62.93.9.239


hostname: 239.9.93.62.dsl.xitylight.de
open ports: [5060]
# Nmap 7.80 scan initiated Wed Oct 21 04:00:02 2020 as: nmap -oA data/nweb.h1b2pttrjk -sC -sV --open -Pn --system-dns -p 5060 62.93.9.239
Nmap scan report for 239.9.93.62.dsl.xitylight.de (62.93.9.239)
Host is up (0.0091s latency).

PORT     STATE SERVICE VERSION
5060/tcp open  sip     AVM FRITZ!OS SIP
Service Info: Device: VoIP adapter

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 04:00:09 2020 -- 1 IP address (1 host up) scanned in 7.01 seconds

64.111.61.198


hostname: 64.111.61.198.marktwain.net
open ports: [80, 443]
HTTP

HTTPS

# Nmap 7.80 scan initiated Wed Oct 21 03:59:08 2020 as: nmap -oA data/nweb.j8jlkhgxky -sC -sV --open -Pn --system-dns -p "22, 80, 443" 64.111.61.198
Nmap scan report for 64.111.61.198.marktwain.net (64.111.61.198)
Host is up (0.13s latency).
Not shown: 1 filtered port
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE  VERSION
80/tcp  open  http     lighttpd 1.4.39
|_http-server-header: lighttpd/1.4.39
|_http-title: Did not follow redirect to https://64.111.61.198.marktwain.net/
443/tcp open  ssl/http lighttpd 1.4.39
|_http-server-header: lighttpd/1.4.39
|_http-title: Ubiquiti
| ssl-cert: Subject: commonName=UBNT-B4:FB:E4:B8:1B:2F/organizationName=Ubiquiti Networks Inc./stateOrProvinceName=CA/countryName=US
| Subject Alternative Name: DNS:UBNT-B4:FB:E4:B8:1B:2F
| Not valid before: 2019-01-01T00:00:00
|_Not valid after:  2038-01-01T00:00:00
|_ssl-date: TLS randomness does not represent time

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:59:37 2020 -- 1 IP address (1 host up) scanned in 28.98 seconds

98.166.47.176


hostname: ip98-166-47-176.hr.hr.cox.net
open ports: [8080]
# Nmap 7.80 scan initiated Wed Oct 21 03:56:17 2020 as: nmap -oA data/nweb.v0aobes35p -sC -sV --open -Pn --system-dns -p 8080 98.166.47.176
Nmap scan report for ip98-166-47-176.hr.hr.cox.net (98.166.47.176)
Host is up (0.10s latency).

PORT     STATE SERVICE        VERSION
8080/tcp open  ssl/http-proxy
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 401 Unauthorized
|     Content-Type: text/plain; charset=utf-8
|     X-Content-Type-Options: nosniff
|     Date: Wed, 21 Oct 2020 03:57:36 GMT
|     Content-Length: 51
|     unauthorized: certificate or access token required
|   GenericLines, Help, Kerberos, LPDString, RTSPRequest, SSLSessionReq, TLSSessionReq, TerminalServerCookie: 
|     HTTP/1.1 400 Bad Request
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Request
|   GetRequest: 
|     HTTP/1.0 401 Unauthorized
|     Content-Type: text/plain; charset=utf-8
|     X-Content-Type-Options: nosniff
|     Date: Wed, 21 Oct 2020 03:57:06 GMT
|     Content-Length: 51
|     unauthorized: certificate or access token required
|   HTTPOptions: 
|     HTTP/1.0 401 Unauthorized
|     Content-Type: text/plain; charset=utf-8
|     X-Content-Type-Options: nosniff
|     Date: Wed, 21 Oct 2020 03:57:07 GMT
|     Content-Length: 51
|_    unauthorized: certificate or access token required
| http-auth: 
| HTTP/1.1 401 Unauthorized\x0D
|_  Server returned status 401 but no WWW-Authenticate header.
| ssl-cert: Subject: commonName=0b1efbcf35990b8ee2aa00eb2bf5ddaafef1cb46/organizationName=Space Monkey/stateOrProvinceName=Utah/countryName=US
| Not valid before: 2010-01-09T15:26:29
|_Not valid after:  2030-01-04T15:26:29
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port8080-TCP:V=7.80%T=SSL%I=7%D=10/21%Time=5F8FB192%P=x86_64-pc-linux-g
SF:nu%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Typ
SF:e:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x
SF:20Bad\x20Request")%r(GetRequest,D3,"HTTP/1\.0\x20401\x20Unauthorized\r\
SF:nContent-Type:\x20text/plain;\x20charset=utf-8\r\nX-Content-Type-Option
SF:s:\x20nosniff\r\nDate:\x20Wed,\x2021\x20Oct\x202020\x2003:57:06\x20GMT\
SF:r\nContent-Length:\x2051\r\n\r\nunauthorized:\x20certificate\x20or\x20a
SF:ccess\x20token\x20required\n")%r(HTTPOptions,D3,"HTTP/1\.0\x20401\x20Un
SF:authorized\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nX-Conten
SF:t-Type-Options:\x20nosniff\r\nDate:\x20Wed,\x2021\x20Oct\x202020\x2003:
SF:57:07\x20GMT\r\nContent-Length:\x2051\r\n\r\nunauthorized:\x20certifica
SF:te\x20or\x20access\x20token\x20required\n")%r(RTSPRequest,67,"HTTP/1\.1
SF:\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=ut
SF:f-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Help,67,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20ch
SF:arset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(SS
SF:LSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20
SF:text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\
SF:x20Request")%r(TerminalServerCookie,67,"HTTP/1\.1\x20400\x20Bad\x20Requ
SF:est\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20
SF:close\r\n\r\n400\x20Bad\x20Request")%r(TLSSessionReq,67,"HTTP/1\.1\x204
SF:00\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r
SF:\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Kerberos,67,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20cha
SF:rset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Fou
SF:rOhFourRequest,D3,"HTTP/1\.0\x20401\x20Unauthorized\r\nContent-Type:\x2
SF:0text/plain;\x20charset=utf-8\r\nX-Content-Type-Options:\x20nosniff\r\n
SF:Date:\x20Wed,\x2021\x20Oct\x202020\x2003:57:36\x20GMT\r\nContent-Length
SF::\x2051\r\n\r\nunauthorized:\x20certificate\x20or\x20access\x20token\x2
SF:0required\n")%r(LPDString,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCon
SF:tent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\
SF:r\n400\x20Bad\x20Request");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:58:51 2020 -- 1 IP address (1 host up) scanned in 153.94 seconds

165.103.1.18


hostname: jira.naic.org
open ports: [443]
HTTPS

# Nmap 7.80 scan initiated Wed Oct 21 03:58:46 2020 as: nmap -oA data/nweb.xf247lpajg -sC -sV --open -Pn --system-dns -p 443 165.103.1.18
Nmap scan report for jira.naic.org (165.103.1.18)
Host is up (0.13s latency).

PORT    STATE SERVICE   VERSION
443/tcp open  ssl/https
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 200 
|     Cache-Control: private
|     Expires: Thu, 01 Jan 1970 00:00:00 GMT
|     X-AREQUESTID: 1379x712728x1
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     X-Frame-Options: SAMEORIGIN
|     Content-Security-Policy: frame-ancestors 'self'
|     X-ASEN: SEN-2024547
|     Set-Cookie: atlassian.xsrf.token=AO2H-H5N2-YV55-UR4V_dc00eb2828e4287977f07efc4b4f975c47e1085c_lout; Path=/; Secure
|     X-AUSERNAME: anonymous
|     Set-Cookie: JSESSIONID=FF2B672F3A1E09B1BA13D70885774976; Path=/; Secure; HttpOnly
|     X-Accel-Buffering: no
|     Content-Type: text/html;charset=UTF-8
|     Date: Wed, 21 Oct 2020 03:59:00 GMT
|     Connection: close
|     <!DOCTYPE html>
|     <html lang="en">
|     <head>
|     <meta charset="utf-8">
|     <meta http-equiv="X-UA-Compatible" content="IE=Edge"/>
|     <meta name="application-name" content="JIRA" data-name="jira" data-version="8.5.6"><meta name="ajs-server-scheme" content="https">
|     <meta name="ajs-serve
|   HTTPOptions: 
|     HTTP/1.1 200 
|     Cache-Control: private
|     Expires: Thu, 01 Jan 1970 00:00:00 GMT
|     X-AREQUESTID: 1379x712729x1
|     X-XSS-Protection: 1; mode=block
|     X-Content-Type-Options: nosniff
|     X-Frame-Options: SAMEORIGIN
|     Content-Security-Policy: frame-ancestors 'self'
|     X-ASEN: SEN-2024547
|     Set-Cookie: atlassian.xsrf.token=AO2H-H5N2-YV55-UR4V_74ab54a923b38d54224ba9c84ec4d48b64861bad_lout; Path=/; Secure
|     X-AUSERNAME: anonymous
|     Set-Cookie: JSESSIONID=E306F50625EF9BEC1468886E51E8321C; Path=/; Secure; HttpOnly
|     X-Accel-Buffering: no
|     Content-Type: text/html;charset=UTF-8
|     Date: Wed, 21 Oct 2020 03:59:00 GMT
|     Connection: close
|     <!DOCTYPE html>
|     <html lang="en">
|     <head>
|     <meta charset="utf-8">
|     <meta http-equiv="X-UA-Compatible" content="IE=Edge"/>
|     <meta name="application-name" content="JIRA" data-name="jira" data-version="8.5.6"><meta name="ajs-server-scheme" content="https">
|_    <meta name="ajs-serve
| http-robots.txt: 6 disallowed entries 
| /sr/ /si/ /charts /secure/ConfigureReport.jspa 
|_/secure/ConfigureReport!default.jspa /secure/attachmentzip/
|_http-title: System Dashboard - NAIC / NIPR Jira
| ssl-cert: Subject: commonName=jira.naic.org/organizationName=National Association of Insurance Commissioners/stateOrProvinceName=Missouri/countryName=US
| Subject Alternative Name: DNS:jira.naic.org
| Not valid before: 2020-01-31T16:12:02
|_Not valid after:  2021-01-23T17:21:29
|_ssl-date: 2020-10-21T03:59:30+00:00; -1s from scanner time.
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.80%T=SSL%I=7%D=10/21%Time=5F8FB204%P=x86_64-pc-linux-gn
SF:u%r(GetRequest,3734,"HTTP/1\.1\x20200\x20\r\nCache-Control:\x20private\
SF:r\nExpires:\x20Thu,\x2001\x20Jan\x201970\x2000:00:00\x20GMT\r\nX-AREQUE
SF:STID:\x201379x712728x1\r\nX-XSS-Protection:\x201;\x20mode=block\r\nX-Co
SF:ntent-Type-Options:\x20nosniff\r\nX-Frame-Options:\x20SAMEORIGIN\r\nCon
SF:tent-Security-Policy:\x20frame-ancestors\x20'self'\r\nX-ASEN:\x20SEN-20
SF:24547\r\nSet-Cookie:\x20atlassian\.xsrf\.token=AO2H-H5N2-YV55-UR4V_dc00
SF:eb2828e4287977f07efc4b4f975c47e1085c_lout;\x20Path=/;\x20Secure\r\nX-AU
SF:SERNAME:\x20anonymous\r\nSet-Cookie:\x20JSESSIONID=FF2B672F3A1E09B1BA13
SF:D70885774976;\x20Path=/;\x20Secure;\x20HttpOnly\r\nX-Accel-Buffering:\x
SF:20no\r\nContent-Type:\x20text/html;charset=UTF-8\r\nDate:\x20Wed,\x2021
SF:\x20Oct\x202020\x2003:59:00\x20GMT\r\nConnection:\x20close\r\n\r\n\n<!D
SF:OCTYPE\x20html>\n<html\x20lang=\"en\">\n<head>\n\x20\x20\x20\x20\n\n\n\
SF:n\n\n\n\n\n<meta\x20charset=\"utf-8\">\n<meta\x20http-equiv=\"X-UA-Comp
SF:atible\"\x20content=\"IE=Edge\"/>\n<meta\x20name=\"application-name\"\x
SF:20content=\"JIRA\"\x20data-name=\"jira\"\x20data-version=\"8\.5\.6\"><m
SF:eta\x20name=\"ajs-server-scheme\"\x20content=\"https\">\n<meta\x20name=
SF:\"ajs-serve")%r(HTTPOptions,3734,"HTTP/1\.1\x20200\x20\r\nCache-Control
SF::\x20private\r\nExpires:\x20Thu,\x2001\x20Jan\x201970\x2000:00:00\x20GM
SF:T\r\nX-AREQUESTID:\x201379x712729x1\r\nX-XSS-Protection:\x201;\x20mode=
SF:block\r\nX-Content-Type-Options:\x20nosniff\r\nX-Frame-Options:\x20SAME
SF:ORIGIN\r\nContent-Security-Policy:\x20frame-ancestors\x20'self'\r\nX-AS
SF:EN:\x20SEN-2024547\r\nSet-Cookie:\x20atlassian\.xsrf\.token=AO2H-H5N2-Y
SF:V55-UR4V_74ab54a923b38d54224ba9c84ec4d48b64861bad_lout;\x20Path=/;\x20S
SF:ecure\r\nX-AUSERNAME:\x20anonymous\r\nSet-Cookie:\x20JSESSIONID=E306F50
SF:625EF9BEC1468886E51E8321C;\x20Path=/;\x20Secure;\x20HttpOnly\r\nX-Accel
SF:-Buffering:\x20no\r\nContent-Type:\x20text/html;charset=UTF-8\r\nDate:\
SF:x20Wed,\x2021\x20Oct\x202020\x2003:59:00\x20GMT\r\nConnection:\x20close
SF:\r\n\r\n\n<!DOCTYPE\x20html>\n<html\x20lang=\"en\">\n<head>\n\x20\x20\x
SF:20\x20\n\n\n\n\n\n\n\n\n<meta\x20charset=\"utf-8\">\n<meta\x20http-equi
SF:v=\"X-UA-Compatible\"\x20content=\"IE=Edge\"/>\n<meta\x20name=\"applica
SF:tion-name\"\x20content=\"JIRA\"\x20data-name=\"jira\"\x20data-version=\
SF:"8\.5\.6\"><meta\x20name=\"ajs-server-scheme\"\x20content=\"https\">\n<
SF:meta\x20name=\"ajs-serve");
Click here to see the complete results for 165.103.1.18

69.246.229.238


hostname: c-69-246-229-238.hsd1.il.comcast.net
open ports: [1723]
# Nmap 7.80 scan initiated Wed Oct 21 03:59:23 2020 as: nmap -oA data/nweb.r2iaprboas -sC -sV --open -Pn --system-dns -p 1723 69.246.229.238
Nmap scan report for c-69-246-229-238.hsd1.il.comcast.net (69.246.229.238)
Host is up (0.12s latency).

PORT     STATE SERVICE VERSION
1723/tcp open  pptp    linux (Firmware: 1)
Service Info: Host: local

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:59:37 2020 -- 1 IP address (1 host up) scanned in 14.20 seconds

86.119.28.7


hostname: sw-j-vlan6.unil.cloud.switch.ch
open ports: [179]
# Nmap 7.80 scan initiated Wed Oct 21 03:59:14 2020 as: nmap -oA data/nweb.9w7s1msuw5 -sC -sV --open -Pn --system-dns -p 179 86.119.28.7
Nmap scan report for sw-j-vlan6.unil.cloud.switch.ch (86.119.28.7)
Host is up (0.010s latency).

PORT    STATE SERVICE    VERSION
179/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:59:20 2020 -- 1 IP address (1 host up) scanned in 5.80 seconds

200.241.75.70


hostname: embaixadaportuguesa-M11389-gacc03.bsa.embratel.net.br
open ports: [23, 80]
HTTP

# Nmap 7.80 scan initiated Wed Oct 21 03:58:11 2020 as: nmap -oA data/nweb.i9u78iwnos -sC -sV --open -Pn --system-dns -p "23, 80" 200.241.75.70
Nmap scan report for embaixadaportuguesa-M11389-gacc03.bsa.embratel.net.br (200.241.75.70)
Host is up (0.21s latency).

PORT   STATE SERVICE VERSION
23/tcp open  telnet  Huawei telnetd
| fingerprint-strings: 
|   GenericLines: 
|     ******************************************************************************
|     Copyright (c) 2010-2014 Hewlett-Packard Development Company, L.P. *
|     Without the owner's prior written consent, *
|     decompiling or reverse-engineering shall be allowed. *
|     ******************************************************************************
|     ||========================================||
|     SOMENTE USUARIOS AUTORIZADOS
|     AUTHORIZED USERS ONLY
|     ACESSOS SERAO MONITORADOS
|     ||=======================================||
|     Login authentication
|     Username:
|     Password:
|     Login failed!
|     Username:
|   NULL: 
|     ******************************************************************************
|     Copyright (c) 2010-2014 Hewlett-Packard Development Company, L.P. *
|     Without the owner's prior written consent, *
|     decompiling or reverse-engineering shall be allowed. *
|     ******************************************************************************
|     ||========================================||
|     SOMENTE USUARIOS AUTORIZADOS
|     AUTHORIZED USERS ONLY
|     ACESSOS SERAO MONITORADOS
|     ||=======================================||
|     Login authentication
|_    Username:
80/tcp open  http    HP MSM Controller or 1920-series switch httpd
|_http-server-header: Httpd 
| http-title: Web user login
|_Requested resource was index.htm
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port23-TCP:V=7.80%I=7%D=10/21%Time=5F8FB1DB%P=x86_64-pc-linux-gnu%r(NUL
SF:L,29C,"\xff\xfb\x01\xff\xfb\x01\xff\xfb\x01\xff\xfb\x03\xff\xfd\x18\xff
SF:\xfd\x1f\r\n\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\
SF:*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
SF:\*\*\*\*\*\*\*\*\*\*\*\*\*\r\n\*\x20Copyright\x20\(c\)\x202010-2014\x20
SF:Hewlett-Packard\x20Development\x20Company,\x20L\.P\.\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\*\r\n\*\x20Without\x20the\x20owner's\x20prior\x20
SF:written\x20consent,\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20
SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\*\r\n\*\x20no\x20decompiling\x20or\x20reverse-engineering\x20
SF:shall\x20be\x20allowed\.\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\*\r\n\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
SF:\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\
SF:*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\r\n\r\n\r\n\|\|==
SF:======================================\|\|\r\n\r\n\x20\x20\x20\x20\x20\
SF:x20\x20\x20SOMENTE\x20USUARIOS\x20AUTORIZADOS\r\n\x20\x20\x20\x20\x20\x
SF:20\x20\x20\x20\x20\x20AUTHORIZED\x20USERS\x20ONLY\r\n\x20\x20\x20\x20\x
SF:20\x20\x20\x20OS\x20ACESSOS\x20SERAO\x20MONITORADOS\r\n\r\n\|\|========
SF:===============================\|\|\r\n\r\n\r\nLogin\x20authentication\
SF:r\n\r\n\r\nUsername:")%r(GenericLines,2C5,"\xff\xfb\x01\xff\xfb\x01\xff
SF:\xfb\x01\xff\xfb\x03\xff\xfd\x18\xff\xfd\x1f\r\n\*\*\*\*\*\*\*\*\*\*\*\
SF:*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
SF:\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\r\n\*\x2
SF:0Copyright\x20\(c\)\x202010-2014\x20Hewlett-Packard\x20Development\x20C
SF:ompany,\x20L\.P\.\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\*\r\n\*\x20Wi
SF:thout\x20the\x20owner's\x20prior\x20written\x20consent,\x20\x20\x20\x20
SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\*\r\n\*\x20no\x20decompil
SF:ing\x20or\x20reverse-engineering\x20shall\x20be\x20allowed\.\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\*
SF:\r\n\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\
SF:*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*\*
SF:\*\*\*\*\*\*\*\*\*\r\n\r\n\r\n\|\|=====================================
SF:===\|\|\r\n\r\n\x20\x20\x20\x20\x20\x20\x20\x20SOMENTE\x20USUARIOS\x20A
SF:UTORIZADOS\r\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20AUTHORIZED\x2
SF:0USERS\x20ONLY\r\n\x20\x20\x20\x20\x20\x20\x20\x20OS\x20ACESSOS\x20SERA
SF:O\x20MONITORADOS\r\n\r\n\|\|=======================================\|\|
SF:\r\n\r\n\r\nLogin\x20authentication\r\n\r\n\r\nUsername:\r\nPassword:\r
SF:\n%\x20Login\x20failed!\r\n\r\nUsername:");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:59:06 2020 -- 1 IP address (1 host up) scanned in 54.73 seconds

149.144.254.90


hostname: vlan782.gw.latrobe.edu.au
open ports: [179]
# Nmap 7.80 scan initiated Wed Oct 21 03:58:53 2020 as: nmap -oA data/nweb.nyoqfrg3js -sC -sV --open -Pn --system-dns -p 179 149.144.254.90
Nmap scan report for vlan782.gw.latrobe.edu.au (149.144.254.90)
Host is up (0.32s latency).

PORT    STATE SERVICE    VERSION
179/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:59:01 2020 -- 1 IP address (1 host up) scanned in 8.29 seconds

201.2.112.85


hostname: 201.2.112.85.brasiltelecom.net.br
open ports: [179]
# Nmap 7.80 scan initiated Wed Oct 21 03:58:44 2020 as: nmap -oA data/nweb.bpe45iongl -sC -sV --open -Pn --system-dns -p 179 201.2.112.85
Nmap scan report for 201.2.112.85.brasiltelecom.net.br (201.2.112.85)
Host is up (0.24s latency).

PORT    STATE SERVICE    VERSION
179/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:58:51 2020 -- 1 IP address (1 host up) scanned in 7.81 seconds

194.185.26.8


hostname: 194.185.26.8
open ports: [443]
HTTPS

# Nmap 7.80 scan initiated Wed Oct 21 03:58:21 2020 as: nmap -oA data/nweb.eqkvgym0up -sC -sV --open -Pn --system-dns -p 443 194.185.26.8
Nmap scan report for 194.185.26.8
Host is up (0.012s latency).

PORT    STATE SERVICE  VERSION
443/tcp open  ssl/http Apache httpd
|_http-server-header: Apache
|_http-title: Did not follow redirect to http://www.google.com/search?q=194.185.26.8
| ssl-cert: Subject: commonName=*.yoox.biz/organizationName=YOOX Net-A-Porter Group S.p.a./countryName=IT
| Subject Alternative Name: DNS:*.yoox.biz, DNS:yoox.biz
| Not valid before: 2020-02-17T00:00:00
|_Not valid after:  2022-02-24T12:00:00
|_ssl-date: TLS randomness does not represent time

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:58:35 2020 -- 1 IP address (1 host up) scanned in 13.95 seconds

61.63.125.242


hostname: 61-63-125-242.nty.dynamic.tbcnet.net.tw
open ports: [8000]
# Nmap 7.80 scan initiated Wed Oct 21 03:57:49 2020 as: nmap -oA data/nweb.p0sxw4opp6 -sC -sV --open -Pn --system-dns -p "8000, 49152" 61.63.125.242
Nmap scan report for 61-63-125-242.nty.dynamic.tbcnet.net.tw (61.63.125.242)
Host is up (0.21s latency).
Not shown: 1 closed port
PORT     STATE SERVICE VERSION
8000/tcp open  ipcam   Hikvision IPCam control port

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:58:35 2020 -- 1 IP address (1 host up) scanned in 45.84 seconds

173.30.122.129


hostname: 173-30-122-129.client.mchsi.com
open ports: [8080]
# Nmap 7.80 scan initiated Wed Oct 21 03:57:22 2020 as: nmap -oA data/nweb.dq0oy2wz8l -sC -sV --open -Pn --system-dns -p 8080 173.30.122.129
Nmap scan report for 173-30-122-129.client.mchsi.com (173.30.122.129)
Host is up (0.13s latency).

PORT     STATE SERVICE VERSION
8080/tcp open  http    lighttpd
|_http-title: Common UI

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:57:33 2020 -- 1 IP address (1 host up) scanned in 10.81 seconds

181.174.142.187


hostname: host-142-187.adc.net.ar
open ports: [8080]
# Nmap 7.80 scan initiated Wed Oct 21 03:57:03 2020 as: nmap -oA data/nweb.fkc17d2k1k -sC -sV --open -Pn --system-dns -p 8080 181.174.142.187
Nmap scan report for host-142-187.adc.net.ar (181.174.142.187)
Host is up (0.25s latency).

PORT     STATE SERVICE VERSION
8080/tcp open  http    lighttpd
|_http-server-header: DasanNetwork Solution
|_http-title: GPON ONT

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:57:18 2020 -- 1 IP address (1 host up) scanned in 14.99 seconds

76.173.140.253


hostname: cpe-76-173-140-253.hawaii.res.rr.com
open ports: [2000]
# Nmap 7.80 scan initiated Wed Oct 21 03:55:07 2020 as: nmap -oA data/nweb.owzkq440wn -sC -sV --open -Pn --system-dns -p 2000 76.173.140.253
Nmap scan report for cpe-76-173-140-253.hawaii.res.rr.com (76.173.140.253)
Host is up (0.22s latency).

PORT     STATE SERVICE     VERSION
2000/tcp open  cisco-sccp?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port2000-TCP:V=7.80%I=7%D=10/21%Time=5F8FB132%P=x86_64-pc-linux-gnu%r(N
SF:CP,C,"\xe4mdT\xf0\x0f\0\x01\0\0\0\0")%r(RPCCheck,C,"\xa0\0\0\(\xf0\x0f\
SF:0\x01\0\0\0\0")%r(DNSVersionBindReqTCP,C,"\xa0\x1e\0\x06\xf0\x0f\0\x01\
SF:0\0\0\0")%r(DNSStatusRequestTCP,C,"\xa0\x0c\0\0\xf0\x0f\0\x01\0\0\0\0")
SF:%r(Kerberos,18,"\xa0\0\0q\xf0\x0f\0\x01\0\0\0\0\xa2\x01\x05\xa2\xf0\x0f
SF:\0\x01\0\0\0\0")%r(X11Probe,C,"\xec\0\x0b\0\xf0\x0f\0\x01\0\0\0\0")%r(W
SF:MSRequest,24,"\xa1\0\0\xfd\xf0\x0f\0\x01\0\0\0\0\xedMS\x14\xf0\x0f\0\x0
SF:1\0\0\0\0\xa0\0\0\0\xf0\x0f\0\x01\0\0\0\0")%r(afp,C,"\xa0\x03\0\x01\xf0
SF:\x0f\0\x01\0\0\0\0");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:58:16 2020 -- 1 IP address (1 host up) scanned in 189.35 seconds

221.28.115.193


hostname: softbank221028115193.bbtec.net
open ports: [80]
# Nmap 7.80 scan initiated Wed Oct 21 03:53:48 2020 as: nmap -oA data/nweb.h7zo0agep3 -sC -sV --open -Pn --system-dns -p 80 221.28.115.193
Nmap scan report for softbank221028115193.bbtec.net (221.28.115.193)
Host is up (0.29s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http
| fingerprint-strings: 
|   NULL: 
|     HTTP/1.0 200 OK
|     Content-type: text/html
|     <html>
|     <body><h1>400 Bad Request</h1>
|     <p>Request Error.</p></body>
|_    </html>
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.80%I=7%D=10/21%Time=5F8FB0D3%P=x86_64-pc-linux-gnu%r(NUL
SF:L,7B,"HTTP/1\.0\x20200\x20OK\r\nContent-type:\x20text/html\r\n\r\n<html
SF:>\r\n<body><h1>400\x20Bad\x20Request</h1>\r\n<p>Request\x20Error\.</p><
SF:/body>\r\n</html>\r\n");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:57:58 2020 -- 1 IP address (1 host up) scanned in 250.64 seconds

120.74.151.27


hostname: p784a971b.sitmnt01.ap.so-net.ne.jp
open ports: [1723]
# Nmap 7.80 scan initiated Wed Oct 21 03:56:49 2020 as: nmap -oA data/nweb.gopdxyupdy -sC -sV --open -Pn --system-dns -p 1723 120.74.151.27
Nmap scan report for p784a971b.sitmnt01.ap.so-net.ne.jp (120.74.151.27)
Host is up (0.24s latency).

PORT     STATE SERVICE VERSION
1723/tcp open  pptp    Cisco Systems, Inc. (Firmware: 4608)
Service Info: Host: JC892J

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:57:52 2020 -- 1 IP address (1 host up) scanned in 63.21 seconds

130.107.7.20


hostname: dh-7-20.csl.sri.com
open ports: [1720]
# Nmap 7.80 scan initiated Wed Oct 21 03:54:55 2020 as: nmap -oA data/nweb.d2i3x3g2o6 -sC -sV --open -Pn --system-dns -p 1720 130.107.7.20
Nmap scan report for dh-7-20.csl.sri.com (130.107.7.20)
Host is up (0.16s latency).

PORT     STATE SERVICE   VERSION
1720/tcp open  h323q931?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:57:47 2020 -- 1 IP address (1 host up) scanned in 172.43 seconds

141.214.16.21


hostname: schedulon.med.umich.edu
open ports: [80, 443]
HTTP

# Nmap 7.80 scan initiated Wed Oct 21 03:56:42 2020 as: nmap -oA data/nweb.znr141jyku -sC -sV --open -Pn --system-dns -p "80, 443" 141.214.16.21
Nmap scan report for schedulon.med.umich.edu (141.214.16.21)
Host is up (0.11s latency).

PORT    STATE SERVICE  VERSION
80/tcp  open  http     Microsoft IIS httpd 8.5
|_http-server-header: Microsoft-IIS/8.5
|_http-title: Did not follow redirect to https://schedulon.med.umich.edu/EmsWebApp/
443/tcp open  ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
| http-server-header: 
|   Microsoft-HTTPAPI/2.0
|_  Microsoft-IIS/8.5
| http-title: EMS Web App Error
|_Requested resource was /EmsWebApp/Error.aspx
| ssl-cert: Subject: commonName=schedulon.med.umich.edu/organizationName=University of Michigan/stateOrProvinceName=MI/countryName=US
| Subject Alternative Name: DNS:schedulon.med.umich.edu
| Not valid before: 2019-08-06T00:00:00
|_Not valid after:  2021-08-05T23:59:59
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:57:02 2020 -- 1 IP address (1 host up) scanned in 19.94 seconds

199.227.171.2


hostname: 199.227.171.2
open ports: [80, 444]
HTTP

# Nmap 7.80 scan initiated Wed Oct 21 03:56:39 2020 as: nmap -oA data/nweb.x2jvyg68y5 -sC -sV --open -Pn --system-dns -p "22, 80, 444" 199.227.171.2
Nmap scan report for 199.227.171.2
Host is up (0.12s latency).
Not shown: 1 filtered port
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE  VERSION
80/tcp  open  http     Apache httpd 2.4.41 ((Unix) OpenSSL/1.1.1 mod_fastcgi/mod_fastcgi-SNAP-0910052141)
|_http-server-header: Apache/2.4.41 (Unix) OpenSSL/1.1.1 mod_fastcgi/mod_fastcgi-SNAP-0910052141
|_http-title: Did not follow redirect to https://199.227.171.2:444/
444/tcp open  ssl/http Apache httpd 2.4.41 ((Unix) OpenSSL/1.1.1 mod_fastcgi/mod_fastcgi-SNAP-0910052141)
|_http-favicon: Fortinet
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Apache/2.4.41 (Unix) OpenSSL/1.1.1 mod_fastcgi/mod_fastcgi-SNAP-0910052141
|_http-title: Site doesn't have a title (text/html).
| ssl-cert: Subject: commonName=FortiGate/organizationName=Fortinet Ltd.
| Not valid before: 2020-03-17T15:52:27
|_Not valid after:  2030-03-18T15:52:27
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:57:07 2020 -- 1 IP address (1 host up) scanned in 28.36 seconds

212.107.255.7


hostname: 212.107.255.7
open ports: [23, 80, 443]
# Nmap 7.80 scan initiated Wed Oct 21 03:55:10 2020 as: nmap -oA data/nweb.3dkktoben1 -sC -sV --open -Pn --system-dns -p "22, 23, 80, 443" 212.107.255.7
Nmap scan report for 212.107.255.7
Host is up (0.083s latency).
Not shown: 1 filtered port
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE    VERSION
23/tcp  open  telnet     Cisco router telnetd
80/tcp  open  http       Cisco IOS http config
| http-auth: 
| HTTP/1.1 401 Unauthorized\x0D
|_  Basic realm=level_15_access
|_http-server-header: cisco-IOS
|_http-title: Site doesn't have a title.
443/tcp open  ssl/https?
Service Info: OS: IOS; Device: router; CPE: cpe:/o:cisco:ios

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:56:57 2020 -- 1 IP address (1 host up) scanned in 107.22 seconds

44.182.1.52


hostname: cpanel2.netveillance.net
open ports: [21, 53, 80, 110, 143, 443, 993]
HTTP

HTTPS

# Nmap 7.80 scan initiated Wed Oct 21 03:56:11 2020 as: nmap -oA data/nweb.4krsazmr25 -sC -sV --open -Pn --system-dns -p "21, 25, 53, 80, 110, 143, 443, 465, 587, 993" 44.182.1.52
Nmap scan report for cpanel2.netveillance.net (44.182.1.52)
Host is up (0.029s latency).
Not shown: 3 filtered ports
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE  VERSION
21/tcp  open  ftp      Pure-FTPd
| ssl-cert: Subject: commonName=cpanel2.netveillance.net
| Subject Alternative Name: DNS:cpanel2.netveillance.net, DNS:www.cpanel2.netveillance.net
| Not valid before: 2020-06-07T00:00:00
|_Not valid after:  2021-06-07T23:59:59
|_ssl-date: TLS randomness does not represent time
53/tcp  open  domain   PowerDNS Authoritative Server 4.1.14
| dns-nsid: 
|   NSID: cpanel2.netveillance.net (6370616e656c322e6e65747665696c6c616e63652e6e6574)
|   id.server: cpanel2.netveillance.net
|_  bind.version: PowerDNS Authoritative Server 4.1.14 (built Sep 23 2020 09:14:39 by root@rpmbuild-64-centos-7.dev.cpanel.net)
80/tcp  open  http     Apache httpd
|_http-server-header: Apache
|_http-title: 403 Forbidden
110/tcp open  pop3     Dovecot pop3d
|_pop3-capabilities: CAPA TOP AUTH-RESP-CODE STLS RESP-CODES UIDL USER SASL(PLAIN LOGIN) PIPELINING
| ssl-cert: Subject: commonName=cpanel2.netveillance.net
| Subject Alternative Name: DNS:cpanel2.netveillance.net, DNS:www.cpanel2.netveillance.net
| Not valid before: 2020-06-07T00:00:00
|_Not valid after:  2021-06-07T23:59:59
143/tcp open  imap     Dovecot imapd
|_imap-capabilities: ID NAMESPACE STARTTLS have more post-login SASL-IR AUTH=PLAIN AUTH=LOGINA0001 LITERAL+ Pre-login LOGIN-REFERRALS IMAP4rev1 IDLE listed capabilities OK ENABLE
| ssl-cert: Subject: commonName=cpanel2.netveillance.net
| Subject Alternative Name: DNS:cpanel2.netveillance.net, DNS:www.cpanel2.netveillance.net
| Not valid before: 2020-06-07T00:00:00
|_Not valid after:  2021-06-07T23:59:59
443/tcp open  ssl/http Apache httpd
|_http-server-header: Apache
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=cpanel2.netveillance.net
| Subject Alternative Name: DNS:cpanel2.netveillance.net, DNS:www.cpanel2.netveillance.net
| Not valid before: 2020-06-07T00:00:00
|_Not valid after:  2021-06-07T23:59:59
993/tcp open  imaps?
|_imap-capabilities: ID NAMESPACE OK have more post-login SASL-IR capabilities AUTH=LOGINA0001 LITERAL+ Pre-login LOGIN-REFERRALS IDLE listed AUTH=PLAIN IMAP4rev1 ENABLE
| ssl-cert: Subject: commonName=cpanel2.netveillance.net
| Subject Alternative Name: DNS:cpanel2.netveillance.net, DNS:www.cpanel2.netveillance.net
| Not valid before: 2020-06-07T00:00:00
|_Not valid after:  2021-06-07T23:59:59

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:56:53 2020 -- 1 IP address (1 host up) scanned in 41.66 seconds

221.95.68.12


hostname: softbank221095068012.bbtec.net
open ports: [80]
# Nmap 7.80 scan initiated Wed Oct 21 03:52:52 2020 as: nmap -oA data/nweb.mgg7hq13vt -sC -sV --open -Pn --system-dns -p 80 221.95.68.12
Nmap scan report for softbank221095068012.bbtec.net (221.95.68.12)
Host is up (0.28s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:56:45 2020 -- 1 IP address (1 host up) scanned in 232.87 seconds

66.187.160.149


hostname: DW.STVL.CARN.R000.2.Dasia.Net
open ports: [2000]
# Nmap 7.80 scan initiated Wed Oct 21 03:56:35 2020 as: nmap -oA data/nweb.eum7v1vji4 -sC -sV --open -Pn --system-dns -p 2000 66.187.160.149
Nmap scan report for DW.STVL.CARN.R000.2.Dasia.Net (66.187.160.149)
Host is up (0.11s latency).

PORT     STATE SERVICE        VERSION
2000/tcp open  bandwidth-test MikroTik bandwidth-test server

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:56:37 2020 -- 1 IP address (1 host up) scanned in 2.17 seconds

121.243.17.140


hostname: 121.243.17.140.static-delhi.vsnl.net.in
open ports: [8443]
HTTPS

# Nmap 7.80 scan initiated Wed Oct 21 03:54:11 2020 as: nmap -oA data/nweb.a4dprz8vu9 -sC -sV --open -Pn --system-dns -p 8443 121.243.17.140
Nmap scan report for 121.243.17.140.static-delhi.vsnl.net.in (121.243.17.140)
Host is up (0.14s latency).

PORT     STATE SERVICE    VERSION
8443/tcp open  https-alt?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:56:24 2020 -- 1 IP address (1 host up) scanned in 132.85 seconds

214.42.255.68


hostname: vpn38.socom.mil
open ports: [443]
HTTPS

# Nmap 7.80 scan initiated Wed Oct 21 03:55:58 2020 as: nmap -oA data/nweb.yaascqou7t -sC -sV --open -Pn --system-dns -p 443 214.42.255.68
Nmap scan report for vpn38.socom.mil (214.42.255.68)
Host is up (0.072s latency).

PORT    STATE SERVICE  VERSION
443/tcp open  ssl/http Cisco ASA SSL VPN
| http-robots.txt: 1 disallowed entry 
|_/
|_http-title: Site doesn't have a title (text/html; charset=utf-8).
|_http-trane-info: Problem with XML parsing of /evox/about
| ssl-cert: Subject: commonName=vpn38.socom.mil/organizationName=U.S. Government/countryName=US
| Subject Alternative Name: DNS:vpn38.socom.mil, IP Address:214.42.255.68
| Not valid before: 2017-12-13T21:40:48
|_Not valid after:  2020-12-13T21:40:48

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:56:15 2020 -- 1 IP address (1 host up) scanned in 17.02 seconds

91.10.143.172


hostname: p5b0a8fac.dip0.t-ipconnect.de
open ports: [5060]
# Nmap 7.80 scan initiated Wed Oct 21 03:56:10 2020 as: nmap -oA data/nweb.0w2eo97dyw -sC -sV --open -Pn --system-dns -p 5060 91.10.143.172
Nmap scan report for p5b0a8fac.dip0.t-ipconnect.de (91.10.143.172)
Host is up (0.017s latency).

PORT     STATE SERVICE    VERSION
5060/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:56:16 2020 -- 1 IP address (1 host up) scanned in 5.75 seconds

80.97.56.183


hostname: 80.97.56.183
open ports: [2000, 5060]
# Nmap 7.80 scan initiated Wed Oct 21 03:54:12 2020 as: nmap -oA data/nweb.xzz8s8mz76 -sC -sV --open -Pn --system-dns -p "2000, 5060" 80.97.56.183
Nmap scan report for 80.97.56.183
Host is up (0.039s latency).

PORT     STATE SERVICE     VERSION
2000/tcp open  cisco-sccp?
5060/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:56:14 2020 -- 1 IP address (1 host up) scanned in 122.53 seconds

98.183.40.65


hostname: ip98-183-40-65.pn.at.cox.net
open ports: [5101]
# Nmap 7.80 scan initiated Wed Oct 21 03:55:48 2020 as: nmap -oA data/nweb.goyeoa64jb -sC -sV --open -Pn --system-dns -p 5101 98.183.40.65
Nmap scan report for ip98-183-40-65.pn.at.cox.net (98.183.40.65)
Host is up (0.13s latency).

PORT     STATE SERVICE VERSION
5101/tcp open  admdog?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:56:09 2020 -- 1 IP address (1 host up) scanned in 20.98 seconds

198.135.192.199


hostname: www.incentivenews.ca
open ports: [80]
HTTP

# Nmap 7.80 scan initiated Wed Oct 21 03:55:43 2020 as: nmap -oA data/nweb.pclmbky2h1 -sC -sV --open -Pn --system-dns -p 80 198.135.192.199
Nmap scan report for www.incentivenews.ca (198.135.192.199)
Host is up (0.10s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    Microsoft IIS httpd 8.5
| http-cookie-flags: 
|   /: 
|     ASPSESSIONIDQSRQSDSD: 
|_      httponly flag not set
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/8.5
| http-title: Site doesn't have a title (text/html).
|_Requested resource was /loginRedirect.asp
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:53 2020 -- 1 IP address (1 host up) scanned in 9.98 seconds

78.120.170.247


hostname: 247.170.120.78.rev.sfr.net
open ports: [80]
HTTP

# Nmap 7.80 scan initiated Wed Oct 21 03:55:37 2020 as: nmap -oA data/nweb.rnel8ui490 -sC -sV --open -Pn --system-dns -p 80 78.120.170.247
Nmap scan report for 247.170.120.78.rev.sfr.net (78.120.170.247)
Host is up (0.018s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    Microchip Libraries of Applications TCP/IP Stack httpd
| http-title: Centrale
|_Requested resource was /fr/login.htm

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:48 2020 -- 1 IP address (1 host up) scanned in 10.72 seconds

138.44.25.24


hostname: 138.44.25.24
open ports: [80, 443]
# Nmap 7.80 scan initiated Wed Oct 21 03:55:14 2020 as: nmap -oA data/nweb.0y55c6ne57 -sC -sV --open -Pn --system-dns -p "80, 443" 138.44.25.24
Nmap scan report for 138.44.25.24
Host is up (0.30s latency).

PORT    STATE SERVICE  VERSION
80/tcp  open  http     AkamaiGHost (Akamai's HTTP Acceleration/Mirror service)
|_http-title: Invalid URL
443/tcp open  ssl/http AkamaiGHost (Akamai's HTTP Acceleration/Mirror service)
|_http-title: Invalid URL
| ssl-cert: Subject: commonName=cl1.apple.com/organizationName=Apple Inc./stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:cl1.apple.com, DNS:cl4.apple.com, DNS:cl2.apple.com, DNS:cl5.apple.com, DNS:cl3.apple.com
| Not valid before: 2020-06-10T19:29:51
|_Not valid after:  2021-07-10T19:39:00
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|   http/1.1
|_  http/1.0

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:44 2020 -- 1 IP address (1 host up) scanned in 30.04 seconds

170.225.231.154


hostname: 170.225.231.154
open ports: [2000, 5060]
# Nmap 7.80 scan initiated Wed Oct 21 03:55:24 2020 as: nmap -oA data/nweb.nuc2zjgz4l -sC -sV --open -Pn --system-dns -p "2000, 5060" 170.225.231.154
Nmap scan report for 170.225.231.154
Host is up (0.26s latency).

PORT     STATE SERVICE    VERSION
2000/tcp open  tcpwrapped
5060/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:46 2020 -- 1 IP address (1 host up) scanned in 21.27 seconds

35.156.245.147


hostname: ec2-35-156-245-147.eu-central-1.compute.amazonaws.com
open ports: [443]
HTTPS

# Nmap 7.80 scan initiated Wed Oct 21 03:55:22 2020 as: nmap -oA data/nweb.xmk81mhlmr -sC -sV --open -Pn --system-dns -p 443 35.156.245.147
Nmap scan report for ec2-35-156-245-147.eu-central-1.compute.amazonaws.com (35.156.245.147)
Host is up (0.0015s latency).

PORT    STATE SERVICE  VERSION
443/tcp open  ssl/http nginx
|_http-title: Did not follow redirect to https://www.cpvcode.de/
| ssl-cert: Subject: commonName=www.cpvcode.de
| Subject Alternative Name: DNS:www.cpvcode.de, DNS:cpvcode.de
| Not valid before: 2020-05-20T00:00:00
|_Not valid after:  2021-06-05T12:00:00
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| tls-nextprotoneg: 
|   h2
|_  http/1.1

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:35 2020 -- 1 IP address (1 host up) scanned in 13.24 seconds

216.27.126.36


hostname: 216.27.126.36
open ports: [443, 444]
HTTPS

# Nmap 7.80 scan initiated Wed Oct 21 03:55:08 2020 as: nmap -oA data/nweb.glf22mhz8o -sC -sV --open -Pn --system-dns -p "443, 444" 216.27.126.36
Nmap scan report for 216.27.126.36
Host is up (0.086s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/http   Fortinet security device httpd
|_http-favicon: Fortinet
|_http-server-header: xxxxxxxx-xxxxx
|_http-title: Site doesn't have a title (text/html).
| ssl-cert: Subject: commonName=FGT60E4Q16082695/organizationName=Fortinet/stateOrProvinceName=California/countryName=US
| Not valid before: 2016-11-14T01:32:25
|_Not valid after:  2038-01-19T03:14:07
|_ssl-date: TLS randomness does not represent time
444/tcp open  tcpwrapped
Service Info: Device: security-misc

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:31 2020 -- 1 IP address (1 host up) scanned in 23.47 seconds

71.69.122.87


hostname: cpe-71-69-122-87.triad.res.rr.com
open ports: [80, 3306]
# Nmap 7.80 scan initiated Wed Oct 21 03:54:53 2020 as: nmap -oA data/nweb.5hcf1dtn87 -sC -sV --open -Pn --system-dns -p "22, 80, 3306" 71.69.122.87
Nmap scan report for cpe-71-69-122-87.triad.res.rr.com (71.69.122.87)
Host is up (0.11s latency).
Not shown: 1 filtered port
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE VERSION
80/tcp   open  http    Apache httpd 2.4.46 ((Fedora))
|_http-server-header: Apache/2.4.46 (Fedora)
|_http-title: D &amp; M Vapes
3306/tcp open  mysql   MySQL 5.5.5-10.4.14-MariaDB
| mysql-info: 
|   Protocol: 10
|   Version: 5.5.5-10.4.14-MariaDB
|   Thread ID: 31399
|   Capabilities flags: 63486
|   Some Capabilities: ODBCClient, SupportsCompression, Speaks41ProtocolOld, SupportsTransactions, IgnoreSpaceBeforeParenthesis, Speaks41ProtocolNew, Support41Auth, FoundRows, IgnoreSigpipes, LongColumnFlag, DontAllowDatabaseTableColumn, ConnectWithDatabase, SupportsLoadDataLocal, InteractiveClient, SupportsAuthPlugins, SupportsMultipleResults, SupportsMultipleStatments
|   Status: Autocommit
|   Salt: 2f0WIE_/iGdDfSPsvte}
|_  Auth Plugin Name: mysql_native_password

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:15 2020 -- 1 IP address (1 host up) scanned in 22.12 seconds

59.152.61.209


hostname: 59.152.61.209
open ports: [179, 2000]
# Nmap 7.80 scan initiated Wed Oct 21 03:55:09 2020 as: nmap -oA data/nweb.cvypzp4hdh -sC -sV --open -Pn --system-dns -p "179, 2000" 59.152.61.209
Nmap scan report for 59.152.61.209
Host is up (0.20s latency).

PORT     STATE SERVICE        VERSION
179/tcp  open  tcpwrapped
2000/tcp open  bandwidth-test MikroTik bandwidth-test server

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:16 2020 -- 1 IP address (1 host up) scanned in 7.38 seconds

58.119.57.234


hostname: 58.119.57.234
open ports: [143]
# Nmap 7.80 scan initiated Wed Oct 21 03:51:48 2020 as: nmap -oA data/nweb.11cn3vir8b -sC -sV --open -Pn --system-dns -p 143 58.119.57.234
Nmap scan report for 58.119.57.234
Host is up (0.25s latency).

PORT    STATE SERVICE VERSION
143/tcp open  imap?

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:10 2020 -- 1 IP address (1 host up) scanned in 202.91 seconds

68.173.201.151


hostname: agg2.nycrnydf08m.nyc.rr.com
open ports: [179]
# Nmap 7.80 scan initiated Wed Oct 21 03:54:59 2020 as: nmap -oA data/nweb.sjcy113eqo -sC -sV --open -Pn --system-dns -p 179 68.173.201.151
Nmap scan report for agg2.nycrnydf08m.nyc.rr.com (68.173.201.151)
Host is up (0.090s latency).

PORT    STATE SERVICE    VERSION
179/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:05 2020 -- 1 IP address (1 host up) scanned in 6.70 seconds

153.9.244.16


hostname: 153.9.244.16
open ports: [443]
# Nmap 7.80 scan initiated Wed Oct 21 03:53:18 2020 as: nmap -oA data/nweb.d5xyvvca7r -sC -sV --open -Pn --system-dns -p 443 153.9.244.16
Nmap scan report for 153.9.244.16
Host is up (0.11s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?
|_ssl-date: TLS randomness does not represent time

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:55:04 2020 -- 1 IP address (1 host up) scanned in 106.12 seconds

172.14.36.47


hostname: 172-14-36-47.lightspeed.sndgca.sbcglobal.net
open ports: [443]
# Nmap 7.80 scan initiated Wed Oct 21 03:53:12 2020 as: nmap -oA data/nweb.pu3wuy68ok -sC -sV --open -Pn --system-dns -p 443 172.14.36.47
Nmap scan report for 172-14-36-47.lightspeed.sndgca.sbcglobal.net (172.14.36.47)
Host is up (0.17s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?
|_ssl-date: 2020-10-21T03:53:59+00:00; -1s from scanner time.

Host script results:
|_clock-skew: -1s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:54:59 2020 -- 1 IP address (1 host up) scanned in 107.64 seconds

169.56.81.15


hostname: f.51.38a9.ip4.static.sl-reverse.com
open ports: [80]
# Nmap 7.80 scan initiated Wed Oct 21 03:54:37 2020 as: nmap -oA data/nweb.56drm5dj5w -sC -sV --open -Pn --system-dns -p 80 169.56.81.15
Nmap scan report for f.51.38a9.ip4.static.sl-reverse.com (169.56.81.15)
Host is up (0.30s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd
| http-auth: 
| HTTP/1.1 401 Unauthorized\x0D
|_  Basic realm=CollabNet Subversion Repository
|_http-server-header: Apache
|_http-title: 401 Unauthorized

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:54:52 2020 -- 1 IP address (1 host up) scanned in 15.01 seconds

39.109.222.51


hostname: 39.109.222.51
open ports: [80]
HTTP

# Nmap 7.80 scan initiated Wed Oct 21 03:54:24 2020 as: nmap -oA data/nweb.9rzfovup9k -sC -sV --open -Pn --system-dns -p 80 39.109.222.51
Nmap scan report for 39.109.222.51
Host is up (0.17s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    HTTPServer
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, GenericLines, Help, RPCCheck, X11Probe: 
|     <body><h1>400 Bad Request</h1></body>
|   FourOhFourRequest: 
|     <body><h1>404 Not Found</h1></body>
|   GetRequest: 
|     HTTP/1.0 200 OK
|     Server: HTTPServer
|     Cache-control: no-cache
|     Accept-Ranges: bytes
|     Connection: close
|     Content-Type: text/html
|     Content-Length: 1364
|     <html>
|     <head>
|     <title>WebVideo</title>
|     </head>
|     <body align="center" TopMargin="0" bgcolor="#FFFFFF" Leftmargin="0" RightMargin="0" Bottommargin="0" onResize="ReSet()" onLoad="ReSet()">
|     <!-- do not modify start -->
|     <input type=hidden name=cLanguage value=2 >
|     <input type=hidden name=cDomain value= >
|     <input type=hidden name=cPassword value=fe692bfc7b8f892e9aff7da774fc6a25>
|     <input type=hidden name=cDvrStyle value=0 >
|     <input type=hidden name=cCmdPort value=3357 >
|     <!-- do not modify end -->
|     <object codebase="webvideo.cab#version=1,0,0,36" name="webvideo" classid="clsid:fe7d5a0f-4e25-41b1-8a99-3d9d58f400d2" width="100%"
|   HTTPOptions, RTSPRequest: 
|_    <body><h1>501 Not Implemented</h1></body>
|_http-server-header: HTTPServer
|_http-title: WebVideo
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.80%I=7%D=10/21%Time=5F8FB0F8%P=x86_64-pc-linux-gnu%r(Get
SF:Request,5EC,"HTTP/1\.0\x20200\x20OK\r\nServer:\x20HTTPServer\r\nCache-c
SF:ontrol:\x20no-cache\r\nAccept-Ranges:\x20bytes\r\nConnection:\x20close\
SF:r\nContent-Type:\x20text/html\r\nContent-Length:\x201364\r\n\r\n<html>\
SF:r\n<head>\r\n<title>WebVideo</title>\r\n</head>\r\n\r\n\r\n<body\x20ali
SF:gn=\"center\"\x20TopMargin=\"0\"\x20bgcolor=\"#FFFFFF\"\x20Leftmargin=\
SF:"0\"\x20RightMargin=\"0\"\x20Bottommargin=\"0\"\x20onResize=\"ReSet\(\)
SF:\"\x20onLoad=\"ReSet\(\)\">\r\n<!--\x20do\x20not\x20modify\x20start\x20
SF:-->\r\n<input\x20type=hidden\x20name=cLanguage\x20value=2\x20\x20\x20\x
SF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20>\r\n<input\x20ty
SF:pe=hidden\x20name=cDomain\x20value=\x20\x20\x20\x20\x20\x20\x20\x20\x20
SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20>\r\n<input\x20type=hidden\x20name=cPassword\x20value=fe692bfc7b
SF:8f892e9aff7da774fc6a25>\r\n<input\x20type=hidden\x20name=cDvrStyle\x20v
SF:alue=0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20>\r\n<input\x20type=hidden\x20name=cCmdPort\x20\t\tvalue=3357\x20\x2
SF:0\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20>\r\n<!--\x20do\x20not
SF:\x20modify\x20end\x20-->\r\n\r\n<object\x20codebase=\"webvideo\.cab#ver
SF:sion=1,0,0,36\"\x20name=\"webvideo\"\x20classid=\"clsid:fe7d5a0f-4e25-4
SF:1b1-8a99-3d9d58f400d2\"\x20\x20width=\"100%\"")%r(HTTPOptions,29,"<body
SF:><h1>501\x20Not\x20Implemented</h1></body>")%r(RTSPRequest,29,"<body><h
SF:1>501\x20Not\x20Implemented</h1></body>")%r(X11Probe,25,"<body><h1>400\
SF:x20Bad\x20Request</h1></body>")%r(FourOhFourRequest,23,"<body><h1>404\x
SF:20Not\x20Found</h1></body>")%r(GenericLines,25,"<body><h1>400\x20Bad\x2
SF:0Request</h1></body>")%r(RPCCheck,25,"<body><h1>400\x20Bad\x20Request</
SF:h1></body>")%r(DNSVersionBindReqTCP,25,"<body><h1>400\x20Bad\x20Request
SF:</h1></body>")%r(DNSStatusRequestTCP,25,"<body><h1>400\x20Bad\x20Reques
SF:t</h1></body>")%r(Help,25,"<body><h1>400\x20Bad\x20Request</h1></body>"
SF:);

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Wed Oct 21 03:54:46 2020 -- 1 IP address (1 host up) scanned in 21.62 seconds

184.173.191.67


hostname: 43.bf.adb8.ip4.static.sl-reverse.com
open ports: [53, 80]
HTTP