Ports
Duration
Date
IP
Nmap scan report for v53-te.tiktokcdn.com (58.27.5.112) Host is up (0.22s latency). Other addresses for v53-te.tiktokcdn.com (not scanned): 58.27.5.116 Not shown: 997 filtered ports PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.0 403 Forbidden | Content-Length: 155 | X-Block-Reason: noncdn |_ <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>403 Forbidden</TITLE></HEAD><BODY><H1>403 Forbidden</H1></BODY></HTML> |_http-title: Did not follow redirect to https://v53-te.tiktokcdn.com/ 443/tcp open ssl/https | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.0 403 Forbidden | Content-Length: 155 | X-Block-Reason: noncdn |_ <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>403 Forbidden</TITLE></HEAD><BODY><H1>403 Forbidden</H1></BODY></HTML> |_http-title: 403 Forbidden | ssl-cert: Subject: commonName=*.tiktokcdn.com | Subject Alternative Name: DNS:*.tiktokcdn.com, DNS:tiktokcdn.com | Not valid before: 2023-09-01T00:00:00 |_Not valid after: 2024-10-01T23:59:59 |_ssl-date: TLS randomness does not represent time 1935/tcp open rtmp? 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=11/20%Time=655B4F67%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\x20155 SF:\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-equiv=\" SF:content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403\x20For SF:bidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTML>")%r( SF:HTTPOptions,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\x20155 SF:\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-equiv=\" SF:content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403\x20For SF:bidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTML>")%r( SF:FourOhFourRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length:\ SF:x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-eq SF:uiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403\ SF:x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTML SF:>"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655B4F6E%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length: SF:\x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-e SF:quiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403 SF:\x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTM SF:L>")%r(HTTPOptions,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-Length: SF:\x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20http-e SF:quiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TITLE>403 SF:\x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY></HTM SF:L>")%r(FourOhFourRequest,E2,"HTTP/1\.0\x20403\x20Forbidden\r\nContent-L SF:ength:\x20155\r\nX-Block-Reason:\x20noncdn\r\n\r\n<HTML><HEAD><meta\x20 SF:http-equiv=\"content-type\"\x20content=\"text/html;charset=utf-8\"><TIT SF:LE>403\x20Forbidden</TITLE></HEAD><BODY><H1>403\x20Forbidden</H1></BODY SF:></HTML>"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Crestron XPanel control system (90%), Rebranded surveillance DVR (Hikvision, Q-SEE, EYEsurv, A1Webcams, Foscam) (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (88%), OpenWrt White Russian 0.9 (Linux 2.4.30) (88%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (88%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.16 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 12 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177 2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.62 ms multacom.com (96.45.162.9) 4 2.79 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121) 5 ... 6 195.14 ms be2913.ccr31.sin01.atlas.cogentco.com (154.54.27.53) 7 ... 8 237.91 ms 10.55.108.66 9 235.93 ms 10.55.108.63 10 237.44 ms 10.55.52.31 11 230.30 ms 10.55.48.234 12 235.75 ms 58.27.5.112 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 243.41 seconds