Nmap scan report for jotun.com (204.74.99.103) Host is up (0.00051s latency). Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 53/tcp closed domain 80/tcp open http | fingerprint-strings: | GetRequest: | HTTP/1.1 400 Bad Request | date: Wed, 10 Sep 2025 20:26:52 GMT | last-modified: Wed, 10 Sep 2025 20:26:52 GMT | accept-ranges: none | content-type: text/html | connection: close | | | UltraDNS Client Redirection Service | | bgcolor="#FF4444"> | | | |
|

HTTP/1.1 400 Bad Request

|
ORIGIN HOST: 208.76.253.234
TARGET HOST:
TARGET PAGE: /


|


| Copyright © Vercara, LLC.
| Rights Reserved

| | HTTPOptions: | HTTP/1.1 501 Not Implemented | date: Wed, 10 Sep 2025 20:26:52 GMT | last-modified: Wed, 10 Sep 2025 20:26:52 GMT | accept-ranges: none | content-type: text/html | connection: close | | | UltraDNS Client Redirection Service | | bgcolor="#FF4444"> | | | |
|

HTTP/1.1 501 Not Implemented

|
ORIGIN HOST: 208.76.253.234
TARGET HOST:
TARGET PAGE: /


|


| Copyright © Vercara, LLC.
| Rights Reserved

|_ |_http-title: Did not follow redirect to https://www.jotun.com/ 443/tcp closed https 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.92%I=7%D=9/10%Time=68C1DF0C%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,362,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ndate:\x20Wed,\x20 SF:10\x20Sep\x202025\x2020:26:52\x20GMT\r\nlast-modified:\x20Wed,\x2010\x2 SF:0Sep\x202025\x2020:26:52\x20GMT\r\naccept-ranges:\x20none\r\ncontent-ty SF:pe:\x20text/html\r\nconnection:\x20close\r\n\r\n\r\n\r\n SF:UltraDNS\x20Client\x20Redirection\x20Service\r\n\r\n< SF:th\x20colspan=\"2\">\r\n

HTTP/1\.1\x20400\x20Bad\x20Request

< SF:/p>\r\n\r\nORIGIN\x20HOS SF:T:\x20208\.76\.253\.234
\r\nTARGET\x20HOST:\x20 SF:\r\n< SF:tt>TARGET\x20PAGE:\x20/ SF:\r\n

\r\n

\r\n SF:Copyright\x20©\x20Vercara,\x20LLC\.
\r\nAll\x20Rights\x20Reserv SF:ed

\r\n\r\n\r\n\r\n")%r(HTTPOptions,36A," SF:HTTP/1\.1\x20501\x20Not\x20Implemented\r\ndate:\x20Wed,\x2010\x20Sep\x2 SF:02025\x2020:26:52\x20GMT\r\nlast-modified:\x20Wed,\x2010\x20Sep\x202025 SF:\x2020:26:52\x20GMT\r\naccept-ranges:\x20none\r\ncontent-type:\x20text/ SF:html\r\nconnection:\x20close\r\n\r\n\r\n\r\nUltraDNS\x20 SF:Client\x20Redirection\x20Service\r\n\r\n\r\n

HTTP/1\.1\x20501\x20Not\x20Implemented

\r\n< SF:/th>\r\nORIGIN\x20HOST:\x20208\.76\.253\.234\r\nTARGET\x20HOST:\x20\r\nTARGET\x20PAGE:\x20/\r\n

\r\n

\r\nCopyrigh SF:t\x20©\x20Vercara,\x20LLC\.
\r\nAll\x20Rights\x20Reserved
\r\n\r\n\r\n\r\n"); Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.6 Network Distance: 5 hops TRACEROUTE (using port 53/tcp) HOP RTT ADDRESS 1 23.18 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 2.14 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.97 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.36 ms any2ix0.uslax.as16552.net (206.72.211.116) 5 0.51 ms 204.74.99.103 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 18.49 seconds