Puertos
Duración
Fecha
IP
Nmap scan report for hw-sh-pcdn-32.biliapi.net (101.91.136.167) Host is up (0.15s latency). Not shown: 996 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp closed http 443/tcp open ssl/https? | tls-alpn: |_ h2 |_ssl-date: TLS randomness does not represent time | ssl-cert: Subject: commonName=*.biliapi.net | Subject Alternative Name: DNS:*.biliapi.net, DNS:biliapi.net | Not valid before: 2024-04-23T12:04:28 |_Not valid after: 2025-05-25T12:04:27 8443/tcp open https-alt | fingerprint-strings: | FourOhFourRequest: | HTTP/1.0 200 OK | Date: Thu, 26 Dec 2024 12:47:29 GMT | Content-Length: 0 | GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SSLSessionReq, SSLv23SessionReq, TLSSessionReq, TerminalServerCookie: | HTTP/1.1 400 Bad Request | Content-Type: text/plain; charset=utf-8 | Connection: close | Request | GetRequest: | HTTP/1.0 200 OK | Date: Thu, 26 Dec 2024 12:47:01 GMT | Content-Length: 0 | HTTPOptions: | HTTP/1.0 200 OK | Date: Thu, 26 Dec 2024 12:47:02 GMT |_ Content-Length: 0 |_http-title: Site doesn't have a title. 9000/tcp closed cslistener 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=12/26%Time=676D504A%P=x86_64-redhat-linu SF:x-gnu%r(NULL,F,"\0\0\x06\x04\0\0\0\0\0\0\x05\0\0@\0")%r(GetRequest,F,"\ SF:0\0\x06\x04\0\0\0\0\0\0\x05\0\0@\0")%r(HTTPOptions,F,"\0\0\x06\x04\0\0\ SF:0\0\0\0\x05\0\0@\0")%r(FourOhFourRequest,F,"\0\0\x06\x04\0\0\0\0\0\0\x0 SF:5\0\0@\0"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port8443-TCP:V=7.92%I=7%D=12/26%Time=676D5043%P=x86_64-redhat-linux-gnu SF:%r(SSLSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type SF::\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x2 SF:0Bad\x20Request")%r(TLSSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Reques SF:t\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20cl SF:ose\r\n\r\n400\x20Bad\x20Request")%r(SSLv23SessionReq,67,"HTTP/1\.1\x20 SF:400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\ SF:r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(GenericLines,6 SF:7,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x SF:20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")% SF:r(GetRequest,4B,"HTTP/1\.0\x20200\x20OK\r\nDate:\x20Thu,\x2026\x20Dec\x SF:202024\x2012:47:01\x20GMT\r\nContent-Length:\x200\r\n\r\n")%r(HTTPOptio SF:ns,4B,"HTTP/1\.0\x20200\x20OK\r\nDate:\x20Thu,\x2026\x20Dec\x202024\x20 SF:12:47:02\x20GMT\r\nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,67,"HTT SF:P/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20char SF:set=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(Help SF:,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain; SF:\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request" SF:)%r(TerminalServerCookie,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCont SF:ent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r SF:\n400\x20Bad\x20Request")%r(Kerberos,67,"HTTP/1\.1\x20400\x20Bad\x20Req SF:uest\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x2 SF:0close\r\n\r\n400\x20Bad\x20Request")%r(FourOhFourRequest,4B,"HTTP/1\.0 SF:\x20200\x20OK\r\nDate:\x20Thu,\x2026\x20Dec\x202024\x2012:47:29\x20GMT\ SF:r\nContent-Length:\x200\r\n\r\n")%r(LPDString,67,"HTTP/1\.1\x20400\x20B SF:ad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nConne SF:ction:\x20close\r\n\r\n400\x20Bad\x20Request")%r(LDAPSearchReq,67,"HTTP SF:/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20chars SF:et=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request"); Aggressive OS guesses: Linux 2.6.32 - 3.13 (94%), Linux 2.6.32 (91%), Linux 3.2 - 4.9 (91%), Linux 2.6.32 - 3.10 (91%), HP P2000 G3 NAS device (90%), Oracle VM Server 3.4.2 (Linux 4.1) (90%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (89%), Linux 5.0 - 5.4 (89%), Linux 5.1 (89%), Ubiquiti Pico Station WAP (AirOS 5.2.6) (89%) No exact OS matches for host (test conditions non-ideal). Network Distance: 21 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.60 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.73 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.34 ms 182.54.129.104 5 0.53 ms 218.30.54.189 6 148.46 ms 202.97.59.169 7 ... 8 153.30 ms 202.97.24.253 9 ... 20 21 150.48 ms 101.91.136.167 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 91.32 seconds