Ports
Duration
Date
IP
Nmap scan report for ac.search.naver.com (223.130.200.117) Host is up (0.14s latency). Other addresses for ac.search.naver.com (not scanned): 223.130.192.99 223.130.192.97 223.130.200.116 Not shown: 971 filtered ports, 27 closed ports PORT STATE SERVICE VERSION 80/tcp open http nginx (reverse proxy) | http-robots.txt: 1 disallowed entry |_/ |_http-title: 403 Forbidden 443/tcp open ssl/http nginx (reverse proxy) | http-robots.txt: 1 disallowed entry |_/ |_http-title: 403 Forbidden | ssl-cert: Subject: commonName=*.search.naver.com/organizationName=NAVER Corp./stateOrProvinceName=Gyeonggi-do/countryName=KR | Subject Alternative Name: DNS:*.search.naver.com, DNS:search.naver.com | Not valid before: 2023-05-08T00:00:00 |_Not valid after: 2024-06-07T23:59:59 |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 | tls-nextprotoneg: | h2 |_ http/1.1 Device type: WAP|PBX|general purpose|broadband router Running (JUST GUESSING): Asus embedded (86%), Linux 3.X|4.X (86%), Vodavi embedded (85%), Ruckus embedded (85%), Viasat embedded (85%) OS CPE: cpe:/h:asus:rt-n56u cpe:/o:linux:linux_kernel:3.4 cpe:/h:vodavi:xts-ip cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:3.16 cpe:/h:ruckus:zoneflex_r710 cpe:/h:viasat:surfbeam_2 Aggressive OS guesses: ASUS RT-N56U WAP (Linux 3.4) (86%), Vodavi XTS-IP PBX (85%), Linux 4.4 (85%), Linux 3.16 (85%), Linux 3.2 (85%), Linux 3.2 - 3.10 (85%), Linux 3.2 - 3.16 (85%), Linux 3.4 (85%), Ruckus ZoneFlex R710 WAP (Linux 3.4) (85%), Viasat SurfBeam 2 satellite modem (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 11 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 62.44 ms 208.76.251.177 2 2.29 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.77 ms multacom.com (96.45.162.9) 4 0.42 ms dvs-networks.as9318.any2ix.coresite.com (206.72.210.167) 5 136.36 ms 10.222.1.98 6 ... 7 147.74 ms 110.9.3.19 8 ... 10 11 136.32 ms 223.130.200.117 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 958.86 seconds
Features
5 scans/day
Daily API Calls - 20 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.
Lifetime
Features
10 000 scans/day
Daily API Calls - 100 000 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is best for professionals who need to test their host's open ports from an external source.
Billed Annually @ $45.00 - 50% discount