Nmap scan report for fulcrum.sethforprivacy.com (23.137.57.100) Host is up (0.068s latency). Not shown: 992 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http Golang net/http server (Go-IPFS json-rpc or InfluxDB API) |_http-title: Did not follow redirect to https://fulcrum.sethforprivacy.com/ 443/tcp open ssl/ssl |_http-title: Site doesn't have a title (text/plain; charset=utf-8). | ssl-cert: Subject: commonName=fulcrum.sethforprivacy.com | Subject Alternative Name: DNS:fulcrum.sethforprivacy.com | Not valid before: 2025-07-22T10:02:03 |_Not valid after: 2025-10-20T10:02:02 3333/tcp open dec-notes? 8333/tcp open landesk-rc LANDesk remote management 8443/tcp closed https-alt 50001/tcp open unknown | fingerprint-strings: | GenericLines: | {"error":{"code":-32700,"message":"Failed to parse Json from string: | "},"id":null,"jsonrpc":"2.0"} | {"error":{"code":-32700,"message":"Failed to parse Json from string: | "},"id":null,"jsonrpc":"2.0"} | GetRequest: | {"error":{"code":-32700,"message":"Failed to parse Json from string: GET / HTTP/1.0 | "},"id":null,"jsonrpc":"2.0"} | {"error":{"code":-32700,"message":"Failed to parse Json from string: | "},"id":null,"jsonrpc":"2.0"} | HTTPOptions: | {"error":{"code":-32700,"message":"Failed to parse Json from string: OPTIONS / HTTP/1.0 | "},"id":null,"jsonrpc":"2.0"} | {"error":{"code":-32700,"message":"Failed to parse Json from string: | "},"id":null,"jsonrpc":"2.0"} | Help: | {"error":{"code":-32700,"message":"Failed to parse Json from string: HELP | "},"id":null,"jsonrpc":"2.0"} | Kerberos: | {"error":{"code":-32700,"message":"Failed to parse Json from string: "},"id":null,"jsonrpc":"2.0"} | RTSPRequest: | {"error":{"code":-32700,"message":"Failed to parse Json from string: OPTIONS / RTSP/1.0 | "},"id":null,"jsonrpc":"2.0"} | {"error":{"code":-32700,"message":"Failed to parse Json from string: | "},"id":null,"jsonrpc":"2.0"} | SSLSessionReq, TLSSessionReq: | {"error":{"code":-32700,"message":"Failed to parse Json from string: u0016u0003"},"id":null,"jsonrpc":"2.0"} | TerminalServerCookie: |_ {"error":{"code":-32700,"message":"Failed to parse Json from string: u0003"},"id":null,"jsonrpc":"2.0"} 50002/tcp open ssl/iiimsf? | fingerprint-strings: | GenericLines: | {"error":{"code":-32700,"message":"Failed to parse Json from string: | "},"id":null,"jsonrpc":"2.0"} | {"error":{"code":-32700,"message":"Failed to parse Json from string: | "},"id":null,"jsonrpc":"2.0"} | GetRequest: | {"error":{"code":-32700,"message":"Failed to parse Json from string: GET / HTTP/1.0 | "},"id":null,"jsonrpc":"2.0"} | {"error":{"code":-32700,"message":"Failed to parse Json from string: | "},"id":null,"jsonrpc":"2.0"} | HTTPOptions: | {"error":{"code":-32700,"message":"Failed to parse Json from string: OPTIONS / HTTP/1.0 | "},"id":null,"jsonrpc":"2.0"} | {"error":{"code":-32700,"message":"Failed to parse Json from string: | "},"id":null,"jsonrpc":"2.0"} | Help: | {"error":{"code":-32700,"message":"Failed to parse Json from string: HELP | "},"id":null,"jsonrpc":"2.0"} | Kerberos: | {"error":{"code":-32700,"message":"Failed to parse Json from string: "},"id":null,"jsonrpc":"2.0"} | RTSPRequest: | {"error":{"code":-32700,"message":"Failed to parse Json from string: OPTIONS / RTSP/1.0 | "},"id":null,"jsonrpc":"2.0"} | {"error":{"code":-32700,"message":"Failed to parse Json from string: | "},"id":null,"jsonrpc":"2.0"} | SSLSessionReq, TLSSessionReq: | {"error":{"code":-32700,"message":"Failed to parse Json from string: u0016u0003"},"id":null,"jsonrpc":"2.0"} | TerminalServerCookie: |_ {"error":{"code":-32700,"message":"Failed to parse Json from string: u0003"},"id":null,"jsonrpc":"2.0"} |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=fulcrum.sethforprivacy.com/organizationName=Seth For Privacy/stateOrProvinceName=Some-State/countryName=US | Not valid before: 2022-12-23T15:31:41 |_Not valid after: 2032-12-20T15:31:41 50003/tcp closed unknown 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port50001-TCP:V=7.92%I=7%D=9/13%Time=68C57C68%P=x86_64-redhat-linux-gnu SF:%r(GenericLines,D0,"{\"error\":{\"code\":-32700,\"message\":\"Failed\x2 SF:0to\x20parse\x20Json\x20from\x20string:\x20\\r\\n\"},\"id\":null,\"json SF:rpc\":\"2\.0\"}\r\n{\"error\":{\"code\":-32700,\"message\":\"Failed\x20 SF:to\x20parse\x20Json\x20from\x20string:\x20\\r\\n\"},\"id\":null,\"jsonr SF:pc\":\"2\.0\"}\r\n")%r(GetRequest,DE,"{\"error\":{\"code\":-32700,\"mes SF:sage\":\"Failed\x20to\x20parse\x20Json\x20from\x20string:\x20GET\x20/\x SF:20HTTP/1\.0\\r\\n\"},\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n{\"error\":{\ SF:"code\":-32700,\"message\":\"Failed\x20to\x20parse\x20Json\x20from\x20s SF:tring:\x20\\r\\n\"},\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n")%r(HTTPOptio SF:ns,E2,"{\"error\":{\"code\":-32700,\"message\":\"Failed\x20to\x20parse\ SF:x20Json\x20from\x20string:\x20OPTIONS\x20/\x20HTTP/1\.0\\r\\n\"},\"id\" SF::null,\"jsonrpc\":\"2\.0\"}\r\n{\"error\":{\"code\":-32700,\"message\": SF:\"Failed\x20to\x20parse\x20Json\x20from\x20string:\x20\\r\\n\"},\"id\": SF:null,\"jsonrpc\":\"2\.0\"}\r\n")%r(RTSPRequest,E2,"{\"error\":{\"code\" SF::-32700,\"message\":\"Failed\x20to\x20parse\x20Json\x20from\x20string:\ SF:x20OPTIONS\x20/\x20RTSP/1\.0\\r\\n\"},\"id\":null,\"jsonrpc\":\"2\.0\"} SF:\r\n{\"error\":{\"code\":-32700,\"message\":\"Failed\x20to\x20parse\x20 SF:Json\x20from\x20string:\x20\\r\\n\"},\"id\":null,\"jsonrpc\":\"2\.0\"}\ SF:r\n")%r(Help,6C,"{\"error\":{\"code\":-32700,\"message\":\"Failed\x20to SF:\x20parse\x20Json\x20from\x20string:\x20HELP\\r\\n\"},\"id\":null,\"jso SF:nrpc\":\"2\.0\"}\r\n")%r(SSLSessionReq,70,"{\"error\":{\"code\":-32700, SF:\"message\":\"Failed\x20to\x20parse\x20Json\x20from\x20string:\x20\\u00 SF:16\\u0003\"},\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n")%r(TerminalServerCo SF:okie,6A,"{\"error\":{\"code\":-32700,\"message\":\"Failed\x20to\x20pars SF:e\x20Json\x20from\x20string:\x20\\u0003\"},\"id\":null,\"jsonrpc\":\"2\ SF:.0\"}\r\n")%r(TLSSessionReq,70,"{\"error\":{\"code\":-32700,\"message\" SF::\"Failed\x20to\x20parse\x20Json\x20from\x20string:\x20\\u0016\\u0003\" SF:},\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n")%r(Kerberos,64,"{\"error\":{\" SF:code\":-32700,\"message\":\"Failed\x20to\x20parse\x20Json\x20from\x20st SF:ring:\x20\"},\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port50002-TCP:V=7.92%T=SSL%I=7%D=9/13%Time=68C57C6F%P=x86_64-redhat-lin SF:ux-gnu%r(GenericLines,D0,"{\"error\":{\"code\":-32700,\"message\":\"Fai SF:led\x20to\x20parse\x20Json\x20from\x20string:\x20\\r\\n\"},\"id\":null, SF:\"jsonrpc\":\"2\.0\"}\r\n{\"error\":{\"code\":-32700,\"message\":\"Fail SF:ed\x20to\x20parse\x20Json\x20from\x20string:\x20\\r\\n\"},\"id\":null,\ SF:"jsonrpc\":\"2\.0\"}\r\n")%r(GetRequest,DE,"{\"error\":{\"code\":-32700 SF:,\"message\":\"Failed\x20to\x20parse\x20Json\x20from\x20string:\x20GET\ SF:x20/\x20HTTP/1\.0\\r\\n\"},\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n{\"erro SF:r\":{\"code\":-32700,\"message\":\"Failed\x20to\x20parse\x20Json\x20fro SF:m\x20string:\x20\\r\\n\"},\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n")%r(HTT SF:POptions,E2,"{\"error\":{\"code\":-32700,\"message\":\"Failed\x20to\x20 SF:parse\x20Json\x20from\x20string:\x20OPTIONS\x20/\x20HTTP/1\.0\\r\\n\"}, SF:\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n{\"error\":{\"code\":-32700,\"mess SF:age\":\"Failed\x20to\x20parse\x20Json\x20from\x20string:\x20\\r\\n\"},\ SF:"id\":null,\"jsonrpc\":\"2\.0\"}\r\n")%r(RTSPRequest,E2,"{\"error\":{\" SF:code\":-32700,\"message\":\"Failed\x20to\x20parse\x20Json\x20from\x20st SF:ring:\x20OPTIONS\x20/\x20RTSP/1\.0\\r\\n\"},\"id\":null,\"jsonrpc\":\"2 SF:\.0\"}\r\n{\"error\":{\"code\":-32700,\"message\":\"Failed\x20to\x20par SF:se\x20Json\x20from\x20string:\x20\\r\\n\"},\"id\":null,\"jsonrpc\":\"2\ SF:.0\"}\r\n")%r(Help,6C,"{\"error\":{\"code\":-32700,\"message\":\"Failed SF:\x20to\x20parse\x20Json\x20from\x20string:\x20HELP\\r\\n\"},\"id\":null SF:,\"jsonrpc\":\"2\.0\"}\r\n")%r(SSLSessionReq,70,"{\"error\":{\"code\":- SF:32700,\"message\":\"Failed\x20to\x20parse\x20Json\x20from\x20string:\x2 SF:0\\u0016\\u0003\"},\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n")%r(TerminalSe SF:rverCookie,6A,"{\"error\":{\"code\":-32700,\"message\":\"Failed\x20to\x SF:20parse\x20Json\x20from\x20string:\x20\\u0003\"},\"id\":null,\"jsonrpc\ SF:":\"2\.0\"}\r\n")%r(TLSSessionReq,70,"{\"error\":{\"code\":-32700,\"mes SF:sage\":\"Failed\x20to\x20parse\x20Json\x20from\x20string:\x20\\u0016\\u SF:0003\"},\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n")%r(Kerberos,64,"{\"error SF:\":{\"code\":-32700,\"message\":\"Failed\x20to\x20parse\x20Json\x20from SF:\x20string:\x20\"},\"id\":null,\"jsonrpc\":\"2\.0\"}\r\n"); Device type: general purpose|storage-misc|firewall Running (JUST GUESSING): Linux 4.X|2.6.X|3.X (86%), Synology DiskStation Manager 5.X (86%), WatchGuard Fireware 11.X (86%), FreeBSD 6.X (85%) OS CPE: cpe:/o:linux:linux_kernel:4.0 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/o:freebsd:freebsd:6.2 Aggressive OS guesses: Linux 4.0 (86%), Linux 2.6.32 (86%), Linux 2.6.32 or 3.10 (86%), Linux 3.5 (86%), Linux 4.4 (86%), Synology DiskStation Manager 5.1 (86%), WatchGuard Fireware 11.8 (86%), Linux 2.6.35 (85%), FreeBSD 6.2-RELEASE (85%), Linux 2.6.39 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 10 hops TRACEROUTE (using port 50003/tcp) HOP RTT ADDRESS 1 0.24 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 1.16 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.71 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.46 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.49 ms ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242) 6 0.43 ms ae-2.a03.lsanca07.us.bb.gin.ntt.net (129.250.3.91) 7 0.46 ms 23.136.28.204.lax.us.cosmic.global (23.136.28.204) 8 0.50 ms 23.136.28.204.lax.us.cosmic.global (23.136.28.204) 9 ... 10 68.16 ms 23.137.57.100 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 189.44 seconds