Ports
Duration
Date
IP
Nmap scan report for sz23511.sz.na.lb.holadns.com (43.135.136.224) Host is up (0.010s latency). Not shown: 993 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 256 d3:fd:62:72:e5:68:b9:cc:86:47:96:1e:72:70:7f:ce (ECDSA) |_ 256 4f:6f:87:83:a5:15:9a:f6:6c:0d:90:00:6d:32:76:80 (ED25519) 80/tcp open http OpenResty web app server |_http-title: Site doesn't have a title (text/plain). |_http-server-header: openresty 443/tcp open ssl/https openresty |_http-title: 400 The plain HTTP request was sent to HTTPS port |_http-server-header: openresty 6000/tcp closed X11 7000/tcp open http OpenResty web app server |_http-title: Site doesn't have a title (text/plain). |_http-server-header: openresty 8000/tcp open http-alt | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 404 Not Found | Content-Type: text/plain | Date: Sun, 27 Oct 2024 19:24:56 GMT | Content-Length: 18 | page not found | GetRequest: | HTTP/1.0 404 Not Found | Content-Type: text/plain | Date: Sun, 27 Oct 2024 19:24:51 GMT | Content-Length: 18 | page not found | HTTPOptions: | HTTP/1.0 404 Not Found | Content-Type: text/plain | Date: Sun, 27 Oct 2024 19:25:01 GMT | Content-Length: 18 | page not found | Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SSLSessionReq, Socks5, TLSSessionReq, TerminalServerCookie: | HTTP/1.1 400 Bad Request | Content-Type: text/plain; charset=utf-8 | Connection: close |_ Request |_http-title: Site doesn't have a title (text/plain). 8001/tcp closed vcom-tunnel 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port8000-TCP:V=7.92%I=7%D=10/27%Time=671E9383%P=x86_64-redhat-linux-gnu SF:%r(GetRequest,7F,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20 SF:text/plain\r\nDate:\x20Sun,\x2027\x20Oct\x202024\x2019:24:51\x20GMT\r\n SF:Content-Length:\x2018\r\n\r\n404\x20page\x20not\x20found")%r(FourOhFour SF:Request,7F,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/p SF:lain\r\nDate:\x20Sun,\x2027\x20Oct\x202024\x2019:24:56\x20GMT\r\nConten SF:t-Length:\x2018\r\n\r\n404\x20page\x20not\x20found")%r(Socks5,67,"HTTP/ SF:1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charse SF:t=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(HTTPOp SF:tions,7F,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text/pla SF:in\r\nDate:\x20Sun,\x2027\x20Oct\x202024\x2019:25:01\x20GMT\r\nContent- SF:Length:\x2018\r\n\r\n404\x20page\x20not\x20found")%r(RTSPRequest,67,"HT SF:TP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20cha SF:rset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Hel SF:p,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain SF:;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request SF:")%r(SSLSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Ty SF:pe:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\ SF:x20Bad\x20Request")%r(TerminalServerCookie,67,"HTTP/1\.1\x20400\x20Bad\ SF:x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnecti SF:on:\x20close\r\n\r\n400\x20Bad\x20Request")%r(TLSSessionReq,67,"HTTP/1\ SF:.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset= SF:utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Kerberos SF:,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain; SF:\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request" SF:)%r(LPDString,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x SF:20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Ba SF:d\x20Request")%r(LDAPSearchReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r SF:\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close SF:\r\n\r\n400\x20Bad\x20Request"); Aggressive OS guesses: Linux 3.1 (93%), Linux 3.2 (93%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (92%), Crestron XPanel control system (91%), Adtran 424RG FTTH gateway (90%), Linux 2.6.32 (90%), Linux 2.6.39 - 3.2 (90%), Linux 3.11 (90%), Linux 3.2 - 4.9 (90%), Linux 3.7 - 3.10 (90%) No exact OS matches for host (test conditions non-ideal). Network Distance: 12 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 8001/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.64 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 28.09 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 1.55 ms be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102) 6 12.40 ms palo-b24-link.ip.twelve99.net (62.115.119.90) 7 10.71 ms 213.248.70.187 8 7.57 ms oriental-ic-336728.ip.twelve99-cust.net (213.248.81.43) 9 ... 11 12 11.55 ms 43.135.136.224 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 106.59 seconds