Nmap scan report for plinksplanet.com (116.202.46.214) Host is up (0.14s latency). rDNS record for 116.202.46.214: static.214.46.202.116.clients.your-server.de Not shown: 996 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.6p1 Ubuntu 3ubuntu13.11 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 256 94:7d:4a:d6:4c:53:83:fa:65:af:3f:83:98:e5:8a:dd (ECDSA) |_ 256 c0:21:3f:f8:40:2c:92:39:c3:58:ae:ba:b6:66:53:a9 (ED25519) 80/tcp open http Caddy httpd |_http-title: Site doesn't have a title. |_http-server-header: Caddy 443/tcp open ssl/http Caddy httpd |_http-title: Site doesn't have a title. |_http-server-header: Caddy | ssl-cert: Subject: commonName=plinksplanet.com | Subject Alternative Name: DNS:plinksplanet.com | Not valid before: 2025-08-07T14:03:06 |_Not valid after: 2025-11-05T14:03:05 8088/tcp open radan-http | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 404 Not Found | Content-Type: application/json; charset=UTF-8 | Date: Thu, 11 Sep 2025 10:35:26 GMT | Content-Length: 24 | {"message":"Not Found"} | GenericLines, Help, Kerberos, LPDString, RTSPRequest, SSLSessionReq, Socks5, TLSSessionReq, TerminalServerCookie: | HTTP/1.1 400 Bad Request | Content-Type: text/plain; charset=utf-8 | Connection: close | Request | GetRequest: | HTTP/1.0 404 Not Found | Content-Type: application/json; charset=UTF-8 | Date: Thu, 11 Sep 2025 10:34:52 GMT | Content-Length: 24 | {"message":"Not Found"} | HTTPOptions: | HTTP/1.0 404 Not Found | Content-Type: application/json; charset=UTF-8 | Date: Thu, 11 Sep 2025 10:34:58 GMT | Content-Length: 24 |_ {"message":"Not Found"} |_http-title: Site doesn't have a title (application/json; charset=UTF-8). 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port8088-TCP:V=7.92%I=7%D=9/11%Time=68C2A5CB%P=x86_64-redhat-linux-gnu% SF:r(GetRequest,9A,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20a SF:pplication/json;\x20charset=UTF-8\r\nDate:\x20Thu,\x2011\x20Sep\x202025 SF:\x2010:34:52\x20GMT\r\nContent-Length:\x2024\r\n\r\n{\"message\":\"Not\ SF:x20Found\"}\n")%r(Socks5,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCont SF:ent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r SF:\n400\x20Bad\x20Request")%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x2 SF:0Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection SF::\x20close\r\n\r\n400\x20Bad\x20Request")%r(HTTPOptions,9A,"HTTP/1\.0\x SF:20404\x20Not\x20Found\r\nContent-Type:\x20application/json;\x20charset= SF:UTF-8\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2010:34:58\x20GMT\r\nConte SF:nt-Length:\x2024\r\n\r\n{\"message\":\"Not\x20Found\"}\n")%r(RTSPReques SF:t,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain SF:;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request SF:")%r(Help,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20te SF:xt/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x2 SF:0Request")%r(SSLSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCo SF:ntent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n SF:\r\n400\x20Bad\x20Request")%r(TerminalServerCookie,67,"HTTP/1\.1\x20400 SF:\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\n SF:Connection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(TLSSessionReq,67, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20 SF:charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r( SF:Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20tex SF:t/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20 SF:Request")%r(FourOhFourRequest,9A,"HTTP/1\.0\x20404\x20Not\x20Found\r\nC SF:ontent-Type:\x20application/json;\x20charset=UTF-8\r\nDate:\x20Thu,\x20 SF:11\x20Sep\x202025\x2010:35:26\x20GMT\r\nContent-Length:\x2024\r\n\r\n{\ SF:"message\":\"Not\x20Found\"}\n")%r(LPDString,67,"HTTP/1\.1\x20400\x20Ba SF:d\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnec SF:tion:\x20close\r\n\r\n400\x20Bad\x20Request"); Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.6 Network Distance: 13 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.56 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.65 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.52 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 ... 8 9 138.68 ms ae-1.a03.frnkge13.de.bb.gin.ntt.net (129.250.4.175) 10 139.22 ms ae-0.hetzner.frnkge13.de.bb.gin.ntt.net (213.198.82.130) 11 141.90 ms core12.nbg1.hetzner.com (213.239.252.26) 12 142.72 ms ex9k1.dc3.nbg1.hetzner.com (213.239.229.154) 13 142.32 ms static.214.46.202.116.clients.your-server.de (116.202.46.214) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 116.45 seconds