nmap

nmap -sC -A -T4 192.168.110.1                  
Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-15 01:22 CST
Nmap scan report for 192.168.110.1
Host is up (0.24s latency).
Not shown: 997 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
53/tcp  open  domain    Unbound 1.16.0
80/tcp  open  http      OPNsense
|_http-server-header: OPNsense
|_http-title: Did not follow redirect to https://192.168.110.1/
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 301 Moved Permanently
|     Location: https:///nice%20ports%2C/Trinity.txt.bak
|     Content-Length: 0
|     Connection: close
|     Date: Sat, 15 Feb 2025 07:22:39 GMT
|     Server: OPNsense
|   GenericLines: 
|     HTTP/1.0 400 Bad Request
|     Content-Type: text/html
|     Content-Length: 345
|     Connection: close
|     Date: Sat, 15 Feb 2025 07:22:40 GMT
|     Server: OPNsense
|     <?xml version="1.0" encoding="iso-8859-1"?>
|     <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|     "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|     <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
|     <head>
|     <title>400 Bad Request</title>
|     </head>
|     <body>
|     <h1>400 Bad Request</h1>
|     </body>
|     </html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.0 301 Moved Permanently
|     Location: https:///
|     Content-Length: 0
|     Connection: close
|     Date: Sat, 15 Feb 2025 07:22:31 GMT
|     Server: OPNsense
|   RTSPRequest: 
|     HTTP/1.0 400 Bad Request
|     Content-Type: text/html
|     Content-Length: 345
|     Connection: close
|     Date: Sat, 15 Feb 2025 07:22:32 GMT
|     Server: OPNsense
|     <?xml version="1.0" encoding="iso-8859-1"?>
|     <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|     "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|     <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
|     <head>
|     <title>400 Bad Request</title>
|     </head>
|     <body>
|     <h1>400 Bad Request</h1>
|     </body>
|_    </html>
443/tcp open  ssl/https OPNsense
|_http-trane-info: Problem with XML parsing of /evox/about
|_http-server-header: OPNsense
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=OPNsense.localdomain/organizationName=OPNsense self-signed web certificate/stateOrProvinceName=Zuid-Holland/countryName=NL
| Subject Alternative Name: DNS:OPNsense.localdomain
| Not valid before: 2022-03-11T09:13:36
|_Not valid after:  2023-04-12T09:13:36
|_http-title: Login | OPNsense
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.0 200 OK
|     Set-Cookie: PHPSESSID=b1410e699c716a7676be88342c62537b; path=/; secure; HttpOnly
|     Set-Cookie: PHPSESSID=b1410e699c716a7676be88342c62537b; path=/; secure; HttpOnly
|     Expires: Thu, 19 Nov 1981 08:52:00 GMT
|     Cache-Control: no-store, no-cache, must-revalidate
|     Pragma: no-cache
|     Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline' 'unsafe-eval';
|     X-Frame-Options: SAMEORIGIN
|     X-Content-Type-Options: nosniff
|     X-XSS-Protection: 1; mode=block
|     Referrer-Policy: same-origin
|     Content-type: text/html; charset=UTF-8
|     Content-Length: 1823
|     Connection: close
|     Date: Sat, 15 Feb 2025 07:22:38 GMT
|     Server: OPNsense
|     <!doctype html>
|     <!--[if IE 8 ]><html lang="en" class="ie ie8 lte9 lte8 no-js"><![endif]-->
|     <!--[if IE 9 ]><html lang="en" class="ie ie9 lte9 no-js"><![endif]-->
|     <!--[if (gt IE 9)|!(IE)]><!--><html lang="
|   HTTPOptions: 
|     HTTP/1.0 403 Forbidden
|     Set-Cookie: PHPSESSID=aaa80fd017d7c48661c00b27254d39f7; path=/; secure; HttpOnly
|     Set-Cookie: PHPSESSID=aaa80fd017d7c48661c00b27254d39f7; path=/; secure; HttpOnly
|     Expires: Thu, 19 Nov 1981 08:52:00 GMT
|     Cache-Control: no-store, no-cache, must-revalidate
|     Pragma: no-cache
|     Content-type: text/html; charset=UTF-8
|     Content-Length: 563
|     Connection: close
|     Date: Sat, 15 Feb 2025 07:22:44 GMT
|     Server: OPNsense
|     <html><head><title>CSRF check failed</title>
|     <script>
|     document ).ready(function() {
|     $.ajaxSetup({
|     'beforeSend': function(xhr) {
|     xhr.setRequestHeader("X-CSRFToken", "My90bnB5NGlBV2Z6N1pvNEVWMzR0UT09" );
|     </script>
|     </head>
|     <body>
|_    <p>CSRF check failed. Your form s
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.95%I=7%D=2/15%Time=67B040B5%P=x86_64-pc-linux-gnu%r(GetR
SF:equest,94,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
SF:ps:///\r\nContent-Length:\x200\r\nConnection:\x20close\r\nDate:\x20Sat,
SF:\x2015\x20Feb\x202025\x2007:22:31\x20GMT\r\nServer:\x20OPNsense\r\n\r\n
SF:")%r(HTTPOptions,94,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nLocati
SF:on:\x20https:///\r\nContent-Length:\x200\r\nConnection:\x20close\r\nDat
SF:e:\x20Sat,\x2015\x20Feb\x202025\x2007:22:31\x20GMT\r\nServer:\x20OPNsen
SF:se\r\n\r\n")%r(RTSPRequest,1ED,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nC
SF:ontent-Type:\x20text/html\r\nContent-Length:\x20345\r\nConnection:\x20c
SF:lose\r\nDate:\x20Sat,\x2015\x20Feb\x202025\x2007:22:32\x20GMT\r\nServer
SF::\x20OPNsense\r\n\r\n<\?xml\x20version=\"1\.0\"\x20encoding=\"iso-8859-
SF:1\"\?>\n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XHTML\x201\.0\x
SF:20Transitional//EN\"\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\"http://www\
SF:.w3\.org/TR/xhtml1/DTD/xhtml1-transitional\.dtd\">\n<html\x20xmlns=\"ht
SF:tp://www\.w3\.org/1999/xhtml\"\x20xml:lang=\"en\"\x20lang=\"en\">\n\x20
SF:<head>\n\x20\x20<title>400\x20Bad\x20Request</title>\n\x20</head>\n\x20
SF:<body>\n\x20\x20<h1>400\x20Bad\x20Request</h1>\n\x20</body>\n</html>\n"
SF:)%r(FourOhFourRequest,B3,"HTTP/1\.0\x20301\x20Moved\x20Permanently\r\nL
SF:ocation:\x20https:///nice%20ports%2C/Trinity\.txt\.bak\r\nContent-Lengt
SF:h:\x200\r\nConnection:\x20close\r\nDate:\x20Sat,\x2015\x20Feb\x202025\x
SF:2007:22:39\x20GMT\r\nServer:\x20OPNsense\r\n\r\n")%r(GenericLines,1ED,"
SF:HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html\r\nCon
SF:tent-Length:\x20345\r\nConnection:\x20close\r\nDate:\x20Sat,\x2015\x20F
SF:eb\x202025\x2007:22:40\x20GMT\r\nServer:\x20OPNsense\r\n\r\n<\?xml\x20v
SF:ersion=\"1\.0\"\x20encoding=\"iso-8859-1\"\?>\n<!DOCTYPE\x20html\x20PUB
SF:LIC\x20\"-//W3C//DTD\x20XHTML\x201\.0\x20Transitional//EN\"\n\x20\x20\x
SF:20\x20\x20\x20\x20\x20\x20\"http://www\.w3\.org/TR/xhtml1/DTD/xhtml1-tr
SF:ansitional\.dtd\">\n<html\x20xmlns=\"http://www\.w3\.org/1999/xhtml\"\x
SF:20xml:lang=\"en\"\x20lang=\"en\">\n\x20<head>\n\x20\x20<title>400\x20Ba
SF:d\x20Request</title>\n\x20</head>\n\x20<body>\n\x20\x20<h1>400\x20Bad\x
SF:20Request</h1>\n\x20</body>\n</html>\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.95%T=SSL%I=7%D=2/15%Time=67B040C1%P=x86_64-pc-linux-gnu
SF:%r(GetRequest,9D8,"HTTP/1\.0\x20200\x20OK\r\nSet-Cookie:\x20PHPSESSID=b
SF:1410e699c716a7676be88342c62537b;\x20path=/;\x20secure;\x20HttpOnly\r\nS
SF:et-Cookie:\x20PHPSESSID=b1410e699c716a7676be88342c62537b;\x20path=/;\x2
SF:0secure;\x20HttpOnly\r\nExpires:\x20Thu,\x2019\x20Nov\x201981\x2008:52:
SF:00\x20GMT\r\nCache-Control:\x20no-store,\x20no-cache,\x20must-revalidat
SF:e\r\nPragma:\x20no-cache\r\nContent-Security-Policy:\x20default-src\x20
SF:'self';\x20script-src\x20'self'\x20'unsafe-inline'\x20'unsafe-eval';\x2
SF:0style-src\x20'self'\x20'unsafe-inline'\x20'unsafe-eval';\r\nX-Frame-Op
SF:tions:\x20SAMEORIGIN\r\nX-Content-Type-Options:\x20nosniff\r\nX-XSS-Pro
SF:tection:\x201;\x20mode=block\r\nReferrer-Policy:\x20same-origin\r\nCont
SF:ent-type:\x20text/html;\x20charset=UTF-8\r\nContent-Length:\x201823\r\n
SF:Connection:\x20close\r\nDate:\x20Sat,\x2015\x20Feb\x202025\x2007:22:38\
SF:x20GMT\r\nServer:\x20OPNsense\r\n\r\n<!doctype\x20html>\n<!--\[if\x20IE
SF:\x208\x20\]><html\x20lang=\"en\"\x20class=\"ie\x20ie8\x20lte9\x20lte8\x
SF:20no-js\"><!\[endif\]-->\n<!--\[if\x20IE\x209\x20\]><html\x20lang=\"en\
SF:"\x20class=\"ie\x20ie9\x20lte9\x20no-js\"><!\[endif\]-->\n<!--\[if\x20\
SF:(gt\x20IE\x209\)\|!\(IE\)\]><!--><html\x20lang=\"")%r(HTTPOptions,3E6,"
SF:HTTP/1\.0\x20403\x20Forbidden\r\nSet-Cookie:\x20PHPSESSID=aaa80fd017d7c
SF:48661c00b27254d39f7;\x20path=/;\x20secure;\x20HttpOnly\r\nSet-Cookie:\x
SF:20PHPSESSID=aaa80fd017d7c48661c00b27254d39f7;\x20path=/;\x20secure;\x20
SF:HttpOnly\r\nExpires:\x20Thu,\x2019\x20Nov\x201981\x2008:52:00\x20GMT\r\
SF:nCache-Control:\x20no-store,\x20no-cache,\x20must-revalidate\r\nPragma:
SF:\x20no-cache\r\nContent-type:\x20text/html;\x20charset=UTF-8\r\nContent
SF:-Length:\x20563\r\nConnection:\x20close\r\nDate:\x20Sat,\x2015\x20Feb\x
SF:202025\x2007:22:44\x20GMT\r\nServer:\x20OPNsense\r\n\r\n<html><head><ti
SF:tle>CSRF\x20check\x20failed</title>\n\x20\x20\x20\x20\x20\x20\x20\x20\x
SF:20\x20\x20\x20<script>\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x2
SF:0\x20\x20\$\(\x20document\x20\)\.ready\(function\(\)\x20{\n\x20\x20\x20
SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\$\.ajaxSet
SF:up\({\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20
SF:\x20\x20'beforeSend':\x20function\(xhr\)\x20{\n\x20\x20\x20\x20\x20\x20
SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20xhr\.se
SF:tRequestHeader\(\"X-CSRFToken\",\x20\"My90bnB5NGlBV2Z6N1pvNEVWMzR0UT09\
SF:"\x20\);\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20\x20}\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\
SF:x20\x20}\);\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20}\
SF:);\n\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20</script>\n\x20\x20
SF:\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20</head>\n\x20\x20\x20\x20\x20\x
SF:20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<body>\n\x20\x20\x20\
SF:x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20\x20<p>CSRF\x20c
SF:heck\x20failed\.\x20Your\x20form\x20s");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host

TRACEROUTE
HOP RTT       ADDRESS
1   239.61 ms 192.168.110.1

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 235.07 seconds

Last updated