# Nmap 7.94SVN scan initiated Mon Mar 3 16:32:10 2025 as: nmap --privileged -sV -p- -T4 -O --min-parallelism 100 --max-rtt-timeout 1s -oN /var/www/html/nmap/results/f3d1f91d-9c78-4ff4-b86f-e49d607cc6b6.txt bbc.co.uk Nmap scan report for bbc.co.uk (151.101.64.81) Host is up (0.0022s latency). Other addresses for bbc.co.uk (not scanned): 151.101.192.81 151.101.128.81 151.101.0.81 2a04:4e42::81 2a04:4e42:400::81 2a04:4e42:200::81 2a04:4e42:600::81 Not shown: 65533 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http Varnish 443/tcp open ssl/https Varnish 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.94SVN%I=7%D=3/3%Time=67C5D9E0%P=x86_64-pc-linux-gnu%r(Ge SF:tRequest,200,"HTTP/1\.1\x20500\x20Domain\x20Not\x20Found\r\nConnection: SF:\x20close\r\nContent-Length:\x20237\r\nServer:\x20Varnish\r\nRetry-Afte SF:r:\x200\r\ncontent-type:\x20text/html\r\nCache-Control:\x20private,\x20 SF:no-cache\r\nX-Served-By:\x20cache-ams21054-AMS\r\nAccept-Ranges:\x20byt SF:es\r\nDate:\x20Mon,\x2003\x20Mar\x202025\x2016:33:35\x20GMT\r\nVia:\x20 SF:1\.1\x20varnish\r\n\r\n\n\n
\nFastly\x20error:\x20unk SF:nown\x20domain:\x20\.\x20Please\x20check\x20that\x20this\x20domain\x20h SF:as\x20been\x20added\x20to\x20a\x20service\.
\nDetails:\x20cache-a SF:ms21054-AMS\x20\(151\.101\.64\.81\)
")%r(HTTPOptions,2 SF:00,"HTTP/1\.1\x20500\x20Domain\x20Not\x20Found\r\nConnection:\x20close\ SF:r\nContent-Length:\x20237\r\nServer:\x20Varnish\r\nRetry-After:\x200\r\ SF:ncontent-type:\x20text/html\r\nCache-Control:\x20private,\x20no-cache\r SF:\nX-Served-By:\x20cache-ams21033-AMS\r\nAccept-Ranges:\x20bytes\r\nDate SF::\x20Mon,\x2003\x20Mar\x202025\x2016:33:35\x20GMT\r\nVia:\x201\.1\x20va SF:rnish\r\n\r\n\n\n\nFastly\x20error:\x20unknown\x20do SF:main:\x20\.\x20Please\x20check\x20that\x20this\x20domain\x20has\x20been SF:\x20added\x20to\x20a\x20service\.
\nDetails:\x20cache-ams21033-AM SF:S\x20\(151\.101\.64\.81\)
")%r(RTSPRequest,94,"HTTP/1\ SF:.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\nContent-Length:\ SF:x2011\r\ncontent-type:\x20text/plain;\x20charset=utf-8\r\nx-served-by:\ SF:x20cache-ams21033\r\n\r\nBad\x20Request")%r(X11Probe,96,"HTTP/1\.1\x204 SF:00\x20Bad\x20Request\r\nConnection:\x20close\r\nContent-Length:\x2011\r SF:\ncontent-type:\x20text/plain;\x20charset=utf-8\r\nx-served-by:\x20cach SF:e-ams2100124\r\n\r\nBad\x20Request")%r(FourOhFourRequest,200,"HTTP/1\.1 SF:\x20500\x20Domain\x20Not\x20Found\r\nConnection:\x20close\r\nContent-Le SF:ngth:\x20237\r\nServer:\x20Varnish\r\nRetry-After:\x200\r\ncontent-type SF::\x20text/html\r\nCache-Control:\x20private,\x20no-cache\r\nX-Served-By SF::\x20cache-ams21032-AMS\r\nAccept-Ranges:\x20bytes\r\nDate:\x20Mon,\x20 SF:03\x20Mar\x202025\x2016:33:35\x20GMT\r\nVia:\x201\.1\x20varnish\r\n\r\n SF:\n\n\nFastly\x20error:\x20unknown\x20domain:\x20\.\x SF:20Please\x20check\x20that\x20this\x20domain\x20has\x20been\x20added\x20 SF:to\x20a\x20service\.
\nDetails:\x20cache-ams21032-AMS\x20\(151\.1 SF:01\.64\.81\)
"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.94SVN%T=SSL%I=7%D=3/3%Time=67C5D9E6%P=x86_64-pc-linux-g SF:nu%r(GetRequest,1BB,"HTTP/1\.1\x20421\x20Misdirected\x20Request\r\nConn SF:ection:\x20close\r\nContent-Length:\x20297\r\ncontent-type:\x20text/pla SF:in;\x20charset=utf-8\r\nx-served-by:\x20cache-ams21065\r\n\r\nRequested SF:\x20host\x20does\x20not\x20match\x20any\x20Subject\x20Alternative\x20Na SF:mes\x20\(SANs\)\x20on\x20TLS\x20certificate\x20\[7ccb348716e94e9f83ac23 SF:533d4648b0a3a69ede6bd4117e830122876855c81a\]\x20in\x20use\x20with\x20th SF:is\x20connection\.\r\n\r\nVisit\x20https://docs\.fastly\.com/en/guides/ SF:common-400-errors#error-421-misdirected-request\x20for\x20more\x20infor SF:mation\.\r\n\r")%r(HTTPOptions,1B5,"HTTP/1\.1\x20421\x20Misdirected\x20 SF:Request\r\nConnection:\x20close\r\nContent-Length:\x20291\r\ncontent-ty SF:pe:\x20text/plain;\x20charset=utf-8\r\nx-served-by:\x20cache-ams21054\r SF:\n\r\nRequested\x20host\x20does\x20not\x20match\x20any\x20Subject\x20Al SF:ternative\x20Names\x20\(SANs\)\x20on\x20TLS\x20certificate\x20\[7ccb348 SF:716e94e9f83ac23533d4648b0a3a69ede6bd4117e830122876855c81a\]\x20in\x20us SF:e\x20with\x20this\x20connection\.\r\n\r\nVisit\x20https://www\.fastly\. SF:com/documentation/guides/concepts/errors/#routing-errors\x20for\x20more SF:\x20information\.\r\n\r")%r(FourOhFourRequest,1BD,"HTTP/1\.1\x20421\x20 SF:Misdirected\x20Request\r\nConnection:\x20close\r\nContent-Length:\x2029 SF:7\r\ncontent-type:\x20text/plain;\x20charset=utf-8\r\nx-served-by:\x20c SF:ache-ams2100109\r\n\r\nRequested\x20host\x20does\x20not\x20match\x20any SF:\x20Subject\x20Alternative\x20Names\x20\(SANs\)\x20on\x20TLS\x20certifi SF:cate\x20\[7ccb348716e94e9f83ac23533d4648b0a3a69ede6bd4117e830122876855c SF:81a\]\x20in\x20use\x20with\x20this\x20connection\.\r\n\r\nVisit\x20http SF:s://docs\.fastly\.com/en/guides/common-400-errors#error-421-misdirected SF:-request\x20for\x20more\x20information\.\r\n\r")%r(tor-versions,94,"HTT SF:P/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\nContent-Leng SF:th:\x2011\r\ncontent-type:\x20text/plain;\x20charset=utf-8\r\nx-served- SF:by:\x20cache-ams21058\r\n\r\nBad\x20Request")%r(RTSPRequest,94,"HTTP/1\ SF:.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\nContent-Length:\ SF:x2011\r\ncontent-type:\x20text/plain;\x20charset=utf-8\r\nx-served-by:\ SF:x20cache-ams21039\r\n\r\nBad\x20Request"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): OpenBSD 4.X (88%), FreeBSD 8.X (85%) OS CPE: cpe:/o:openbsd:openbsd:4.0 cpe:/o:freebsd:freebsd:8.2 Aggressive OS guesses: OpenBSD 4.0 (88%), FreeBSD 8.2-RELEASE (85%) No exact OS matches for host (test conditions non-ideal). OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Mon Mar 3 16:33:47 2025 -- 1 IP address (1 host up) scanned in 96.81 seconds