Starting Nmap 7.80 ( https://nmap.org ) at 2023-11-21 04:33 EST
Nmap scan report for glosoft.net (172.67.198.117)
Host is up (0.0014s latency).
Other addresses for glosoft.net (not scanned): 2606:4700:3031::6815:44cd 2606:4700:3031::ac43:c675 104.21.68.205
PORT STATE SERVICE VERSION
21/tcp filtered ftp
22/tcp filtered ssh
25/tcp filtered smtp
80/tcp open http cloudflare
110/tcp filtered pop3
143/tcp filtered imap
443/tcp open ssl/https cloudflare
445/tcp filtered microsoft-ds
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.80%I=7%D=11/21%Time=655C7954%P=x86_64-pc-linux-gnu%r(Get
SF:Request,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2021\
SF:x20Nov\x202023\x2009:33:08\x20GMT\r\nContent-Type:\x20text/html\r\nCont
SF:ent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x20cloudflare\r\n
SF:CF-RAY:\x208297edf28fa96c82-DFW\r\n\r\n\r\n400\x20Ba
SF:d\x20Request\r\n\r\n400\x20Bad\x20Requ
SF:est
\r\n
cloudflare\r\n\r\n\r\n")%r(HTTPOptions,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate
SF::\x20Tue,\x2021\x20Nov\x202023\x2009:33:08\x20GMT\r\nContent-Type:\x20t
SF:ext/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServer:\x
SF:20cloudflare\r\nCF-RAY:\x208297edf29e58eaf2-DFW\r\n\r\n\r\n
SF:400\x20Bad\x20Request\r\n\r\n40
SF:0\x20Bad\x20Request
\r\n
cloudflare\r\
SF:n\r\n\r\n")%r(RTSPRequest,9B,"\r\n400\
SF:x20Bad\x20Request\r\n\r\n400\x20Bad\x2
SF:0Request
\r\n
cloudflare\r\n\r\
SF:n\r\n")%r(X11Probe,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSe
SF:rver:\x20cloudflare\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:08\x
SF:20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnec
SF:tion:\x20close\r\nCF-RAY:\x20-\r\n\r\n\r\n400\x20Bad
SF:\x20Request\r\n\r\n400\x20Bad\x20Reque
SF:st
\r\n
cloudflare\r\n\r\n\r\n")%r(FourOhFourRequest,14F,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
SF:nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:08\x20GMT\r\nContent-Type:
SF:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\nServ
SF:er:\x20cloudflare\r\nCF-RAY:\x208297edf2aaf66b1c-DFW\r\n\r\n\r\n<
SF:head>400\x20Bad\x20Request\r\n\r\n<
SF:h1>400\x20Bad\x20Request\r\n
cloudflare\r\n\r\n\r\n")%r(RPCCheck,13C,"HTTP/1\.1\x20400\x20Bad\
SF:x20Request\r\nServer:\x20cloudflare\r\nDate:\x20Tue,\x2021\x20Nov\x2020
SF:23\x2009:33:13\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\
SF:x20155\r\nConnection:\x20close\r\nCF-RAY:\x20-\r\n\r\n\r\n<
SF:title>400\x20Bad\x20Request\r\n\r\n400
SF:\x20Bad\x20Request
\r\n
cloudflare\r\n
SF:\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.80%T=SSL%I=7%D=11/21%Time=655C795A%P=x86_64-pc-linux-gn
SF:u%r(GetRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloudfl
SF:are\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:14\x20GMT\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20close\r
SF:\nCF-RAY:\x208297ee182a6a6b3a-DFW\r\n\r\n\r\n403\x20
SF:Forbidden\r\n\r\n403\x20Forbidden
SF:\r\n
cloudflare\r\n\r\n\r\n"
SF:)%r(HTTPOptions,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20cloudf
SF:lare\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:14\x20GMT\r\nConten
SF:t-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20close\
SF:r\nCF-RAY:\x208297ee187f60e736-DFW\r\n\r\n\r\n403\x2
SF:0Forbidden\r\n\r\n403\x20Forbidden
\r\n
cloudflare\r\n\r\n\r\n
SF:")%r(FourOhFourRequest,149,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x2
SF:0cloudflare\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:15\x20GMT\r\
SF:nContent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x2
SF:0close\r\nCF-RAY:\x208297ee18db37aa6a-DFW\r\n\r\n\r\n403\x20Forbidden\r\n\r\n403\x20Forbid
SF:den
\r\n
cloudflare\r\n\r\n\r\n")%r(tor-versions,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSer
SF:ver:\x20cloudflare\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:15\x2
SF:0GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20155\r\nConnect
SF:ion:\x20close\r\nCF-RAY:\x20-\r\n\r\n\r\n400\x20Bad\
SF:x20Request\r\n\r\n400\x20Bad\x20Reques
SF:t
\r\n
cloudflare\r\n\r\n\r\n")%r(RTSPRequest,9B,"\r\n400\x20Bad\x20Request<
SF:/title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cen
SF:ter>\r\n<hr><center>cloudflare</center>\r\n</body>\r\n</html>\r\n")%r(R
SF:PCCheck,13C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20cloudflar
SF:e\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2009:33:20\x20GMT\r\nContent-T
SF:ype:\x20text/html\r\nContent-Length:\x20155\r\nConnection:\x20close\r\n
SF:CF-RAY:\x20-\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\r
SF:\n
cloudflare\r\n\r\n\r\n");
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 21.73 seconds