Nmap scan report for 10jqka.com.cn ( Host is up (0.16s latency). rDNS record for xy17.myhexin.com Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http-proxy Squid http proxy 3.5.20 |_http-server-header: squid/3.5.20 |_http-title: Did not follow redirect to http://www.10jqka.com.cn/ 443/tcp open ssl/http-proxy Squid http proxy 3.5.20 |_http-server-header: squid/3.5.20 |_http-title: Did not follow redirect to http://www.10jqka.com.cn/ | ssl-cert: Subject: commonName=*.10jqka.com.cn/organizationName=Hithink RoyalFlush Information Network Co.,Ltd./stateOrProvinceName=\xE6\xB5\x99\xE6\xB1\x9F\xE7\x9C\x81/countryName=CN | Subject Alternative Name: DNS:*.10jqka.com.cn, DNS:*.kuaicha365.com, DNS:*.forfunds.cn, DNS:*.aicubes.cn, DNS:*.iwencai.cn, DNS:*.0033.cn, DNS:*.300033.info, DNS:*.touzime.com, DNS:*.touzime.cn, DNS:*.touzime.com.cn, DNS:*.touzime.net, DNS:*.0033cas.com, DNS:*.0033cas.cn, DNS:*.hexin.cn, DNS:*.thsi.cn, DNS:*.iwencai.com, DNS:*.liejin99.com, DNS:*.0033.com, DNS:*.ths123.com, DNS:*.myhexin.com, DNS:*.51ifind.cn, DNS:*.51ifind.com, DNS:*.5ifund.com, DNS:*.5ifund.cn, DNS:*.hexin0033.net, DNS:*.5ifind.com.cn, DNS:*.5ifind.cn, DNS:10jqka.com.cn | Not valid before: 2023-08-11T00:00:00 |_Not valid after: 2024-06-17T23:59:59 |_ssl-date: TLS randomness does not represent time Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): FreeBSD 10.X (86%), OpenBSD 4.X (85%) OS CPE: cpe:/o:freebsd:freebsd:10.1 cpe:/o:openbsd:openbsd:4.3 Aggressive OS guesses: FreeBSD 10.1-RELEASE (86%), OpenBSD 4.3 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 12 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.69 ms 2 0.85 ms gw.mcom-colocationamerica.com ( 3 10.77 ms multacom.com ( 4 0.38 ms 5 7.27 ms 6 159.28 ms 7 169.70 ms 8 167.84 ms 9 156.62 ms 10 157.69 ms 11 ... 12 155.88 ms xy17.myhexin.com ( OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 64.95 seconds