Nmap scan report for mitula.com (62.97.82.34)
Host is up (0.16s latency).
Not shown: 997 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http
|_http-title: Did not follow redirect to https://mitula.com/
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, SSLSessionReq, X11Probe:
| HTTP/1.0 400 Bad request
| cache-control: no-cache
| content-type: text/html
|
400 Bad request
| Your browser sent an invalid request.
|
| FourOhFourRequest:
| HTTP/1.1 301 Moved Permanently
| content-length: 0
| location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
| connection: close
| GetRequest, HTTPOptions, RTSPRequest:
| HTTP/1.1 301 Moved Permanently
| content-length: 0
| location: https:///
|_ connection: close
113/tcp closed ident
443/tcp open ssl/http nginx
| ssl-cert: Subject: commonName=mitula.com
| Subject Alternative Name: DNS:coches.mitula.com, DNS:coches.mitula.es, DNS:mitula.com, DNS:mitula.es, DNS:pisos.mitula.com, DNS:pisos.mitula.es, DNS:trabajo.mitula.com, DNS:trabajo.mitula.es, DNS:www.mitula.com, DNS:www.mitula.es
| Not valid before: 2025-08-07T07:30:32
|_Not valid after: 2025-11-05T07:30:31
|_http-title: Did not follow redirect to https://www.mitula.com/
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=8/27%Time=68AF630C%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,5D,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\ncontent-leng
SF:th:\x200\r\nlocation:\x20https:///\r\nconnection:\x20close\r\n\r\n")%r(
SF:HTTPOptions,5D,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\ncontent-len
SF:gth:\x200\r\nlocation:\x20https:///\r\nconnection:\x20close\r\n\r\n")%r
SF:(RTSPRequest,5D,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\ncontent-le
SF:ngth:\x200\r\nlocation:\x20https:///\r\nconnection:\x20close\r\n\r\n")%
SF:r(X11Probe,A9,"HTTP/1\.0\x20400\x20Bad\x20request\r\ncache-control:\x20
SF:no-cache\r\ncontent-type:\x20text/html\r\n\r\n400\x20Ba
SF:d\x20request
\nYour\x20browser\x20sent\x20an\x20invalid\x20request\
SF:.\n\n\n")%r(FourOhFourRequest,80,"HTTP/1\.1\x20301\x20Mov
SF:ed\x20Permanently\r\ncontent-length:\x200\r\nlocation:\x20https:///nice
SF:%20ports%2C/Tri%6Eity\.txt%2ebak\r\nconnection:\x20close\r\n\r\n")%r(RP
SF:CCheck,A9,"HTTP/1\.0\x20400\x20Bad\x20request\r\ncache-control:\x20no-c
SF:ache\r\ncontent-type:\x20text/html\r\n\r\n400\x20Bad\x2
SF:0request
\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n<
SF:/body>\n\n")%r(DNSVersionBindReqTCP,A9,"HTTP/1\.0\x20400\x20Bad\
SF:x20request\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\
SF:r\n\r\n400\x20Bad\x20request
\nYour\x20browser\x20s
SF:ent\x20an\x20invalid\x20request\.\n\n\n")%r(DNSStatusRequ
SF:estTCP,A9,"HTTP/1\.0\x20400\x20Bad\x20request\r\ncache-control:\x20no-c
SF:ache\r\ncontent-type:\x20text/html\r\n\r\n400\x20Bad\x2
SF:0request
\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n<
SF:/body>\n\n")%r(Help,A9,"HTTP/1\.0\x20400\x20Bad\x20request\r\nca
SF:che-control:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\n400\x20Bad\x20request
\nYour\x20browser\x20sent\x20an\x20inv
SF:alid\x20request\.\n\n\n")%r(SSLSessionReq,A9,"HTTP/1\.0\x
SF:20400\x20Bad\x20request\r\ncache-control:\x20no-cache\r\ncontent-type:\
SF:x20text/html\r\n\r\n400\x20Bad\x20request
\nYour\x2
SF:0browser\x20sent\x20an\x20invalid\x20request\.\n\n\n");
Device type: general purpose|firewall|media device|broadband router|security-misc
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (88%), IPCop 2.X|1.X (88%), Tiandy embedded (87%), D-Link embedded (85%), Draytek embedded (85%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:ipcop:ipcop:2.0 cpe:/o:linux:linux_kernel:3.2 cpe:/o:linux:linux_kernel:4.9 cpe:/h:dlink:dsl-2890al cpe:/h:draytek:vigor_2960 cpe:/o:linux:linux_kernel:2.6.25.20 cpe:/o:ipcop:ipcop:1.9.19
Aggressive OS guesses: IPCop 2.0 (Linux 2.6.32) (88%), Linux 2.6.32 (88%), Linux 3.2 (88%), Linux 4.9 (88%), Tiandy NVR (87%), D-Link DSL-2890AL ADSL router (85%), Draytek Vigor 2960 VPN firewall (85%), OpenWrt Kamikaze 8.09 (Linux 2.6.25.20) (85%), IPCop 1.9.19 or IPFire 2.9 firewall (Linux 2.6.32) (85%), Linux 2.6.36 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 6 hops
TRACEROUTE (using port 113/tcp)
HOP RTT ADDRESS
1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.61 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.71 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4 0.36 ms 206.72.211.182.any2ix.coresite.com (206.72.211.182)
5 ...
6 157.39 ms 62.97.82.34
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 47.67 seconds