Nmap scan report for sprc.org (156.110.248.50) Host is up (0.039s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http-proxy F5 BIG-IP load balancer http proxy |_http-server-header: BigIP |_http-open-proxy: Proxy might be redirecting requests 443/tcp open ssl/http Apache httpd 2.4.62 ((Red Hat Enterprise Linux)) | ssl-cert: Subject: commonName=sprc.org/organizationName=University of Oklahoma/stateOrProvinceName=Oklahoma/countryName=US | Subject Alternative Name: DNS:sprc.org, DNS:*.sprc.org | Not valid before: 2025-01-21T00:00:00 |_Not valid after: 2026-02-21T23:59:59 |_http-trane-info: Problem with XML parsing of /evox/about |_ssl-date: TLS randomness does not represent time |_http-server-header: Apache/2.4.62 (Red Hat Enterprise Linux) |_http-title: Suicide Prevention Resource Center | http-robots.txt: 1 disallowed entry |_/wp-admin/ Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): OpenBSD 4.X (86%) OS CPE: cpe:/o:openbsd:openbsd:4.0 Aggressive OS guesses: OpenBSD 4.0 (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 15 hops Service Info: Device: load balancer TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.85 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.85 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 18.50 ms port-channel4.core4.lax2.he.net (184.105.223.226) 5 9.31 ms 213.248.89.210 6 ... 7 30.46 ms hurricane-ic-345012.ip.twelve99-cust.net (62.115.176.10) 8 36.20 ms 100ge0-34.core2.okc1.he.net (184.104.197.98) 9 39.59 ms ok-state-regentsonenet.port-channel5.core1.okc1.he.net (216.66.79.210) 10 51.38 ms 164.58.63.77 11 39.46 ms 164.58.63.78 12 37.88 ms 156.110.254.22 13 37.88 ms 156.110.254.58 14 39.77 ms 156.110.254.71 15 38.45 ms 156.110.248.50 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 92.43 seconds