Nmap scan report for www.3322.org (118.184.169.48)
Host is up (0.15s latency).
Not shown: 995 closed tcp ports (reset)
PORT STATE SERVICE VERSION
25/tcp open smtp Postfix smtpd
|_smtp-commands: haproxy2.pubyun.com, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING
| ssl-cert: Subject: commonName=haproxy2.pubyun.com
| Subject Alternative Name: DNS:haproxy2.pubyun.com
| Not valid before: 2025-05-31T14:35:16
|_Not valid after: 2035-05-29T14:35:16
|_ssl-date: TLS randomness does not represent time
80/tcp open http nginx
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 400 Bad Request
| server: nginx
| date: Mon, 15 Sep 2025 08:41:21 GMT
| content-type: text/html
| content-length: 150
| connection: close
|
|
400 Bad Request
|
| 400 Bad Request
|
nginx
|
|
| GetRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| server: nginx
| date: Mon, 15 Sep 2025 08:41:20 GMT
| content-type: text/html
| content-length: 150
| connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
nginx
|
|
| RPCCheck, RTSPRequest, X11Probe:
| HTTP/1.1 400 Bad request
| Content-length: 90
| Cache-Control: no-cache
| Connection: close
| Content-Type: text/html
| 400 Bad request
| Your browser sent an invalid request.
|_
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: nginx
443/tcp open ssl/https nginx
| fingerprint-strings:
| DNSVersionBindReqTCP, RPCCheck, RTSPRequest, tor-versions:
| HTTP/1.1 400 Bad request
| Content-length: 90
| Cache-Control: no-cache
| Connection: close
| Content-Type: text/html
| 400 Bad request
| Your browser sent an invalid request.
|
| FourOhFourRequest, HTTPOptions:
| HTTP/1.1 429 Too Many Requests
| content-length: 117
| cache-control: no-cache
| content-type: text/html
| connection: close
| 429 Too Many Requests
| have sent too many requests in a given amount of time.
|
| GetRequest:
| HTTP/1.1 400 Bad Request
| server: nginx
| date: Mon, 15 Sep 2025 08:41:26 GMT
| content-type: text/html
| content-length: 150
| connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
nginx
|
|_
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: nginx
| ssl-cert: Subject: commonName=baojia.orelc.com
| Subject Alternative Name: DNS:baojia.orelc.com
| Not valid before: 2021-11-06T04:15:52
|_Not valid after: 2022-02-04T04:15:51
|_ssl-date: TLS randomness does not represent time
445/tcp filtered microsoft-ds
4444/tcp filtered krb524
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=9/15%Time=68C7D12F%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,127,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nserver:\x20nginx\
SF:r\ndate:\x20Mon,\x2015\x20Sep\x202025\x2008:41:20\x20GMT\r\ncontent-typ
SF:e:\x20text/html\r\ncontent-length:\x20150\r\nconnection:\x20close\r\n\r
SF:\n\r\n400\x20Bad\x20Request\r\n
SF:\r\n400\x20Bad\x20Request
\r\n
ngin
SF:x\r\n\r\n\r\n")%r(HTTPOptions,127,"HTTP/1\.1\x20
SF:400\x20Bad\x20Request\r\nserver:\x20nginx\r\ndate:\x20Mon,\x2015\x20Sep
SF:\x202025\x2008:41:20\x20GMT\r\ncontent-type:\x20text/html\r\ncontent-le
SF:ngth:\x20150\r\nconnection:\x20close\r\n\r\n\r\n400\
SF:x20Bad\x20Request\r\n\r\n400\x20Bad\x2
SF:0Request
\r\n
nginx\r\n\r\n\r\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConte
SF:nt-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\
SF:r\nContent-Type:\x20text/html\r\n\r\n400\x20Bad\x20requ
SF:est
\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n")%r(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConte
SF:nt-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\
SF:r\nContent-Type:\x20text/html\r\n\r\n400\x20Bad\x20requ
SF:est
\nYour\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n")%r(FourOhFourRequest,127,"HTTP/1\.1\x20400\x20Bad\x20Reques
SF:t\r\nserver:\x20nginx\r\ndate:\x20Mon,\x2015\x20Sep\x202025\x2008:41:21
SF:\x20GMT\r\ncontent-type:\x20text/html\r\ncontent-length:\x20150\r\nconn
SF:ection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\r\n
nginx\r\n\r\n\r\n")%r(RPCCheck
SF:,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCac
SF:he-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20tex
SF:t/html\r\n\r\n400\x20Bad\x20request
\nYour\x20brows
SF:er\x20sent\x20an\x20invalid\x20request\.\n\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/15%Time=68C7D136%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,127,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nserver:\x2
SF:0nginx\r\ndate:\x20Mon,\x2015\x20Sep\x202025\x2008:41:26\x20GMT\r\ncont
SF:ent-type:\x20text/html\r\ncontent-length:\x20150\r\nconnection:\x20clos
SF:e\r\n\r\n\r\n400\x20Bad\x20Request\r\
SF:n\r\n400\x20Bad\x20Request
\r\n
nginx\r\n\r\n\r\n")%r(HTTPOptions,F1,"HTTP/1\
SF:.1\x20429\x20Too\x20Many\x20Requests\r\ncontent-length:\x20117\r\ncache
SF:-control:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnection:\x20c
SF:lose\r\n\r\n429\x20Too\x20Many\x20Requests
\nYou\x2
SF:0have\x20sent\x20too\x20many\x20requests\x20in\x20a\x20given\x20amount\
SF:x20of\x20time\.\n\n")%r(FourOhFourRequest,F1,"HTTP/1\.1\x
SF:20429\x20Too\x20Many\x20Requests\r\ncontent-length:\x20117\r\ncache-con
SF:trol:\x20no-cache\r\ncontent-type:\x20text/html\r\nconnection:\x20close
SF:\r\n\r\n429\x20Too\x20Many\x20Requests
\nYou\x20hav
SF:e\x20sent\x20too\x20many\x20requests\x20in\x20a\x20given\x20amount\x20o
SF:f\x20time\.\n\n")%r(tor-versions,CF,"HTTP/1\.1\x20400\x20
SF:Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r
SF:\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n400\x20Bad\x20request
\nYour\x20browser\x20sent\x20an\x20inval
SF:id\x20request\.\n\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\
SF:x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cach
SF:e\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n400\x20Bad\x20request
\nYour\x20browser\x20sent\x20an\x20in
SF:valid\x20request\.\n\n")%r(RPCCheck,CF,"HTTP/1\.1\x20400\
SF:x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cach
SF:e\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n400\x20Bad\x20request
\nYour\x20browser\x20sent\x20an\x20in
SF:valid\x20request\.\n