Nmap scan report for bclplaw.com (54.203.180.53) Host is up (0.028s latency). rDNS record for 54.203.180.53: ec2-54-203-180-53.us-west-2.compute.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http |_http-title: Did not follow redirect to https://bclplaw.com/ | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, RTSPRequest, X11Probe: | HTTP/1.1 400 Bad request | Content-length: 90 | Cache-Control: no-cache | Connection: close | Content-Type: text/html |

400 Bad request

| Your browser sent an invalid request. | | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 403 Forbidden | content-length: 93 | cache-control: no-cache | content-type: text/html | connection: close |

403 Forbidden

| Request forbidden by administrative rules. |_ 443/tcp open ssl/https | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, RTSPRequest, tor-versions: | HTTP/1.1 400 Bad request | Content-length: 90 | Cache-Control: no-cache | Connection: close | Content-Type: text/html |

400 Bad request

| Your browser sent an invalid request. | | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 403 Forbidden | content-length: 93 | cache-control: no-cache | content-type: text/html | connection: close |

403 Forbidden

| Request forbidden by administrative rules. |_ | ssl-cert: Subject: commonName=bclplaw.com | Subject Alternative Name: DNS:bclplaw.com | Not valid before: 2025-07-13T10:12:32 |_Not valid after: 2025-10-11T10:12:31 |_ssl-date: TLS randomness does not represent time |_http-title: Did not follow redirect to https://www.bclplaw.com/ 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=9/12%Time=68C49542%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,D0,"HTTP/1\.1\x20403\x20Forbidden\r\ncontent-length:\x2093\r SF:\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnectio SF:n:\x20close\r\n\r\n

403\x20Forbidden

\nRequest\x20fo SF:rbidden\x20by\x20administrative\x20rules\.\n\n")%r(HTTPOp SF:tions,D0,"HTTP/1\.1\x20403\x20Forbidden\r\ncontent-length:\x2093\r\ncac SF:he-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnection:\x2 SF:0close\r\n\r\n

403\x20Forbidden

\nRequest\x20forbidd SF:en\x20by\x20administrative\x20rules\.\n\n")%r(RTSPRequest SF:,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCac SF:he-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20tex SF:t/html\r\n\r\n

400\x20Bad\x20request

\nYour\x20brows SF:er\x20sent\x20an\x20invalid\x20request\.\n\n")%r(X11Probe SF:,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCac SF:he-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20tex SF:t/html\r\n\r\n

400\x20Bad\x20request

\nYour\x20brows SF:er\x20sent\x20an\x20invalid\x20request\.\n\n")%r(FourOhFo SF:urRequest,D0,"HTTP/1\.1\x20403\x20Forbidden\r\ncontent-length:\x2093\r\ SF:ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnection SF::\x20close\r\n\r\n

403\x20Forbidden

\nRequest\x20for SF:bidden\x20by\x20administrative\x20rules\.\n\n")%r(RPCChec SF:k,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCa SF:che-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20te SF:xt/html\r\n\r\n

400\x20Bad\x20request

\nYour\x20brow SF:ser\x20sent\x20an\x20invalid\x20request\.\n\n")%r(DNSVers SF:ionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length: SF:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent SF:-Type:\x20text/html\r\n\r\n

400\x20Bad\x20request

\n SF:Your\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n SF:")%r(DNSStatusRequestTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nCont SF:ent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close SF:\r\nContent-Type:\x20text/html\r\n\r\n

400\x20Bad\x20req SF:uest

\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/12%Time=68C49548%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,D0,"HTTP/1\.1\x20403\x20Forbidden\r\ncontent-length:\ SF:x2093\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nco SF:nnection:\x20close\r\n\r\n

403\x20Forbidden

\nReques SF:t\x20forbidden\x20by\x20administrative\x20rules\.\n\n")%r SF:(HTTPOptions,D0,"HTTP/1\.1\x20403\x20Forbidden\r\ncontent-length:\x2093 SF:\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnect SF:ion:\x20close\r\n\r\n

403\x20Forbidden

\nRequest\x20 SF:forbidden\x20by\x20administrative\x20rules\.\n\n")%r(Four SF:OhFourRequest,D0,"HTTP/1\.1\x20403\x20Forbidden\r\ncontent-length:\x209 SF:3\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnec SF:tion:\x20close\r\n\r\n

403\x20Forbidden

\nRequest\x2 SF:0forbidden\x20by\x20administrative\x20rules\.\n\n")%r(tor SF:-versions,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x20 SF:90\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Typ SF:e:\x20text/html\r\n\r\n

400\x20Bad\x20request

\nYour SF:\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n")%r SF:(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\ SF:x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent- SF:Type:\x20text/html\r\n\r\n

400\x20Bad\x20request

\nY SF:our\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n" SF:)%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\ SF:x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent- SF:Type:\x20text/html\r\n\r\n

400\x20Bad\x20request

\nY SF:our\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n" SF:)%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nCont SF:ent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close SF:\r\nContent-Type:\x20text/html\r\n\r\n

400\x20Bad\x20req SF:uest

\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n")%r(DNSStatusRequestTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20requ SF:est\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnectio SF:n:\x20close\r\nContent-Type:\x20text/html\r\n\r\n

400\x2 SF:0Bad\x20request

\nYour\x20browser\x20sent\x20an\x20invalid\x20reque SF:st\.\n\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 2.6.32 - 3.10 (93%), Linux 3.10 (93%), Linux 3.12 - 4.10 (93%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (88%), Crestron XPanel control system (87%), Nintendo Wii game console (86%), Linux 2.6.18 (86%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), OpenWrt White Russian 0.9 (Linux 2.4.30) (86%), Linux 2.6.32 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 12 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 7.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 3.61 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.70 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.41 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146) 5 ... 8 9 27.15 ms 108.166.232.35 10 ... 11 28.72 ms 108.166.240.60 12 28.74 ms ec2-54-203-180-53.us-west-2.compute.amazonaws.com (54.203.180.53) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 36.96 seconds