60.190.154.158


hostname: 60.190.154.158
open ports: [444]
# Nmap 7.60 scan initiated Sun Jul 30 02:23:49 2023 as: nmap -oA data/nweb.yvg5plnpd7 -sC -sV --open -Pn --system-dns -p 444, 1723 60.190.154.158
Nmap scan report for 60.190.154.158
Host is up (0.15s latency).
Not shown: 1 filtered port
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE  VERSION
444/tcp open  ssl/http Cisco ASA 5510 firewall http config
| http-title: Cisco ASDM 6.4(5)
|_Requested resource was /admin/public/index.html
| ssl-cert: Subject: commonName=60.190.154.158
| Not valid before: 2003-01-01T00:01:16
|_Not valid after:  2012-12-29T00:01:16
|_ssl-date: 2023-07-30T09:24:03+00:00; -4s from scanner time.
Service Info: Device: firewall; CPE: cpe:/h:cisco:asa_5510

Host script results:
|_clock-skew: mean: -4s, deviation: 0s, median: -4s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:24:14 2023 -- 1 IP address (1 host up) scanned in 24.95 seconds

202.66.174.112


hostname: web-22.znetlive.in
open ports: [21, 80, 135, 443, 445, 8081]
# Nmap 7.60 scan initiated Sun Jul 30 02:22:43 2023 as: nmap -oA data/nweb.nl42z5kxip -sC -sV --open -Pn --system-dns -p 21, 80, 135, 443, 445, 2000, 3306, 5060, 8081, 49153, 49154 202.66.174.112
Nmap scan report for web-22.znetlive.in (202.66.174.112)
Host is up (0.25s latency).
Not shown: 5 filtered ports
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT     STATE SERVICE          VERSION
21/tcp   open  ftp              Microsoft ftpd
| ftp-syst: 
|_  SYST: Windows_NT
80/tcp   open  http             Microsoft IIS httpd 10.0
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
|_http-title: IIS Windows Server
135/tcp  open  msrpc            Microsoft Windows RPC
443/tcp  open  ssl/http         Microsoft IIS httpd 10.0
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Did not follow redirect to https://web-22.znetlive.in/Default.aspx?pid=Login&ReturnUrl=/
| ssl-cert: Subject: commonName=*.znetindia.net
| Subject Alternative Name: DNS:*.znetindia.net, DNS:znetindia.net
| Not valid before: 2023-01-18T07:00:43
|_Not valid after:  2024-02-19T07:00:42
|_ssl-date: 2023-07-30T09:23:11+00:00; -1s from scanner time.
|_sstp-discover: SSTP is supported.
445/tcp  open  microsoft-ds?
8081/tcp open  blackice-icecap?
| fingerprint-strings: 
|   HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Content-Type: text/plain; charset=utf-8
|     Content-Length: 13
|_    Found
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port8081-TCP:V=7.60%I=7%D=7/30%Time=64C62BF4%P=x86_64-pc-linux-gnu%r(HT
SF:TPOptions,64,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Type:\x20text
SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2013\r\n\r\n404\x20Not\x20
SF:Found");
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: -1s, deviation: 0s, median: -1s
| smb2-security-mode: 
|   2.02: 
|_    Message signing enabled but not required
| smb2-time: 
|   date: 2023-07-30 02:23:14
|_  start_date: 1600-12-31 16:07:02

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:23:52 2023 -- 1 IP address (1 host up) scanned in 68.69 seconds

118.201.125.114


hostname: 118.201.125.114
open ports: [1720]
# Nmap 7.60 scan initiated Sun Jul 30 02:23:02 2023 as: nmap -oA data/nweb.xpqtwgnhw3 -sC -sV --open -Pn --system-dns -p 1720 118.201.125.114
Nmap scan report for 118.201.125.114
Host is up (0.19s latency).

PORT     STATE SERVICE  VERSION
1720/tcp open  h323q931 Polycom ViewStation H.323

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:23:41 2023 -- 1 IP address (1 host up) scanned in 39.24 seconds

141.96.6.64


hostname: mail.candriam.com
open ports: [25]
# Nmap 7.60 scan initiated Sun Jul 30 02:22:19 2023 as: nmap -oA data/nweb.ps9qta5162 -sC -sV --open -Pn --system-dns -p 25 141.96.6.64
Nmap scan report for mail.candriam.com (141.96.6.64)
Host is up (0.16s latency).

PORT   STATE SERVICE VERSION
25/tcp open  smtp    IronPort smtpd
| smtp-commands: mail.candriam.com, 8BITMIME, SIZE 26214400, STARTTLS, 
|_ The following commands are recognized auth data ehlo helo help mail noop quit rcpt rset starttls vrfy 
| ssl-cert: Subject: commonName=mail.candriam.com/organizationName=Candriam/countryName=BE
| Subject Alternative Name: DNS:mail.candriam.com, DNS:www.mail.candriam.com
| Not valid before: 2023-05-04T00:00:00
|_Not valid after:  2024-06-03T23:59:59
|_ssl-date: TLS randomness does not represent time
Service Info: OS: AsyncOS; Device: specialized; CPE: cpe:/o:cisco:asyncos

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:22:41 2023 -- 1 IP address (1 host up) scanned in 22.08 seconds

86.92.231.54


hostname: 86-92-231-54.fixed.kpn.net
open ports: [80, 8000]
# Nmap 7.60 scan initiated Sun Jul 30 02:21:25 2023 as: nmap -oA data/nweb.atdx498yn4 -sC -sV --open -Pn --system-dns -p 80, 8000 86.92.231.54
Nmap scan report for 86-92-231-54.fixed.kpn.net (86.92.231.54)
Host is up (0.16s latency).

PORT     STATE SERVICE VERSION
80/tcp   open  http    Hikvision Network Video Recorder http admin
| http-methods: 
|_  Potentially risky methods: PUT DELETE
|_http-server-header: DNVRS-Webs
|_http-title: Site doesn't have a title (text/html).
8000/tcp open  ipcam   Hikvision IPCam control port
Service Info: Device: webcam

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:22:23 2023 -- 1 IP address (1 host up) scanned in 58.97 seconds

163.209.59.5


hostname: lss.kic.kagoshima-u.ac.jp
open ports: [80, 443]
# Nmap 7.60 scan initiated Sun Jul 30 02:21:57 2023 as: nmap -oA data/nweb.j9ey6o6rgd -sC -sV --open -Pn --system-dns -p 80, 443 163.209.59.5
Nmap scan report for lss.kic.kagoshima-u.ac.jp (163.209.59.5)
Host is up (0.12s latency).

PORT    STATE SERVICE  VERSION
80/tcp  open  http     Microsoft IIS httpd 8.5
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/8.5
|_http-title: IIS Windows Server
443/tcp open  ssl/http Microsoft IIS httpd 8.5
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/8.5
|_http-title: IIS Windows Server
| ssl-cert: Subject: commonName=lss.kic.kagoshima-u.ac.jp/organizationName=Kagoshima University/stateOrProvinceName=Kagoshima/countryName=JP
| Subject Alternative Name: DNS:lss.kic.kagoshima-u.ac.jp
| Not valid before: 2023-03-09T07:17:25
|_Not valid after:  2024-04-08T07:17:25
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:22:20 2023 -- 1 IP address (1 host up) scanned in 23.66 seconds

206.112.176.45


hostname: 206.112.176.45
open ports: [179]
# Nmap 7.60 scan initiated Sun Jul 30 02:22:11 2023 as: nmap -oA data/nweb.pfxlas50a4 -sC -sV --open -Pn --system-dns -p 179 206.112.176.45
Nmap scan report for 206.112.176.45
Host is up (0.062s latency).

PORT    STATE SERVICE    VERSION
179/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:22:17 2023 -- 1 IP address (1 host up) scanned in 5.95 seconds

189.202.203.130


hostname: 130.189-202-203.bestelclientes.com.mx
open ports: [443]
# Nmap 7.60 scan initiated Sun Jul 30 02:21:44 2023 as: nmap -oA data/nweb.4i921xsqu2 -sC -sV --open -Pn --system-dns -p 22, 53, 443 189.202.203.130
Nmap scan report for 130.189-202-203.bestelclientes.com.mx (189.202.203.130)
Host is up (0.085s latency).
Not shown: 1 closed port, 1 filtered port
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE  VERSION
443/tcp open  ssl/http SonicWALL firewall http config
|_http-server-header: SonicWALL
| http-title: Site doesn't have a title (text/html; charset=UTF-8;).
|_Requested resource was https://130.189-202-203.bestelclientes.com.mx/sonicui/7/login/
| ssl-cert: Subject: commonName=192.168.168.168/organizationName=HTTPS Management Certificate for SonicWALL (self-signed)/stateOrProvinceName=California/countryName=US
| Not valid before: 1970-01-01T00:00:01
|_Not valid after:  2038-01-19T03:14:07
Service Info: Device: firewall

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:22:03 2023 -- 1 IP address (1 host up) scanned in 18.82 seconds

61.71.99.124


hostname: host-61-71-99-124.static.kbtelecom.net
open ports: [80]
# Nmap 7.60 scan initiated Sun Jul 30 02:21:41 2023 as: nmap -oA data/nweb.fdlw6une5a -sC -sV --open -Pn --system-dns -p 80 61.71.99.124
Nmap scan report for host-61-71-99-124.static.kbtelecom.net (61.71.99.124)
Host is up (0.17s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    AkamaiGHost (Akamai's HTTP Acceleration/Mirror service)
|_http-server-header: AkamaiGHost
|_http-title: Invalid URL

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:21:54 2023 -- 1 IP address (1 host up) scanned in 12.87 seconds

165.3.5.61


hostname: 165.3.5.61
open ports: [22, 80]
# Nmap 7.60 scan initiated Sun Jul 30 02:20:23 2023 as: nmap -oA data/nweb.2x6xn4pzfr -sC -sV --open -Pn --system-dns -p 22, 80 165.3.5.61
Nmap scan report for 165.3.5.61
Host is up (0.0023s latency).

PORT   STATE SERVICE    VERSION
22/tcp open  tcpwrapped
80/tcp open  tcpwrapped

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:21:30 2023 -- 1 IP address (1 host up) scanned in 67.68 seconds

90.160.190.141


hostname: 141.pool90-160-190.dynamic.orange.es
open ports: [80]
# Nmap 7.60 scan initiated Sun Jul 30 02:21:01 2023 as: nmap -oA data/nweb.r4u6h1zwtg -sC -sV --open -Pn --system-dns -p 80 90.160.190.141
Nmap scan report for 141.pool90-160-190.dynamic.orange.es (90.160.190.141)
Host is up (0.18s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    AuraHyperCache
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 403 Forbidden
|     Server: AuraHyperCache
|     Date: Sun, 30 Jul 2023 09:21:10 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     <html>
|     <head><title>403 Forbidden</title></head>
|     <body bgcolor="white">
|     <center><h1>403 Forbidden</h1></center>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.0 403 Forbidden
|     Server: AuraHyperCache
|     Date: Sun, 30 Jul 2023 09:21:08 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     <html>
|     <head><title>403 Forbidden</title></head>
|     <body bgcolor="white">
|     <center><h1>403 Forbidden</h1></center>
|     </body>
|     </html>
|   HTTPOptions: 
|     HTTP/1.0 403 Forbidden
|     Server: AuraHyperCache
|     Date: Sun, 30 Jul 2023 09:21:09 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     <html>
|     <head><title>403 Forbidden</title></head>
|     <body bgcolor="white">
|     <center><h1>403 Forbidden</h1></center>
|     </body>
|     </html>
|   RPCCheck: 
|     HTTP/1.0 400 Bad Request
|     Server: AuraHyperCache
|     Date: Sun, 30 Jul 2023 09:21:15 GMT
|     Content-Type: text/html
|     Content-Length: 138
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.0 400 Bad Request
|     Server: AuraHyperCache
|     Date: Sun, 30 Jul 2023 09:21:09 GMT
|     Content-Type: text/html
|     Content-Length: 138
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-server-header: AuraHyperCache
|_http-title: 403 Forbidden
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.60%I=7%D=7/30%Time=64C62B84%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,11E,"HTTP/1\.0\x20403\x20Forbidden\r\nServer:\x20AuraHyperCache\
SF:r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:21:08\x20GMT\r\nContent-Typ
SF:e:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x20close\r\n\r
SF:\n<html>\r\n<head><title>403\x20Forbidden</title></head>\r\n<body\x20bg
SF:color=\"white\">\r\n<center><h1>403\x20Forbidden</h1></center>\r\n</bod
SF:y>\r\n</html>\r\n")%r(HTTPOptions,11E,"HTTP/1\.0\x20403\x20Forbidden\r\
SF:nServer:\x20AuraHyperCache\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:
SF:21:09\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20134\r\
SF:nConnection:\x20close\r\n\r\n<html>\r\n<head><title>403\x20Forbidden</t
SF:itle></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>403\x20Forbi
SF:dden</h1></center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,8A,"<html>
SF:\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcol
SF:or=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</b
SF:ody>\r\n</html>\r\n")%r(X11Probe,124,"HTTP/1\.0\x20400\x20Bad\x20Reques
SF:t\r\nServer:\x20AuraHyperCache\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2
SF:009:21:09\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2013
SF:8\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20R
Click here to see the complete results for 90.160.190.141

59.50.95.43


hostname: 59.50.95.43
open ports: [80]
# Nmap 7.60 scan initiated Sun Jul 30 02:20:59 2023 as: nmap -oA data/nweb.2pgi0a6ckx -sC -sV --open -Pn --system-dns -p 80 59.50.95.43
Nmap scan report for 59.50.95.43
Host is up (0.21s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http    Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Safedog/4.0.0
| http-title: Not Found
|_Requested resource was /?WebShieldDRSessionVerify=tJg35r9gQjoRVN5wYIVw
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:21:16 2023 -- 1 IP address (1 host up) scanned in 17.68 seconds

190.227.173.136


hostname: host136.190-227-173.telecom.net.ar
open ports: [22]
# Nmap 7.60 scan initiated Sun Jul 30 02:20:28 2023 as: nmap -oA data/nweb.1jveibim2n -sC -sV --open -Pn --system-dns -p 22, 80 190.227.173.136
Nmap scan report for host136.190-227-173.telecom.net.ar (190.227.173.136)
Host is up (0.21s latency).
Not shown: 1 filtered port
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT   STATE SERVICE VERSION
22/tcp open  ssh     Dropbear sshd 2017.75 (protocol 2.0)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:21:08 2023 -- 1 IP address (1 host up) scanned in 40.31 seconds

136.253.223.14


hostname: host.slb.com
open ports: [443]
# Nmap 7.60 scan initiated Sun Jul 30 02:19:18 2023 as: nmap -oA data/nweb.kkaec0aimu -sC -sV --open -Pn --system-dns -p 443 136.253.223.14
Nmap scan report for host.slb.com (136.253.223.14)
Host is up (0.043s latency).

PORT    STATE SERVICE    VERSION
443/tcp open  ssl/https?
| fingerprint-strings: 
|   NotesRPC: 
|     CGP/01
|_    Citrix.TcpProxyService
| ssl-cert: Subject: commonName=remoteapps.nam.gateway.slb.com/organizationName=Schlumberger/stateOrProvinceName=Texas/countryName=US
| Subject Alternative Name: DNS:remoteapps.nam.gateway.slb.com, DNS:remoteapps.gateway.slb.com
| Not valid before: 2023-03-06T13:52:19
|_Not valid after:  2024-03-15T13:52:19
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.60%T=SSL%I=7%D=7/30%Time=64C62B58%P=x86_64-pc-linux-gnu
SF:%r(NotesRPC,3A,"\x1aCGP/01\xac\0\x02\0\0\0\x81\0\xa4\0\0\0\x01\0\0\0\x0
SF:1\x1c\x01\0\x01\0\0\x16Citrix\.TcpProxyService\x04\x03\0\0\x15");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:20:51 2023 -- 1 IP address (1 host up) scanned in 93.14 seconds

216.101.17.250


hostname: 216.101.17.250
open ports: [80, 443]
# Nmap 7.60 scan initiated Sun Jul 30 02:19:57 2023 as: nmap -oA data/nweb.6j0ewizjnf -sC -sV --open -Pn --system-dns -p 80, 443 216.101.17.250
Nmap scan report for 216.101.17.250
Host is up (0.0042s latency).

PORT    STATE SERVICE   VERSION
80/tcp  open  http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 301 Moved Permanently
|     Date: Sun, 30 Jul 2023 09:20:04 GMT
|     Content-Type: text/html
|     Content-Length: 157
|     Connection: close
|     Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
|     Strict-Transport-Security: max-age=31536000;
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 301 Moved Permanently
|     Date: Sun, 30 Jul 2023 09:20:04 GMT
|     Content-Type: text/html
|     Content-Length: 157
|     Connection: close
|     Location: https:///
|     Strict-Transport-Security: max-age=31536000;
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 30 Jul 2023 09:20:09 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 30 Jul 2023 09:20:04 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center></center>
|     </body>
|_    </html>
|_http-title: Did not follow redirect to https://216.101.17.250/
443/tcp open  ssl/https
| fingerprint-strings: 
|   DNSVersionBindReq, RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 30 Jul 2023 09:20:15 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Date: Sun, 30 Jul 2023 09:20:10 GMT
|     Content-Type: text/html
|     Content-Length: 141
|     Connection: close
|     <html>
|     <head><title>404 Not Found</title></head>
|     <body>
|     <center><h1>404 Not Found</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
Click here to see the complete results for 216.101.17.250

187.84.236.139


hostname: smtp612.umblergrid.com
open ports: [25]
# Nmap 7.60 scan initiated Sun Jul 30 02:20:05 2023 as: nmap -oA data/nweb.wzh8c0gkpq -sC -sV --open -Pn --system-dns -p 25 187.84.236.139
Nmap scan report for smtp612.umblergrid.com (187.84.236.139)
Host is up (0.17s latency).

PORT   STATE SERVICE VERSION
25/tcp open  smtp    cbdev cmail smtpd
| smtp-commands: ubpmta01.umbler.local says hello, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, 8BITMIME, AUTH CRAM-MD5 PLAIN LOGIN, AUTH=CRAM-MD5 PLAIN LOGIN, XACK, SIZE 0, VERP, SMTPUTF8, DSN, 
|_ 2.0.0 sorry, no help available here. 
Service Info: Host: ubpmta01.umbler.local

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:20:13 2023 -- 1 IP address (1 host up) scanned in 8.66 seconds

212.118.187.10


hostname: 212.118.187.10
open ports: [443]
# Nmap 7.60 scan initiated Sun Jul 30 02:18:56 2023 as: nmap -oA data/nweb.lh3gkbuq5r -sC -sV --open -Pn --system-dns -p 443 212.118.187.10
Nmap scan report for 212.118.187.10
Host is up (0.16s latency).

PORT    STATE SERVICE   VERSION
443/tcp open  ssl/https
| fingerprint-strings: 
|   DNSStatusRequest, DNSVersionBindReq: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 30 Jul 2023 09:19:19 GMT
|     Content-Type: text/html
|     Content-Length: 154
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>openresty</center>
|     </body>
|     </html>
|   FourOhFourRequest: 
|     HTTP/1.1 442 
|     Date: Sun, 30 Jul 2023 09:19:11 GMT
|     Content-Length: 0
|     Connection: close
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 442 
|     Date: Sun, 30 Jul 2023 09:19:10 GMT
|     Content-Length: 0
|     Connection: close
|   RPCCheck, RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 30 Jul 2023 09:19:18 GMT
|     Content-Type: text/html
|     Content-Length: 154
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>openresty</center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 30 Jul 2023 09:19:12 GMT
|     Content-Type: text/html
|     Content-Length: 154
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>openresty</center>
|     </body>
|_    </html>
| http-robots.txt: 16 disallowed entries (15 shown)
| / /admin/ /bin/ /modules/ /katalog/ /languages/ 
| /rondeladmin/ /schublade/ /videoplayer/ *?*template=leertemplate 
| /bestellen.php /anmelden.php /warenkorb.php /administration.php 
|_/myshop.php
| http-title: Site doesn't have a title (text/html; charset=utf-8).
|_Requested resource was https://212.118.187.10/administration.php?SessID=3d0318d5834b041521072a80872dcc73&redirect=shop&globalerror=
| ssl-cert: Subject: commonName=wwsanbindung.ede-shop.de
| Subject Alternative Name: DNS:wwsanbindung.ede-shop.de
| Not valid before: 2023-06-21T19:45:53
|_Not valid after:  2023-09-19T19:45:52
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.60%T=SSL%I=7%D=7/30%Time=64C62B0E%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,5C,"HTTP/1\.1\x20442\x20\r\nDate:\x20Sun,\x2030\x20Jul\x2
SF:02023\x2009:19:10\x20GMT\r\nContent-Length:\x200\r\nConnection:\x20clos
SF:e\r\n\r\n")%r(HTTPOptions,5C,"HTTP/1\.1\x20442\x20\r\nDate:\x20Sun,\x20
SF:30\x20Jul\x202023\x2009:19:10\x20GMT\r\nContent-Length:\x200\r\nConnect
SF:ion:\x20close\r\n\r\n")%r(FourOhFourRequest,5C,"HTTP/1\.1\x20442\x20\r\
SF:nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:19:11\x20GMT\r\nContent-Lengt
SF:h:\x200\r\nConnection:\x20close\r\n\r\n")%r(tor-versions,11C,"HTTP/1\.1
SF:\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:1
SF:9:12\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20154\r\n
SF:Connection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Reques
SF:t</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></c
SF:enter>\r\n<hr><center>openresty</center>\r\n</body>\r\n</html>\r\n")%r(
SF:RTSPRequest,11C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2
SF:030\x20Jul\x202023\x2009:19:18\x20GMT\r\nContent-Type:\x20text/html\r\n
SF:Content-Length:\x20154\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><
SF:title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400
SF:\x20Bad\x20Request</h1></center>\r\n<hr><center>openresty</center>\r\n<
SF:/body>\r\n</html>\r\n")%r(RPCCheck,11C,"HTTP/1\.1\x20400\x20Bad\x20Requ
SF:est\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:19:18\x20GMT\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x20154\r\nConnection:\x20close\r
SF:\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<b
SF:ody>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>
SF:openresty</center>\r\n</body>\r\n</html>\r\n")%r(DNSVersionBindReq,11C,
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2030\x20Jul\x2020
SF:23\x2009:19:19\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\
SF:x20154\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad
SF:\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reque
SF:st</h1></center>\r\n<hr><center>openresty</center>\r\n</body>\r\n</html
SF:>\r\n")%r(DNSStatusRequest,11C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nD
SF:ate:\x20Sun,\x2030\x20Jul\x202023\x2009:19:19\x20GMT\r\nContent-Type:\x
SF:20text/html\r\nContent-Length:\x20154\r\nConnection:\x20close\r\n\r\n<h
Click here to see the complete results for 212.118.187.10

134.68.104.213


hostname: 134.68.104.213
open ports: [22]
# Nmap 7.60 scan initiated Sun Jul 30 02:19:07 2023 as: nmap -oA data/nweb.ogazpetcug -sC -sV --open -Pn --system-dns -p 22 134.68.104.213
Nmap scan report for 134.68.104.213
Host is up (0.055s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 5.3 (protocol 2.0)
| ssh-hostkey: 
|_  1024 d8:0e:4d:d3:d7:00:d7:aa:8f:69:9f:ec:af:90:b3:16 (RSA)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:19:39 2023 -- 1 IP address (1 host up) scanned in 31.98 seconds

201.184.129.131


hostname: static-adsl201-184-129-131.une.net.co
open ports: [80]
# Nmap 7.60 scan initiated Sun Jul 30 02:18:17 2023 as: nmap -oA data/nweb.9q6k7mfdjs -sC -sV --open -Pn --system-dns -p 80 201.184.129.131
Nmap scan report for static-adsl201-184-129-131.une.net.co (201.184.129.131)
Host is up (0.12s latency).

PORT   STATE SERVICE VERSION
80/tcp open  http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 404 Not Found
|     Date: Sun, 30 Jul 2023 09:18:25 GMT
|     Connection: close
|     Content-Type: text/html
|     <HTML><HEAD><TITLE>404 Not Found</TITLE></HEAD>
|     <BODY><H1>The request URL was not found!</H1>
|     </BODY></HTML>
|   GenericLines, Kerberos, LDAPSearchReq, LPDString, SSLSessionReq, TLSSessionReq: 
|     <B>ERROR : Method Not Implemented</B>
|   GetRequest: 
|     HTTP/1.0 303 See Other
|     Location: http://201.184.129.131/default/en_US/status.html
|     Date: Sun, 30 Jul 2023 09:18:21 GMT
|     Connection: close
|     Content-Type: text/html
|     <HTML>
|     <HEAD>
|     <META HTTP-EQUIV="refresh" CONTENT="0; URL=http://201.184.129.131/default/en_US/status.html">
|     </HEAD>
|     <BODY><a href="http://201.184.129.131/default/en_US/status.html
|     ">Click here</a></BODY>
|     </HTML>
|   HTTPOptions, RTSPRequest, SIPOptions: 
|     <B>ERROR : Method Not Implemented</B>
|     OPTIONS
|   Help: 
|     <B>ERROR : Method Not Implemented</B>
|_    HELP
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.60%I=7%D=7/30%Time=64C62ADE%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,175,"HTTP/1\.0\x20303\x20See\x20Other\nLocation:\x20http://201\.
SF:184\.129\.131/default/en_US/status\.html\nDate:\x20Sun,\x2030\x20Jul\x2
SF:02023\x2009:18:21\x20GMT\nConnection:\x20close\nContent-Type:\x20text/h
SF:tml\n\n<HTML>\n<HEAD>\n<META\x20HTTP-EQUIV=\"refresh\"\x20CONTENT=\"0;\
SF:x20URL=http://201\.184\.129\.131/default/en_US/status\.html\">\n</HEAD>
SF:\n<BODY><a\x20href=\"http://201\.184\.129\.131/default/en_US/status\.ht
SF:ml\n\">Click\x20here</a></BODY>\n</HTML>\n")%r(HTTPOptions,2F,"\n<B>ERR
SF:OR\x20:\x20Method\x20Not\x20Implemented</B>\n\nOPTIONS")%r(RTSPRequest,
SF:2F,"\n<B>ERROR\x20:\x20Method\x20Not\x20Implemented</B>\n\nOPTIONS")%r(
SF:FourOhFourRequest,D3,"HTTP/1\.0\x20404\x20Not\x20Found\nDate:\x20Sun,\x
SF:2030\x20Jul\x202023\x2009:18:25\x20GMT\nConnection:\x20close\nContent-T
SF:ype:\x20text/html\n\n<HTML><HEAD><TITLE>404\x20Not\x20Found</TITLE></HE
SF:AD>\n<BODY><H1>The\x20request\x20URL\x20was\x20not\x20found!</H1>\n</BO
SF:DY></HTML>\n")%r(GenericLines,28,"\n<B>ERROR\x20:\x20Method\x20Not\x20I
SF:mplemented</B>\n\n")%r(Help,2C,"\n<B>ERROR\x20:\x20Method\x20Not\x20Imp
SF:lemented</B>\n\nHELP")%r(SSLSessionReq,28,"\n<B>ERROR\x20:\x20Method\x2
SF:0Not\x20Implemented</B>\n\n")%r(TLSSessionReq,28,"\n<B>ERROR\x20:\x20Me
SF:thod\x20Not\x20Implemented</B>\n\n")%r(Kerberos,28,"\n<B>ERROR\x20:\x20
SF:Method\x20Not\x20Implemented</B>\n\n")%r(LPDString,28,"\n<B>ERROR\x20:\
SF:x20Method\x20Not\x20Implemented</B>\n\n")%r(LDAPSearchReq,28,"\n<B>ERRO
SF:R\x20:\x20Method\x20Not\x20Implemented</B>\n\n")%r(SIPOptions,2F,"\n<B>
SF:ERROR\x20:\x20Method\x20Not\x20Implemented</B>\n\nOPTIONS");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:19:16 2023 -- 1 IP address (1 host up) scanned in 59.33 seconds

147.9.253.99


hostname: roster.wcl.american.edu
open ports: [80, 443]
# Nmap 7.60 scan initiated Sun Jul 30 02:18:29 2023 as: nmap -oA data/nweb.zjic21lfe5 -sC -sV --open -Pn --system-dns -p 80, 443 147.9.253.99
Nmap scan report for roster.wcl.american.edu (147.9.253.99)
Host is up (0.069s latency).

PORT    STATE SERVICE  VERSION
80/tcp  open  http     Microsoft IIS httpd 8.5
|_http-server-header: Microsoft-IIS/8.5
|_http-title: Did not follow redirect to https://roster.wcl.american.edu//
443/tcp open  ssl/http Microsoft IIS httpd 8.5
|_http-server-header: Microsoft-IIS/8.5
| http-title: LISTSERV 16.0 - LISTSERV Archives at ROSTER.WCL.AMERICAN.EDU -...
|_Requested resource was https://roster.wcl.american.edu/scripts/wa.exe?HOME
| ssl-cert: Subject: commonName=*.wcl.american.edu
| Subject Alternative Name: DNS:*.wcl.american.edu, DNS:wcl.american.edu
| Not valid before: 2023-02-03T00:00:00
|_Not valid after:  2024-03-05T23:59:59
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:18:46 2023 -- 1 IP address (1 host up) scanned in 16.79 seconds