Host information for '216.101.17.250'


# Nmap 7.60 scan initiated Sun Jul 30 02:19:57 2023 as: nmap -oA data/nweb.6j0ewizjnf -sC -sV --open -Pn --system-dns -p 80, 443 216.101.17.250
Nmap scan report for 216.101.17.250
Host is up (0.0042s latency).

PORT    STATE SERVICE   VERSION
80/tcp  open  http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 301 Moved Permanently
|     Date: Sun, 30 Jul 2023 09:20:04 GMT
|     Content-Type: text/html
|     Content-Length: 157
|     Connection: close
|     Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
|     Strict-Transport-Security: max-age=31536000;
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 301 Moved Permanently
|     Date: Sun, 30 Jul 2023 09:20:04 GMT
|     Content-Type: text/html
|     Content-Length: 157
|     Connection: close
|     Location: https:///
|     Strict-Transport-Security: max-age=31536000;
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 30 Jul 2023 09:20:09 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 30 Jul 2023 09:20:04 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center></center>
|     </body>
|_    </html>
|_http-title: Did not follow redirect to https://216.101.17.250/
443/tcp open  ssl/https
| fingerprint-strings: 
|   DNSVersionBindReq, RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 30 Jul 2023 09:20:15 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Date: Sun, 30 Jul 2023 09:20:10 GMT
|     Content-Type: text/html
|     Content-Length: 141
|     Connection: close
|     <html>
|     <head><title>404 Not Found</title></head>
|     <body>
|     <center><h1>404 Not Found</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 400 Bad Request: missing required Host header
|     Date: Sun, 30 Jul 2023 09:20:10 GMT
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Request: missing required Host header
|   HTTPOptions: 
|     HTTP/1.1 405 Not Allowed
|     Date: Sun, 30 Jul 2023 09:20:10 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     Allow: GET, POST
|     <html>
|     <head><title>405 Not Allowed</title></head>
|     <body>
|     <center><h1>405 Not Allowed</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center></center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Date: Sun, 30 Jul 2023 09:20:10 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center></center>
|     </body>
|_    </html>
| http-title: GlobalProtect Portal
|_Requested resource was /global-protect/login.esp
| ssl-cert: Subject: commonName=protect.theravance.com
| Subject Alternative Name: DNS:protect.theravance.com, DNS:www.protect.theravance.com
| Not valid before: 2023-05-28T07:21:41
|_Not valid after:  2024-06-27T02:00:56
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.60%I=7%D=7/30%Time=64C62B44%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,168,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nDate:\x20Sun,\x
SF:2030\x20Jul\x202023\x2009:20:04\x20GMT\r\nContent-Type:\x20text/html\r\
SF:nContent-Length:\x20157\r\nConnection:\x20close\r\nLocation:\x20https:/
SF://\r\nStrict-Transport-Security:\x20max-age=31536000;\r\n\r\n<html>\r\n
SF:<head><title>301\x20Moved\x20Permanently</title></head>\r\n<body>\r\n<c
SF:enter><h1>301\x20Moved\x20Permanently</h1></center>\r\n<hr><center></ce
SF:nter>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,168,"HTTP/1\.1\x20301\x
SF:20Moved\x20Permanently\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:20:0
SF:4\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20157\r\nCon
SF:nection:\x20close\r\nLocation:\x20https:///\r\nStrict-Transport-Securit
SF:y:\x20max-age=31536000;\r\n\r\n<html>\r\n<head><title>301\x20Moved\x20P
SF:ermanently</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20Perm
SF:anently</h1></center>\r\n<hr><center></center>\r\n</body>\r\n</html>\r\
SF:n")%r(RTSPRequest,91,"<html>\r\n<head><title>400\x20Bad\x20Request</tit
SF:le></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>
SF:\r\n<hr><center></center>\r\n</body>\r\n</html>\r\n")%r(X11Probe,113,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2030\x20Jul\x202023
SF:\x2009:20:04\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2
SF:0145\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x
SF:20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request
SF:</h1></center>\r\n<hr><center></center>\r\n</body>\r\n</html>\r\n")%r(F
SF:ourOhFourRequest,18B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nDate:
SF:\x20Sun,\x2030\x20Jul\x202023\x2009:20:04\x20GMT\r\nContent-Type:\x20te
SF:xt/html\r\nContent-Length:\x20157\r\nConnection:\x20close\r\nLocation:\
SF:x20https:///nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\nStrict-Transport-Se
SF:curity:\x20max-age=31536000;\r\n\r\n<html>\r\n<head><title>301\x20Moved
SF:\x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\x2
SF:0Permanently</h1></center>\r\n<hr><center></center>\r\n</body>\r\n</htm
SF:l>\r\n")%r(RPCCheck,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x2
SF:0Sun,\x2030\x20Jul\x202023\x2009:20:09\x20GMT\r\nContent-Type:\x20text/
SF:html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\n\r\n<html>\r\
SF:n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center
SF:><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center></center>\r\n</
SF:body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.60%T=SSL%I=7%D=7/30%Time=64C62B4A%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,C8,"HTTP/1\.1\x20400\x20Bad\x20Request:\x20missing\x20req
SF:uired\x20Host\x20header\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:20:
SF:10\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnectio
SF:n:\x20close\r\n\r\n400\x20Bad\x20Request:\x20missing\x20required\x20Hos
SF:t\x20header")%r(HTTPOptions,125,"HTTP/1\.1\x20405\x20Not\x20Allowed\r\n
SF:Date:\x20Sun,\x2030\x20Jul\x202023\x2009:20:10\x20GMT\r\nContent-Type:\
SF:x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\nAllow
SF::\x20GET,\x20POST\r\n\r\n<html>\r\n<head><title>405\x20Not\x20Allowed</
SF:title></head>\r\n<body>\r\n<center><h1>405\x20Not\x20Allowed</h1></cent
SF:er>\r\n<hr><center></center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRe
SF:quest,10D,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Sun,\x2030\x20J
SF:ul\x202023\x2009:20:10\x20GMT\r\nContent-Type:\x20text/html\r\nContent-
SF:Length:\x20141\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>40
SF:4\x20Not\x20Found</title></head>\r\n<body>\r\n<center><h1>404\x20Not\x2
SF:0Found</h1></center>\r\n<hr><center></center>\r\n</body>\r\n</html>\r\n
SF:")%r(tor-versions,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20S
SF:un,\x2030\x20Jul\x202023\x2009:20:10\x20GMT\r\nContent-Type:\x20text/ht
SF:ml\r\nContent-Length:\x20145\r\nConnection:\x20close\r\n\r\n<html>\r\n<
SF:head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><
SF:h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center></center>\r\n</bo
SF:dy>\r\n</html>\r\n")%r(RTSPRequest,91,"<html>\r\n<head><title>400\x20Ba
SF:d\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Requ
SF:est</h1></center>\r\n<hr><center></center>\r\n</body>\r\n</html>\r\n")%
SF:r(RPCCheck,113,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x20
SF:30\x20Jul\x202023\x2009:20:15\x20GMT\r\nContent-Type:\x20text/html\r\nC
SF:ontent-Length:\x20145\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><t
SF:itle>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\
SF:x20Bad\x20Request</h1></center>\r\n<hr><center></center>\r\n</body>\r\n
SF:</html>\r\n")%r(DNSVersionBindReq,113,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\nDate:\x20Sun,\x2030\x20Jul\x202023\x2009:20:15\x20GMT\r\nContent-
SF:Type:\x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\
SF:n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<bo
SF:dy>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center><
SF:/center>\r\n</body>\r\n</html>\r\n");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sun Jul 30 02:20:17 2023 -- 1 IP address (1 host up) scanned in 20.26 seconds