Ports
Duration
Date
IP
Nmap scan report for wps.com (114.119.186.87) Host is up (0.18s latency). rDNS record for 114.119.186.87: ecs-114-119-186-87.compute.hwclouds-dns.com Not shown: 997 filtered ports PORT STATE SERVICE VERSION 80/tcp open http elb | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:19 GMT | Content-Type: text/html | Content-Length: 138 | Connection: close | Server: elb | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:13 GMT | Content-Length: 0 | Connection: close | Server: elb | GetRequest: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:11 GMT | Content-Length: 0 | Connection: close | Server: elb | HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:12 GMT | Content-Length: 0 | Connection: close | Server: elb | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:18 GMT | Content-Type: text/html | Content-Length: 138 | Connection: close | Server: elb | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:12 GMT | Content-Type: text/html | Content-Length: 138 | Connection: close | Server: elb | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-server-header: elb |_http-title: Did not follow redirect to https://www.wps.com/ 443/tcp open ssl/https elb | fingerprint-strings: | DNSStatusRequestTCP: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:30 GMT | Content-Type: text/html | Content-Length: 138 | Connection: close | Server: elb | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:29 GMT | Content-Type: text/html | Content-Length: 138 | Connection: close | Server: elb | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:20 GMT | Content-Length: 0 | Connection: close | Server: elb | GetRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:19 GMT | Content-Length: 0 | Connection: close | Server: elb | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:28 GMT | Content-Type: text/html | Content-Length: 138 | Connection: close | Server: elb | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Date: Wed, 04 Oct 2023 07:48:21 GMT | Content-Type: text/html | Content-Length: 138 | Connection: close | Server: elb | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-server-header: elb |_http-title: Did not follow redirect to https://www.wps.com/ | ssl-cert: Subject: commonName=*.wps.com/organizationName=Kingsoft Office Software Corporation Limited/countryName=HK | Subject Alternative Name: DNS:*.wps.com, DNS:wps.com | Not valid before: 2023-04-26T00:00:00 |_Not valid after: 2024-05-10T23:59:59 |_ssl-date: TLS randomness does not represent time | tls-alpn: |_ http/1.1 | tls-nextprotoneg: |_ http/1.1 1433/tcp closed ms-sql-s 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=10/4%Time=651D18BB%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,74,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x200 SF:4\x20Oct\x202023\x2007:48:11\x20GMT\r\nContent-Length:\x200\r\nConnecti SF:on:\x20close\r\nServer:\x20elb\r\n\r\n")%r(HTTPOptions,74,"HTTP/1\.1\x2 SF:0400\x20Bad\x20Request\r\nDate:\x20Wed,\x2004\x20Oct\x202023\x2007:48:1 SF:2\x20GMT\r\nContent-Length:\x200\r\nConnection:\x20close\r\nServer:\x20 SF:elb\r\n\r\n")%r(RTSPRequest,8A,"<html>\r\n<head><title>400\x20Bad\x20Re SF:quest</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>400\ SF:x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(X11Probe, SF:119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2004\x20Oct\x SF:202023\x2007:48:12\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Leng SF:th:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<html>\r\n< SF:head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\" SF:white\">\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\ SF:r\n</html>\r\n")%r(FourOhFourRequest,74,"HTTP/1\.1\x20400\x20Bad\x20Req SF:uest\r\nDate:\x20Wed,\x2004\x20Oct\x202023\x2007:48:13\x20GMT\r\nConten SF:t-Length:\x200\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n")%r(RP SF:CCheck,119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2004\x SF:20Oct\x202023\x2007:48:18\x20GMT\r\nContent-Type:\x20text/html\r\nConte SF:nt-Length:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<htm SF:l>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgc SF:olor=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n< SF:/body>\r\n</html>\r\n")%r(DNSVersionBindReqTCP,119,"HTTP/1\.1\x20400\x2 SF:0Bad\x20Request\r\nDate:\x20Wed,\x2004\x20Oct\x202023\x2007:48:19\x20GM SF:T\r\nContent-Type:\x20text/html\r\nContent-Length:\x20138\r\nConnection SF::\x20close\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>400\x20Bad\x SF:20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1> SF:400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(DNSSt SF:atusRequestTCP,119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed, SF:\x2004\x20Oct\x202023\x2007:48:19\x20GMT\r\nContent-Type:\x20text/html\ SF:r\nContent-Length:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\r\n SF:\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<bod SF:y\x20bgcolor=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></cent SF:er>\r\n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=10/4%Time=651D18C2%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,74,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20We SF:d,\x2004\x20Oct\x202023\x2007:48:19\x20GMT\r\nContent-Length:\x200\r\nC SF:onnection:\x20close\r\nServer:\x20elb\r\n\r\n")%r(HTTPOptions,74,"HTTP/ SF:1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2004\x20Oct\x202023\x20 SF:07:48:19\x20GMT\r\nContent-Length:\x200\r\nConnection:\x20close\r\nServ SF:er:\x20elb\r\n\r\n")%r(FourOhFourRequest,74,"HTTP/1\.1\x20400\x20Bad\x2 SF:0Request\r\nDate:\x20Wed,\x2004\x20Oct\x202023\x2007:48:20\x20GMT\r\nCo SF:ntent-Length:\x200\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n")% SF:r(tor-versions,119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Wed, SF:\x2004\x20Oct\x202023\x2007:48:21\x20GMT\r\nContent-Type:\x20text/html\ SF:r\nContent-Length:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\r\n SF:\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<bod SF:y\x20bgcolor=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></cent SF:er>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,8A,"<html>\r\n<head><titl SF:e>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r SF:\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html> SF:\r\n")%r(RPCCheck,119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20W SF:ed,\x2004\x20Oct\x202023\x2007:48:28\x20GMT\r\nContent-Type:\x20text/ht SF:ml\r\nContent-Length:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\ SF:r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n< SF:body\x20bgcolor=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></c SF:enter>\r\n</body>\r\n</html>\r\n")%r(DNSVersionBindReqTCP,119,"HTTP/1\. SF:1\x20400\x20Bad\x20Request\r\nDate:\x20Wed,\x2004\x20Oct\x202023\x2007: SF:48:29\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20138\r\ SF:nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>4 SF:00\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\n< SF:center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\ SF:n")%r(DNSStatusRequestTCP,119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDa SF:te:\x20Wed,\x2004\x20Oct\x202023\x2007:48:30\x20GMT\r\nContent-Type:\x2 SF:0text/html\r\nContent-Length:\x20138\r\nConnection:\x20close\r\nServer: SF:\x20elb\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></he SF:ad>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>400\x20Bad\x20Request SF:</h1></center>\r\n</body>\r\n</html>\r\n"); Device type: general purpose Running (JUST GUESSING): Linux 4.X (85%) OS CPE: cpe:/o:linux:linux_kernel:4.9 Aggressive OS guesses: Linux 4.9 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 12 hops TRACEROUTE (using port 1433/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177 2 0.55 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.61 ms multacom.com (96.45.162.9) 4 0.36 ms singtel.as7473.any2ix.coresite.com (206.72.210.63) 5 199.12 ms 203.208.172.153 6 173.16 ms 203.208.171.145 7 199.76 ms 203.208.182.253 8 170.67 ms 203.208.166.241 9 ... 10 168.45 ms 203.208.171.145 11 178.99 ms 203.208.177.66 12 189.60 ms ecs-114-119-186-87.compute.hwclouds-dns.com (114.119.186.87) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 353.87 seconds