Nmap scan report for tdum.stockstar.com (212.129.158.120) Host is up (0.14s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http SSwebsrv1.0 |_http-server-header: SSwebsrv1.0 | fingerprint-strings: | GetRequest: | HTTP/1.1 200 OK | Date: Fri, 01 Aug 2025 21:25:02 GMT | Content-Type: text/html | Connection: close | Server: SSwebsrv1.0 | | | | | | | |_ |

400 Bad Request

|
openresty/1.11.2.4
| | | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | Date: Fri, 01 Aug 2025 21:25:32 GMT | Content-Type: text/html | Connection: close | Server: SSwebsrv1.0 | | 400 Bad Request | |

400 Bad Request

|
openresty/1.11.2.4
| | | RPCCheck: | HTTP/1.1 400 Bad Request | Date: Fri, 01 Aug 2025 21:25:31 GMT | Content-Type: text/html | Connection: close | Server: SSwebsrv1.0 | | 400 Bad Request | |

400 Bad Request

|
openresty/1.11.2.4
| | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

|
openresty/1.11.2.4
| | | tor-versions: | HTTP/1.1 400 Bad Request | Date: Fri, 01 Aug 2025 21:25:25 GMT | Content-Type: text/html | Connection: close | Server: SSwebsrv1.0 | | 400 Bad Request | |

400 Bad Request

|
openresty/1.11.2.4
| |_ | tls-nextprotoneg: |_ http/1.1 | tls-alpn: |_ http/1.1 |_http-title: 400 The plain HTTP request was sent to HTTPS port |_http-server-header: SSwebsrv1.0 | ssl-cert: Subject: commonName=api.szzy888.com | Subject Alternative Name: DNS:api.szzy888.com | Not valid before: 2023-01-12T00:00:00 |_Not valid after: 2024-01-12T23:59:59 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=8/1%Time=688D30AE%P=x86_64-redhat-linux-gnu%r(G SF:etRequest,360A,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Fri,\x2001\x20Aug\x2 SF:02025\x2021:25:02\x20GMT\r\nContent-Type:\x20text/html\r\nConnection:\x SF:20close\r\nServer:\x20SSwebsrv1\.0\r\n\r\n\r\n\r\n\r\n\r\n\x20\x20\x20\x20\x20\r\n SF:\x20\x20\x20\x20\xd6\xa4\xc8\xaf\xd6\xae\xd0\xc7\x20-\x20\xb7\xa SF:2\xcf\xd6\xba\xc3\xcd\xb6\xd7\xca\xa3\xac\xcc\xe1\xb9\xa9\xb4\xf3\xc5\x SF:cc\xd6\xb8\xca\xfd\xa1\xa2\xd0\xd0\xc7\xe9\xca\xfd\xbe\xdd\xa1\xa2\xb2\ SF:xc6\xbe\xad\xa1\xa2\xb9\xc9\xc6\xb1\xa1\xa2\xbb\xf9\xbd\xf0\xa1\xa2\xc6 SF:\xda\xbb\xf5\xa1\xa2\xd2\xf8\xd0\xd0\xa1\xa2\xb1\xa3\xcf\xd5\xb5\xc8\xb SF:d\xf0\xc8\xda\xd0\xc5\xcf\xa2\xb7\xfe\xce\xf1\r\n\x20\x20\x20\x SF:20\r\n\x20\x20\x20\x20\r\n\x20\x20\x20\x20\r\n\x20\x20\x20\x20\r\ SF:n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
openresty/1\.11\.2\.4\r\n\r\n\r\n")%r(RTSP SF:Request,B3,"\r\n400\x20Bad\x20Request SF:\r\n\r\n

400\x20Bad\x20Request

\r\n
openresty/1\.11\.2\.4
\r\n\r\ SF:n\r\n")%r(RPCCheck,135,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDa SF:te:\x20Fri,\x2001\x20Aug\x202025\x2021:25:31\x20GMT\r\nContent-Type:\x2 SF:0text/html\r\nConnection:\x20close\r\nServer:\x20SSwebsrv1\.0\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\ SF:n
openresty/1\.11\.2\.4
\r\n\r\n\r\n") SF:%r(DNSVersionBindReqTCP,135,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate SF::\x20Fri,\x2001\x20Aug\x202025\x2021:25:32\x20GMT\r\nContent-Type:\x20t SF:ext/html\r\nConnection:\x20close\r\nServer:\x20SSwebsrv1\.0\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n< SF:hr>
openresty/1\.11\.2\.4
\r\n\r\n\r\n")%r SF:(DNSStatusRequestTCP,135,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x SF:20Fri,\x2001\x20Aug\x202025\x2021:25:33\x20GMT\r\nContent-Type:\x20text SF:/html\r\nConnection:\x20close\r\nServer:\x20SSwebsrv1\.0\r\n\r\n\ SF:r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
SF:
openresty/1\.11\.2\.4
\r\n\r\n\r\n")%r(He SF:lp,135,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Fri,\x2001\x20Au SF:g\x202025\x2021:25:33\x20GMT\r\nContent-Type:\x20text/html\r\nConnectio SF:n:\x20close\r\nServer:\x20SSwebsrv1\.0\r\n\r\n\r\n40 SF:0\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n
openresty/ SF:1\.11\.2\.4
\r\n\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 14 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.71 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.66 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.38 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.70 ms ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242) 6 12.26 ms 218.30.53.50 7 132.86 ms 202.97.92.77 8 132.31 ms 202.97.74.6 9 134.38 ms 202.97.57.146 10 ... 11 135.93 ms 101.95.247.134 12 135.96 ms 101.226.210.82 13 ... 14 136.66 ms 212.129.158.120 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 149.65 seconds