Nmap scan report for get.aplaut.io (5.188.162.75) Host is up (0.17s latency). Other addresses for get.aplaut.io (not scanned): 178.132.201.211 93.90.218.249 188.246.230.93 46.182.28.147 Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | http-title: \xD0\xA3 \xD0\xBD\xD0\xB0\xD1\x81 \xD0\xBD\xD0\xB5\xD1\x82 \xD1\x81\xD1\x82\xD1\x80\xD0\xB0\xD0\xBD\xD0\xB8\xD1\x86\xD1\x8B, \xD0\xBA\xD0\xBE\xD1\x82\xD0\xBE\xD1\x80\xD1\x83\xD1\x8E \xD0\xB2\xD1\x8B \xD0\xBF\xD1\x8B\xD1\x82\xD0... |_Requested resource was http://get.aplaut.io/b | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck: | HTTP/1.1 400 Bad Request | Date: Tue, 10 Jun 2025 16:15:15 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 163 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
openresty/1.19.3.1
| | | Help: | HTTP/1.1 400 Bad Request | Date: Tue, 10 Jun 2025 16:15:16 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 163 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
openresty/1.19.3.1
| | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

|
openresty/1.19.3.1
| | | X11Probe: | HTTP/1.1 400 Bad Request | Date: Tue, 10 Jun 2025 16:15:09 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 163 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
openresty/1.19.3.1
| |_ 443/tcp open ssl/https | fingerprint-strings: | DNSStatusRequestTCP, Help: | HTTP/1.1 400 Bad Request | Date: Tue, 10 Jun 2025 16:15:25 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 163 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
openresty/1.19.3.1
| | | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | Date: Tue, 10 Jun 2025 16:15:24 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 163 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
openresty/1.19.3.1
| | | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Tue, 10 Jun 2025 16:15:23 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 163 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
openresty/1.19.3.1
| | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

|
openresty/1.19.3.1
| | | tor-versions: | HTTP/1.1 400 Bad Request | Date: Tue, 10 Jun 2025 16:15:16 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 163 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
openresty/1.19.3.1
| |_ | http-title: \xD0\xA3 \xD0\xBD\xD0\xB0\xD1\x81 \xD0\xBD\xD0\xB5\xD1\x82 \xD1\x81\xD1\x82\xD1\x80\xD0\xB0\xD0\xBD\xD0\xB8\xD1\x86\xD1\x8B, \xD0\xBA\xD0\xBE\xD1\x82\xD0\xBE\xD1\x80\xD1\x83\xD1\x8E \xD0\xB2\xD1\x8B \xD0\xBF\xD1\x8B\xD1\x82\xD0... |_Requested resource was https://get.aplaut.io/b | tls-nextprotoneg: | h2 |_ http/1.1 | ssl-cert: Subject: commonName=aplaut.io | Subject Alternative Name: DNS:*.aplaut-mail.com, DNS:*.aplaut.com, DNS:*.aplaut.io, DNS:*.aplaut.net, DNS:*.aplaut.ru, DNS:*.aplaut.tech, DNS:*.internal.aplaut.net, DNS:*.sf.aplaut.net, DNS:*.shoppilot.ru, DNS:*.staging-old.aplaut.net, DNS:*.staging.aplaut.net, DNS:aplaut-mail.com, DNS:aplaut.com, DNS:aplaut.io, DNS:aplaut.net, DNS:aplaut.ru, DNS:aplaut.tech, DNS:shoppilot.ru | Not valid before: 2025-04-22T06:49:06 |_Not valid after: 2025-07-21T06:49:05 | tls-alpn: | h2 |_ http/1.1 |_ssl-date: TLS randomness does not represent time 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=6/10%Time=68485A0C%P=x86_64-redhat-linux-gnu%r( SF:RTSPRequest,A3,"\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
openresty/1\.19\.3\.1
\r\n\r\n\r\n")%r( SF:X11Probe,134,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2010 SF:\x20Jun\x202025\x2016:15:09\x20GMT\r\nContent-Type:\x20text/html;\x20ch SF:arset=utf-8\r\nContent-Length:\x20163\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n SF:

400\x20Bad\x20Request

\r\n
openrest SF:y/1\.19\.3\.1
\r\n\r\n\r\n")%r(RPCCheck,134,"HTTP SF:/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2010\x20Jun\x202025\x2 SF:016:15:15\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nCon SF:tent-Length:\x20163\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x2 SF:0Bad\x20Request

\r\n
openresty/1\.19\.3\.1\r\n\r\n\r\n")%r(DNSVersionBindReqTCP,134,"HTTP/1\.1\ SF:x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2010\x20Jun\x202025\x2016:15 SF::15\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-L SF:ength:\x20163\r\nConnection:\x20close\r\n\r\n\r\n400 SF:\x20Bad\x20Request\r\n\r\n

400\x20Bad\x SF:20Request

\r\n
openresty/1\.19\.3\.1
\r SF:\n\r\n\r\n")%r(DNSStatusRequestTCP,134,"HTTP/1\.1\x20400\ SF:x20Bad\x20Request\r\nDate:\x20Tue,\x2010\x20Jun\x202025\x2016:15:15\x20 SF:GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\ SF:x20163\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad SF:\x20Request\r\n\r\n

400\x20Bad\x20Reque SF:st

\r\n
openresty/1\.19\.3\.1
\r\n\r\n\r\n")%r(Help,134,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nD SF:ate:\x20Tue,\x2010\x20Jun\x202025\x2016:15:16\x20GMT\r\nContent-Type:\x SF:20text/html;\x20charset=utf-8\r\nContent-Length:\x20163\r\nConnection:\ SF:x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
openresty/1\.19\.3\.1
\r\n\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=6/10%Time=68485A14%P=x86_64-redhat-linux SF:-gnu%r(tor-versions,134,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x2 SF:0Tue,\x2010\x20Jun\x202025\x2016:15:16\x20GMT\r\nContent-Type:\x20text/ SF:html;\x20charset=utf-8\r\nContent-Length:\x20163\r\nConnection:\x20clos SF:e\r\n\r\n\r\n400\x20Bad\x20Request\r\ SF:n\r\n

400\x20Bad\x20Request

\r\n
openresty/1\.19\.3\.1
\r\n\r\n\r\n")%r(RTSPReq SF:uest,A3,"\r\n400\x20Bad\x20Request\r\ SF:n\r\n

400\x20Bad\x20Request

\r\n
openresty/1\.19\.3\.1\r\n\r\n\r\n")%r(RPCChec SF:k,134,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2010\x20Jun SF:\x202025\x2016:15:23\x20GMT\r\nContent-Type:\x20text/html;\x20charset=u SF:tf-8\r\nContent-Length:\x20163\r\nConnection:\x20close\r\n\r\n\r\ SF:n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
openresty/1\.19 SF:\.3\.1
\r\n\r\n\r\n")%r(DNSVersionBindReqTCP,134, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2010\x20Jun\x2020 SF:25\x2016:15:24\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r SF:\nContent-Length:\x20163\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

4 SF:00\x20Bad\x20Request

\r\n
openresty/1\.19\.3\.1 SF:
\r\n\r\n\r\n")%r(DNSStatusRequestTCP,134,"HTTP/1 SF:\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2010\x20Jun\x202025\x201 SF:6:15:25\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nConte SF:nt-Length:\x20163\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20B SF:ad\x20Request

\r\n
openresty/1\.19\.3\.1\r\n\r\n\r\n")%r(Help,134,"HTTP/1\.1\x20400\x20Bad\x20R SF:equest\r\nDate:\x20Tue,\x2010\x20Jun\x202025\x2016:15:25\x20GMT\r\nCont SF:ent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20163\r\nC SF:onnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request SF:\r\n\r\n

400\x20Bad\x20Request

\r\n
openresty/1\.19\.3\.1
\r\n\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|storage-misc Running (JUST GUESSING): Linux 4.X|5.X|2.6.X|3.X (93%), Synology DiskStation Manager 5.X (85%) OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/a:synology:diskstation_manager:5.2 Aggressive OS guesses: Linux 4.15 - 5.6 (93%), Linux 2.6.32 (93%), Linux 5.0 - 5.4 (93%), Linux 5.0 - 5.3 (92%), Linux 2.6.32 or 3.10 (91%), Linux 4.4 (91%), Linux 5.4 (90%), Linux 2.6.32 - 2.6.35 (90%), Linux 2.6.32 - 2.6.39 (89%), Linux 3.10 - 4.11 (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 16 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 217.25 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 2.02 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.86 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.39 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.92 ms lax-b22-link.ip.twelve99.net (213.248.103.170) 6 0.88 ms lax-bb2-link.ip.twelve99.net (62.115.140.156) 7 ... 8 156.29 ms atl-b24-link.ip.twelve99.net (62.115.140.32) 9 156.55 ms atl-bb2-link.ip.twelve99.net (62.115.143.236) 10 ... 11 12 156.57 ms sap-b4-link.ip.twelve99.net (62.115.115.247) 13 149.19 ms sto-bb2-link.ip.twelve99.net (62.115.139.172) 14 156.90 ms 92.53.93.73 15 158.74 ms 92.53.93.184 16 171.28 ms 5.188.162.75 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 76.07 seconds