Analyser le rapport pour "v26-hca.douyinvod.com"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

28

Durée

2min 28.02seconde (148.02seconde)

Date

2024-09-18

IP

39.137.35.135

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A v26-hca.douyinvod.com)
Nmap scan report for v26-hca.douyinvod.com (39.137.35.135)
Host is up (0.23s latency).
Other addresses for v26-hca.douyinvod.com (not scanned): 116.153.39.142 61.54.86.159 61.54.86.156 116.153.39.141 39.137.107.206 39.137.35.137 39.135.60.79 39.137.107.205 39.135.60.82 39.137.107.201 39.137.107.203
Not shown: 972 filtered tcp ports (no-response)
PORT     STATE  SERVICE     VERSION
80/tcp   open   http        OpenResty web app server
|_http-title: 403 Forbidden
|_http-cors: GET POST OPTIONS
|_http-server-header: openresty
443/tcp  open   ssl/http    OpenResty web app server
| tls-alpn: 
|   h2
|_  http/1.1
| ssl-cert: Subject: commonName=*.douyinvod.com
| Subject Alternative Name: DNS:*.douyinvod.com, DNS:douyinvod.com
| Not valid before: 2024-05-23T00:00:00
|_Not valid after:  2025-05-23T23:59:59
|_http-server-header: openresty
|_http-cors: OPTIONS
|_ssl-date: TLS randomness does not represent time
| tls-nextprotoneg: 
|   h2
|_  http/1.1
|_http-title: 403 Forbidden
1935/tcp open   http        OpenResty web app server
|_http-cors: HEAD POST OPTIONS
|_http-server-header: openresty
|_http-title: 403 Forbidden
2607/tcp closed connection
3000/tcp open   http        OpenResty web app server
|_http-title: 403 Forbidden
|_http-server-header: openresty
|_http-cors: HEAD GET POST
4443/tcp open   ssl/http    OpenResty web app server
| tls-nextprotoneg: 
|   h2
|_  http/1.1
|_http-title: 403 Forbidden
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| ssl-cert: Subject: commonName=*.douyinvod.com
| Subject Alternative Name: DNS:*.douyinvod.com, DNS:douyinvod.com
| Not valid before: 2024-05-23T00:00:00
|_Not valid after:  2025-05-23T23:59:59
|_http-server-header: openresty
|_http-cors: HEAD GET POST OPTIONS
5100/tcp open   http        OpenResty web app server
|_http-title: 403 Forbidden
|_http-cors: POST OPTIONS
|_http-server-header: openresty
5101/tcp closed admdog
5102/tcp closed admeng
6101/tcp closed backupexec
7443/tcp open   ssl/http    OpenResty web app server
|_http-server-header: openresty
| tls-nextprotoneg: 
|   h2
|_  http/1.1
| tls-alpn: 
|   h2
|_  http/1.1
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=*.douyinvod.com
| Subject Alternative Name: DNS:*.douyinvod.com, DNS:douyinvod.com
| Not valid before: 2024-05-23T00:00:00
|_Not valid after:  2025-05-23T23:59:59
|_http-title: 400 The plain HTTP request was sent to HTTPS port
|_http-cors: HEAD GET
7777/tcp closed cbt
8000/tcp open   http        OpenResty web app server
|_http-title: 403 Forbidden
8001/tcp closed vcom-tunnel
8080/tcp open   http        OpenResty web app server
|_http-cors: HEAD GET POST OPTIONS
|_http-title: 403 Forbidden
8081/tcp open   http        OpenResty web app server
|_http-title: 403 Forbidden
|_http-cors: HEAD GET POST OPTIONS
|_http-server-header: openresty
8084/tcp closed websnp
8088/tcp open   http        OpenResty web app server
|_http-cors: HEAD GET POST OPTIONS
|_http-server-header: openresty
|_http-title: 403 Forbidden
8089/tcp closed unknown
8099/tcp closed unknown
8180/tcp open   http        OpenResty web app server
|_http-server-header: openresty
|_http-cors: HEAD GET OPTIONS
|_http-title: 403 Forbidden
8443/tcp open   ssl/http    OpenResty web app server
| ssl-cert: Subject: commonName=*.douyinvod.com
| Subject Alternative Name: DNS:*.douyinvod.com, DNS:douyinvod.com
| Not valid before: 2024-05-23T00:00:00
|_Not valid after:  2025-05-23T23:59:59
|_http-title: 403 Forbidden
|_http-cors: HEAD POST OPTIONS
| tls-nextprotoneg: 
|   h2
|_  http/1.1
|_http-server-header: openresty
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
8888/tcp open   http        OpenResty web app server
|_http-server-header: openresty
|_http-title: 403 Forbidden
|_http-cors: HEAD GET POST OPTIONS
9011/tcp closed d-star
9080/tcp closed glrpc
9081/tcp closed cisco-aqos
9090/tcp closed zeus-admin
9200/tcp open   http        OpenResty web app server
|_http-server-header: openresty
|_http-cors: HEAD GET POST OPTIONS
|_http-title: 403 Forbidden
Aggressive OS guesses: Linux 3.2 - 4.9 (92%), Linux 4.10 (89%), Linux 3.2 (88%), Linux 3.8 (88%), Linux 3.1 (87%), Android 4.1.2 (87%), Android 4.2.2 (Linux 3.4) (87%), Linux 3.7 (87%), Linksys EA3500 WAP (87%), Linux 5.3 - 5.4 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   31.08 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   263.85 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.91 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.40 ms   182.54.129.88
5   0.80 ms   lax-b22-link.ip.twelve99.net (62.115.162.54)
6   0.84 ms   lax-b23-link.ip.twelve99.net (62.115.143.38)
7   9.46 ms   sjo-b23-link.ip.twelve99.net (62.115.116.40)
8   30.80 ms  sea-b1-link.ip.twelve99.net (62.115.132.153)
9   74.69 ms  chinamobile-ic-342124.ip.twelve99-cust.net (62.115.171.221)
10  73.95 ms  223.120.6.53
11  75.68 ms  223.120.7.74
12  205.71 ms 221.183.89.182
13  233.76 ms 221.183.89.182
14  243.96 ms 221.183.89.50
15  241.12 ms 221.183.89.50
16  231.83 ms 117.143.109.186
17  242.14 ms 117.143.109.186
18  238.49 ms 39.137.35.135

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 148.02 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
39.137.35.135
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est Chine
Chine
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 28 identifiés
Exécuter la commande
nmap -A v26-hca.douyinvod.com
Scan date
18 Sep 2024 01:45
Durée de l'analyse
2min 28.02seconde (148.02seconde)
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: