Ports
Duration
Date
IP
Nmap scan report for lilithgame.com (106.75.49.72) Host is up (0.18s latency). Not shown: 990 closed ports PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Mon, 30 Oct 2023 09:32:12 GMT | Content-Type: text/html | Content-Length: 242 | Connection: close | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <h1>400 Bad Request</h1> | <p>Your browser sent a request that this server could not understand.</body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request | Date: Mon, 30 Oct 2023 09:32:10 GMT | Content-Type: text/html | Content-Length: 242 | Connection: close | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <h1>400 Bad Request</h1> | <p>Your browser sent a request that this server could not understand.</body> | </html> | HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Mon, 30 Oct 2023 09:32:11 GMT | Content-Type: text/html | Content-Length: 242 | Connection: close | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <h1>400 Bad Request</h1> | <p>Your browser sent a request that this server could not understand.</body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Date: Mon, 30 Oct 2023 09:32:11 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-title: Did not follow redirect to http://www.lilithgame.com/ 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 443/tcp open ssl/https | fingerprint-strings: | FourOhFourRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Mon, 30 Oct 2023 09:32:18 GMT | Content-Type: text/html | Content-Length: 242 | Connection: close | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <h1>400 Bad Request</h1> | <p>Your browser sent a request that this server could not understand.</body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request | Date: Mon, 30 Oct 2023 09:32:17 GMT | Content-Type: text/html | Content-Length: 242 | Connection: close | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <h1>400 Bad Request</h1> | <p>Your browser sent a request that this server could not understand.</body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Date: Mon, 30 Oct 2023 09:32:19 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-title: Did not follow redirect to http://www.lilithgame.com/ | ssl-cert: Subject: commonName=*.lilithgames.com | Subject Alternative Name: DNS:*.lilithgames.com, DNS:lilithgames.com | Not valid before: 2020-07-27T03:32:46 |_Not valid after: 2022-09-19T04:41:00 |_ssl-date: TLS randomness does not represent time | tls-alpn: |_ http/1.1 | tls-nextprotoneg: |_ http/1.1 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 4444/tcp filtered krb524 5800/tcp filtered vnc-http 5900/tcp filtered vnc 8080/tcp open http-proxy | fingerprint-strings: | FourOhFourRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Mon, 30 Oct 2023 09:32:11 GMT | Content-Type: text/html | Content-Length: 242 | Connection: close | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <h1>400 Bad Request</h1> | <p>Your browser sent a request that this server could not understand.</body> | </html> | GetRequest: | HTTP/1.1 400 Bad Request | Date: Mon, 30 Oct 2023 09:32:10 GMT | Content-Type: text/html | Content-Length: 242 | Connection: close | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <h1>400 Bad Request</h1> | <p>Your browser sent a request that this server could not understand.</body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | Socks5: | HTTP/1.1 400 Bad Request | Date: Mon, 30 Oct 2023 09:32:12 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-title: lilith sgame 3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=10/30%Time=653F781A%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\x2 SF:030\x20Oct\x202023\x2009:32:10\x20GMT\r\nContent-Type:\x20text/html\r\n SF:Content-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML SF:\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head> SF:<title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white SF:\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x20 SF:a\x20request\x20that\x20this\x20server\x20could\x20not\x20understand\.< SF:/body>\r\n</html>\r\n")%r(HTTPOptions,174,"HTTP/1\.1\x20400\x20Bad\x20R SF:equest\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nCont SF:ent-Type:\x20text/html\r\nContent-Length:\x20242\r\nConnection:\x20clos SF:e\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0/ SF:/EN\">\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r SF:\n<body\x20bgcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Y SF:our\x20browser\x20sent\x20a\x20request\x20that\x20this\x20server\x20cou SF:ld\x20not\x20understand\.</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<ht SF:ml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n< SF:center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\ SF:n")%r(X11Probe,FC,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\ SF:x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nContent-Type:\x20text/html\r SF:\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head SF:><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>4 SF:00\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(FourOh SF:FourRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\x2 SF:030\x20Oct\x202023\x2009:32:12\x20GMT\r\nContent-Type:\x20text/html\r\n SF:Content-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML SF:\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head> SF:<title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white SF:\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x20 SF:a\x20request\x20that\x20this\x20server\x20could\x20not\x20understand\.< SF:/body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=10/30%Time=653F7820%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20 SF:Mon,\x2030\x20Oct\x202023\x2009:32:17\x20GMT\r\nContent-Type:\x20text/h SF:tml\r\nContent-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\ SF:x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\ SF:n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor= SF:\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20s SF:ent\x20a\x20request\x20that\x20this\x20server\x20could\x20not\x20unders SF:tand\.</body>\r\n</html>\r\n")%r(HTTPOptions,174,"HTTP/1\.1\x20400\x20B SF:ad\x20Request\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:18\x20GMT\ SF:r\nContent-Type:\x20text/html\r\nContent-Length:\x20242\r\nConnection:\ SF:x20close\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x SF:202\.0//EN\">\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></ SF:head>\r\n<body\x20bgcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\ SF:r\n<p>Your\x20browser\x20sent\x20a\x20request\x20that\x20this\x20server SF:\x20could\x20not\x20understand\.</body>\r\n</html>\r\n")%r(FourOhFourRe SF:quest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\x2030\x2 SF:0Oct\x202023\x2009:32:18\x20GMT\r\nContent-Type:\x20text/html\r\nConten SF:t-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML\x20PU SF:BLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head><title SF:>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\ SF:n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x20a\x20r SF:equest\x20that\x20this\x20server\x20could\x20not\x20understand\.</body> SF:\r\n</html>\r\n")%r(tor-versions,FC,"HTTP/1\.1\x20400\x20Bad\x20Request SF:\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:19\x20GMT\r\nContent-Ty SF:pe:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\ SF:r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body SF:>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</ht SF:ml>\r\n")%r(RTSPRequest,7A,"<html>\r\n<head><title>400\x20Bad\x20Reques SF:t</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></c SF:enter>\r\n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8080-TCP:V=7.70%I=7%D=10/30%Time=653F781A%P=x86_64-redhat-linux-gnu SF:%r(GetRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Mon,\ SF:x2030\x20Oct\x202023\x2009:32:10\x20GMT\r\nContent-Type:\x20text/html\r SF:\nContent-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HT SF:ML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<hea SF:d><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"whi SF:te\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x SF:20a\x20request\x20that\x20this\x20server\x20could\x20not\x20understand\ SF:.</body>\r\n</html>\r\n")%r(HTTPOptions,174,"HTTP/1\.1\x20400\x20Bad\x2 SF:0Request\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nCo SF:ntent-Type:\x20text/html\r\nContent-Length:\x20242\r\nConnection:\x20cl SF:ose\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\. SF:0//EN\">\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head> SF:\r\n<body\x20bgcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p SF:>Your\x20browser\x20sent\x20a\x20request\x20that\x20this\x20server\x20c SF:ould\x20not\x20understand\.</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"< SF:html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\ SF:n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\ SF:r\n")%r(FourOhFourRequest,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDa SF:te:\x20Mon,\x2030\x20Oct\x202023\x2009:32:11\x20GMT\r\nContent-Type:\x2 SF:0text/html\r\nContent-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!D SF:OCTYPE\x20HTML\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<h SF:tml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20b SF:gcolor=\"white\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20brows SF:er\x20sent\x20a\x20request\x20that\x20this\x20server\x20could\x20not\x2 SF:0understand\.</body>\r\n</html>\r\n")%r(Socks5,FC,"HTTP/1\.1\x20400\x20 SF:Bad\x20Request\r\nDate:\x20Mon,\x2030\x20Oct\x202023\x2009:32:12\x20GMT SF:\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection: SF:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></ SF:head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n< SF:/body>\r\n</html>\r\n"); Aggressive OS guesses: Linux 3.1 (94%), Linux 3.2 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Linux 2.6.32 (92%), Linux 2.6.39 - 3.2 (92%), Linux 3.1 - 3.2 (92%), Linux 3.11 (92%), Linux 3.2 - 4.9 (92%) No exact OS matches for host (test conditions non-ideal). Network Distance: 17 hops TRACEROUTE (using port 22/tcp) HOP RTT ADDRESS 1 0.25 ms 208.76.251.177 2 0.53 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.64 ms multacom.com (96.45.162.9) 4 0.34 ms 182.54.129.90 5 9.72 ms 10.31.0.238 6 177.74 ms 219.158.33.77 7 180.70 ms 219.158.96.41 8 175.40 ms 219.158.3.141 9 173.50 ms 219.158.5.149 10 176.73 ms 202.96.12.114 11 175.68 ms 61.148.146.110 12 178.63 ms 123.125.128.234 13 ... 16 17 189.92 ms 106.75.49.72 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 614.53 seconds