Scan OS information and Traceroute (nmap -A geo.wps.cn)
Nmap scan report for geo.wps.cn (114.116.235.116)
Host is up (0.16s latency).
rDNS record for 114.116.235.116: ecs-114-116-235-116.compute.hwclouds-dns.com
Not shown: 996 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http elb
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:52:59 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| GetRequest:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:52:55 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| HTTPOptions:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:52:57 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:53:04 GMT
| Content-Type: text/html
| Content-Length: 138
| Connection: close
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| RTSPRequest:
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| X11Probe:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:52:59 GMT
| Content-Type: text/html
| Content-Length: 138
| Connection: close
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
|_http-server-header: elb
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
443/tcp open ssl/https elb
| fingerprint-strings:
| FourOhFourRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:53:03 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| GetRequest:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:53:02 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:53:11 GMT
| Content-Type: text/html
| Content-Length: 138
| Connection: close
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| RTSPRequest:
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| tor-versions:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:53:05 GMT
| Content-Type: text/html
| Content-Length: 138
| Connection: close
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
|_http-server-header: elb
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
| ssl-cert: Subject: commonName=*.wps.cn/organizationName=Zhuhai Kingsoft Office Software Co., Ltd./stateOrProvinceName=Guangdong Province/countryName=CN
| Subject Alternative Name: DNS:*.wps.cn, DNS:wps.cn
| Not valid before: 2023-04-26T00:00:00
|_Not valid after: 2024-04-26T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
1433/tcp closed ms-sql-s
8080/tcp open http-proxy elb
| fingerprint-strings:
| FourOhFourRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:52:56 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| GetRequest:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:52:55 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| RTSPRequest:
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| Socks4, Socks5:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 07:52:57 GMT
| Content-Type: text/html
| Content-Length: 138
| Connection: close
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
|_http-server-header: elb
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/18%Time=6559BED7%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2
SF:019\x20Nov\x202023\x2007:52:55\x20GMT\r\nContent-Type:\x20text/html;\x2
SF:0charset=utf-8\r\nContent-Length:\x20159\r\nConnection:\x20close\r\nX-K
SF:LB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20
SF:Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</
SF:h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\n</body>\r\n<
SF:/html>\r\n")%r(HTTPOptions,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nD
SF:ate:\x20Sun,\x2019\x20Nov\x202023\x2007:52:57\x20GMT\r\nContent-Type:\x
SF:20text/html;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConnection:\
SF:x20close\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title
SF:>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20B
SF:ad\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\
SF:r\n</body>\r\n</html>\r\n")%r(RTSPRequest,8A,"<html>\r\n<head><title>40
SF:0\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<c
SF:enter><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n
SF:")%r(X11Probe,119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\
SF:x2019\x20Nov\x202023\x2007:52:59\x20GMT\r\nContent-Type:\x20text/html\r
SF:\nContent-Length:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\r\n\
SF:r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body
SF:\x20bgcolor=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></cente
SF:r>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,147,"HTTP/1\.1\x2040
SF:0\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:52:59\x
SF:20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length
SF::\x20159\r\nConnection:\x20close\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r
SF:\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>
SF:\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>ZLB/
SF:2\.38\.2\.8\.1</center>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,119,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x
SF:2007:53:04\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x201
SF:38\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><ti
SF:tle>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">
SF:\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</htm
SF:l>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/18%Time=6559BEDE%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20
SF:Sun,\x2019\x20Nov\x202023\x2007:53:02\x20GMT\r\nContent-Type:\x20text/h
SF:tml;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConnection:\x20close
SF:\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>400\x20
SF:Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Re
SF:quest</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\n</bod
SF:y>\r\n</html>\r\n")%r(HTTPOptions,147,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:53:03\x20GMT\r\nContent-
SF:Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConne
SF:ction:\x20close\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head
SF:><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>4
SF:00\x20Bad\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</c
SF:enter>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,147,"HTTP/1\.1\x
SF:20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:53:
SF:03\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le
SF:ngth:\x20159\r\nConnection:\x20close\r\nX-KLB:\x202\r\nServer:\x20elb\r
SF:\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<b
SF:ody>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>
SF:ZLB/2\.38\.2\.8\.1</center>\r\n</body>\r\n</html>\r\n")%r(tor-versions,
SF:119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x
SF:202023\x2007:53:05\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Leng
SF:th:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<html>\r\n<
SF:head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"
SF:white\">\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\
SF:r\n</html>\r\n")%r(RTSPRequest,8A,"<html>\r\n<head><title>400\x20Bad\x2
SF:0Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>4
SF:00\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(RPCChe
SF:ck,119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20No
SF:v\x202023\x2007:53:11\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L
SF:ength:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<html>\r
SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor
SF:=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</bod
SF:y>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8080-TCP:V=7.70%I=7%D=11/18%Time=6559BED7%P=x86_64-redhat-linux-gnu
SF:%r(GetRequest,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\
SF:x2019\x20Nov\x202023\x2007:52:55\x20GMT\r\nContent-Type:\x20text/html;\
SF:x20charset=utf-8\r\nContent-Length:\x20159\r\nConnection:\x20close\r\nX
SF:-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>400\x20Bad\x
SF:20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request
SF:</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\n</body>\r\
SF:n</html>\r\n")%r(HTTPOptions,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
SF:nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:52:56\x20GMT\r\nContent-Type:
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConnection
SF::\x20close\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><tit
SF:le>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x2
SF:0Bad\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center
SF:>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,8A,"<html>\r\n<head><title>
SF:400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\n
SF:<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r
SF:\n")%r(FourOhFourRequest,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDat
SF:e:\x20Sun,\x2019\x20Nov\x202023\x2007:52:56\x20GMT\r\nContent-Type:\x20
SF:text/html;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConnection:\x2
SF:0close\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>4
SF:00\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad
SF:\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\
SF:n</body>\r\n</html>\r\n")%r(Socks5,119,"HTTP/1\.1\x20400\x20Bad\x20Requ
SF:est\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:52:57\x20GMT\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x20138\r\nConnection:\x20close\r
SF:\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</t
SF:itle></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>400\x20Bad\x
SF:20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(Socks4,119,"HTTP/
SF:1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x20
SF:07:52:57\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20138
SF:\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><titl
SF:e>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r
SF:\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>
SF:\r\n");
OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
No OS matches for host
Network Distance: 18 hops
TRACEROUTE (using port 1433/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.57 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.70 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1)
4 1.06 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5 13.03 ms be3177.ccr22.sjc01.atlas.cogentco.com (154.54.40.146)
6 14.72 ms be3144.ccr41.sjc03.atlas.cogentco.com (154.54.5.102)
7 15.71 ms 38.104.138.106
8 ... 10
11 176.84 ms 36.110.248.142
12 172.73 ms 36.110.251.62
13 153.17 ms 106.38.244.114
14 ... 17
18 157.95 ms ecs-114-116-235-116.compute.hwclouds-dns.com (114.116.235.116)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1867.90 seconds
Color Scheme
-
Target
-
Target IP
114.116.235.116
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A geo.wps.cn
-
Scan date
19 Nov 2023 02:54
-
Copy scan report
-
Download report
-
Remove scan result