Scan report for "ac.search.naver.com"
Scan OS information and Traceroute (nmap -A ac.search.naver.com)
Nmap scan report for ac.search.naver.com (223.130.200.117)
Host is up (0.14s latency).
Other addresses for ac.search.naver.com (not scanned): 223.130.192.99 223.130.192.97 223.130.200.116
Not shown: 971 filtered ports, 27 closed ports
PORT STATE SERVICE VERSION
80/tcp open http nginx (reverse proxy)
| http-robots.txt: 1 disallowed entry
|_/
|_http-title: 403 Forbidden
443/tcp open ssl/http nginx (reverse proxy)
| http-robots.txt: 1 disallowed entry
|_/
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=*.search.naver.com/organizationName=NAVER Corp./stateOrProvinceName=Gyeonggi-do/countryName=KR
| Subject Alternative Name: DNS:*.search.naver.com, DNS:search.naver.com
| Not valid before: 2023-05-08T00:00:00
|_Not valid after: 2024-06-07T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
| h2
|_ http/1.1
| tls-nextprotoneg:
| h2
|_ http/1.1
Device type: WAP|PBX|general purpose|broadband router
Running (JUST GUESSING): Asus embedded (86%), Linux 3.X|4.X (86%), Vodavi embedded (85%), Ruckus embedded (85%), Viasat embedded (85%)
OS CPE: cpe:/h:asus:rt-n56u cpe:/o:linux:linux_kernel:3.4 cpe:/h:vodavi:xts-ip cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:3.16 cpe:/h:ruckus:zoneflex_r710 cpe:/h:viasat:surfbeam_2
Aggressive OS guesses: ASUS RT-N56U WAP (Linux 3.4) (86%), Vodavi XTS-IP PBX (85%), Linux 4.4 (85%), Linux 3.16 (85%), Linux 3.2 (85%), Linux 3.2 - 3.10 (85%), Linux 3.2 - 3.16 (85%), Linux 3.4 (85%), Ruckus ZoneFlex R710 WAP (Linux 3.4) (85%), Viasat SurfBeam 2 satellite modem (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 62.44 ms 208.76.251.177
2 2.29 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.77 ms multacom.com (96.45.162.9)
4 0.42 ms dvs-networks.as9318.any2ix.coresite.com (206.72.210.167)
5 136.36 ms 10.222.1.98
6 ...
7 147.74 ms 110.9.3.19
8 ... 10
11 136.32 ms 223.130.200.117
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 958.86 seconds
Color Scheme
-
Target
-
Target IP
223.130.200.117
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A ac.search.naver.com
-
Scan date
20 Nov 2023 18:56
-
Copy scan report
-
Download report
-
Remove scan result
We use cookies to ensure you get the best experience on our website.
Cookie policy