Ports
Duration
Date
IP
Nmap scan report for sc-lb.us-east-1.unityops.net (34.123.148.224) Host is up (0.047s latency). rDNS record for 34.123.148.224: 224.148.123.34.bc.googleusercontent.com Not shown: 999 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 443/tcp open ssl/https | ssl-cert: Subject: commonName=*.unity.com/organizationName=Unity Technologies ApS/countryName=DK | Subject Alternative Name: DNS:*.unity.com, DNS:unity.com | Not valid before: 2024-07-17T00:00:00 |_Not valid after: 2025-07-21T23:59:59 |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 |_http-title: Site doesn't have a title (text/html). | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, tor-versions: | HTTP/1.1 400 Bad request | content-length: 90 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest: | HTTP/1.0 403 Forbidden | cache-control: no-cache | content-type: text/html | <html><body><h1>403 Forbidden</h1> | Request forbidden by administrative rules. |_ </body></html> 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=10/6%Time=6702BA53%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,AA,"HTTP/1\.0\x20403\x20Forbidden\r\ncache-control:\x SF:20no-cache\r\ncontent-type:\x20text/html\r\n\r\n<html><body><h1>403\x20 SF:Forbidden</h1>\nRequest\x20forbidden\x20by\x20administrative\x20rules\. SF:\n</body></html>\n\n")%r(HTTPOptions,AA,"HTTP/1\.0\x20403\x20Forbidden\ SF:r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\n<htm SF:l><body><h1>403\x20Forbidden</h1>\nRequest\x20forbidden\x20by\x20admini SF:strative\x20rules\.\n</body></html>\n\n")%r(FourOhFourRequest,AA,"HTTP/ SF:1\.0\x20403\x20Forbidden\r\ncache-control:\x20no-cache\r\ncontent-type: SF:\x20text/html\r\n\r\n<html><body><h1>403\x20Forbidden</h1>\nRequest\x20 SF:forbidden\x20by\x20administrative\x20rules\.\n</body></html>\n\n")%r(to SF:r-versions,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\ncontent-length:\x2 SF:090\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconn SF:ection:\x20close\r\n\r\n<html><body><h1>400\x20Bad\x20request</h1>\nYou SF:r\x20browser\x20sent\x20an\x20invalid\x20request\.\n</body></html>\n")% SF:r(RTSPRequest,AA,"HTTP/1\.0\x20403\x20Forbidden\r\ncache-control:\x20no SF:-cache\r\ncontent-type:\x20text/html\r\n\r\n<html><body><h1>403\x20Forb SF:idden</h1>\nRequest\x20forbidden\x20by\x20administrative\x20rules\.\n</ SF:body></html>\n\n")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\ SF:ncontent-length:\x2090\r\ncache-control:\x20no-cache\r\ncontent-type:\x SF:20text/html\r\nconnection:\x20close\r\n\r\n<html><body><h1>400\x20Bad\x SF:20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n SF:</body></html>\n")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x SF:20request\r\ncontent-length:\x2090\r\ncache-control:\x20no-cache\r\ncon SF:tent-type:\x20text/html\r\nconnection:\x20close\r\n\r\n<html><body><h1> SF:400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x20invalid\x2 SF:0request\.\n</body></html>\n")%r(DNSStatusRequestTCP,CF,"HTTP/1\.1\x204 SF:00\x20Bad\x20request\r\ncontent-length:\x2090\r\ncache-control:\x20no-c SF:ache\r\ncontent-type:\x20text/html\r\nconnection:\x20close\r\n\r\n<html SF:><body><h1>400\x20Bad\x20request</h1>\nYour\x20browser\x20sent\x20an\x2 SF:0invalid\x20request\.\n</body></html>\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 5 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.24 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.62 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.67 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.44 ms google.as15169.any2ix.coresite.com (206.72.210.41) 5 46.51 ms 224.148.123.34.bc.googleusercontent.com (34.123.148.224) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 37.30 seconds