Ports
Duration
Date
IP
Nmap scan report for tracing.ghtk.vn (103.188.250.129) Host is up (0.17s latency). Other addresses for tracing.ghtk.vn (not scanned): 103.188.251.129 Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, X11Probe: | HTTP/1.1 400 Bad request | content-length: 90 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | FourOhFourRequest: | HTTP/1.1 307 Temporary Redirect | content-length: 0 | location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak | cache-control: no-cache | connection: close | GetRequest, HTTPOptions, RTSPRequest: | HTTP/1.1 307 Temporary Redirect | content-length: 0 | location: https:/// | cache-control: no-cache |_ connection: close |_http-title: Did not follow redirect to https://tracing.ghtk.vn/ 113/tcp closed ident 443/tcp open ssl/http nginx 1.23.0 |_http-title: Site doesn't have a title (application/json). | ssl-cert: Subject: commonName=*.ghtk.vn | Subject Alternative Name: DNS:*.ghtk.vn, DNS:ghtk.vn | Not valid before: 2024-06-03T04:58:27 |_Not valid after: 2025-07-05T04:58:26 | tls-alpn: | h2 |_ http/1.1 |_ssl-date: TLS randomness does not represent time |_http-server-header: nginx/1.23.0 8443/tcp open ssl/http nginx 1.23.0 |_http-title: 404 Not Found |_http-server-header: nginx/1.23.0 |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=*.ghtk.vn | Subject Alternative Name: DNS:*.ghtk.vn, DNS:ghtk.vn | Not valid before: 2024-06-03T04:58:27 |_Not valid after: 2025-07-05T04:58:26 | tls-alpn: | h2 | http/1.1 | http/1.0 |_ http/0.9 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.92%I=7%D=12/23%Time=6769C6A3%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,77,"HTTP/1\.1\x20307\x20Temporary\x20Redirect\r\ncontent-le SF:ngth:\x200\r\nlocation:\x20https:///\r\ncache-control:\x20no-cache\r\nc SF:onnection:\x20close\r\n\r\n")%r(HTTPOptions,77,"HTTP/1\.1\x20307\x20Tem SF:porary\x20Redirect\r\ncontent-length:\x200\r\nlocation:\x20https:///\r\ SF:ncache-control:\x20no-cache\r\nconnection:\x20close\r\n\r\n")%r(RTSPReq SF:uest,77,"HTTP/1\.1\x20307\x20Temporary\x20Redirect\r\ncontent-length:\x SF:200\r\nlocation:\x20https:///\r\ncache-control:\x20no-cache\r\nconnecti SF:on:\x20close\r\n\r\n")%r(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20reques SF:t\r\ncontent-length:\x2090\r\ncache-control:\x20no-cache\r\ncontent-typ SF:e:\x20text/html\r\nconnection:\x20close\r\n\r\n<html><body><h1>400\x20B SF:ad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request SF:\.\n</body></html>\n")%r(FourOhFourRequest,9A,"HTTP/1\.1\x20307\x20Temp SF:orary\x20Redirect\r\ncontent-length:\x200\r\nlocation:\x20https:///nice SF:%20ports%2C/Tri%6Eity\.txt%2ebak\r\ncache-control:\x20no-cache\r\nconne SF:ction:\x20close\r\n\r\n")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20req SF:uest\r\ncontent-length:\x2090\r\ncache-control:\x20no-cache\r\ncontent- SF:type:\x20text/html\r\nconnection:\x20close\r\n\r\n<html><body><h1>400\x SF:20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20requ SF:est\.\n</body></html>\n")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x SF:20Bad\x20request\r\ncontent-length:\x2090\r\ncache-control:\x20no-cache SF:\r\ncontent-type:\x20text/html\r\nconnection:\x20close\r\n\r\n<html><bo SF:dy><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20inv SF:alid\x20request\.\n</body></html>\n")%r(DNSStatusRequestTCP,CF,"HTTP/1\ SF:.1\x20400\x20Bad\x20request\r\ncontent-length:\x2090\r\ncache-control:\ SF:x20no-cache\r\ncontent-type:\x20text/html\r\nconnection:\x20close\r\n\r SF:\n<html><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x SF:20an\x20invalid\x20request\.\n</body></html>\n")%r(Help,CF,"HTTP/1\.1\x SF:20400\x20Bad\x20request\r\ncontent-length:\x2090\r\ncache-control:\x20n SF:o-cache\r\ncontent-type:\x20text/html\r\nconnection:\x20close\r\n\r\n<h SF:tml><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an SF:\x20invalid\x20request\.\n</body></html>\n"); Device type: firewall|media device|general purpose Running (JUST GUESSING): Linux 3.X (88%), IPCop 2.X (88%), Tiandy embedded (87%) OS CPE: cpe:/o:linux:linux_kernel:3.4 cpe:/o:ipcop:ipcop:2 cpe:/o:linux:linux_kernel:3.18 Aggressive OS guesses: IPCop 2 firewall (Linux 3.4) (88%), Tiandy NVR (87%), Linux 3.18 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 10 hops TRACEROUTE (using port 113/tcp) HOP RTT ADDRESS 1 0.24 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.51 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 2.03 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.34 ms fpt-telecom.as18403.any2ix.coresite.com (206.72.211.73) 5 155.16 ms 42.112.1.26 6 204.79 ms 118.69.253.74 7 175.08 ms 42.114.255.15 8 175.51 ms 42.114.255.16 9 177.57 ms 58.186.87.228 10 169.20 ms 103.188.250.129 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 60.14 seconds