Nmap scan report for lnk.tracksolutionspartners.com (3.73.221.40) Host is up (0.14s latency). Other addresses for lnk.tracksolutionspartners.com (not scanned): 52.29.151.225 52.28.191.58 rDNS record for 3.73.221.40: ec2-3-73-221-40.eu-central-1.compute.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http |_http-title: Site doesn't have a title (text/html;charset=UTF-8). | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 403 | Date: Wed, 10 Sep 2025 22:28:59 GMT | Content-Type: text/html;charset=UTF-8 | Connection: close | Vary: Origin | Vary: Access-Control-Request-Method | Vary: Access-Control-Request-Headers | Content-Language: en | | | | | | | | |

404: Page not Found

| | | GetRequest: | HTTP/1.1 200 | Date: Wed, 10 Sep 2025 22:28:58 GMT | Content-Type: text/html;charset=UTF-8 | Connection: close | Content-Language: en | | | | | | | | | | | HTTPOptions: | HTTP/1.1 200 | Date: Wed, 10 Sep 2025 22:28:58 GMT | Content-Length: 0 | Connection: close | Allow: GET,HEAD,POST,OPTIONS | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

| | | X11Probe: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Wed, 10 Sep 2025 22:28:59 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | | 400 Bad Request | |

400 Bad Request

| |_ | http-robots.txt: 1 disallowed entry |_/ 443/tcp open ssl/https | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 403 | Date: Wed, 10 Sep 2025 22:29:06 GMT | Content-Type: text/html;charset=UTF-8 | Connection: close | Vary: Origin | Vary: Access-Control-Request-Method | Vary: Access-Control-Request-Headers | Content-Language: en | | | | | | | | |

404: Page not Found

| | | GetRequest: | HTTP/1.1 200 | Date: Wed, 10 Sep 2025 22:29:05 GMT | Content-Type: text/html;charset=UTF-8 | Connection: close | Content-Language: en | | | | | | | | | | | HTTPOptions: | HTTP/1.1 200 | Date: Wed, 10 Sep 2025 22:29:05 GMT | Content-Length: 0 | Connection: close | Allow: GET,HEAD,POST,OPTIONS | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

| | | tor-versions: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Wed, 10 Sep 2025 22:29:06 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | | 400 Bad Request | |

400 Bad Request

| |_ |_http-title: Site doesn't have a title (text/html;charset=UTF-8). | http-robots.txt: 1 disallowed entry |_/ | ssl-cert: Subject: commonName=*.rtgads.com | Subject Alternative Name: DNS:*.rtgads.com, DNS:*.rtgtng-ads.com, DNS:*.adsviewers.com, DNS:*.theiadserver.com, DNS:*.performrtgtng.com, DNS:*.containads.com, DNS:*.retarg-ads.com, DNS:*.lesperformads.com, DNS:*.adensemble.com, DNS:*.prfrm-ads.com | Not valid before: 2025-06-03T00:00:00 |_Not valid after: 2026-07-02T23:59:59 | tls-alpn: | h2 |_ http/1.1 |_ssl-date: TLS randomness does not represent time | tls-nextprotoneg: | h2 |_ http/1.1 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=9/10%Time=68C1FBAA%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,1C4,"HTTP/1\.1\x20200\x20\r\nDate:\x20Wed,\x2010\x20Sep\x202 SF:025\x2022:28:58\x20GMT\r\nContent-Type:\x20text/html;charset=UTF-8\r\nC SF:onnection:\x20close\r\nContent-Language:\x20en\r\n\r\n\n\n\n\x20\x20\x20\x20\n\x20\x20\x20\x20\n\x20 SF:\x20\x20\x20\n\n\n\n")%r(HTTPOptions,7A,"HTTP/1\.1\x2 SF:0200\x20\r\nDate:\x20Wed,\x2010\x20Sep\x202025\x2022:28:58\x20GMT\r\nCo SF:ntent-Length:\x200\r\nConnection:\x20close\r\nAllow:\x20GET,HEAD,POST,O SF:PTIONS\r\n\r\n")%r(RTSPRequest,7A,"\r\n400\x20Bad\x2 SF:0Request\r\n\r\n

400\x20Bad\x20Request< SF:/h1>

\r\n\r\n\r\n")%r(X11Probe,110,"HTTP/1\.1\x20 SF:400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Wed,\x2010\ SF:x20Sep\x202025\x2022:28:59\x20GMT\r\nContent-Type:\x20text/html\r\nCont SF:ent-Length:\x20122\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20 SF:Bad\x20Request

\r\n\r\n\r\n")%r(FourOhFourRe SF:quest,23E,"HTTP/1\.1\x20403\x20\r\nDate:\x20Wed,\x2010\x20Sep\x202025\x SF:2022:28:59\x20GMT\r\nContent-Type:\x20text/html;charset=UTF-8\r\nConnec SF:tion:\x20close\r\nVary:\x20Origin\r\nVary:\x20Access-Control-Request-Me SF:thod\r\nVary:\x20Access-Control-Request-Headers\r\nContent-Language:\x2 SF:0en\r\n\r\n\n\n\n\x20\x20\x20\x20\n\x20\x20 SF:\x20\x20\n\x20\x20\x20\x20\n\n\n\x20\x20\x20\x20

4 SF:04:\x20Page\x20not\x20Found

\n\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/10%Time=68C1FBB1%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,1C4,"HTTP/1\.1\x20200\x20\r\nDate:\x20Wed,\x2010\x20S SF:ep\x202025\x2022:29:05\x20GMT\r\nContent-Type:\x20text/html;charset=UTF SF:-8\r\nConnection:\x20close\r\nContent-Language:\x20en\r\n\r\n\n\n\n\x20\x20\x20\x20\n\x20\x20\x20\x20\n\x20\x20\x20\x20\n\n\n\n")%r(HTTPOptions,7A,"HTTP/ SF:1\.1\x20200\x20\r\nDate:\x20Wed,\x2010\x20Sep\x202025\x2022:29:05\x20GM SF:T\r\nContent-Length:\x200\r\nConnection:\x20close\r\nAllow:\x20GET,HEAD SF:,POST,OPTIONS\r\n\r\n")%r(FourOhFourRequest,23E,"HTTP/1\.1\x20403\x20\r SF:\nDate:\x20Wed,\x2010\x20Sep\x202025\x2022:29:06\x20GMT\r\nContent-Type SF::\x20text/html;charset=UTF-8\r\nConnection:\x20close\r\nVary:\x20Origin SF:\r\nVary:\x20Access-Control-Request-Method\r\nVary:\x20Access-Control-R SF:equest-Headers\r\nContent-Language:\x20en\r\n\r\n\n\n\n\x20\x20\x20\x20\n\x20\x20\x20\x20\n\x20\x20\ SF:x20\x20\n SF:\n\n\x20\x20\x20\x20

404:\x20Page\x20not\x20Found

\ SF:n\n")%r(tor-versions,110,"HTTP/1\.1\x20400\x20Bad\x20Requ SF:est\r\nServer:\x20awselb/2\.0\r\nDate:\x20Wed,\x2010\x20Sep\x202025\x20 SF:22:29:06\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122 SF:\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Re SF:quest\r\n\r\n

400\x20Bad\x20Request

\r\n\r\n\r\n")%r(RTSPRequest,7A,"\r\n400\x20Bad\x20Request\r\n\r\n

SF:400\x20Bad\x20Request

\r\n\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%) OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.10 - 3.13 (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 19 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 125.43 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.63 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 10.78 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 19.74 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 31.13 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 37.80 ms port-channel8121.ccr91.jan02.atlas.cogentco.com (154.54.40.250) 9 45.47 ms be3009.ccr41.atl01.atlas.cogentco.com (154.54.29.133) 10 61.56 ms port-channel3482.ccr91.dca04.atlas.cogentco.com (154.54.169.177) 11 66.45 ms be8073.ccr41.jfk02.atlas.cogentco.com (154.54.170.70) 12 132.31 ms be2317.ccr41.lon13.atlas.cogentco.com (154.54.30.186) 13 134.57 ms be2348.rcr21.b023101-0.lon13.atlas.cogentco.com (130.117.51.74) 14 ... 18 19 142.79 ms ec2-3-73-221-40.eu-central-1.compute.amazonaws.com (3.73.221.40) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 59.61 seconds