Scan report for "l.m.naver.com"

Membership level: Free member

l.m.naver.com

223.130.200.97Target IP location is Korea (the Republic of)

Summary

Ports

2

Duration

24min 56sec (1496sec)

Date

2023-11-21

IP

223.130.200.97

Report
Scan OS information and Traceroute (nmap -A l.m.naver.com)
Nmap scan report for l.m.naver.com (223.130.200.97)
Host is up (0.14s latency).
Other addresses for l.m.naver.com (not scanned): 223.130.200.103 223.130.195.208 223.130.193.11
Not shown: 971 filtered ports, 27 closed ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http      NWS
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Server: NWS
|     Date: Tue, 21 Nov 2023 15:40:11 GMT
|     Content-Type: text/html; charset=UTF-8
|     Content-Length: 146
|     Connection: close
|     <html>
|     <head><title>404 Not Found</title></head>
|     <body>
|     <center><h1>404 Not Found</h1></center>
|     <hr><center> NWS </center>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 200 OK
|     Server: NWS
|     Date: Tue, 21 Nov 2023 15:40:10 GMT
|     Content-Type: image/gif
|     Content-Length: 2
|     Last-Modified: Thu, 26 Sep 2019 10:49:52 GMT
|     Connection: close
|     ETag: "5d8c97d0-2"
|     Content-Type: image/gif
|     Accept-Ranges: bytes
|   HTTPOptions: 
|     HTTP/1.1 405 Not Allowed
|     Server: NWS
|     Date: Tue, 21 Nov 2023 15:40:11 GMT
|     Content-Type: text/html; charset=UTF-8
|     Content-Length: 150
|     Connection: close
|     <html>
|     <head><title>405 Not Allowed</title></head>
|     <body>
|     <center><h1>405 Not Allowed</h1></center>
|     <hr><center> NWS </center>
|     </body>
|     </html>
|   RTSPRequest, X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: NWS
|     Date: Tue, 21 Nov 2023 15:40:11 GMT
|     Content-Type: text/html; charset=UTF-8
|     Content-Length: 150
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center> NWS </center>
|     </body>
|_    </html>
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: NWS
|_http-title: Site doesn't have a title (image/gif, image/gif).
443/tcp open  ssl/https NWS
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Server: NWS
|     Date: Tue, 21 Nov 2023 15:40:15 GMT
|     Content-Type: text/html; charset=UTF-8
|     Content-Length: 146
|     Connection: close
|     <html>
|     <head><title>404 Not Found</title></head>
|     <body>
|     <center><h1>404 Not Found</h1></center>
|     <hr><center> NWS </center>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 200 OK
|     Server: NWS
|     Date: Tue, 21 Nov 2023 15:40:14 GMT
|     Content-Type: image/gif
|     Content-Length: 2
|     Last-Modified: Thu, 26 Sep 2019 10:49:52 GMT
|     Connection: close
|     ETag: "5d8c97d0-2"
|     Content-Type: image/gif
|     Accept-Ranges: bytes
|   HTTPOptions: 
|     HTTP/1.1 405 Not Allowed
|     Server: NWS
|     Date: Tue, 21 Nov 2023 15:40:15 GMT
|     Content-Type: text/html; charset=UTF-8
|     Content-Length: 150
|     Connection: close
|     <html>
|     <head><title>405 Not Allowed</title></head>
|     <body>
|     <center><h1>405 Not Allowed</h1></center>
|     <hr><center> NWS </center>
|     </body>
|     </html>
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Server: NWS
|     Date: Tue, 21 Nov 2023 15:40:20 GMT
|     Content-Type: text/html; charset=UTF-8
|     Content-Length: 150
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center> NWS </center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Server: NWS
|     Date: Tue, 21 Nov 2023 15:40:16 GMT
|     Content-Type: text/html; charset=UTF-8
|     Content-Length: 150
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center> NWS </center>
|     </body>
|_    </html>
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: NWS
|_http-title: Site doesn't have a title (image/gif, image/gif).
| ssl-cert: Subject: commonName=*.m.naver.com/organizationName=NAVER Corp./stateOrProvinceName=Gyeonggi-do/countryName=KR
| Subject Alternative Name: DNS:*.m.naver.com, DNS:m.naver.com
| Not valid before: 2023-05-23T00:00:00
|_Not valid after:  2024-06-07T23:59:59
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/21%Time=655CCF5A%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,F7,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20NWS\r\nDate:\x20Tu
SF:e,\x2021\x20Nov\x202023\x2015:40:10\x20GMT\r\nContent-Type:\x20image/gi
SF:f\r\nContent-Length:\x202\r\nLast-Modified:\x20Thu,\x2026\x20Sep\x20201
SF:9\x2010:49:52\x20GMT\r\nConnection:\x20close\r\nETag:\x20\"5d8c97d0-2\"
SF:\r\nContent-Type:\x20image/gif\r\nAccept-Ranges:\x20bytes\r\n\r\n\x20\n
SF:")%r(HTTPOptions,134,"HTTP/1\.1\x20405\x20Not\x20Allowed\r\nServer:\x20
SF:NWS\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2015:40:11\x20GMT\r\nContent
SF:-Type:\x20text/html;\x20charset=UTF-8\r\nContent-Length:\x20150\r\nConn
SF:ection:\x20close\r\n\r\n<html>\r\n<head><title>405\x20Not\x20Allowed</t
SF:itle></head>\r\n<body>\r\n<center><h1>405\x20Not\x20Allowed</h1></cente
SF:r>\r\n<hr><center>\x20NWS\x20</center>\r\n</body>\r\n</html>\r\n")%r(RT
SF:SPRequest,134,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20NWS\r\n
SF:Date:\x20Tue,\x2021\x20Nov\x202023\x2015:40:11\x20GMT\r\nContent-Type:\
SF:x20text/html;\x20charset=UTF-8\r\nContent-Length:\x20150\r\nConnection:
SF:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></
SF:head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<
SF:hr><center>\x20NWS\x20</center>\r\n</body>\r\n</html>\r\n")%r(X11Probe,
SF:134,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20NWS\r\nDate:\x20T
SF:ue,\x2021\x20Nov\x202023\x2015:40:11\x20GMT\r\nContent-Type:\x20text/ht
SF:ml;\x20charset=UTF-8\r\nContent-Length:\x20150\r\nConnection:\x20close\
SF:r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<
SF:body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center
SF:>\x20NWS\x20</center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,1
SF:2E,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20NWS\r\nDate:\x20Tue,
SF:\x2021\x20Nov\x202023\x2015:40:11\x20GMT\r\nContent-Type:\x20text/html;
SF:\x20charset=UTF-8\r\nContent-Length:\x20146\r\nConnection:\x20close\r\n
SF:\r\n<html>\r\n<head><title>404\x20Not\x20Found</title></head>\r\n<body>
SF:\r\n<center><h1>404\x20Not\x20Found</h1></center>\r\n<hr><center>\x20NW
SF:S\x20</center>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655CCF5E%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,F7,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20NWS\r\nDate
SF::\x20Tue,\x2021\x20Nov\x202023\x2015:40:14\x20GMT\r\nContent-Type:\x20i
SF:mage/gif\r\nContent-Length:\x202\r\nLast-Modified:\x20Thu,\x2026\x20Sep
SF:\x202019\x2010:49:52\x20GMT\r\nConnection:\x20close\r\nETag:\x20\"5d8c9
SF:7d0-2\"\r\nContent-Type:\x20image/gif\r\nAccept-Ranges:\x20bytes\r\n\r\
SF:n\x20\n")%r(HTTPOptions,134,"HTTP/1\.1\x20405\x20Not\x20Allowed\r\nServ
SF:er:\x20NWS\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2015:40:15\x20GMT\r\n
SF:Content-Type:\x20text/html;\x20charset=UTF-8\r\nContent-Length:\x20150\
SF:r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>405\x20Not\x20All
SF:owed</title></head>\r\n<body>\r\n<center><h1>405\x20Not\x20Allowed</h1>
SF:</center>\r\n<hr><center>\x20NWS\x20</center>\r\n</body>\r\n</html>\r\n
SF:")%r(FourOhFourRequest,12E,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:
SF:\x20NWS\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2015:40:15\x20GMT\r\nCon
SF:tent-Type:\x20text/html;\x20charset=UTF-8\r\nContent-Length:\x20146\r\n
SF:Connection:\x20close\r\n\r\n<html>\r\n<head><title>404\x20Not\x20Found<
SF:/title></head>\r\n<body>\r\n<center><h1>404\x20Not\x20Found</h1></cente
SF:r>\r\n<hr><center>\x20NWS\x20</center>\r\n</body>\r\n</html>\r\n")%r(to
SF:r-versions,134,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20NWS\r\
SF:nDate:\x20Tue,\x2021\x20Nov\x202023\x2015:40:16\x20GMT\r\nContent-Type:
SF:\x20text/html;\x20charset=UTF-8\r\nContent-Length:\x20150\r\nConnection
SF::\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title><
SF:/head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n
SF:<hr><center>\x20NWS\x20</center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequ
SF:est,134,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20NWS\r\nDate:\
SF:x20Tue,\x2021\x20Nov\x202023\x2015:40:20\x20GMT\r\nContent-Type:\x20tex
SF:t/html;\x20charset=UTF-8\r\nContent-Length:\x20150\r\nConnection:\x20cl
SF:ose\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\
SF:r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><ce
SF:nter>\x20NWS\x20</center>\r\n</body>\r\n</html>\r\n");
Device type: general purpose|PBX|WAP
Running (JUST GUESSING): Linux 3.X|4.X (86%), Vodavi embedded (85%), Asus embedded (85%)
OS CPE: cpe:/o:linux:linux_kernel:3.16 cpe:/h:vodavi:xts-ip cpe:/o:linux:linux_kernel:4.4 cpe:/h:asus:rt-n56u cpe:/o:linux:linux_kernel:3.4
Aggressive OS guesses: Linux 3.16 (86%), Vodavi XTS-IP PBX (85%), Linux 4.4 (85%), ASUS RT-N56U WAP (Linux 3.4) (85%), Linux 3.2 - 4.9 (85%), Linux 4.10 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   0.22 ms   208.76.251.177
2   0.55 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.97 ms   multacom.com (96.45.162.9)
4   1.65 ms   dvs-networks.as9318.any2ix.coresite.com (206.72.210.167)
5   145.72 ms 10.222.45.96
6   ...
7   125.70 ms 110.9.3.15
8   ... 10
11  136.92 ms 223.130.200.97

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1496.45 seconds
Color Scheme
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Detailed report
Target
Target IP
223.130.200.97
Host status
UP
Target Country
Target IP location is Korea (the Republic of)
Korea (the Republic of)
Free scan
Free scan
Method
Scan OS information and Traceroute
Scan status
Identified 2 ports
Run command
nmap -A l.m.naver.com
Scan date
21 Nov 2023 10:41
API - Scan ID
Scan duration
24min 56sec (1496sec)
Download report
Remove scan result
$
Total scans
Scan more
Pricing

REGISTERED


Features

5 scans/day

Daily API Calls - 20 request

Save log

Public scan

OSINT scan

Unlisted scan

Private scan

No Ads

Remove after scan

Remove scan result

Additional methods for scan

This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.

$0.00

Lifetime

Register

PROFESSIONAL


Features

10 000 scans/day

Daily API Calls - 100 000 request

Save log

Public scan

OSINT scan

Unlisted scan

Private scan

No Ads

Remove after scan

Remove scan result

Additional methods for scan

This option is best for professionals who need to test their host's open ports from an external source.

$7.50 $3.75/Month

Billed Annually @ $45.00 - 50% discount

Get Professional