Ports
Durée
Date
IP
Nmap scan report for sodatafeed.vps.com.vn (13.213.212.71) Host is up (0.17s latency). Other addresses for sodatafeed.vps.com.vn (not scanned): 13.250.93.4 rDNS record for 13.213.212.71: ec2-13-213-212-71.ap-southeast-1.compute.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp closed http 443/tcp open ssl/https |_http-title: Site doesn't have a title. | ssl-cert: Subject: commonName=*.vps.com.vn/organizationName=VPS Securities Joint Stock Company/stateOrProvinceName=Hanoi/countryName=VN | Subject Alternative Name: DNS:*.vps.com.vn, DNS:vps.com.vn | Not valid before: 2024-03-11T03:41:02 |_Not valid after: 2025-04-12T03:41:01 | tls-nextprotoneg: | h2 |_ http/1.1 | fingerprint-strings: | GetRequest: | HTTP/1.1 200 OK | Date: Sun, 20 Oct 2024 00:49:09 GMT | Content-Length: 0 | Connection: close | Set-Cookie: AWSALB=1XX+6aRqC14E0XmdmEi6Bh32ZbZqrH+vnZeomF8E2RyuHg6I3roTVtz4XpYe/56LZCixw3NY9yD0STcj7INQfeOo8U+UA+svg5idzu5jQna0fuZaVT8PmMYxAi54; Expires=Sun, 27 Oct 2024 00:49:09 GMT; Path=/ | Set-Cookie: AWSALBCORS=1XX+6aRqC14E0XmdmEi6Bh32ZbZqrH+vnZeomF8E2RyuHg6I3roTVtz4XpYe/56LZCixw3NY9yD0STcj7INQfeOo8U+UA+svg5idzu5jQna0fuZaVT8PmMYxAi54; Expires=Sun, 27 Oct 2024 00:49:09 GMT; Path=/; SameSite=None; Secure | Content-Security-Policy: default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests | Cross-Origin-Opener-Policy: same-origin | Cross-Origin-Resource-Policy: same-origin | Origin-Agent-Cluster: ?1 | Referrer- | HTTPOptions: | HTTP/1.1 200 OK | Date: Sun, 20 Oct 2024 00:49:09 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 8 | Connection: close | Set-Cookie: AWSALB=rfZ605bDXXKJc698F6dj2A1VB7FhQlQ8Sp4WMv13whGNfgY3yeERUFTfo4DRAJC2JoK0R0z5vY2Sdei5WAVmJ5p1pDXAaf/3sOkNtoe+SRHID7sVCTCH/CxtN8zg; Expires=Sun, 27 Oct 2024 00:49:09 GMT; Path=/ | Set-Cookie: AWSALBCORS=rfZ605bDXXKJc698F6dj2A1VB7FhQlQ8Sp4WMv13whGNfgY3yeERUFTfo4DRAJC2JoK0R0z5vY2Sdei5WAVmJ5p1pDXAaf/3sOkNtoe+SRHID7sVCTCH/CxtN8zg; Expires=Sun, 27 Oct 2024 00:49:09 GMT; Path=/; SameSite=None; Secure | Content-Security-Policy: default-src 'self';base-uri 'self';font-src 'self' https: data:;form-action 'self';frame-ancestors 'self';img-src 'self' data:;object-src 'none';script-src 'self';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests | Cross-Origin-Opener-Policy: same-origin |_ Cross-Origin-Resource-Policy: same-ori | tls-alpn: | h2 |_ http/1.1 |_ssl-date: TLS randomness does not represent time 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=10/19%Time=67145384%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,490,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Sun,\x2020\x SF:20Oct\x202024\x2000:49:09\x20GMT\r\nContent-Length:\x200\r\nConnection: SF:\x20close\r\nSet-Cookie:\x20AWSALB=1XX\+6aRqC14E0XmdmEi6Bh32ZbZqrH\+vnZ SF:eomF8E2RyuHg6I3roTVtz4XpYe/56LZCixw3NY9yD0STcj7INQfeOo8U\+UA\+svg5idzu5 SF:jQna0fuZaVT8PmMYxAi54;\x20Expires=Sun,\x2027\x20Oct\x202024\x2000:49:09 SF:\x20GMT;\x20Path=/\r\nSet-Cookie:\x20AWSALBCORS=1XX\+6aRqC14E0XmdmEi6Bh SF:32ZbZqrH\+vnZeomF8E2RyuHg6I3roTVtz4XpYe/56LZCixw3NY9yD0STcj7INQfeOo8U\+ SF:UA\+svg5idzu5jQna0fuZaVT8PmMYxAi54;\x20Expires=Sun,\x2027\x20Oct\x20202 SF:4\x2000:49:09\x20GMT;\x20Path=/;\x20SameSite=None;\x20Secure\r\nContent SF:-Security-Policy:\x20default-src\x20'self';base-uri\x20'self';font-src\ SF:x20'self'\x20https:\x20data:;form-action\x20'self';frame-ancestors\x20' SF:self';img-src\x20'self'\x20data:;object-src\x20'none';script-src\x20'se SF:lf';script-src-attr\x20'none';style-src\x20'self'\x20https:\x20'unsafe- SF:inline';upgrade-insecure-requests\r\nCross-Origin-Opener-Policy:\x20sam SF:e-origin\r\nCross-Origin-Resource-Policy:\x20same-origin\r\nOrigin-Agen SF:t-Cluster:\x20\?1\r\nReferrer-")%r(HTTPOptions,4FA,"HTTP/1\.1\x20200\x2 SF:0OK\r\nDate:\x20Sun,\x2020\x20Oct\x202024\x2000:49:09\x20GMT\r\nContent SF:-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x208\r\nConnec SF:tion:\x20close\r\nSet-Cookie:\x20AWSALB=rfZ605bDXXKJc698F6dj2A1VB7FhQlQ SF:8Sp4WMv13whGNfgY3yeERUFTfo4DRAJC2JoK0R0z5vY2Sdei5WAVmJ5p1pDXAaf/3sOkNto SF:e\+SRHID7sVCTCH/CxtN8zg;\x20Expires=Sun,\x2027\x20Oct\x202024\x2000:49: SF:09\x20GMT;\x20Path=/\r\nSet-Cookie:\x20AWSALBCORS=rfZ605bDXXKJc698F6dj2 SF:A1VB7FhQlQ8Sp4WMv13whGNfgY3yeERUFTfo4DRAJC2JoK0R0z5vY2Sdei5WAVmJ5p1pDXA SF:af/3sOkNtoe\+SRHID7sVCTCH/CxtN8zg;\x20Expires=Sun,\x2027\x20Oct\x202024 SF:\x2000:49:09\x20GMT;\x20Path=/;\x20SameSite=None;\x20Secure\r\nContent- SF:Security-Policy:\x20default-src\x20'self';base-uri\x20'self';font-src\x SF:20'self'\x20https:\x20data:;form-action\x20'self';frame-ancestors\x20's SF:elf';img-src\x20'self'\x20data:;object-src\x20'none';script-src\x20'sel SF:f';script-src-attr\x20'none';style-src\x20'self'\x20https:\x20'unsafe-i SF:nline';upgrade-insecure-requests\r\nCross-Origin-Opener-Policy:\x20same SF:-origin\r\nCross-Origin-Resource-Policy:\x20same-ori"); Aggressive OS guesses: Linux 2.6.32 - 3.13 (91%), Linux 2.6.32 (88%), Linux 3.2 - 4.9 (88%), Linux 2.6.32 - 3.10 (87%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (86%), Linux 5.0 - 5.4 (86%), Linux 5.1 (86%), Ubiquiti Pico Station WAP (AirOS 5.2.6) (86%), HP P2000 G3 NAS device (86%), Linux 3.7 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 16 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 22.13 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.63 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.72 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 1.30 ms be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102) 6 102.67 ms be2894.ccr72.tyo01.atlas.cogentco.com (154.54.1.22) 7 ... 15 16 173.43 ms ec2-13-213-212-71.ap-southeast-1.compute.amazonaws.com (13.213.212.71) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 67.23 seconds