Puertos
Duración
Fecha
IP
Nmap scan report for focus.cn (61.135.164.48) Host is up (0.15s latency). rDNS record for 61.135.164.48: smtp.eachnet.com.cn Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http nginx |_http-title: 503 Service Temporarily Unavailable 443/tcp open ssl/http nginx |_http-title: 503 Service Temporarily Unavailable |_ssl-date: TLS randomness does not represent time |_http-server-header: SWS | tls-alpn: | h2 |_ http/1.1 | ssl-cert: Subject: commonName=*.focus.cn/organizationName=\xE5\x8C\x97\xE4\xBA\xAC\xE6\x90\x9C\xE7\x8B\x90\xE6\x96\xB0\xE5\xAA\x92\xE4\xBD\x93\xE4\xBF\xA1\xE6\x81\xAF\xE6\x8A\x80\xE6\x9C\xAF\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE5\x8C\x97\xE4\xBA\xAC\xE5\xB8\x82/countryName=CN | Subject Alternative Name: DNS:*.focus.cn, DNS:*.home.focus.cn, DNS:*.focus-img.cn, DNS:focus.cn | Not valid before: 2024-03-13T00:00:00 |_Not valid after: 2024-11-20T23:59:59 | tls-nextprotoneg: | h2 |_ http/1.1 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 3.12 - 4.10 (94%), Linux 3.16 (92%), Crestron XPanel control system (90%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (90%), Linux 3.2 (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (88%), OpenWrt White Russian 0.9 (Linux 2.4.30) (88%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), HP P2000 G3 NAS device (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 12 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 1.47 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.73 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.39 ms 182.54.129.110 5 176.72 ms 219.158.33.77 6 153.84 ms 219.158.96.37 7 154.58 ms 219.158.9.226 8 ... 9 10 149.83 ms 221.216.107.170 11 ... 12 153.35 ms smtp.eachnet.com.cn (61.135.164.48) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 56.88 seconds