Scan report for "le.wps.cn"

Membership level: Free member
Scan OS information and Traceroute (nmap -A le.wps.cn)
Nmap scan report for le.wps.cn (119.3.210.249)
Host is up (0.18s latency).
Other addresses for le.wps.cn (not scanned): 139.9.135.197
rDNS record for 119.3.210.249: ecs-119-3-210-249.compute.hwclouds-dns.com
Not shown: 997 filtered ports
PORT     STATE  SERVICE   VERSION
80/tcp   open   http      ZLB/2.38.2.8.1
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Server: ZLB/2.38.2.8.1
|     Date: Sun, 19 Nov 2023 18:20:54 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 43
|     Connection: close
|     X-KLB: 2
|     {"error_msg":"failed to match any routes"}
|   GetRequest: 
|     HTTP/1.1 404 Not Found
|     Server: ZLB/2.38.2.8.1
|     Date: Sun, 19 Nov 2023 18:20:52 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 43
|     Connection: close
|     X-KLB: 2
|     {"error_msg":"failed to match any routes"}
|   HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Server: ZLB/2.38.2.8.1
|     Date: Sun, 19 Nov 2023 18:20:53 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 43
|     Connection: close
|     X-KLB: 2
|     {"error_msg":"failed to match any routes"}
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: ZLB/2.38.2.8.1
|     Date: Sun, 19 Nov 2023 18:20:59 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 159
|     Connection: close
|     X-KLB: 2
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>ZLB/2.38.2.8.1</center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>ZLB/2.38.2.8.1</center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: ZLB/2.38.2.8.1
|     Date: Sun, 19 Nov 2023 18:20:53 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 159
|     Connection: close
|     X-KLB: 2
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>ZLB/2.38.2.8.1</center>
|     </body>
|_    </html>
| http-server-header: 
|   ZLB/2.38.2.8.1
|_  openresty
|_http-title: Site doesn't have a title.
443/tcp  open   ssl/https ZLB/2.38.2.8.1
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Server: ZLB/2.38.2.8.1
|     Date: Sun, 19 Nov 2023 18:21:00 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 43
|     Connection: close
|     X-KLB: 2
|     {"error_msg":"failed to match any routes"}
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Server: ZLB/2.38.2.8.1
|     Date: Sun, 19 Nov 2023 18:20:59 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 43
|     Connection: close
|     X-KLB: 2
|     {"error_msg":"failed to match any routes"}
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: ZLB/2.38.2.8.1
|     Date: Sun, 19 Nov 2023 18:21:08 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 159
|     Connection: close
|     X-KLB: 2
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>ZLB/2.38.2.8.1</center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>ZLB/2.38.2.8.1</center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Server: ZLB/2.38.2.8.1
|     Date: Sun, 19 Nov 2023 18:21:01 GMT
|     Content-Type: text/html; charset=utf-8
|     Content-Length: 159
|     Connection: close
|     X-KLB: 2
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>ZLB/2.38.2.8.1</center>
|     </body>
|_    </html>
| http-server-header: 
|   ZLB/2.38.2.8.1
|_  openresty
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=*.wps.cn/organizationName=Zhuhai Kingsoft Office Software Co., Ltd./stateOrProvinceName=Guangdong Province/countryName=CN
| Subject Alternative Name: DNS:*.wps.cn, DNS:wps.cn
| Not valid before: 2023-04-26T00:00:00
|_Not valid after:  2024-04-26T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| tls-nextprotoneg: 
|   h2
|_  http/1.1
1433/tcp closed ms-sql-s
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=655A5204%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,DB,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20ZLB/2\.3
SF:8\.2\.8\.1\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2018:20:52\x20GMT\r\n
SF:Content-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2043\r
SF:\nConnection:\x20close\r\nX-KLB:\x202\r\n\r\n{\"error_msg\":\"failed\x2
SF:0to\x20match\x20any\x20routes\"}\n")%r(HTTPOptions,DB,"HTTP/1\.1\x20404
SF:\x20Not\x20Found\r\nServer:\x20ZLB/2\.38\.2\.8\.1\r\nDate:\x20Sun,\x201
SF:9\x20Nov\x202023\x2018:20:53\x20GMT\r\nContent-Type:\x20text/html;\x20c
SF:harset=utf-8\r\nContent-Length:\x2043\r\nConnection:\x20close\r\nX-KLB:
SF:\x202\r\n\r\n{\"error_msg\":\"failed\x20to\x20match\x20any\x20routes\"}
SF:\n")%r(RTSPRequest,9F,"<html>\r\n<head><title>400\x20Bad\x20Request</ti
SF:tle></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center
SF:>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\n</body>\r\n</html>\r\n"
SF:)%r(X11Probe,152,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZLB/
SF:2\.38\.2\.8\.1\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2018:20:53\x20GMT
SF:\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20
SF:159\r\nConnection:\x20close\r\nX-KLB:\x202\r\n\r\n<html>\r\n<head><titl
SF:e>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20
SF:Bad\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>
SF:\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,DB,"HTTP/1\.1\x20404\x
SF:20Not\x20Found\r\nServer:\x20ZLB/2\.38\.2\.8\.1\r\nDate:\x20Sun,\x2019\
SF:x20Nov\x202023\x2018:20:54\x20GMT\r\nContent-Type:\x20text/html;\x20cha
SF:rset=utf-8\r\nContent-Length:\x2043\r\nConnection:\x20close\r\nX-KLB:\x
SF:202\r\n\r\n{\"error_msg\":\"failed\x20to\x20match\x20any\x20routes\"}\n
SF:")%r(RPCCheck,152,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZLB
SF:/2\.38\.2\.8\.1\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2018:20:59\x20GM
SF:T\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2
SF:0159\r\nConnection:\x20close\r\nX-KLB:\x202\r\n\r\n<html>\r\n<head><tit
SF:le>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x2
SF:0Bad\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center
SF:>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655A520B%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,DB,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20Z
SF:LB/2\.38\.2\.8\.1\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2018:20:59\x20
SF:GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\
SF:x2043\r\nConnection:\x20close\r\nX-KLB:\x202\r\n\r\n{\"error_msg\":\"fa
SF:iled\x20to\x20match\x20any\x20routes\"}\n")%r(HTTPOptions,DB,"HTTP/1\.1
SF:\x20404\x20Not\x20Found\r\nServer:\x20ZLB/2\.38\.2\.8\.1\r\nDate:\x20Su
SF:n,\x2019\x20Nov\x202023\x2018:20:59\x20GMT\r\nContent-Type:\x20text/htm
SF:l;\x20charset=utf-8\r\nContent-Length:\x2043\r\nConnection:\x20close\r\
SF:nX-KLB:\x202\r\n\r\n{\"error_msg\":\"failed\x20to\x20match\x20any\x20ro
SF:utes\"}\n")%r(FourOhFourRequest,DB,"HTTP/1\.1\x20404\x20Not\x20Found\r\
SF:nServer:\x20ZLB/2\.38\.2\.8\.1\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2
SF:018:21:00\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nCon
SF:tent-Length:\x2043\r\nConnection:\x20close\r\nX-KLB:\x202\r\n\r\n{\"err
SF:or_msg\":\"failed\x20to\x20match\x20any\x20routes\"}\n")%r(tor-versions
SF:,152,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20ZLB/2\.38\.2\.8\
SF:.1\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2018:21:01\x20GMT\r\nContent-
SF:Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConne
SF:ction:\x20close\r\nX-KLB:\x202\r\n\r\n<html>\r\n<head><title>400\x20Bad
SF:\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reque
SF:st</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\n</body>\
SF:r\n</html>\r\n")%r(RTSPRequest,9F,"<html>\r\n<head><title>400\x20Bad\x2
SF:0Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request<
SF:/h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\n</body>\r\n
SF:</html>\r\n")%r(RPCCheck,152,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSer
SF:ver:\x20ZLB/2\.38\.2\.8\.1\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2018:
SF:21:08\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent
SF:-Length:\x20159\r\nConnection:\x20close\r\nX-KLB:\x202\r\n\r\n<html>\r\
SF:n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center
SF:><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8
SF:\.1</center>\r\n</body>\r\n</html>\r\n");
OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
No OS matches for host
Network Distance: 15 hops

TRACEROUTE (using port 1433/tcp)
HOP RTT       ADDRESS
1   0.21 ms   208.76.251.177
2   0.65 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.63 ms   multacom.com (96.45.162.9)
4   0.32 ms   182.54.129.90
5   9.62 ms   10.31.0.238
6   176.97 ms 219.158.33.77
7   179.59 ms 219.158.96.41
8   177.31 ms 219.158.3.177
9   175.84 ms 219.158.4.173
10  ... 11
12  175.34 ms 61.49.137.2
13  ... 14
15  175.51 ms ecs-119-3-210-249.compute.hwclouds-dns.com (119.3.210.249)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 173.23 seconds
Color Scheme
Target
le.wps.cn
Target IP
119.3.210.249
Target Country
CN
Scan method
Scan OS information and Traceroute
Run command
nmap -A le.wps.cn
Scan date
19 Nov 2023 13:21
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: