Ports
Duration
Date
IP
Nmap scan report for sns.playtogether.haegin.co.kr (35.170.27.237) Host is up (0.065s latency). Other addresses for sns.playtogether.haegin.co.kr (not scanned): 54.84.31.138 34.199.215.107 44.219.65.124 3.225.205.25 44.221.19.226 rDNS record for 35.170.27.237: ec2-35-170-27-237.compute-1.amazonaws.com Not shown: 999 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 443/tcp open ssl/https Kestrel |_http-title: Site doesn't have a title. | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 404 Not Found | Content-Length: 0 | Connection: close | Date: Sat, 26 Oct 2024 04:25:00 GMT | Server: Kestrel | Help: | HTTP/1.1 400 Bad Request | Content-Length: 0 | Connection: close | Date: Sat, 26 Oct 2024 04:25:26 GMT | Server: Kestrel | Kerberos: | HTTP/1.1 400 Bad Request | Content-Length: 0 | Connection: close | Date: Sat, 26 Oct 2024 04:25:28 GMT | Server: Kestrel | LDAPSearchReq, LPDString: | HTTP/1.1 400 Bad Request | Content-Length: 0 | Connection: close | Date: Sat, 26 Oct 2024 04:25:38 GMT | Server: Kestrel | RTSPRequest: | HTTP/1.1 505 HTTP Version Not Supported | Content-Length: 0 | Connection: close | Date: Sat, 26 Oct 2024 04:25:11 GMT | Server: Kestrel | SSLSessionReq, TLSSessionReq, TerminalServerCookie: | HTTP/1.1 400 Bad Request | Content-Length: 0 | Connection: close | Date: Sat, 26 Oct 2024 04:25:27 GMT |_ Server: Kestrel | ssl-cert: Subject: commonName=*.playtogether.haegin.co.kr | Subject Alternative Name: DNS:*.playtogether.haegin.co.kr | Not valid before: 2024-10-21T00:00:00 |_Not valid after: 2025-11-19T23:59:59 |_http-server-header: Kestrel |_ssl-date: TLS randomness does not represent time 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=10/25%Time=671C6F1C%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,76,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Leng SF:th:\x200\r\nConnection:\x20close\r\nDate:\x20Sat,\x2026\x20Oct\x202024\ SF:x2004:25:00\x20GMT\r\nServer:\x20Kestrel\r\n\r\n")%r(HTTPOptions,76,"HT SF:TP/1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x200\r\nConnection:\x SF:20close\r\nDate:\x20Sat,\x2026\x20Oct\x202024\x2004:25:00\x20GMT\r\nSer SF:ver:\x20Kestrel\r\n\r\n")%r(FourOhFourRequest,76,"HTTP/1\.1\x20404\x20N SF:ot\x20Found\r\nContent-Length:\x200\r\nConnection:\x20close\r\nDate:\x2 SF:0Sat,\x2026\x20Oct\x202024\x2004:25:00\x20GMT\r\nServer:\x20Kestrel\r\n SF:\r\n")%r(RTSPRequest,87,"HTTP/1\.1\x20505\x20HTTP\x20Version\x20Not\x20 SF:Supported\r\nContent-Length:\x200\r\nConnection:\x20close\r\nDate:\x20S SF:at,\x2026\x20Oct\x202024\x2004:25:11\x20GMT\r\nServer:\x20Kestrel\r\n\r SF:\n")%r(Help,78,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x SF:200\r\nConnection:\x20close\r\nDate:\x20Sat,\x2026\x20Oct\x202024\x2004 SF::25:26\x20GMT\r\nServer:\x20Kestrel\r\n\r\n")%r(SSLSessionReq,78,"HTTP/ SF:1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x2 SF:0close\r\nDate:\x20Sat,\x2026\x20Oct\x202024\x2004:25:27\x20GMT\r\nServ SF:er:\x20Kestrel\r\n\r\n")%r(TerminalServerCookie,78,"HTTP/1\.1\x20400\x2 SF:0Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\nDate SF::\x20Sat,\x2026\x20Oct\x202024\x2004:25:27\x20GMT\r\nServer:\x20Kestrel SF:\r\n\r\n")%r(TLSSessionReq,78,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCo SF:ntent-Length:\x200\r\nConnection:\x20close\r\nDate:\x20Sat,\x2026\x20Oc SF:t\x202024\x2004:25:27\x20GMT\r\nServer:\x20Kestrel\r\n\r\n")%r(Kerberos SF:,78,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConn SF:ection:\x20close\r\nDate:\x20Sat,\x2026\x20Oct\x202024\x2004:25:28\x20G SF:MT\r\nServer:\x20Kestrel\r\n\r\n")%r(LPDString,78,"HTTP/1\.1\x20400\x20 SF:Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\nDate: SF:\x20Sat,\x2026\x20Oct\x202024\x2004:25:38\x20GMT\r\nServer:\x20Kestrel\ SF:r\n\r\n")%r(LDAPSearchReq,78,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCon SF:tent-Length:\x200\r\nConnection:\x20close\r\nDate:\x20Sat,\x2026\x20Oct SF:\x202024\x2004:25:38\x20GMT\r\nServer:\x20Kestrel\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 14 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.57 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.95 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 12.45 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 21.35 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 32.39 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 32.65 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74) 9 ... 13 14 64.92 ms ec2-35-170-27-237.compute-1.amazonaws.com (35.170.27.237) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 126.27 seconds