Nmap scan report for coinguess.allfootballapp.com (43.158.121.168) Host is up (0.15s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http OpenWS | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Sat, 13 Sep 2025 03:09:00 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | Server: OpenWS | | 400 Bad Request | |

400 Bad Request

|
OpenWS
| | | GetRequest, HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Sat, 13 Sep 2025 03:08:59 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | Server: OpenWS | | 400 Bad Request | |

400 Bad Request

|
OpenWS
| | | RPCCheck: | HTTP/1.1 400 Bad Request | Server: stgw | Date: Sat, 13 Sep 2025 03:09:05 GMT | Content-Type: text/html | Content-Length: 149 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
stgw
| | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

|
stgw
| | | X11Probe: | HTTP/1.1 400 Bad Request | Server: stgw | Date: Sat, 13 Sep 2025 03:08:59 GMT | Content-Type: text/html | Content-Length: 149 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
stgw
| |_ |_http-title: 403 Forbidden |_http-server-header: OpenWS 443/tcp open ssl/https OpenWS |_http-title: 403 Forbidden | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 400 Bad Request | Date: Sat, 13 Sep 2025 03:09:07 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | Server: OpenWS | | 400 Bad Request | |

400 Bad Request

|
OpenWS
| | | GetRequest: | HTTP/1.1 400 Bad Request | Date: Sat, 13 Sep 2025 03:09:05 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | Server: OpenWS | | 400 Bad Request | |

400 Bad Request

|
OpenWS
| | | HTTPOptions: | HTTP/1.1 400 Bad Request | Date: Sat, 13 Sep 2025 03:09:06 GMT | Content-Type: text/html | Content-Length: 151 | Connection: close | Server: OpenWS | | 400 Bad Request | |

400 Bad Request

|
OpenWS
| | | RPCCheck: | HTTP/1.1 400 Bad Request | Server: stgw | Date: Sat, 13 Sep 2025 03:09:14 GMT | Content-Type: text/html | Content-Length: 149 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
stgw
| | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

|
stgw
| | | tor-versions: | HTTP/1.1 400 Bad Request | Server: stgw | Date: Sat, 13 Sep 2025 03:09:07 GMT | Content-Type: text/html | Content-Length: 149 | Connection: close | | 400 Bad Request | |

400 Bad Request

|
stgw
| |_ |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 | tls-nextprotoneg: | h2 |_ http/1.1 | ssl-cert: Subject: commonName=*.allfootballapp.com/organizationName=\xE5\x8C\x97\xE4\xBA\xAC\xE6\x87\x82\xE7\x90\x83\xE5\xB8\x9D\xE7\xA7\x91\xE6\x8A\x80\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE5\x8C\x97\xE4\xBA\xAC\xE5\xB8\x82/countryName=CN | Subject Alternative Name: DNS:*.allfootballapp.com, DNS:allfootballapp.com | Not valid before: 2025-04-28T06:14:25 |_Not valid after: 2026-05-30T06:14:24 |_http-server-header: OpenWS 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=9/12%Time=68C4E04A%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,129,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sat,\x20 SF:13\x20Sep\x202025\x2003:08:59\x20GMT\r\nContent-Type:\x20text/html\r\nC SF:ontent-Length:\x20151\r\nConnection:\x20close\r\nServer:\x20OpenWS\r\n\ SF:r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
Ope SF:nWS
\r\n\r\n\r\n")%r(HTTPOptions,129,"HTTP/1\.1\x SF:20400\x20Bad\x20Request\r\nDate:\x20Sat,\x2013\x20Sep\x202025\x2003:08: SF:59\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20151\r\nCo SF:nnection:\x20close\r\nServer:\x20OpenWS\r\n\r\n\r\n4 SF:00\x20Bad\x20Request\r\n\r\n

400\x20Bad SF:\x20Request

\r\n
OpenWS
\r\n\r\n SF:\r\n")%r(RTSPRequest,95,"\r\n400\x20Bad\x20Re SF:quest\r\n\r\n

400\x20Bad\x20Request

\r\n
stgw
\r\n\r\n\r\n")%r(X SF:11Probe,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20stgw\r\nD SF:ate:\x20Sat,\x2013\x20Sep\x202025\x2003:08:59\x20GMT\r\nContent-Type:\x SF:20text/html\r\nContent-Length:\x20149\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n SF:

400\x20Bad\x20Request

\r\n
stgw\r\n\r\n\r\n")%r(FourOhFourRequest,129,"HTTP/1\.1\x2 SF:0400\x20Bad\x20Request\r\nDate:\x20Sat,\x2013\x20Sep\x202025\x2003:09:0 SF:0\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20151\r\nCon SF:nection:\x20close\r\nServer:\x20OpenWS\r\n\r\n\r\n40 SF:0\x20Bad\x20Request\r\n\r\n

400\x20Bad\ SF:x20Request

\r\n
OpenWS
\r\n\r\n< SF:/html>\r\n")%r(RPCCheck,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServ SF:er:\x20stgw\r\nDate:\x20Sat,\x2013\x20Sep\x202025\x2003:09:05\x20GMT\r\ SF:nContent-Type:\x20text/html\r\nContent-Length:\x20149\r\nConnection:\x2 SF:0close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
SF:
stgw
\r\n\r\n\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/12%Time=68C4E051%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,129,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20S SF:at,\x2013\x20Sep\x202025\x2003:09:05\x20GMT\r\nContent-Type:\x20text/ht SF:ml\r\nContent-Length:\x20151\r\nConnection:\x20close\r\nServer:\x20Open SF:WS\r\n\r\n\r\n400\x20Bad\x20Request\r SF:\n\r\n

400\x20Bad\x20Request

\r\n
OpenWS
\r\n\r\n\r\n")%r(HTTPOptions,129,"HTTP SF:/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sat,\x2013\x20Sep\x202025\x2 SF:003:09:06\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2015 SF:1\r\nConnection:\x20close\r\nServer:\x20OpenWS\r\n\r\n\r\n< SF:title>400\x20Bad\x20Request\r\n\r\n

400 SF:\x20Bad\x20Request

\r\n
OpenWS
\r\n\r\n\r\n")%r(FourOhFourRequest,129,"HTTP/1\.1\x20400\x20Bad\x SF:20Request\r\nDate:\x20Sat,\x2013\x20Sep\x202025\x2003:09:07\x20GMT\r\nC SF:ontent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnection:\x20c SF:lose\r\nServer:\x20OpenWS\r\n\r\n\r\n400\x20Bad\x20R SF:equest\r\n\r\n

400\x20Bad\x20Request

\r\n
OpenWS
\r\n\r\n\r\n")% SF:r(tor-versions,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20st SF:gw\r\nDate:\x20Sat,\x2013\x20Sep\x202025\x2003:09:07\x20GMT\r\nContent- SF:Type:\x20text/html\r\nContent-Length:\x20149\r\nConnection:\x20close\r\ SF:n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
s SF:tgw
\r\n\r\n\r\n")%r(RTSPRequest,95,"\r\n400\x20Bad\x20Request\r\n\r\n
400\x20Bad\x20Request
\r\n
stgw
\r\n< SF:/body>\r\n\r\n")%r(RPCCheck,125,"HTTP/1\.1\x20400\x20Bad\x20Requ SF:est\r\nServer:\x20stgw\r\nDate:\x20Sat,\x2013\x20Sep\x202025\x2003:09:1 SF:4\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20149\r\nCon SF:nection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request</ SF:title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cent SF:er>\r\n<hr><center>stgw</center>\r\n</body>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: proxy server Running (JUST GUESSING): Blue Coat embedded (85%) OS CPE: cpe:/h:bluecoat:packetshaper Aggressive OS guesses: Blue Coat PacketShaper appliance (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 18 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.26 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 4.53 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 2.95 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 0.65 ms be3243.ccr41.lax05.atlas.cogentco.com (154.54.27.118) 6 0.80 ms lax-b22-link.ip.twelve99.net (80.239.160.64) 7 63.57 ms rest-bb1-link.ip.twelve99.net (62.115.137.36) 8 151.45 ms lax-b22-link.ip.twelve99.net (62.115.140.157) 9 56.21 ms rest-bb1-link.ip.twelve99.net (62.115.139.140) 10 138.66 ms prs-bb2-link.ip.twelve99.net (62.115.140.106) 11 146.25 ms oriental-ic-376189.ip.twelve99-cust.net (62.115.50.145) 12 ... 13 14 143.16 ms ffm-b11-link.ip.twelve99.net (62.115.124.117) 15 150.18 ms 11.40.61.89 16 ... 17 149.79 ms 11.40.61.89 18 152.06 ms 43.158.121.168 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 64.92 seconds