The remote host may give an attacker information useful for future attacks.
The remote host is running Big Sister network monitoring software. Big Sister gives anonymous users quite a bit of information regarding critical servers, uptime, response times, and more. An attacker accessing these pages would be able to map out potential targets
Use ACLs or firewalls to prevent network-based access.