Analyser le rapport pour "v53-te.tiktokcdn.com"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A v53-te.tiktokcdn.com)
Nmap scan report for v53-te.tiktokcdn.com (58.27.5.112)
Host is up (0.22s latency).
Other addresses for v53-te.tiktokcdn.com (not scanned): 58.27.5.116
Not shown: 997 filtered ports
PORT     STATE SERVICE   VERSION
80/tcp   open  http
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.0 403 Forbidden
|     Content-Length: 155
|     X-Block-Reason: noncdn
|_    <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>403 Forbidden</TITLE></HEAD><BODY><H1>403 Forbidden</H1></BODY></HTML>
|_http-title: Did not follow redirect to https://v53-te.tiktokcdn.com/
443/tcp  open  ssl/https
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.0 403 Forbidden
|     Content-Length: 155
|     X-Block-Reason: noncdn
|_    <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>403 Forbidden</TITLE></HEAD><BODY><H1>403 Forbidden</H1></BODY></HTML>
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=*.tiktokcdn.com
| Subject Alternative Name: DNS:*.tiktokcdn.com, DNS:tiktokcdn.com
| Not valid before: 2023-09-01T00:00:00
|_Not valid after:  2024-10-01T23:59:59
|_ssl-date: TLS randomness does not represent time
1935/tcp open  rtmp?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/20%Time=655B4F67%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\x20155
SF:\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-equiv=\"
SF:content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403\x20For
SF:bidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTML>")%r(
SF:HTTPOptions,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\x20155
SF:\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-equiv=\"
SF:content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403\x20For
SF:bidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTML>")%r(
SF:FourOhFourRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\
SF:x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-eq
SF:uiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403\
SF:x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTML
SF:>");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655B4F6E%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:
SF:\x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-e
SF:quiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403
SF:\x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTM
SF:L>")%r(HTTPOptions,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:
SF:\x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-e
SF:quiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403
SF:\x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTM
SF:L>")%r(FourOhFourRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-L
SF:ength:\x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20
SF:http-equiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TIT
SF:LE>403\x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY
SF:></HTML>");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Crestron XPanel control system (90%), Rebranded surveillance DVR (Hikvision, Q-SEE, EYEsurv, A1Webcams, Foscam) (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (88%), OpenWrt White Russian 0.9 (Linux 2.4.30) (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (88%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.16 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops

TRACEROUTE (using port 443/tcp)
HOP RTT       ADDRESS
1   0.19 ms   208.76.251.177
2   0.58 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.62 ms   multacom.com (96.45.162.9)
4   2.79 ms   ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5   ...
6   195.14 ms be2913.ccr31.sin01.atlas.cogentco.com (154.54.27.53)
7   ...
8   237.91 ms 10.55.108.66
9   235.93 ms 10.55.108.63
10  237.44 ms 10.55.52.31
11  230.30 ms 10.55.48.234
12  235.75 ms 58.27.5.112

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 243.41 seconds
Schéma de couleur
Cible
v53-te.tiktokcdn.com
IP cible
58.27.5.112
Pays cible
MY
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A v53-te.tiktokcdn.com
Scan date
20 Nov 2023 07:25
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Total scans
About 2 times
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: