Scan OS information and Traceroute (nmap -A v53-te.tiktokcdn.com)
Nmap scan report for v53-te.tiktokcdn.com (58.27.5.112)
Host is up (0.22s latency).
Other addresses for v53-te.tiktokcdn.com (not scanned): 58.27.5.116
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http
| fingerprint-strings:
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.0 403 Forbidden
| Content-Length: 155
| X-Block-Reason: noncdn
|_ <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>403 Forbidden</TITLE></HEAD><BODY><H1>403 Forbidden</H1></BODY></HTML>
|_http-title: Did not follow redirect to https://v53-te.tiktokcdn.com/
443/tcp open ssl/https
| fingerprint-strings:
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.0 403 Forbidden
| Content-Length: 155
| X-Block-Reason: noncdn
|_ <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>403 Forbidden</TITLE></HEAD><BODY><H1>403 Forbidden</H1></BODY></HTML>
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=*.tiktokcdn.com
| Subject Alternative Name: DNS:*.tiktokcdn.com, DNS:tiktokcdn.com
| Not valid before: 2023-09-01T00:00:00
|_Not valid after: 2024-10-01T23:59:59
|_ssl-date: TLS randomness does not represent time
1935/tcp open rtmp?
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/20%Time=655B4F67%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\x20155
SF:\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-equiv=\"
SF:content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403\x20For
SF:bidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTML>")%r(
SF:HTTPOptions,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\x20155
SF:\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-equiv=\"
SF:content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403\x20For
SF:bidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTML>")%r(
SF:FourOhFourRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\
SF:x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-eq
SF:uiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403\
SF:x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTML
SF:>");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655B4F6E%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:
SF:\x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-e
SF:quiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403
SF:\x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTM
SF:L>")%r(HTTPOptions,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:
SF:\x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-e
SF:quiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403
SF:\x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTM
SF:L>")%r(FourOhFourRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-L
SF:ength:\x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20
SF:http-equiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TIT
SF:LE>403\x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY
SF:></HTML>");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Crestron XPanel control system (90%), Rebranded surveillance DVR (Hikvision, Q-SEE, EYEsurv, A1Webcams, Foscam) (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (88%), OpenWrt White Russian 0.9 (Linux 2.4.30) (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (88%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.16 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.62 ms multacom.com (96.45.162.9)
4 2.79 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5 ...
6 195.14 ms be2913.ccr31.sin01.atlas.cogentco.com (154.54.27.53)
7 ...
8 237.91 ms 10.55.108.66
9 235.93 ms 10.55.108.63
10 237.44 ms 10.55.52.31
11 230.30 ms 10.55.48.234
12 235.75 ms 58.27.5.112
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 243.41 seconds