Puertos
Duración
Fecha
IP
Nmap scan report for new.land.naver.com (210.89.168.65) Host is up (0.13s latency). Other addresses for new.land.naver.com (not scanned): 210.89.168.33 110.93.151.131 110.93.151.161 Not shown: 971 filtered tcp ports (no-response), 27 closed tcp ports (reset) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, SSLSessionReq, TerminalServerCookie, X11Probe: | HTTP/1.1 400 Bad request | Content-length: 90 | Cache-Control: no-cache | Connection: close | Content-Type: text/html | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. |_ </body></html> |_http-title: Did not follow redirect to https://new.land.naver.com/ 443/tcp open ssl/https nfront | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, SSLSessionReq, TerminalServerCookie, tor-versions: | HTTP/1.1 400 Bad request | Content-length: 90 | Cache-Control: no-cache | Connection: close | Content-Type: text/html | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. |_ </body></html> | http-robots.txt: 1 disallowed entry |_/ | http-title: \xEB\x84\xA4\xEC\x9D\xB4\xEB\xB2\x84\xED\x8E\x98\xEC\x9D\xB4 \xEB\xB6\x80\xEB\x8F\x99\xEC\x82\xB0 |_Requested resource was https://new.land.naver.com/complexes |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=*.land.naver.com/organizationName=NAVER Corp./stateOrProvinceName=Gyeonggi-do/countryName=KR | Subject Alternative Name: DNS:*.land.naver.com | Not valid before: 2024-05-23T00:00:00 |_Not valid after: 2025-06-03T23:59:59 | tls-alpn: | h2 |_ http/1.1 |_http-server-header: nfront 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=12/25%Time=676C3442%P=x86_64-redhat-linux-gnu%r SF:(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x20 SF:90\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Typ SF:e:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour SF:\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></html>\n")%r SF:(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x20 SF:90\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Typ SF:e:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYour SF:\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></html>\n")%r SF:(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent SF:-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\ SF:nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20reques SF:t</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body>< SF:/html>\n")%r(DNSStatusRequestTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request SF:\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\ SF:x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Ba SF:d\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\ SF:.\n</body></html>\n")%r(Help,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\n SF:Content-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20c SF:lose\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x2 SF:0request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n< SF:/body></html>\n")%r(SSLSessionReq,CF,"HTTP/1\.1\x20400\x20Bad\x20reques SF:t\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection: SF:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20B SF:ad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request SF:\.\n</body></html>\n")%r(TerminalServerCookie,CF,"HTTP/1\.1\x20400\x20B SF:ad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\ SF:nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body> SF:<h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invali SF:d\x20request\.\n</body></html>\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=12/25%Time=676C343F%P=x86_64-redhat-linu SF:x-gnu%r(tor-versions,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent- SF:length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n SF:Content-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request SF:</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></ SF:html>\n")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent- SF:length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n SF:Content-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Bad\x20request SF:</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></ SF:html>\n")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request SF:\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\ SF:x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>400\x20Ba SF:d\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\ SF:.\n</body></html>\n")%r(DNSStatusRequestTCP,CF,"HTTP/1\.1\x20400\x20Bad SF:\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nC SF:onnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h SF:1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\ SF:x20request\.\n</body></html>\n")%r(Help,CF,"HTTP/1\.1\x20400\x20Bad\x20 SF:request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConne SF:ction:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body><h1>40 SF:0\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20r SF:equest\.\n</body></html>\n")%r(SSLSessionReq,CF,"HTTP/1\.1\x20400\x20Ba SF:d\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\n SF:Connection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n<html><body>< SF:h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid SF:\x20request\.\n</body></html>\n")%r(TerminalServerCookie,CF,"HTTP/1\.1\ SF:x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20 SF:no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n< SF:html><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20a SF:n\x20invalid\x20request\.\n</body></html>\n"); Device type: general purpose|WAP Running (JUST GUESSING): Linux 3.X|4.X (90%), Asus embedded (85%) OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:asus:rt-n56u cpe:/o:linux:linux_kernel:3.4 Aggressive OS guesses: Linux 3.2 - 4.9 (90%), Linux 4.10 (90%), Linux 3.16 (87%), Linux 4.4 (86%), Linux 3.2 - 3.16 (86%), ASUS RT-N56U WAP (Linux 3.4) (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 12 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.23 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 2.11 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.43 ms 206.72.211.139.any2ix.coresite.com (206.72.211.139) 5 574.10 ms 112.174.87.101 6 124.37 ms 112.174.91.165 7 132.05 ms 112.174.92.98 8 127.46 ms 203.234.255.78 9 ... 11 12 129.44 ms 210.89.168.65 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 74.15 seconds