Scan OS information and Traceroute (nmap -A p2-pro.a.yximgs.com)
Nmap scan report for p2-pro.a.yximgs.com (47.246.23.143)
Host is up (0.011s latency).
Other addresses for p2-pro.a.yximgs.com (not scanned): 47.246.23.146 47.246.23.147 47.246.23.145 47.246.23.144 47.246.23.148
Not shown: 996 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http Tengine httpd
|_http-cors: HEAD GET POST PUT DELETE
|_http-server-header: Tengine
|_http-title: Site doesn't have a title (text/html).
443/tcp open ssl/http Tengine httpd
|_http-cors: HEAD GET POST PUT DELETE
|_http-server-header: Tengine
|_http-title: Site doesn't have a title (text/html).
| ssl-cert: Subject: commonName=*.a.yximgs.com/organizationName=Beijing Kuaishou Technology Co.,Ltd./stateOrProvinceName=Beijing/countryName=CN
| Subject Alternative Name: DNS:*.a.yximgs.com, DNS:a.kwimgs.com, DNS:a.etoote.com, DNS:*.a.kwimgs.com, DNS:*.a.etoote.com, DNS:a.yximgs.com
| Not valid before: 2023-06-16T08:46:22
|_Not valid after: 2024-07-17T08:46:21
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
| h2
|_ http/1.1
| tls-nextprotoneg:
| h2
|_ http/1.1
843/tcp open adobe-crossdomain Adobe cross-domain policy (domain: *; ports: *)
1935/tcp open tcpwrapped
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 11 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.53 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.67 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1)
4 1.10 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5 0.74 ms be3360.ccr41.lax04.atlas.cogentco.com (154.54.25.150)
6 0.77 ms lax-b22-link.ip.twelve99.net (80.239.160.64)
7 10.81 ms sjo-b23-link.ip.twelve99.net (62.115.116.40)
8 10.78 ms sjo-b23-link.ip.twelve99.net (62.115.116.40)
9 ... 10
11 10.98 ms 47.246.23.143
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 135.35 seconds