Nmap scan report for lasvegas-speedtest.commnetbroadband.com (69.160.187.255) Host is up (0.028s latency). Other addresses for lasvegas-speedtest.commnetbroadband.com (not scanned): 2607:fdd8:8:: Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 5060/tcp open ssl/sip? | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, SIPOptions: | HTTP/1.1 500 Internal Server Error | Connection: Close | GenericLines: | ERROR | ERROR | Help, LPDString: | ERROR | Kerberos: | \xbcc | LDAPSearchReq: | \xaa- | TerminalServerCookie: |_ _atN~ |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=server-56008.prod.hosts.ooklaserver.net | Subject Alternative Name: DNS:lasvegas-speedtest.commnetbroadband.com.prod.hosts.ooklaserver.net, DNS:server-56008.prod.hosts.ooklaserver.net | Not valid before: 2025-07-28T02:32:40 |_Not valid after: 2025-10-26T02:32:39 5214/tcp closed unknown 8080/tcp open ssl/http-proxy |_http-title: OoklaServer | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, SIPOptions: | HTTP/1.1 500 Internal Server Error | Connection: Close | GenericLines: | ERROR | ERROR | Help, LPDString: | ERROR | SSLSessionReq: | _atN~ | TLSSessionReq: |_ hJVy | ssl-cert: Subject: commonName=server-56008.prod.hosts.ooklaserver.net | Subject Alternative Name: DNS:lasvegas-speedtest.commnetbroadband.com.prod.hosts.ooklaserver.net, DNS:server-56008.prod.hosts.ooklaserver.net | Not valid before: 2025-07-28T02:32:40 |_Not valid after: 2025-10-26T02:32:39 |_ssl-date: TLS randomness does not represent time 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port5060-TCP:V=7.92%T=SSL%I=7%D=8/27%Time=68AF290C%P=x86_64-redhat-linu SF:x-gnu%r(GenericLines,C,"ERROR\nERROR\n")%r(GetRequest,39,"HTTP/1\.1\x20 SF:500\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n")%r( SF:HTTPOptions,39,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConn SF:ection:\x20Close\r\n\r\n")%r(RTSPRequest,39,"HTTP/1\.1\x20500\x20Intern SF:al\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n")%r(Help,6,"ERROR SF:\n")%r(SSLSessionReq,20,"\x01r\xaa\xd3\xd7\xe3eS\xcdZ\xfd\xf2\xf2\xc6\x SF:01\xab\+\xfa\(\x9d\xb7\x1dB\xdc_\xb0\xa1\x17\xe6\xa6\xde\n")%r(Terminal SF:ServerCookie,19,"_atN~\xa5/\xa1\xf4\xa2\xe7!\xe9\xdez\x14k\xa7\x103\xb7 SF:\xb5\x92\xce\n")%r(TLSSessionReq,41,"\xed\xf92\xa2\xa6\xc2NT\*\xe2\x9co SF:19\xf9\xd6\xe0\x19h6\x8f\n\xd7@\x8c\+\xb0i\|R\xdb\xe4\xbb;\xf8jA\xa0\xa SF:9\xb6\xe5\xbdX\x8fb3\xeb\x15&\xa3\xef\x0e\]\x1f\xaa\xba\x0b=\]_\xf8\xe9 SF:\x8d\|\n")%r(Kerberos,2C,"\x19}\xc6\xb8\xddlw\]\x17pv\xddI;\x87\x2055\x SF:cc\xc2\\\xbcc\x92\x92\xf1X\xef\x0b\xc6\x204\xae\xfcCb\xbb\xb1\x95\xeb\x SF:d8ha\n")%r(FourOhFourRequest,39,"HTTP/1\.1\x20500\x20Internal\x20Server SF:\x20Error\r\nConnection:\x20Close\r\n\r\n")%r(LPDString,6,"ERROR\n")%r( SF:LDAPSearchReq,43,"\xaa\xaa\xf1\xd2\x87\x12\xe8\?\xb9=4\x9c=\xab\xa5\\\x SF:aa-\x13\x84\x13\xfe\xfa\xf2H`S\xf0\|\xa8ZR\n\xa7\xac}\x19\x9b\x8a\xfd\x SF:d9\xc6\x1e\(J\x11b\xda\x83\x8c\x93G\xd4_\xb6\xa7\x9d\x8b\xf9\xee\xf8\x8 SF:58\x9de6\n")%r(SIPOptions,39,"HTTP/1\.1\x20500\x20Internal\x20Server\x2 SF:0Error\r\nConnection:\x20Close\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8080-TCP:V=7.92%T=SSL%I=7%D=8/27%Time=68AF2911%P=x86_64-redhat-linu SF:x-gnu%r(GenericLines,C,"ERROR\nERROR\n")%r(GetRequest,39,"HTTP/1\.1\x20 SF:500\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n")%r( SF:HTTPOptions,39,"HTTP/1\.1\x20500\x20Internal\x20Server\x20Error\r\nConn SF:ection:\x20Close\r\n\r\n")%r(RTSPRequest,39,"HTTP/1\.1\x20500\x20Intern SF:al\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n")%r(Help,6,"ERROR SF:\n")%r(SSLSessionReq,1A,"_atN~\xa5/\xa1\xf4\xa2\xe7!\xe9\xdez\x14K\x86\ SF:x08\xf2\xef\xf0\xcd6\x82\n")%r(TerminalServerCookie,16,"\xed\xf92\xa2\x SF:a6\xc2NT\*\xe2\x9co19\xf9\xd6X\xc7\[\xfav\n")%r(TLSSessionReq,4F,"\x19} SF:\xc6\xb8\xddlw\]\x17pv\xddI;\x87\x20\xb4\xd2\xc9p\xa2hJVy\x0cv\xab\t\xa SF:4\x85\x9c3\x20mF\x87\xdev\x05\xe1\?\n\xce1\xadj\xf9n\xabRA\x1d\xbc:\xe9 SF:\xd6V\x98\xb3\x9f\x0c\x958,\xda\xc0\xda\xbf\xb1uz\xa5X&g\xf9-\n")%r(Ker SF:beros,1E,"\xe3\x02\x87\xef\xf0'\xd3\)N\xf1~\xa1\xc6\x1f\x12\x1e\x96\xf0 SF:\x06#e\t\xff\xcf\x9b\xc7\x99\x8c\\\n")%r(FourOhFourRequest,39,"HTTP/1\. SF:1\x20500\x20Internal\x20Server\x20Error\r\nConnection:\x20Close\r\n\r\n SF:")%r(LPDString,6,"ERROR\n")%r(LDAPSearchReq,4D,"\x15\x81\xc2\xd0\xed\x1 SF:3\xfd\x1f\xa9\x92\x89s\xcf\x04gO\xa5\xc7\x8c\xe8\*\t\xf8\xea\x11\x17\x8 SF:2\xce\xef\x0e`\xf5\xd5E\n\xbe\x87\xb8\xdb\xf4\x20\x9b\xdf\xdd\xef\x0e\x SF:ffI}\xaam`\xb9\xef\x01\(\x1b\x87\xf4\\\]\xdb\xb0L\x15_\xde\x8b\x8a'\x9f SF:\xac\xb1\xdf\x99i\n")%r(SIPOptions,39,"HTTP/1\.1\x20500\x20Internal\x20 SF:Server\x20Error\r\nConnection:\x20Close\r\n\r\n"); Aggressive OS guesses: ASUS RT-N56U WAP (Linux 3.4) (91%), Linux 3.16 (91%), Linux 3.1 (89%), Linux 3.2 (89%), Linux 3.10 (89%), Linux 3.10 - 3.13 (89%), Linux 3.12 (89%), Linux 3.2 - 4.9 (89%), Linux 3.4 - 3.10 (89%), Linux 3.8 (89%) No exact OS matches for host (test conditions non-ideal). Network Distance: 15 hops TRACEROUTE (using port 5214/tcp) HOP RTT ADDRESS 1 4.40 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.71 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.73 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 34.00 ms hurricane-ic-371593.ip.twelve99-cust.net (62.115.55.98) 6 34.90 ms port-channel3.core1.den3.he.net (184.104.198.110) 7 34.93 ms essextel-inc.e0-45.switch1.den6.he.net (184.105.11.78) 8 ... 12 13 28.28 ms 10.61.24.188 14 28.22 ms 169.254.0.0 15 28.04 ms 69.160.187.255 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 190.89 seconds