Nmap scan report for sdk.jivosite.com (185.163.159.177) Host is up (0.010s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http QRATOR |_http-server-header: QRATOR | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, SSLSessionReq, TLSSessionReq, TerminalServerCookie: | HTTP/1.1 400 Bad Request | Server: QRATOR | Date: Thu, 11 Sep 2025 18:57:12 GMT | Content-Type: text/html | Content-Length: 32 | Connection: close | | QRATOR HTTP 400 | | RTSPRequest: | | QRATOR HTTP 400 | | X11Probe: | HTTP/1.1 400 Bad Request | Server: QRATOR | Date: Thu, 11 Sep 2025 18:57:02 GMT | Content-Type: text/html | Content-Length: 32 | Connection: close | | QRATOR HTTP 400 |_ 443/tcp open ssl/https QRATOR |_http-server-header: QRATOR | http-methods: |_ Potentially risky methods: PATCH PUT DELETE | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, SSLSessionReq: | HTTP/1.1 400 Bad Request | Server: QRATOR | Date: Thu, 11 Sep 2025 18:57:03 GMT | Content-Type: text/html | Content-Length: 32 | Connection: close | | QRATOR HTTP 400 | | FourOhFourRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Server: QRATOR | Date: Thu, 11 Sep 2025 18:56:58 GMT | Content-Length: 0 | Connection: close | GetRequest: | HTTP/1.1 400 Bad Request | Server: QRATOR | Date: Thu, 11 Sep 2025 18:56:57 GMT | Content-Length: 0 | Connection: close | RTSPRequest: | | QRATOR HTTP 400 | | tor-versions: | HTTP/1.1 400 Bad Request | Server: QRATOR | Date: Thu, 11 Sep 2025 18:56:58 GMT | Content-Type: text/html | Content-Length: 32 | Connection: close | | QRATOR HTTP 400 |_ |_http-title: Site doesn't have a title. 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=9/11%Time=68C31B7D%P=x86_64-redhat-linux-gnu%r( SF:RTSPRequest,20,"\r\nQRATOR\x20HTTP\x20400\r\n")%r(X11Probe SF:,B1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20QRATOR\r\nDate:\x SF:20Thu,\x2011\x20Sep\x202025\x2018:57:02\x20GMT\r\nContent-Type:\x20text SF:/html\r\nContent-Length:\x2032\r\nConnection:\x20close\r\n\r\n\r\ SF:nQRATOR\x20HTTP\x20400\r\n")%r(RPCCheck,B1,"HTTP/1\.1\x20400\x20 SF:Bad\x20Request\r\nServer:\x20QRATOR\r\nDate:\x20Thu,\x2011\x20Sep\x2020 SF:25\x2018:57:12\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\ SF:x2032\r\nConnection:\x20close\r\n\r\n\r\nQRATOR\x20HTTP\x20400\r\ SF:n")%r(DNSVersionBindReqTCP,B1,"HTTP/1\.1\x20400\x20Bad\x20Reques SF:t\r\nServer:\x20QRATOR\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2018:57:1 SF:2\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2032\r\nConn SF:ection:\x20close\r\n\r\n\r\nQRATOR\x20HTTP\x20400\r\n")%r( SF:DNSStatusRequestTCP,B1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x SF:20QRATOR\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2018:57:12\x20GMT\r\nCo SF:ntent-Type:\x20text/html\r\nContent-Length:\x2032\r\nConnection:\x20clo SF:se\r\n\r\n\r\nQRATOR\x20HTTP\x20400\r\n")%r(Help,B1,"HTTP/ SF:1\.1\x20400\x20Bad\x20Request\r\nServer:\x20QRATOR\r\nDate:\x20Thu,\x20 SF:11\x20Sep\x202025\x2018:57:12\x20GMT\r\nContent-Type:\x20text/html\r\nC SF:ontent-Length:\x2032\r\nConnection:\x20close\r\n\r\n\r\nQRATOR\x2 SF:0HTTP\x20400\r\n")%r(SSLSessionReq,B1,"HTTP/1\.1\x20400\x20Bad\x SF:20Request\r\nServer:\x20QRATOR\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2 SF:018:57:12\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2032 SF:\r\nConnection:\x20close\r\n\r\n\r\nQRATOR\x20HTTP\x20400\r\n")%r(TerminalServerCookie,B1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n SF:Server:\x20QRATOR\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2018:57:12\x20 SF:GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2032\r\nConnectio SF:n:\x20close\r\n\r\n\r\nQRATOR\x20HTTP\x20400\r\n")%r(TLSSe SF:ssionReq,B1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20QRATOR\r\ SF:nDate:\x20Thu,\x2011\x20Sep\x202025\x2018:57:12\x20GMT\r\nContent-Type: SF:\x20text/html\r\nContent-Length:\x2032\r\nConnection:\x20close\r\n\r\n< SF:html>\r\nQRATOR\x20HTTP\x20400\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/11%Time=68C31B79%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,77,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20 SF:QRATOR\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2018:56:57\x20GMT\r\nCont SF:ent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(HTTPOptions,77,"HT SF:TP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20QRATOR\r\nDate:\x20Thu,\ SF:x2011\x20Sep\x202025\x2018:56:58\x20GMT\r\nContent-Length:\x200\r\nConn SF:ection:\x20close\r\n\r\n")%r(FourOhFourRequest,77,"HTTP/1\.1\x20400\x20 SF:Bad\x20Request\r\nServer:\x20QRATOR\r\nDate:\x20Thu,\x2011\x20Sep\x2020 SF:25\x2018:56:58\x20GMT\r\nContent-Length:\x200\r\nConnection:\x20close\r SF:\n\r\n")%r(tor-versions,B1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServe SF:r:\x20QRATOR\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2018:56:58\x20GMT\r SF:\nContent-Type:\x20text/html\r\nContent-Length:\x2032\r\nConnection:\x2 SF:0close\r\n\r\n\r\nQRATOR\x20HTTP\x20400\r\n")%r(RTSPReques SF:t,20,"\r\nQRATOR\x20HTTP\x20400\r\n")%r(RPCCheck,B1,"HTTP/ SF:1\.1\x20400\x20Bad\x20Request\r\nServer:\x20QRATOR\r\nDate:\x20Thu,\x20 SF:11\x20Sep\x202025\x2018:57:03\x20GMT\r\nContent-Type:\x20text/html\r\nC SF:ontent-Length:\x2032\r\nConnection:\x20close\r\n\r\n\r\nQRATOR\x2 SF:0HTTP\x20400\r\n")%r(DNSVersionBindReqTCP,B1,"HTTP/1\.1\x20400\x SF:20Bad\x20Request\r\nServer:\x20QRATOR\r\nDate:\x20Thu,\x2011\x20Sep\x20 SF:2025\x2018:57:03\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length SF::\x2032\r\nConnection:\x20close\r\n\r\n\r\nQRATOR\x20HTTP\x20400\ SF:r\n")%r(DNSStatusRequestTCP,B1,"HTTP/1\.1\x20400\x20Bad\x20Reque SF:st\r\nServer:\x20QRATOR\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2018:57: SF:03\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2032\r\nCon SF:nection:\x20close\r\n\r\n\r\nQRATOR\x20HTTP\x20400\r\n")%r SF:(Help,B1,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20QRATOR\r\nDa SF:te:\x20Thu,\x2011\x20Sep\x202025\x2018:57:03\x20GMT\r\nContent-Type:\x2 SF:0text/html\r\nContent-Length:\x2032\r\nConnection:\x20close\r\n\r\n\r\nQRATOR\x20HTTP\x20400\r\n")%r(SSLSessionReq,B1,"HTTP/1\.1\ SF:x20400\x20Bad\x20Request\r\nServer:\x20QRATOR\r\nDate:\x20Thu,\x2011\x2 SF:0Sep\x202025\x2018:57:03\x20GMT\r\nContent-Type:\x20text/html\r\nConten SF:t-Length:\x2032\r\nConnection:\x20close\r\n\r\n\r\nQRATOR\x20HTTP SF:\x20400\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|media device|remote management Running (JUST GUESSING): FreeBSD 6.X (89%), OpenBSD 4.X (87%), Linux 2.6.X|2.4.X (86%), Motorola embedded (86%) OS CPE: cpe:/o:freebsd:freebsd:6.2 cpe:/o:openbsd:openbsd:4.0 cpe:/o:linux:linux_kernel:2.6.12 cpe:/h:motorola:rfs4000 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.4.21 Aggressive OS guesses: FreeBSD 6.2-RELEASE (89%), OpenBSD 4.0 (87%), OpenBSD 4.3 (86%), Linux 2.6.12 (Dreambox derivative) (86%), Motorola RFS4000 wireless controller (86%), Linux 2.4.21 (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 9 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 2.59 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 2.13 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 1.76 ms be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102) 6 ... 7 12.42 ms if-ae-35-2.tcore1.sv1-santaclara.as6453.net (207.45.219.7) 8 9.71 ms 4.7.18.2 9 8.18 ms 185.163.159.177 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 178.23 seconds