Scan report for "down.qq.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A down.qq.com)
Nmap scan report for down.qq.com (101.33.21.193)
Host is up (0.00036s latency).
Other addresses for down.qq.com (not scanned): 43.132.84.55 101.33.21.71
Not shown: 997 filtered ports
PORT     STATE  SERVICE   VERSION
80/tcp   open   http      Lego Server
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Content-Length: 0
|     X-NWS-LOG-UUID: 18041183801277511874
|     Connection: close
|     Server: Lego Server
|     Date: Mon, 20 Nov 2023 05:22:34 GMT
|     X-Cache-Lookup: Return Directly
|     X-ServerIp: 101.33.21.193
|     Client-Ip: 208.76.253.234
|   GenericLines: 
|     HTTP/1.1 400 Bad Request
|     Connection: close
|     Content-Length: 0
|     Server: Lego Server
|     Date: Mon, 20 Nov 2023 05:22:34 GMT
|   GetRequest: 
|     HTTP/1.1 404 Not Found
|     Content-Length: 0
|     X-NWS-LOG-UUID: 14726537662335313973
|     Connection: close
|     Server: Lego Server
|     Date: Mon, 20 Nov 2023 05:22:29 GMT
|     X-Cache-Lookup: Return Directly
|     X-ServerIp: 101.33.21.193
|     Client-Ip: 208.76.253.234
|   HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Content-Length: 0
|     X-NWS-LOG-UUID: 12753738761267994677
|     Connection: close
|     Server: Lego Server
|     Date: Mon, 20 Nov 2023 05:22:29 GMT
|     X-Cache-Lookup: Return Directly
|     X-ServerIp: 101.33.21.193
|     Client-Ip: 208.76.253.234
|   RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Connection: close
|     Content-Length: 0
|     Server: Lego Server
|     Date: Mon, 20 Nov 2023 05:22:29 GMT
|   SIPOptions: 
|     HTTP/1.1 400 Bad Request
|     Connection: close
|     Content-Length: 0
|     Server: Lego Server
|_    Date: Mon, 20 Nov 2023 05:23:32 GMT
| http-auth: 
| HTTP/1.1 401 Authorization Required\x0D
|_  Server returned status 401 but no WWW-Authenticate header.
|_http-cors: GET POST PUT
| http-server-header: 
|   Lego Server
|_  NWSs
|_http-title: Site doesn't have a title.
443/tcp  open   ssl/https Lego Server
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Content-Length: 0
|     X-NWS-LOG-UUID: 6017528879808915981
|     Connection: close
|     Server: Lego Server
|     Date: Mon, 20 Nov 2023 05:22:35 GMT
|     X-Cache-Lookup: Return Directly
|     X-ServerIp: 101.33.21.193
|     Client-Ip: 208.76.253.234
|   GenericLines, RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Connection: close
|     Content-Length: 0
|     Server: Lego Server
|     Date: Mon, 20 Nov 2023 05:22:40 GMT
|   GetRequest: 
|     HTTP/1.1 404 Not Found
|     Content-Length: 0
|     X-NWS-LOG-UUID: 10238796397790173379
|     Connection: close
|     Server: Lego Server
|     Date: Mon, 20 Nov 2023 05:22:35 GMT
|     X-Cache-Lookup: Return Directly
|     X-ServerIp: 101.33.21.193
|     Client-Ip: 208.76.253.234
|   HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Content-Length: 0
|     X-NWS-LOG-UUID: 13481354060146841579
|     Connection: close
|     Server: Lego Server
|     Date: Mon, 20 Nov 2023 05:22:35 GMT
|     X-Cache-Lookup: Return Directly
|     X-ServerIp: 101.33.21.193
|     Client-Ip: 208.76.253.234
|   SIPOptions: 
|     HTTP/1.1 400 Bad Request
|     Connection: close
|     Content-Length: 0
|     Server: Lego Server
|_    Date: Mon, 20 Nov 2023 05:23:43 GMT
| http-auth: 
| HTTP/1.1 401 Authorization Required\x0D
|_  Server returned status 401 but no WWW-Authenticate header.
|_http-cors: GET POST PUT
| http-server-header: 
|   Lego Server
|_  NWSs
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=dl.tcdntip.com/organizationName=Shenzhen Tencent Computer Systems Company Limited/stateOrProvinceName=Guangdong Province/countryName=CN
| Subject Alternative Name: DNS:dl.tcdntip.com, DNS:*.dl.tcdntip.com, DNS:*.dlied1.cdntips.com, DNS:d3g.qq.com, DNS:dldir1.qq.com, DNS:dldir2.qq.com, DNS:dldir3.qq.com, DNS:dlied.myapp.com, DNS:dlied1.cdntips.com, DNS:dlied1.myapp.com, DNS:dlied1.qq.com, DNS:dlied2.qq.com, DNS:dlied4.myapp.com, DNS:dlied4.qq.com, DNS:dlied5.myapp.com, DNS:dlied5.qq.com, DNS:dlied6.qq.com, DNS:down-update.qq.com, DNS:down.qq.com, DNS:own-update.qq.com, DNS:update1.dlied.qq.com, DNS:wgdl.qq.com
| Not valid before: 2023-01-06T00:00:00
|_Not valid after:  2024-01-30T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| tls-nextprotoneg: 
|   h2
|_  http/1.1
1935/tcp closed rtmp
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=655AED15%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,F7,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x20
SF:0\r\nX-NWS-LOG-UUID:\x2014726537662335313973\r\nConnection:\x20close\r\
SF:nServer:\x20Lego\x20Server\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:
SF:22:29\x20GMT\r\nX-Cache-Lookup:\x20Return\x20Directly\r\nX-ServerIp:\x2
SF:0101\.33\.21\.193\r\nClient-Ip:\x20208\.76\.253\.234\r\n\r\n")%r(HTTPOp
SF:tions,F7,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x200\r\nX
SF:-NWS-LOG-UUID:\x2012753738761267994677\r\nConnection:\x20close\r\nServe
SF:r:\x20Lego\x20Server\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:22:29\
SF:x20GMT\r\nX-Cache-Lookup:\x20Return\x20Directly\r\nX-ServerIp:\x20101\.
SF:33\.21\.193\r\nClient-Ip:\x20208\.76\.253\.234\r\n\r\n")%r(RTSPRequest,
SF:7C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\nConte
SF:nt-Length:\x200\r\nServer:\x20Lego\x20Server\r\nDate:\x20Mon,\x2020\x20
SF:Nov\x202023\x2005:22:29\x20GMT\r\n\r\n")%r(FourOhFourRequest,F7,"HTTP/1
SF:\.1\x20404\x20Not\x20Found\r\nContent-Length:\x200\r\nX-NWS-LOG-UUID:\x
SF:2018041183801277511874\r\nConnection:\x20close\r\nServer:\x20Lego\x20Se
SF:rver\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:22:34\x20GMT\r\nX-Cach
SF:e-Lookup:\x20Return\x20Directly\r\nX-ServerIp:\x20101\.33\.21\.193\r\nC
SF:lient-Ip:\x20208\.76\.253\.234\r\n\r\n")%r(GenericLines,7C,"HTTP/1\.1\x
SF:20400\x20Bad\x20Request\r\nConnection:\x20close\r\nContent-Length:\x200
SF:\r\nServer:\x20Lego\x20Server\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x20
SF:05:22:34\x20GMT\r\n\r\n")%r(SIPOptions,7C,"HTTP/1\.1\x20400\x20Bad\x20R
SF:equest\r\nConnection:\x20close\r\nContent-Length:\x200\r\nServer:\x20Le
SF:go\x20Server\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:23:32\x20GMT\r
SF:\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655AED1B%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,F7,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Leng
SF:th:\x200\r\nX-NWS-LOG-UUID:\x2010238796397790173379\r\nConnection:\x20c
SF:lose\r\nServer:\x20Lego\x20Server\r\nDate:\x20Mon,\x2020\x20Nov\x202023
SF:\x2005:22:35\x20GMT\r\nX-Cache-Lookup:\x20Return\x20Directly\r\nX-Serve
SF:rIp:\x20101\.33\.21\.193\r\nClient-Ip:\x20208\.76\.253\.234\r\n\r\n")%r
SF:(HTTPOptions,F7,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x2
SF:00\r\nX-NWS-LOG-UUID:\x2013481354060146841579\r\nConnection:\x20close\r
SF:\nServer:\x20Lego\x20Server\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005
SF::22:35\x20GMT\r\nX-Cache-Lookup:\x20Return\x20Directly\r\nX-ServerIp:\x
SF:20101\.33\.21\.193\r\nClient-Ip:\x20208\.76\.253\.234\r\n\r\n")%r(FourO
SF:hFourRequest,F6,"HTTP/1\.1\x20404\x20Not\x20Found\r\nContent-Length:\x2
SF:00\r\nX-NWS-LOG-UUID:\x206017528879808915981\r\nConnection:\x20close\r\
SF:nServer:\x20Lego\x20Server\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:
SF:22:35\x20GMT\r\nX-Cache-Lookup:\x20Return\x20Directly\r\nX-ServerIp:\x2
SF:0101\.33\.21\.193\r\nClient-Ip:\x20208\.76\.253\.234\r\n\r\n")%r(Generi
SF:cLines,7C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r
SF:\nContent-Length:\x200\r\nServer:\x20Lego\x20Server\r\nDate:\x20Mon,\x2
SF:020\x20Nov\x202023\x2005:22:40\x20GMT\r\n\r\n")%r(RTSPRequest,7C,"HTTP/
SF:1\.1\x20400\x20Bad\x20Request\r\nConnection:\x20close\r\nContent-Length
SF::\x200\r\nServer:\x20Lego\x20Server\r\nDate:\x20Mon,\x2020\x20Nov\x2020
SF:23\x2005:22:40\x20GMT\r\n\r\n")%r(SIPOptions,7C,"HTTP/1\.1\x20400\x20Ba
SF:d\x20Request\r\nConnection:\x20close\r\nContent-Length:\x200\r\nServer:
SF:\x20Lego\x20Server\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:23:43\x2
SF:0GMT\r\n\r\n");
Aggressive OS guesses: Linux 2.6.32 - 3.10 (94%), Linux 3.10 (92%), Linux 3.12 - 4.10 (92%), Linux 3.1 (90%), Linux 3.2 (90%), FreeBSD 11.0-STABLE (90%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (90%), Geovision EBD4700 CCTV camera (Linux 3.4) (89%), Dahua or Amcrest network video recorder (Linux) (89%), Linux 2.6.18 (89%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 8 hops

TRACEROUTE (using port 1935/tcp)
HOP RTT     ADDRESS
1   0.29 ms 208.76.251.177
2   0.58 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.68 ms multacom.com (96.45.162.9)
4   1.32 ms 206.72.211.206.any2ix.coresite.com (206.72.211.206)
5   ...
6   0.62 ms 11.173.133.229
7   ...
8   0.34 ms 101.33.21.193

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 193.49 seconds
Color Scheme
Target
down.qq.com
Target IP
101.33.21.193
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A down.qq.com
Scan date
20 Nov 2023 00:25
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: