Nmap scan report for www.bastillepost.com (190.92.242.97) Host is up (0.16s latency). rDNS record for 190.92.242.97: ecs-190-92-242-97.compute.hwclouds-dns.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http elb |_http-title: Did not follow redirect to https://www.bastillepost.com:443/ | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 301 Moved Permanently | Date: Tue, 09 Sep 2025 09:15:02 GMT | Content-Type: text/html | Content-Length: 134 | Connection: close | Location: https://:443/nice%20ports%2C/Tri%6Eity.txt%2ebak | Server: elb | | 301 Moved Permanently | |

301 Moved Permanently

| | | GetRequest: | HTTP/1.1 301 Moved Permanently | Date: Tue, 09 Sep 2025 09:15:00 GMT | Content-Type: text/html | Content-Length: 134 | Connection: close | Location: https://:443/ | Server: elb | | 301 Moved Permanently | |

301 Moved Permanently

| | | HTTPOptions: | HTTP/1.1 301 Moved Permanently | Date: Tue, 09 Sep 2025 09:15:01 GMT | Content-Type: text/html | Content-Length: 134 | Connection: close | Location: https://:443/ | Server: elb | | 301 Moved Permanently | |

301 Moved Permanently

| | | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Tue, 09 Sep 2025 09:15:07 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Server: elb | | 400 Bad Request | |

400 Bad Request

| | | RTSPRequest, X11Probe: | HTTP/1.1 400 Bad Request | Date: Tue, 09 Sep 2025 09:15:01 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Server: elb | | 400 Bad Request | |

400 Bad Request

| |_ |_http-server-header: elb 443/tcp open ssl/https elb | fingerprint-strings: | FourOhFourRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Tue, 09 Sep 2025 09:15:08 GMT | Content-Type: text/html | Content-Length: 163 | Connection: close | Server: elb | | 400 Bad Request | |

400 Bad Request

|
openresty/1.15.8.1
| | | GetRequest: | HTTP/1.1 400 Bad Request | Date: Tue, 09 Sep 2025 09:15:07 GMT | Content-Type: text/html | Content-Length: 163 | Connection: close | Server: elb | | 400 Bad Request | |

400 Bad Request

|
openresty/1.15.8.1
| | | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Tue, 09 Sep 2025 09:15:16 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Server: elb | | 400 Bad Request | |

400 Bad Request

| | | RTSPRequest: | HTTP/1.1 400 Bad Request | Date: Tue, 09 Sep 2025 09:15:15 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Server: elb | | 400 Bad Request | |

400 Bad Request

| | | tor-versions: | HTTP/1.1 400 Bad Request | Date: Tue, 09 Sep 2025 09:15:09 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | Server: elb | | 400 Bad Request | |

400 Bad Request

| |_ |_http-title: Did not follow redirect to http://www.bastillepost.com/hongkong | http-robots.txt: 24 disallowed entries (15 shown) | /hongkong/Category/CateFirst | /macau/Category/CateFirst /china/Category/CateFirst | /global/Category/CateFirst /hongkong/Output /macau/Output /china/Output | /global/Output /wp-content/ /hongkong/wp-content/ | /macau/wp-content/ /global/wp-content/ /hongkong/hongkong/post.php |_/macau/macau/post.php /hongkong/category/157276 | ssl-cert: Subject: commonName=*.bastillepost.com | Subject Alternative Name: DNS:*.bastillepost.com, DNS:bastillepost.com | Not valid before: 2025-07-16T23:46:16 |_Not valid after: 2026-08-17T23:46:16 | tls-alpn: | http/1.1 | http/1.0 |_ http/0.9 |_http-server-header: elb |_ssl-date: TLS randomness does not represent time 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=9/9%Time=68BFF014%P=x86_64-redhat-linux-gnu%r(G SF:etRequest,134,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nDate:\x20Tue SF:,\x2009\x20Sep\x202025\x2009:15:00\x20GMT\r\nContent-Type:\x20text/html SF:\r\nContent-Length:\x20134\r\nConnection:\x20close\r\nLocation:\x20http SF:s://:443/\r\nServer:\x20elb\r\n\r\n\r\n301\x20Moved\ SF:x20Permanently\r\n\r\n

301\x20Moved\x20 SF:Permanently

\r\n\r\n\r\n")%r(HTTPOptions,134 SF:,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nDate:\x20Tue,\x2009\x20Se SF:p\x202025\x2009:15:01\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L SF:ength:\x20134\r\nConnection:\x20close\r\nLocation:\x20https://:443/\r\n SF:Server:\x20elb\r\n\r\n\r\n301\x20Moved\x20Permanentl SF:y\r\n\r\n

301\x20Moved\x20Permanently

\r\n\r\n\r\n")%r(RTSPRequest,109,"HTTP/1\.1\x SF:20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2009\x20Sep\x202025\x2009:15: SF:01\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nCo SF:nnection:\x20close\r\nServer:\x20elb\r\n\r\n\r\n400\ SF:x20Bad\x20Request\r\n\r\n

400\x20Bad\x2 SF:0Request

\r\n\r\n\r\n")%r(X11Probe,109,"HTTP SF:/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2009\x20Sep\x202025\x2 SF:009:15:01\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2012 SF:2\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x2 SF:0Bad\x20Request

\r\n\r\n\r\n")%r(FourOhFourR SF:equest,157,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nDate:\x20Tue,\x SF:2009\x20Sep\x202025\x2009:15:02\x20GMT\r\nContent-Type:\x20text/html\r\ SF:nContent-Length:\x20134\r\nConnection:\x20close\r\nLocation:\x20https:/ SF:/:443/nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\nServer:\x20elb\r\n\r\n\r\n301\x20Moved\x20Permanently\r\n\r\n

301\x20Moved\x20Permanently

\r\n\r SF:\n\r\n")%r(RPCCheck,109,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nD SF:ate:\x20Tue,\x2009\x20Sep\x202025\x2009:15:07\x20GMT\r\nContent-Type:\x SF:20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nServer SF::\x20elb\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/9%Time=68BFF01A%P=x86_64-redhat-linux- SF:gnu%r(GetRequest,132,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tu SF:e,\x2009\x20Sep\x202025\x2009:15:07\x20GMT\r\nContent-Type:\x20text/htm SF:l\r\nContent-Length:\x20163\r\nConnection:\x20close\r\nServer:\x20elb\r SF:\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
SF:openresty/1\.15\.8\.1
\r\n\r\n\r\n")%r(HTTPOption SF:s,132,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2009\x20Sep SF:\x202025\x2009:15:08\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Le SF:ngth:\x20163\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n\r\ SF:n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
openresty/1\.15 SF:\.8\.1
\r\n\r\n\r\n")%r(FourOhFourRequest,132,"HT SF:TP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2009\x20Sep\x202025\ SF:x2009:15:08\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20 SF:163\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\ SF:x20Bad\x20Request

\r\n
openresty/1\.15\.8\.1\r\n\r\n\r\n")%r(tor-versions,109,"HTTP/1\.1\x20400 SF:\x20Bad\x20Request\r\nDate:\x20Tue,\x2009\x20Sep\x202025\x2009:15:09\x2 SF:0GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnect SF:ion:\x20close\r\nServer:\x20elb\r\n\r\n\r\n400\x20Ba SF:d\x20Request\r\n\r\n

400\x20Bad\x20Requ SF:est

\r\n\r\n\r\n")%r(RTSPRequest,109,"HTTP/1 SF:\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2009\x20Sep\x202025\x200 SF:9:15:15\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\ SF:r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20B SF:ad\x20Request

\r\n\r\n\r\n")%r(RPCCheck,109, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x2009\x20Sep\x2020 SF:25\x2009:15:16\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\ SF:x20122\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

4 SF:00\x20Bad\x20Request

\r\n\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 16 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.23 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.53 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.96 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.60 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.58 ms ae-3.r26.lsanca07.us.bb.gin.ntt.net (129.250.3.130) 6 118.15 ms ae-5.r27.osakjp02.jp.bb.gin.ntt.net (129.250.2.177) 7 108.32 ms ae-2.a02.osakjp02.jp.bb.gin.ntt.net (129.250.4.240) 8 112.71 ms ae-0.pccw.osakjp02.jp.bb.gin.ntt.net (129.250.66.14) 9 165.22 ms BE45.br02.hkg04.as3491.net (63.218.114.110) 10 160.01 ms 63-220-200-35.static.as3491.net (63.220.200.35) 11 ... 15 16 162.35 ms ecs-190-92-242-97.compute.hwclouds-dns.com (190.92.242.97) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 65.75 seconds