Escanear informe para "lilithgame.com"

Nivel de membresía: Miembro gratuito
Sumario

Puertos

10

Duración

10mín. 14.53segunda (614.53segunda)

Fecha

2023-10-30

IP

106.75.49.72

Informar
Escanea la información del sistema operativo y Traceroute (nmap -A lilithgame.com)
Nmap scan report for lilithgame.com (106.75.49.72)
Host is up (0.18s latency).
Not shown: 990 closed ports
PORT     STATE    SERVICE        VERSION
80/tcp   open     http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:12 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:10 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:11 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:11 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-title: Did not follow redirect to http://www.lilithgame.com/
135/tcp  filtered msrpc
139/tcp  filtered netbios-ssn
443/tcp  open     ssl/https
| fingerprint-strings: 
|   FourOhFourRequest, HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:18 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:17 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:19 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-title: Did not follow redirect to http://www.lilithgame.com/
| ssl-cert: Subject: commonName=*.lilithgames.com
| Subject Alternative Name: DNS:*.lilithgames.com, DNS:lilithgames.com
| Not valid before: 2020-07-27T03:32:46
|_Not valid after:  2022-09-19T04:41:00
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
445/tcp  filtered microsoft-ds
593/tcp  filtered http-rpc-epmap
4444/tcp filtered krb524
5800/tcp filtered vnc-http
5900/tcp filtered vnc
8080/tcp open     http-proxy
| fingerprint-strings: 
|   FourOhFourRequest, HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:11 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:10 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   Socks5: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:12 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-title: lilith sgame
3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=10/30%Time=653F781A%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\x2
SF:030\x20Oct\x202023\x2009:32:10\x20GMT\r\nContent-Type:\x20text/html\r\n
SF:Content-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML
SF:\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head>
SF:<title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white
SF:\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x20
SF:a\x20request\x20that\x20this\x20server\x20could\x20not\x20understand\.<
SF:/body>\r\n</html>\r\n")%r(HTTPOptions,174,"HTTP/1\.1\x20400\x20Bad\x20R
SF:equest\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nCont
SF:ent-Type:\x20text/html\r\nContent-Length:\x20242\r\nConnection:\x20clos
SF:e\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0/
SF:/EN\">\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r
SF:\n<body\x20bgcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Y
SF:our\x20browser\x20sent\x20a\x20request\x20that\x20this\x20server\x20cou
SF:ld\x20not\x20understand\.</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<ht
SF:ml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<
SF:center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\
SF:n")%r(X11Probe,FC,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\
SF:x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nContent-Type:\x20text/html\r
SF:\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head
SF:><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>4
SF:00\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(FourOh
SF:FourRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\x2
SF:030\x20Oct\x202023\x2009:32:12\x20GMT\r\nContent-Type:\x20text/html\r\n
SF:Content-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML
SF:\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head>
SF:<title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white
SF:\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x20
SF:a\x20request\x20that\x20this\x20server\x20could\x20not\x20understand\.<
SF:/body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=10/30%Time=653F7820%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20
SF:Mon,\x2030\x20Oct\x202023\x2009:32:17\x20GMT\r\nContent-Type:\x20text/h
SF:tml\r\nContent-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\
SF:x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\
SF:n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=
SF:\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20s
SF:ent\x20a\x20request\x20that\x20this\x20server\x20could\x20not\x20unders
SF:tand\.</body>\r\n</html>\r\n")%r(HTTPOptions,174,"HTTP/1\.1\x20400\x20B
SF:ad\x20Request\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:18\x20GMT\
SF:r\nContent-Type:\x20text/html\r\nContent-Length:\x20242\r\nConnection:\
SF:x20close\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x
SF:202\.0//EN\">\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></
SF:head>\r\n<body\x20bgcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\
SF:r\n<p>Your\x20browser\x20sent\x20a\x20request\x20that\x20this\x20server
SF:\x20could\x20not\x20understand\.</body>\r\n</html>\r\n")%r(FourOhFourRe
SF:quest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\x2030\x2
SF:0Oct\x202023\x2009:32:18\x20GMT\r\nContent-Type:\x20text/html\r\nConten
SF:t-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML\x20PU
SF:BLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head><title
SF:>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\
SF:n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x20a\x20r
SF:equest\x20that\x20this\x20server\x20could\x20not\x20understand\.</body>
SF:\r\n</html>\r\n")%r(tor-versions,FC,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:19\x20GMT\r\nContent-Ty
SF:pe:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\
SF:r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body
SF:>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</ht
SF:ml>\r\n")%r(RTSPRequest,7A,"<html>\r\n<head><title>400\x20Bad\x20Reques
SF:t</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></c
SF:enter>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8080-TCP:V=7.70%I=7%D=10/30%Time=653F781A%P=x86_64-redhat-linux-gnu
SF:%r(GetRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\
SF:x2030\x20Oct\x202023\x2009:32:10\x20GMT\r\nContent-Type:\x20text/html\r
SF:\nContent-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HT
SF:ML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<hea
SF:d><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"whi
SF:te\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x
SF:20a\x20request\x20that\x20this\x20server\x20could\x20not\x20understand\
SF:.</body>\r\n</html>\r\n")%r(HTTPOptions,174,"HTTP/1\.1\x20400\x20Bad\x2
SF:0Request\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nCo
SF:ntent-Type:\x20text/html\r\nContent-Length:\x20242\r\nConnection:\x20cl
SF:ose\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.
SF:0//EN\">\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>
SF:\r\n<body\x20bgcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p
SF:>Your\x20browser\x20sent\x20a\x20request\x20that\x20this\x20server\x20c
SF:ould\x20not\x20understand\.</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<
SF:html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\
SF:n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\
SF:r\n")%r(FourOhFourRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDa
SF:te:\x20Mon,\x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nContent-Type:\x2
SF:0text/html\r\nContent-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!D
SF:OCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<h
SF:tml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20b
SF:gcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20brows
SF:er\x20sent\x20a\x20request\x20that\x20this\x20server\x20could\x20not\x2
SF:0understand\.</body>\r\n</html>\r\n")%r(Socks5,FC,"HTTP/1\.1\x20400\x20
SF:Bad\x20Request\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:12\x20GMT
SF:\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:
SF:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></
SF:head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<
SF:/body>\r\n</html>\r\n");
Aggressive OS guesses: Linux 3.1 (94%), Linux 3.2 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Linux 2.6.32 (92%), Linux 2.6.39 - 3.2 (92%), Linux 3.1 - 3.2 (92%), Linux 3.11 (92%), Linux 3.2 - 4.9 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

TRACEROUTE (using port 22/tcp)
HOP RTT       ADDRESS
1   0.25 ms   208.76.251.177
2   0.53 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.64 ms   multacom.com (96.45.162.9)
4   0.34 ms   182.54.129.90
5   9.72 ms   10.31.0.238
6   177.74 ms 219.158.33.77
7   180.70 ms 219.158.96.41
8   175.40 ms 219.158.3.141
9   173.50 ms 219.158.5.149
10  176.73 ms 202.96.12.114
11  175.68 ms 61.148.146.110
12  178.63 ms 123.125.128.234
13  ... 16
17  189.92 ms 106.75.49.72

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 614.53 seconds
Esquema de color
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Informe detallado
Objetivo
IP de destino
106.75.49.72
Estado de host
ARRIBA
País de destino
La ubicación de la IP de destino es China
China
Escaneo gratuito
Escaneo gratuito
Método de escaneo
Escanea la información del sistema operativo y Traceroute
Estado del escaneo
Se identificaron 10 puertos
Comando
nmap -A lilithgame.com
Fecha de escaneo
30 Oct 2023 05:33
API - Scan ID
Duración del escaneo
10mín. 14.53segunda (614.53segunda)
Descargar resultado
Eliminar resultado de escaneo
$
Escaneos totales
Escanear más
Precios

PROFESIONAL


  • 5 escaneos/día
  • Llamadas API diarias - 100 000 solicitudes
  • Guardar registro
  • Escaneo público
  • Escaneo OSINT
  • Escaneo no listado
  • Escaneo privado
  • Sin ads
  • Eliminar resultado de escaneo
  • Quitar después de escanear
  • Métodos adicionales para escanear
$0.75$7.50/mes
Facturado anualmente @ $9.00$90.00 90% de descuento
Hazte profesional

REGISTRADA


  • 5 escaneos/día
  • Llamadas API diarias - 20 solicitudes
  • Guardar registro
  • Escaneo público
  • Escaneo OSINT
  • Escaneo no listado
  • Escaneo privado
  • Sin ads
  • Eliminar resultado de escaneo
  • Quitar después de escanear
  • Métodos adicionales para escanear
$0/toda la vida
 
Registrarse
Anfitrión de escaneo
Algunos cortafuegos bloquean los escaneos de puertos. Para obtener verdaderos resultados positivos, agregue las direcciones IP de portscanner.online (208.76.253.232-208.76.253.239 o CIDR 208.76.253.232/29) a la lista blanca
[scan_method]
Visibilidad:
Método de escaneo: