Scan OS information and Traceroute (nmap -A static.wehaacdn.com)
Nmap scan report for static.wehaacdn.com (74.208.21.154)
Host is up (0.048s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http nginx 1.10.3 (Ubuntu)
|_http-server-header: nginx/1.10.3 (Ubuntu)
|_http-title: Did not follow redirect to https://static.wehaacdn.com/
443/tcp open ssl/http nginx 1.10.3 (Ubuntu)
|_http-server-header: nginx/1.10.3 (Ubuntu)
|_http-title: Wehaa.com Roble Image Server 1
| ssl-cert: Subject: commonName=static.wehaacdn.com
| Subject Alternative Name: DNS:static.wehaacdn.com
| Not valid before: 2023-11-01T02:51:27
|_Not valid after: 2024-01-30T02:51:26
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: load balancer|firewall
Running (JUST GUESSING): F5 Networks TMOS 11.6.X|11.4.X (93%)
OS CPE: cpe:/o:f5:tmos:11.6 cpe:/o:f5:tmos:11.4
Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (93%), F5 BIG-IP AFM firewall (88%), F5 BIG-IP load balancer (TMOS 11.4) (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.20 ms 208.76.251.177
2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.88 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1)
4 0.98 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5 0.72 ms be3360.ccr41.lax04.atlas.cogentco.com (154.54.25.150)
6 0.68 ms telia.lax05.atlas.cogentco.com (154.54.10.10)
7 0.74 ms lax-b23-link.ip.twelve99.net (62.115.143.38)
8 ...
9 46.95 ms kanc-bb2-link.ip.twelve99.net (62.115.139.188)
10 46.57 ms ionos-ic-356185.ip.twelve99-cust.net (80.239.161.89)
11 47.23 ms et-1-29.gw-ngcs-1.slr.lxa.us.oneandone.net (74.208.1.124)
12 55.21 ms 74.208.138.65
13 55.16 ms 74.208.138.65
14 55.26 ms 74.208.21.154
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 44.36 seconds