Nmap scan report for pdr.xdplt.com (139.9.203.199)
Host is up (0.17s latency).
rDNS record for 139.9.203.199: ecs-139-9-203-199.compute.hwclouds-dns.com
Not shown: 998 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http elb
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 400 Bad Request
| Date: Thu, 11 Sep 2025 09:39:02 GMT
| Content-Type: text/html
| Content-Length: 154
| Connection: close
| Server: elb
|
|
400 Bad Request
|
| 400 Bad Request
|
openresty
|
|
| GetRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| Date: Thu, 11 Sep 2025 09:39:01 GMT
| Content-Type: text/html
| Content-Length: 154
| Connection: close
| Server: elb
|
| 400 Bad Request
|
| 400 Bad Request
|
openresty
|
|
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Date: Thu, 11 Sep 2025 09:39:08 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| Server: elb
|
| 400 Bad Request
|
| 400 Bad Request
|
|
| RTSPRequest, X11Probe:
| HTTP/1.1 400 Bad Request
| Date: Thu, 11 Sep 2025 09:39:02 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| Server: elb
|
| 400 Bad Request
|
| 400 Bad Request
|
|_
|_http-title: 404 Not Found
|_http-server-header: elb
443/tcp open ssl/https elb
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 400 Bad Request
| Date: Thu, 11 Sep 2025 09:39:09 GMT
| Content-Type: text/html
| Content-Length: 154
| Connection: close
| Server: elb
|
| 400 Bad Request
|
| 400 Bad Request
|
openresty
|
|
| GetRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| Date: Thu, 11 Sep 2025 09:39:08 GMT
| Content-Type: text/html
| Content-Length: 154
| Connection: close
| Server: elb
|
| 400 Bad Request
|
| 400 Bad Request
|
openresty
|
|
| RPCCheck, RTSPRequest:
| HTTP/1.1 400 Bad Request
| Date: Thu, 11 Sep 2025 09:39:16 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| Server: elb
|
| 400 Bad Request
|
| 400 Bad Request
|
|
| tor-versions:
| HTTP/1.1 400 Bad Request
| Date: Thu, 11 Sep 2025 09:39:10 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| Server: elb
|
| 400 Bad Request
|
| 400 Bad Request
|
|_
|_http-title: 404 Not Found
| ssl-cert: Subject: commonName=*.xdplt.com
| Subject Alternative Name: DNS:*.xdplt.com, DNS:xdplt.com
| Not valid before: 2025-05-15T00:00:00
|_Not valid after: 2026-03-09T23:59:59
|_http-server-header: elb
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=9/11%Time=68C298B4%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,129,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x20
SF:11\x20Sep\x202025\x2009:39:01\x20GMT\r\nContent-Type:\x20text/html\r\nC
SF:ontent-Length:\x20154\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n
SF:\r\n400\x20Bad\x20Request\r\n\r
SF:\n400\x20Bad\x20Request
\r\n
openre
SF:sty\r\n\r\n\r\n")%r(HTTPOptions,129,"HTTP/1\.1\x
SF:20400\x20Bad\x20Request\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2009:39:
SF:01\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20154\r\nCo
SF:nnection:\x20close\r\nServer:\x20elb\r\n\r\n\r\n400\
SF:x20Bad\x20Request\r\n\r\n400\x20Bad\x2
SF:0Request
\r\n
openresty\r\n\r\n
SF:\r\n")%r(RTSPRequest,109,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n
SF:Date:\x20Thu,\x2011\x20Sep\x202025\x2009:39:02\x20GMT\r\nContent-Type:\
SF:x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nServe
SF:r:\x20elb\r\n\r\n\r\n400\x20Bad\x20Request
SF:head>\r\n\r\n400\x20Bad\x20Request
\r\n<
SF:/body>\r\n\r\n")%r(X11Probe,109,"HTTP/1\.1\x20400\x20Bad\x20Requ
SF:est\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2009:39:02\x20GMT\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r
SF:\nServer:\x20elb\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\r\n\r\n\r\n")%r(FourOhFourRequest,129,"HTTP/1\.1\x2040
SF:0\x20Bad\x20Request\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2009:39:02\x
SF:20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20154\r\nConnec
SF:tion:\x20close\r\nServer:\x20elb\r\n\r\n\r\n400\x20B
SF:ad\x20Request\r\n\r\n400\x20Bad\x20Req
SF:uest
\r\n
openresty\r\n\r\n\r\n")%r(RPCCheck,109,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x
SF:20Thu,\x2011\x20Sep\x202025\x2009:39:08\x20GMT\r\nContent-Type:\x20text
SF:/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nServer:\x20e
SF:lb\r\n\r\n\r\n400\x20Bad\x20Request\r
SF:\n\r\n400\x20Bad\x20Request
\r\n\
SF:r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/11%Time=68C298BB%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,129,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20T
SF:hu,\x2011\x20Sep\x202025\x2009:39:08\x20GMT\r\nContent-Type:\x20text/ht
SF:ml\r\nContent-Length:\x20154\r\nConnection:\x20close\r\nServer:\x20elb\
SF:r\n\r\n\r\n400\x20Bad\x20Request\r\n<
SF:body>\r\n400\x20Bad\x20Request
\r\n
openresty\r\n\r\n\r\n")%r(HTTPOptions,129,"HTTP
SF:/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2
SF:009:39:08\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2015
SF:4\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n400\x2
SF:0Bad\x20Request
\r\n
openresty\r\n\r\n\r\n")%r(FourOhFourRequest,129,"HTTP/1\.1\x20400\x20Bad\x
SF:20Request\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2009:39:09\x20GMT\r\nC
SF:ontent-Type:\x20text/html\r\nContent-Length:\x20154\r\nConnection:\x20c
SF:lose\r\nServer:\x20elb\r\n\r\n\r\n400\x20Bad\x20Requ
SF:est\r\n\r\n400\x20Bad\x20Request
<
SF:/center>\r\n
openresty\r\n\r\n\r\n")%
SF:r(tor-versions,109,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Thu,
SF:\x2011\x20Sep\x202025\x2009:39:10\x20GMT\r\nContent-Type:\x20text/html\
SF:r\nContent-Length:\x20122\r\nConnection:\x20close\r\nServer:\x20elb\r\n
SF:\r\n\r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\r\n\r\n\r\n")%r(RTSPRequest,109,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDat
SF:e:\x20Thu,\x2011\x20Sep\x202025\x2009:39:16\x20GMT\r\nContent-Type:\x20
SF:text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nServer:\
SF:x20elb\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\r\n\r\n\r\n")%r(RPCCheck,109,"HTTP/1\.1\x20400\x20Bad\x20Request
SF:\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2009:39:16\x20GMT\r\nContent-Ty
SF:pe:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\nS
SF:erver:\x20elb\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\
SF:r\n\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 20 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.68 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.68 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4 0.73 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5 0.52 ms ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242)
6 7.41 ms ae-17.r26.snjsca04.us.bb.gin.ntt.net (129.250.4.239)
7 8.68 ms ae-19.a03.snjsca04.us.bb.gin.ntt.net (129.250.5.25)
8 10.14 ms 218.30.53.50
9 ...
10 165.76 ms 202.97.94.101
11 ...
12 167.16 ms 113.96.4.54
13 ...
14 163.40 ms 121.14.60.42
15 ... 19
20 163.62 ms ecs-139-9-203-199.compute.hwclouds-dns.com (139.9.203.199)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 66.31 seconds