Nmap scan report for imo.my.salesforce.com (155.226.144.155) Host is up (0.057s latency). Other addresses for imo.my.salesforce.com (not scanned): 155.226.144.157 155.226.144.156 Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | DNSStatusRequestTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:02 GMT | connection: close | Request | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:01 GMT | connection: close | Request | FourOhFourRequest: | HTTP/1.0 400 Bad Request | date: Wed, 27 Aug 2025 12:34:58 GMT | connection: close | content-length: 0 | GenericLines: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:34:59 GMT | connection: close | Request | GetRequest: | HTTP/1.0 400 Bad Request | date: Wed, 27 Aug 2025 12:34:53 GMT | connection: close | content-length: 0 | HTTPOptions: | HTTP/1.0 400 Bad Request | date: Wed, 27 Aug 2025 12:34:55 GMT | connection: close | content-length: 0 | Help: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:03 GMT | connection: close | Request | RPCCheck: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:00 GMT | connection: close | Request | RTSPRequest: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:34:56 GMT | connection: close | Request | SSLSessionReq: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:04 GMT | connection: close | Request | X11Probe: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:34:57 GMT | connection: close |_ Request |_http-title: Did not follow redirect to https://imo.my.salesforce.com/ 443/tcp open ssl/https | fingerprint-strings: | DNSStatusRequestTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:10 GMT | connection: close | Request | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:08 GMT | connection: close | Request | FourOhFourRequest: | HTTP/1.0 400 Bad Request | date: Wed, 27 Aug 2025 12:35:02 GMT | connection: close | content-length: 0 | GenericLines: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:05 GMT | connection: close | Request | GetRequest: | HTTP/1.0 400 Bad Request | date: Wed, 27 Aug 2025 12:34:59 GMT | connection: close | content-length: 0 | HTTPOptions: | HTTP/1.0 400 Bad Request | date: Wed, 27 Aug 2025 12:35:01 GMT | connection: close | content-length: 0 | Help: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:11 GMT | connection: close | Request | RPCCheck: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:07 GMT | connection: close | Request | RTSPRequest: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:06 GMT | connection: close | Request | tor-versions: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Wed, 27 Aug 2025 12:35:03 GMT | connection: close |_ Request | http-robots.txt: 1 disallowed entry |_/ |_http-title: Did not follow redirect to https://login.microsoftonline.com/56e13486-f116-4040-b8e0-6b2d2f40de50/saml2?SAMLRequest=fZNbb6pAEMe%2FCtl3lKsoERuUKipWjly0vhAuC6WFXdxdVPz0x9g26TkPnWQfJjPzn5nNb8ZP17rizpDQEiMDiD0BcBClOCtRYYDAn%2FND8DQZ07iupEY3W%2FaGdvDUQsq4eyGi%2BmfEAC1BOo5pSXUU15DqLNU9c%2BPoUk%2FQG4IZTnEFOJNSSNi91Qwj2taQeJCcyxQGO8cAb4w1VO%2F3yxr36q5H4wrSHJMU9lJcP1FsCIIlBsLDyJDYgLPuc5QoZo%2FZv8srXJSoV5cpwRTnDKOqRA%2BJvjqAoqwMB3wuigNeERSBT4ZQ4AeJlEm5ImRQFfqPhQC3tAwQSTPzbsdKa70rv7HMy%2F%2FvHp2a9u1wceQ%2FzTmEp46xUSvtXmIPm1Yb8pv3t3Wwdg9dc%2FH2wUizFyzmg%2Bjyaq3bRXjt3NdFaKvFVAtP04PJbvlueVL2rqaZcbtVL6ssZeIpbebm9TWB3eUIG%2BXwsT3u2cfSRcjO5d05XkXDknSZ3I2yRXNqkPvsz110azbnZOQVjXNLYfEiBWLq56t9ET%2Br4hbX760TpuuQrPaXRPLisymGiv2xFNuZ2qkrR7arqlFtLZIdc9pE2UgelNF%2Bk8wU6t%2B6mSWSQ3ZdRst5HIyK%2B29R2sIloixGzACSIKm8MOQlzRclXVZ1VeupgngEnPtFwrREn4T9hk3ymUR12%2Fdd3t16PuDCb1LvCeCLS%2F3RnfwE8nfh%2BJtCMPmVuXH%2Fp%2F7ky%2F33DCZ%2FAQ%3D%3D&RelayState=%2F&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=i8YdlqTp0d1O187UCAk3LGCMIwInj6AzpC5ZeT7qNtOvuCWzpDgk5fiLTI7g2%2By2OrzmL3tArKLan71JeT%2BMsWsUVJ697SepV7aa%2FjyVz8yM1sejDJY1i0vXw7hub31lROj4CycSwg6IsGKl%2Fck6YiIiLMskJsjz4CIBK9DMo3ziM6M%2Ba7RuK%2Fzmsj8dpxqKN2p156B%2BgB5Cc1P%2FxLLK0OnwP5xQowjPptA9kQh%2BbCOKt9X%2B8slEF49v6ncNXKlPJxbVq4orCP1kjz%2BB9%2BvfpDQ0EBCp0Siw1Za7LL7UznOMI2z6Cz3sAt6YY8bGNCvih8YJvwLhiutM124KY0gtjQ%3D%3D |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=usa372.sfdc-yfeipo.salesforce.com/organizationName=Salesforce, Inc./stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:usa372.sfdc-yfeipo.salesforce.com, DNS:*.my.salesforce.com, DNS:*.sandbox.my.salesforce.com | Not valid before: 2025-03-11T00:00:00 |_Not valid after: 2026-03-11T23:59:59 | tls-alpn: | h2 |_ http/1.1 8443/tcp open ssl/https-alt? |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 | ssl-cert: Subject: commonName=usa372.sfdc-yfeipo.salesforce.com/organizationName=Salesforce, Inc./stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:usa372.sfdc-yfeipo.salesforce.com, DNS:*.my.salesforce.com, DNS:*.sandbox.my.salesforce.com | Not valid before: 2025-03-11T00:00:00 |_Not valid after: 2026-03-11T23:59:59 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=8/27%Time=68AEFB6E%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,67,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ndate:\x20Wed,\x202 SF:7\x20Aug\x202025\x2012:34:53\x20GMT\r\nconnection:\x20close\r\ncontent- SF:length:\x200\r\n\r\n")%r(HTTPOptions,67,"HTTP/1\.0\x20400\x20Bad\x20Req SF:uest\r\ndate:\x20Wed,\x2027\x20Aug\x202025\x2012:34:55\x20GMT\r\nconnec SF:tion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RTSPRequest,8D,"HTTP SF:/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type SF::\x20text/plain\r\ndate:\x20Wed,\x2027\x20Aug\x202025\x2012:34:56\x20GM SF:T\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,8D,"HTTP/1 SF:\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\ SF:x20text/plain\r\ndate:\x20Wed,\x2027\x20Aug\x202025\x2012:34:57\x20GMT\ SF:r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(FourOhFourRequest,67, SF:"HTTP/1\.0\x20400\x20Bad\x20Request\r\ndate:\x20Wed,\x2027\x20Aug\x2020 SF:25\x2012:34:58\x20GMT\r\nconnection:\x20close\r\ncontent-length:\x200\r SF:\n\r\n")%r(GenericLines,8D,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconte SF:nt-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2027\ SF:x20Aug\x202025\x2012:34:59\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x2 SF:0Request")%r(RPCCheck,8D,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent SF:-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed,\x2027\x2 SF:0Aug\x202025\x2012:35:00\x20GMT\r\nconnection:\x20close\r\n\r\nBad\x20R SF:equest")%r(DNSVersionBindReqTCP,8D,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed SF:,\x2027\x20Aug\x202025\x2012:35:01\x20GMT\r\nconnection:\x20close\r\n\r SF:\nBad\x20Request")%r(DNSStatusRequestTCP,8D,"HTTP/1\.1\x20400\x20Bad\x2 SF:0Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndat SF:e:\x20Wed,\x2027\x20Aug\x202025\x2012:35:02\x20GMT\r\nconnection:\x20cl SF:ose\r\n\r\nBad\x20Request")%r(Help,8D,"HTTP/1\.1\x20400\x20Bad\x20Reque SF:st\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20 SF:Wed,\x2027\x20Aug\x202025\x2012:35:03\x20GMT\r\nconnection:\x20close\r\ SF:n\r\nBad\x20Request")%r(SSLSessionReq,8D,"HTTP/1\.1\x20400\x20Bad\x20Re SF:quest\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\ SF:x20Wed,\x2027\x20Aug\x202025\x2012:35:04\x20GMT\r\nconnection:\x20close SF:\r\n\r\nBad\x20Request"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=8/27%Time=68AEFB74%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,67,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ndate:\x20We SF:d,\x2027\x20Aug\x202025\x2012:34:59\x20GMT\r\nconnection:\x20close\r\nc SF:ontent-length:\x200\r\n\r\n")%r(HTTPOptions,67,"HTTP/1\.0\x20400\x20Bad SF:\x20Request\r\ndate:\x20Wed,\x2027\x20Aug\x202025\x2012:35:01\x20GMT\r\ SF:nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourReq SF:uest,67,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ndate:\x20Wed,\x2027\x20A SF:ug\x202025\x2012:35:02\x20GMT\r\nconnection:\x20close\r\ncontent-length SF::\x200\r\n\r\n")%r(tor-versions,8D,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Wed SF:,\x2027\x20Aug\x202025\x2012:35:03\x20GMT\r\nconnection:\x20close\r\n\r SF:\nBad\x20Request")%r(GenericLines,8D,"HTTP/1\.1\x20400\x20Bad\x20Reques SF:t\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20W SF:ed,\x2027\x20Aug\x202025\x2012:35:05\x20GMT\r\nconnection:\x20close\r\n SF:\r\nBad\x20Request")%r(RTSPRequest,8D,"HTTP/1\.1\x20400\x20Bad\x20Reque SF:st\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20 SF:Wed,\x2027\x20Aug\x202025\x2012:35:06\x20GMT\r\nconnection:\x20close\r\ SF:n\r\nBad\x20Request")%r(RPCCheck,8D,"HTTP/1\.1\x20400\x20Bad\x20Request SF:\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20We SF:d,\x2027\x20Aug\x202025\x2012:35:07\x20GMT\r\nconnection:\x20close\r\n\ SF:r\nBad\x20Request")%r(DNSVersionBindReqTCP,8D,"HTTP/1\.1\x20400\x20Bad\ SF:x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\nd SF:ate:\x20Wed,\x2027\x20Aug\x202025\x2012:35:08\x20GMT\r\nconnection:\x20 SF:close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,8D,"HTTP/1\.1\x2040 SF:0\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/p SF:lain\r\ndate:\x20Wed,\x2027\x20Aug\x202025\x2012:35:10\x20GMT\r\nconnec SF:tion:\x20close\r\n\r\nBad\x20Request")%r(Help,8D,"HTTP/1\.1\x20400\x20B SF:ad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r SF:\ndate:\x20Wed,\x2027\x20Aug\x202025\x2012:35:11\x20GMT\r\nconnection:\ SF:x20close\r\n\r\nBad\x20Request"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 14 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.99 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.84 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 10.95 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 20.10 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 30.88 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 31.38 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74) 9 ... 13 14 56.45 ms 155.226.144.155 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 81.69 seconds