Scan report for "lilithgame.com"

Membership level: Free member
Summary

Ports

10

Duration

10min 14.53sec (614.53sec)

Date

2023-10-30

IP

106.75.49.72

Report
Scan OS information and Traceroute (nmap -A lilithgame.com)
Nmap scan report for lilithgame.com (106.75.49.72)
Host is up (0.18s latency).
Not shown: 990 closed ports
PORT     STATE    SERVICE        VERSION
80/tcp   open     http
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:12 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:10 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:11 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:11 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-title: Did not follow redirect to http://www.lilithgame.com/
135/tcp  filtered msrpc
139/tcp  filtered netbios-ssn
443/tcp  open     ssl/https
| fingerprint-strings: 
|   FourOhFourRequest, HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:18 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:17 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:19 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-title: Did not follow redirect to http://www.lilithgame.com/
| ssl-cert: Subject: commonName=*.lilithgames.com
| Subject Alternative Name: DNS:*.lilithgames.com, DNS:lilithgames.com
| Not valid before: 2020-07-27T03:32:46
|_Not valid after:  2022-09-19T04:41:00
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
445/tcp  filtered microsoft-ds
593/tcp  filtered http-rpc-epmap
4444/tcp filtered krb524
5800/tcp filtered vnc-http
5900/tcp filtered vnc
8080/tcp open     http-proxy
| fingerprint-strings: 
|   FourOhFourRequest, HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:11 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:10 GMT
|     Content-Type: text/html
|     Content-Length: 242
|     Connection: close
|     <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body bgcolor="white">
|     <h1>400 Bad Request</h1>
|     <p>Your browser sent a request that this server could not understand.</body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   Socks5: 
|     HTTP/1.1 400 Bad Request
|     Date: Mon, 30 Oct 2023 09:32:12 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-title: lilith sgame
3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=10/30%Time=653F781A%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\x2
SF:030\x20Oct\x202023\x2009:32:10\x20GMT\r\nContent-Type:\x20text/html\r\n
SF:Content-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML
SF:\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head>
SF:<title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white
SF:\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x20
SF:a\x20request\x20that\x20this\x20server\x20could\x20not\x20understand\.<
SF:/body>\r\n</html>\r\n")%r(HTTPOptions,174,"HTTP/1\.1\x20400\x20Bad\x20R
SF:equest\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nCont
SF:ent-Type:\x20text/html\r\nContent-Length:\x20242\r\nConnection:\x20clos
SF:e\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0/
SF:/EN\">\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r
SF:\n<body\x20bgcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Y
SF:our\x20browser\x20sent\x20a\x20request\x20that\x20this\x20server\x20cou
SF:ld\x20not\x20understand\.</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<ht
SF:ml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<
SF:center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\
SF:n")%r(X11Probe,FC,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\
SF:x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nContent-Type:\x20text/html\r
SF:\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head
SF:><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>4
SF:00\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(FourOh
SF:FourRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\x2
SF:030\x20Oct\x202023\x2009:32:12\x20GMT\r\nContent-Type:\x20text/html\r\n
SF:Content-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML
SF:\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head>
SF:<title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white
SF:\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x20
SF:a\x20request\x20that\x20this\x20server\x20could\x20not\x20understand\.<
SF:/body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=10/30%Time=653F7820%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20
SF:Mon,\x2030\x20Oct\x202023\x2009:32:17\x20GMT\r\nContent-Type:\x20text/h
SF:tml\r\nContent-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\
SF:x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\
SF:n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=
SF:\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20s
SF:ent\x20a\x20request\x20that\x20this\x20server\x20could\x20not\x20unders
SF:tand\.</body>\r\n</html>\r\n")%r(HTTPOptions,174,"HTTP/1\.1\x20400\x20B
SF:ad\x20Request\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:18\x20GMT\
SF:r\nContent-Type:\x20text/html\r\nContent-Length:\x20242\r\nConnection:\
SF:x20close\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x
SF:202\.0//EN\">\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></
SF:head>\r\n<body\x20bgcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\
SF:r\n<p>Your\x20browser\x20sent\x20a\x20request\x20that\x20this\x20server
SF:\x20could\x20not\x20understand\.</body>\r\n</html>\r\n")%r(FourOhFourRe
SF:quest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\x2030\x2
SF:0Oct\x202023\x2009:32:18\x20GMT\r\nContent-Type:\x20text/html\r\nConten
SF:t-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML\x20PU
SF:BLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head><title
SF:>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\
SF:n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x20a\x20r
SF:equest\x20that\x20this\x20server\x20could\x20not\x20understand\.</body>
SF:\r\n</html>\r\n")%r(tor-versions,FC,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:19\x20GMT\r\nContent-Ty
SF:pe:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\
SF:r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body
SF:>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</ht
SF:ml>\r\n")%r(RTSPRequest,7A,"<html>\r\n<head><title>400\x20Bad\x20Reques
SF:t</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></c
SF:enter>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8080-TCP:V=7.70%I=7%D=10/30%Time=653F781A%P=x86_64-redhat-linux-gnu
SF:%r(GetRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\
SF:x2030\x20Oct\x202023\x2009:32:10\x20GMT\r\nContent-Type:\x20text/html\r
SF:\nContent-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HT
SF:ML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<hea
SF:d><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"whi
SF:te\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x
SF:20a\x20request\x20that\x20this\x20server\x20could\x20not\x20understand\
SF:.</body>\r\n</html>\r\n")%r(HTTPOptions,174,"HTTP/1\.1\x20400\x20Bad\x2
SF:0Request\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nCo
SF:ntent-Type:\x20text/html\r\nContent-Length:\x20242\r\nConnection:\x20cl
SF:ose\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.
SF:0//EN\">\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>
SF:\r\n<body\x20bgcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p
SF:>Your\x20browser\x20sent\x20a\x20request\x20that\x20this\x20server\x20c
SF:ould\x20not\x20understand\.</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<
SF:html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\
SF:n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\
SF:r\n")%r(FourOhFourRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDa
SF:te:\x20Mon,\x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nContent-Type:\x2
SF:0text/html\r\nContent-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!D
SF:OCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<h
SF:tml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20b
SF:gcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20brows
SF:er\x20sent\x20a\x20request\x20that\x20this\x20server\x20could\x20not\x2
SF:0understand\.</body>\r\n</html>\r\n")%r(Socks5,FC,"HTTP/1\.1\x20400\x20
SF:Bad\x20Request\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:12\x20GMT
SF:\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:
SF:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></
SF:head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<
SF:/body>\r\n</html>\r\n");
Aggressive OS guesses: Linux 3.1 (94%), Linux 3.2 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Linux 2.6.32 (92%), Linux 2.6.39 - 3.2 (92%), Linux 3.1 - 3.2 (92%), Linux 3.11 (92%), Linux 3.2 - 4.9 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

TRACEROUTE (using port 22/tcp)
HOP RTT       ADDRESS
1   0.25 ms   208.76.251.177
2   0.53 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.64 ms   multacom.com (96.45.162.9)
4   0.34 ms   182.54.129.90
5   9.72 ms   10.31.0.238
6   177.74 ms 219.158.33.77
7   180.70 ms 219.158.96.41
8   175.40 ms 219.158.3.141
9   173.50 ms 219.158.5.149
10  176.73 ms 202.96.12.114
11  175.68 ms 61.148.146.110
12  178.63 ms 123.125.128.234
13  ... 16
17  189.92 ms 106.75.49.72

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 614.53 seconds
Color Scheme
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Detailed report
Target
Target IP
106.75.49.72
Host status
UP
Target Country
Target IP location is China
China
Free scan
Free scan
Scan method
Scan OS information and Traceroute
Scan status
Identified 10 ports
Run command
nmap -A lilithgame.com
Scan date
30 Oct 2023 05:33
API - Scan ID
Scan duration
10min 14.53sec (614.53sec)
Download report
Remove scan result
$
Total scans
Scan more
Pricing

PROFESSIONAL


  • 10 000 scans/day
  • Daily API Calls - 100 000 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0.75$7.50/month
Billed Annually @ $9.00$90.00 90% discount
Get Professional

REGISTERED


  • 5 scans/day
  • Daily API Calls - 20 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0/lifetime
 
Register
Scan host
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: