Nmap scan report for mitula.com (62.97.82.34) Host is up (0.16s latency). Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http |_http-title: Did not follow redirect to https://mitula.com/ | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, SSLSessionReq, X11Probe: | HTTP/1.0 400 Bad request | cache-control: no-cache | content-type: text/html |

400 Bad request

| Your browser sent an invalid request. | | FourOhFourRequest: | HTTP/1.1 301 Moved Permanently | content-length: 0 | location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak | connection: close | GetRequest, HTTPOptions, RTSPRequest: | HTTP/1.1 301 Moved Permanently | content-length: 0 | location: https:/// |_ connection: close 113/tcp closed ident 443/tcp open ssl/http nginx | ssl-cert: Subject: commonName=mitula.com | Subject Alternative Name: DNS:coches.mitula.com, DNS:coches.mitula.es, DNS:mitula.com, DNS:mitula.es, DNS:pisos.mitula.com, DNS:pisos.mitula.es, DNS:trabajo.mitula.com, DNS:trabajo.mitula.es, DNS:www.mitula.com, DNS:www.mitula.es | Not valid before: 2025-08-07T07:30:32 |_Not valid after: 2025-11-05T07:30:31 |_http-title: Did not follow redirect to https://www.mitula.com/ 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.92%I=7%D=8/27%Time=68AF630C%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,5D,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\ncontent-leng SF:th:\x200\r\nlocation:\x20https:///\r\nconnection:\x20close\r\n\r\n")%r( SF:HTTPOptions,5D,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\ncontent-len SF:gth:\x200\r\nlocation:\x20https:///\r\nconnection:\x20close\r\n\r\n")%r SF:(RTSPRequest,5D,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\ncontent-le SF:ngth:\x200\r\nlocation:\x20https:///\r\nconnection:\x20close\r\n\r\n")% SF:r(X11Probe,A9,"HTTP/1\.0\x20400\x20Bad\x20request\r\ncache-control:\x20 SF:no-cache\r\ncontent-type:\x20text/html\r\n\r\n

400\x20Ba SF:d\x20request

\nYour\x20browser\x20sent\x20an\x20invalid\x20request\ SF:.\n\n\n")%r(FourOhFourRequest,80,"HTTP/1\.1\x20301\x20Mov SF:ed\x20Permanently\r\ncontent-length:\x200\r\nlocation:\x20https:///nice SF:%20ports%2C/Tri%6Eity\.txt%2ebak\r\nconnection:\x20close\r\n\r\n")%r(RP SF:CCheck,A9,"HTTP/1\.0\x20400\x20Bad\x20request\r\ncache-control:\x20no-c SF:ache\r\ncontent-type:\x20text/html\r\n\r\n

400\x20Bad\x2 SF:0request

\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n< SF:/body>\n\n")%r(DNSVersionBindReqTCP,A9,"HTTP/1\.0\x20400\x20Bad\ SF:x20request\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\ SF:r\n\r\n

400\x20Bad\x20request

\nYour\x20browser\x20s SF:ent\x20an\x20invalid\x20request\.\n\n\n")%r(DNSStatusRequ SF:estTCP,A9,"HTTP/1\.0\x20400\x20Bad\x20request\r\ncache-control:\x20no-c SF:ache\r\ncontent-type:\x20text/html\r\n\r\n

400\x20Bad\x2 SF:0request

\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n< SF:/body>\n\n")%r(Help,A9,"HTTP/1\.0\x20400\x20Bad\x20request\r\nca SF:che-control:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\n

400\x20Bad\x20request

\nYour\x20browser\x20sent\x20an\x20inv SF:alid\x20request\.\n\n\n")%r(SSLSessionReq,A9,"HTTP/1\.0\x SF:20400\x20Bad\x20request\r\ncache-control:\x20no-cache\r\ncontent-type:\ SF:x20text/html\r\n\r\n

400\x20Bad\x20request

\nYour\x2 SF:0browser\x20sent\x20an\x20invalid\x20request\.\n\n\n"); Device type: general purpose|firewall|media device|broadband router|security-misc Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (88%), IPCop 2.X|1.X (88%), Tiandy embedded (87%), D-Link embedded (85%), Draytek embedded (85%) OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:ipcop:ipcop:2.0 cpe:/o:linux:linux_kernel:3.2 cpe:/o:linux:linux_kernel:4.9 cpe:/h:dlink:dsl-2890al cpe:/h:draytek:vigor_2960 cpe:/o:linux:linux_kernel:2.6.25.20 cpe:/o:ipcop:ipcop:1.9.19 Aggressive OS guesses: IPCop 2.0 (Linux 2.6.32) (88%), Linux 2.6.32 (88%), Linux 3.2 (88%), Linux 4.9 (88%), Tiandy NVR (87%), D-Link DSL-2890AL ADSL router (85%), Draytek Vigor 2960 VPN firewall (85%), OpenWrt Kamikaze 8.09 (Linux 2.6.25.20) (85%), IPCop 1.9.19 or IPFire 2.9 firewall (Linux 2.6.32) (85%), Linux 2.6.36 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 6 hops TRACEROUTE (using port 113/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.61 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.71 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.36 ms 206.72.211.182.any2ix.coresite.com (206.72.211.182) 5 ... 6 157.39 ms 62.97.82.34 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 47.67 seconds