Nmap scan report for www.fhlbdm.com (107.162.254.146) Host is up (0.0090s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http volt-adc | fingerprint-strings: | DNSStatusRequestTCP, Help, SSLSessionReq: | HTTP/1.1 400 Bad Request | server: volt-adc | content-length: 11 | content-type: text/plain | date: Fri, 12 Sep 2025 07:56:59 GMT | connection: close | Request | DNSVersionBindReqTCP, RPCCheck: | HTTP/1.1 400 Bad Request | server: volt-adc | content-length: 11 | content-type: text/plain | date: Fri, 12 Sep 2025 07:56:58 GMT | connection: close | Request | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.0 400 Bad Request | server: volt-adc | date: Fri, 12 Sep 2025 07:56:53 GMT | connection: close | content-length: 0 | RTSPRequest, X11Probe: | HTTP/1.1 400 Bad Request | server: volt-adc | content-length: 11 | content-type: text/plain | date: Fri, 12 Sep 2025 07:56:54 GMT | connection: close |_ Request |_http-title: Did not follow redirect to https://www.fhlbdm.com/ |_http-server-header: volt-adc 443/tcp open ssl/https |_http-title: Site doesn't have a title. |_http-server-header: volt-adc | ssl-cert: Subject: commonName=*.fhlbdm.com/organizationName=Federal Home Loan Bank of Des Moines/stateOrProvinceName=Iowa/countryName=US | Subject Alternative Name: DNS:*.fhlbdm.com, DNS:so.fhlbdm.com, DNS:mail.fhlbdm.com, DNS:desktop.fhlbdm.com, DNS:st.fhlbdm.com, DNS:ebus.fhlbdm.com, DNS:fhlbdm.com | Not valid before: 2025-08-15T00:00:00 |_Not valid after: 2026-08-19T23:59:59 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.92%I=7%D=9/12%Time=68C3D245%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,79,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nserver:\x20volt-ad SF:c\r\ndate:\x20Fri,\x2012\x20Sep\x202025\x2007:56:53\x20GMT\r\nconnectio SF:n:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,79,"HTTP/1\ SF:.0\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ndate:\x20Fri,\x20 SF:12\x20Sep\x202025\x2007:56:53\x20GMT\r\nconnection:\x20close\r\ncontent SF:-length:\x200\r\n\r\n")%r(RTSPRequest,9F,"HTTP/1\.1\x20400\x20Bad\x20Re SF:quest\r\nserver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\ SF:x20text/plain\r\ndate:\x20Fri,\x2012\x20Sep\x202025\x2007:56:54\x20GMT\ SF:r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9F,"HTTP/1\. SF:1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-length:\x2 SF:011\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x2012\x20Sep\x20202 SF:5\x2007:56:54\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r( SF:FourOhFourRequest,79,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nserver:\x20 SF:volt-adc\r\ndate:\x20Fri,\x2012\x20Sep\x202025\x2007:56:53\x20GMT\r\nco SF:nnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9F,"HTT SF:P/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-lengt SF:h:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x2012\x20Sep\x SF:202025\x2007:56:58\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request SF:")%r(DNSVersionBindReqTCP,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nser SF:ver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plai SF:n\r\ndate:\x20Fri,\x2012\x20Sep\x202025\x2007:56:58\x20GMT\r\nconnectio SF:n:\x20close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9F,"HTTP/1\.1 SF:\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\ncontent-length:\x20 SF:11\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x2012\x20Sep\x202025 SF:\x2007:56:59\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(H SF:elp,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20volt-adc\r\nco SF:ntent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Fri,\x20 SF:12\x20Sep\x202025\x2007:56:59\x20GMT\r\nconnection:\x20close\r\n\r\nBad SF:\x20Request")%r(SSLSessionReq,9F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ SF:nserver:\x20volt-adc\r\ncontent-length:\x2011\r\ncontent-type:\x20text/ SF:plain\r\ndate:\x20Fri,\x2012\x20Sep\x202025\x2007:56:59\x20GMT\r\nconne SF:ction:\x20close\r\n\r\nBad\x20Request"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 11 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 2.22 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.04 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.41 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.51 ms ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242) 6 9.09 ms ae-17.r26.snjsca04.us.bb.gin.ntt.net (129.250.4.239) 7 8.94 ms ae-8.a04.snjsca04.us.bb.gin.ntt.net (129.250.5.209) 8 8.98 ms ae-0.f5-networks.snjsca04.us.bb.gin.ntt.net (128.242.179.46) 9 ... 10 11 8.89 ms 107.162.254.146 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 32.62 seconds