HTTP Version Not Supported
|     Server: akka-http
|     Date: Sat, 19 Sep 2020 01:29:46 GMT
|     Connection: close
|     Content-Type: text/plain; charset=UTF-8
|     Content-Length: 74
|     Set-Cookie: SERVERID=2711544262.1570.0000; path=/; Httponly; Secure
|     server does not support the HTTP protocol version used in the request.
|   TerminalServerCookie: 
|     HTTP/1.1 400 Bad Request
|     Server: akka-http
|     Date: Sat, 19 Sep 2020 01:30:15 GMT
|     Connection: close
|     Content-Type: text/plain; charset=UTF-8
|     Content-Length: 23
|     Set-Cookie: SERVERID=2694767046.1570.0000;Path=/
|_    Unsupported HTTP method
|_http-server-header: akka-http
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
| ssl-cert: Subject: commonName=*.si.enclab.att.net/organizationName=AT and T Services, Inc./stateOrProvinceName=Michigan/countryName=US
| Subject Alternative Name: DNS:*.cns.dv.enclab.att.net, DNS:*.cns.ps.enclab.att.net, DNS:*.cns.si.enclab.att.net, DNS:*.dv.enclab.att.net, DNS:*.ps.enclab.att.net, DNS:*.si.enclab.att.net, DNS:dv.enclab.att.net, DNS:ps.enclab.att.net, DNS:si.enclab.att.net
| Not valid before: 2020-01-03T00:00:00
|_Not valid after:  2021-02-13T12:00:00
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
Click here to see the complete results for 198.225.158.74

147.241.199.12


hostname: hoodb4otc06.otc.army.mil
open ports: [443]
# Nmap 7.80 scan initiated Sat Sep 19 01:29:47 2020 as: nmap -oA data/nweb.8r9h5jxgt7 -sC -sV --open -Pn --system-dns -p 443 147.241.199.12
Nmap scan report for hoodb4otc06.otc.army.mil (147.241.199.12)
Host is up (0.13s latency).

PORT    STATE SERVICE  VERSION
443/tcp open  ssl/http Cisco ASA SSL VPN
| ssl-cert: Subject: commonName=Hoodb4otc05.otc.army.mil/organizationName=U.S. Government/countryName=US
| Subject Alternative Name: DNS:Hoodb4otc05.otc.army.mil, IP Address:147.241.200.254
| Not valid before: 2020-03-12T13:23:01
|_Not valid after:  2022-06-15T13:23:01

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:31:05 2020 -- 1 IP address (1 host up) scanned in 77.58 seconds

23.0.26.196


hostname: a23-0-26-196.deploy.static.akamaitechnologies.com
open ports: [80]
# Nmap 7.80 scan initiated Sat Sep 19 01:31:52 2020 as: nmap -oA data/nweb.onwk5yk4ze -sC -sV --open -Pn --system-dns -p 80 23.0.26.196
Nmap scan report for a23-0-26-196.deploy.static.akamaitechnologies.com (23.0.26.196)
Host is up (0.091s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    AkamaiGHost (Akamai's HTTP Acceleration/Mirror service)
|_http-title: Invalid URL

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:32:01 2020 -- 1 IP address (1 host up) scanned in 9.16 seconds

220.14.170.217


hostname: softbank220014170217.bbtec.net
open ports: [80]
# Nmap 7.80 scan initiated Sat Sep 19 01:28:09 2020 as: nmap -oA data/nweb.3smxu6f2uf -sC -sV --open -Pn --system-dns -p 80 220.14.170.217
Nmap scan report for softbank220014170217.bbtec.net (220.14.170.217)
Host is up (0.28s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:32:02 2020 -- 1 IP address (1 host up) scanned in 233.97 seconds

118.97.24.165


hostname: 118.97.24.165
open ports: [1723]
# Nmap 7.80 scan initiated Sat Sep 19 01:30:37 2020 as: nmap -oA data/nweb.c3yhkle446 -sC -sV --open -Pn --system-dns -p 1723 118.97.24.165
Nmap scan report for 118.97.24.165
Host is up (0.28s latency).

PORT     STATE SERVICE VERSION
1723/tcp open  pptp    MikroTik (Firmware: 1)
Service Info: Host: MikroTik

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:31:51 2020 -- 1 IP address (1 host up) scanned in 74.66 seconds

210.135.97.235


hostname: 210.135.97.235
open ports: [22]
# Nmap 7.80 scan initiated Sat Sep 19 01:30:23 2020 as: nmap -oA data/nweb.lq08warb33 -sC -sV --open -Pn --system-dns -p 22 210.135.97.235
Nmap scan report for 210.135.97.235
Host is up (0.27s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh?
|_ssh-hostkey: ERROR: Script execution failed (use -d to debug)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:31:50 2020 -- 1 IP address (1 host up) scanned in 86.34 seconds

109.108.96.47


hostname: 109.108.96.47
open ports: [3389]
# Nmap 7.80 scan initiated Sat Sep 19 01:30:21 2020 as: nmap -oA data/nweb.3hpk9d74nq -sC -sV --open -Pn --system-dns -p 3389 109.108.96.47
Nmap scan report for 109.108.96.47
Host is up (0.048s latency).

PORT     STATE SERVICE            VERSION
3389/tcp open  ssl/ms-wbt-server?
|_ssl-date: 2020-09-19T01:29:50+00:00; -57s from scanner time.

Host script results:
|_clock-skew: -57s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:31:47 2020 -- 1 IP address (1 host up) scanned in 85.51 seconds

185.185.52.124


hostname: 185.185.52.124
open ports: [8888]
# Nmap 7.80 scan initiated Sat Sep 19 01:31:30 2020 as: nmap -oA data/nweb.umbhbmqeul -sC -sV --open -Pn --system-dns -p 8888 185.185.52.124
Nmap scan report for 185.185.52.124
Host is up (0.046s latency).

PORT     STATE SERVICE VERSION
8888/tcp open  http    TP-LINK TD-W8968 http admin
|_http-title: Site doesn't have a title (text/html; charset=utf-8).
Service Info: Device: WAP; CPE: cpe:/h:tp-link:td-w8968

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 19 01:31:40 2020 -- 1 IP address (1 host up) scanned in 9.96 seconds

168.67.2.60


hostname: 168.67.2.60
open ports: [80, 443]
HTTP

HTTPS