Ports
Duration
Date
IP
Nmap scan report for ac.search.naver.com (223.130.200.117) Host is up (0.14s latency). Other addresses for ac.search.naver.com (not scanned): 223.130.192.99 223.130.192.97 223.130.200.116 Not shown: 971 filtered ports, 27 closed ports PORT STATE SERVICE VERSION 80/tcp open http nginx (reverse proxy) | http-robots.txt: 1 disallowed entry |_/ |_http-title: 403 Forbidden 443/tcp open ssl/http nginx (reverse proxy) | http-robots.txt: 1 disallowed entry |_/ |_http-title: 403 Forbidden | ssl-cert: Subject: commonName=*.search.naver.com/organizationName=NAVER Corp./stateOrProvinceName=Gyeonggi-do/countryName=KR | Subject Alternative Name: DNS:*.search.naver.com, DNS:search.naver.com | Not valid before: 2023-05-08T00:00:00 |_Not valid after: 2024-06-07T23:59:59 |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 | tls-nextprotoneg: | h2 |_ http/1.1 Device type: WAP|PBX|general purpose|broadband router Running (JUST GUESSING): Asus embedded (86%), Linux 3.X|4.X (86%), Vodavi embedded (85%), Ruckus embedded (85%), Viasat embedded (85%) OS CPE: cpe:/h:asus:rt-n56u cpe:/o:linux:linux_kernel:3.4 cpe:/h:vodavi:xts-ip cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:3.16 cpe:/h:ruckus:zoneflex_r710 cpe:/h:viasat:surfbeam_2 Aggressive OS guesses: ASUS RT-N56U WAP (Linux 3.4) (86%), Vodavi XTS-IP PBX (85%), Linux 4.4 (85%), Linux 3.16 (85%), Linux 3.2 (85%), Linux 3.2 - 3.10 (85%), Linux 3.2 - 3.16 (85%), Linux 3.4 (85%), Ruckus ZoneFlex R710 WAP (Linux 3.4) (85%), Viasat SurfBeam 2 satellite modem (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 11 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 62.44 ms 208.76.251.177 2 2.29 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.77 ms multacom.com (96.45.162.9) 4 0.42 ms dvs-networks.as9318.any2ix.coresite.com (206.72.210.167) 5 136.36 ms 10.222.1.98 6 ... 7 147.74 ms 110.9.3.19 8 ... 10 11 136.32 ms 223.130.200.117 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 958.86 seconds