Nmap scan report for aspen.edu (20.85.177.70) Host is up (0.067s latency). Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 302 Move | Content-Type: text/html | Cache-Control: no-cache | Location: https://10.250.0.29/nice%20ports%2C/Trinity.txt.bak | Content-Length: 0 | GetRequest, HTTPOptions: | HTTP/1.0 302 Move | Content-Type: text/html | Cache-Control: no-cache | Location: https://10.250.0.29/ |_ Content-Length: 0 |_http-title: Did not follow redirect to https://aspen.edu/ 113/tcp closed ident 179/tcp open tcpwrapped 443/tcp open ssl/http nginx |_http-title: Did not follow redirect to http://www.aspen.edu/ | ssl-cert: Subject: commonName=*.aspen.edu | Subject Alternative Name: DNS:*.aspen.edu, DNS:aspen.edu | Not valid before: 2025-08-02T13:06:45 |_Not valid after: 2026-09-03T13:06:45 |_ssl-date: 2025-09-09T21:07:26+00:00; 0s from scanner time. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.92%I=7%D=9/9%Time=68C096ED%P=x86_64-redhat-linux-gnu%r(G SF:etRequest,7A,"HTTP/1\.0\x20302\x20Move\r\nContent-Type:\x20text/html\r\ SF:nCache-Control:\x20no-cache\r\nLocation:\x20https://10\.250\.0\.29/\r\n SF:Content-Length:\x200\r\n\r\n")%r(HTTPOptions,7A,"HTTP/1\.0\x20302\x20Mo SF:ve\r\nContent-Type:\x20text/html\r\nCache-Control:\x20no-cache\r\nLocat SF:ion:\x20https://10\.250\.0\.29/\r\nContent-Length:\x200\r\n\r\n")%r(Fou SF:rOhFourRequest,99,"HTTP/1\.0\x20302\x20Move\r\nContent-Type:\x20text/ht SF:ml\r\nCache-Control:\x20no-cache\r\nLocation:\x20https://10\.250\.0\.29 SF:/nice%20ports%2C/Trinity\.txt\.bak\r\nContent-Length:\x200\r\n\r\n"); Device type: general purpose|storage-misc|firewall Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (92%), Synology DiskStation Manager 5.X (86%), WatchGuard Fireware 11.X (86%), FreeBSD 6.X (85%) OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1 cpe:/o:watchguard:fireware:11.8 cpe:/o:freebsd:freebsd:6.2 Aggressive OS guesses: Linux 3.10 - 3.12 (92%), Linux 4.4 (92%), Linux 3.10 - 3.16 (91%), Linux 4.0 (91%), Linux 3.10 (90%), Linux 4.9 (89%), Linux 3.11 - 4.1 (86%), Linux 2.6.32 (86%), Linux 2.6.39 (86%), Linux 3.4 (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 25 hops TRACEROUTE (using port 113/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.55 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.65 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.50 ms microsoft.as8075.any2ix.coresite.com (206.72.210.143) 5 ... 6 64.40 ms be-23-0.ibr01.lax30.ntwk.msn.net (104.44.33.173) 7 ... 8 69.08 ms 51.10.32.28 9 65.31 ms be-10-0.ibr01.atl30.ntwk.msn.net (104.44.18.220) 10 ... 11 12 69.74 ms 51.10.19.14 13 65.61 ms 51.10.5.94 14 68.97 ms 51.10.5.94 15 ... 24 25 64.86 ms 20.85.177.70 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 45.82 seconds