Scan report for "pull-rtmp-hs-l1-xg.ixigua.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A pull-rtmp-hs-l1-xg.ixigua.com)
Nmap scan report for pull-rtmp-hs-l1-xg.ixigua.com (138.113.19.15)
Host is up (0.034s latency).
Not shown: 930 closed ports
PORT      STATE SERVICE     VERSION
80/tcp    open  http        nginx
81/tcp    open  http        nginx
82/tcp    open  http        nginx
85/tcp    open  http        nginx
88/tcp    open  http        nginx
89/tcp    open  http        nginx
90/tcp    open  http        nginx
443/tcp   open  ssl/http    nginx
| http-server-header: 
|   Cdn Cache Server V2.0
|_  nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=default.chinanetcenter.com/organizationName=\xE7\xBD\x91\xE5\xAE\xBF\xE7\xA7\x91\xE6\x8A\x80\xE8\x82\xA1\xE4\xBB\xBD\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8\xE5\x8E\xA6\xE9\x97\xA8\xE5\x88\x86\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE7\xA6\x8F\xE5\xBB\xBA\xE7\x9C\x81/countryName=CN
| Subject Alternative Name: DNS:default.chinanetcenter.com, DNS:*.i3839.com, DNS:*.ourdvsss.com, DNS:*.ziroom.com, DNS:*.blued.com, DNS:sstatic.chunboimg.com, DNS:*.ip138.com, DNS:m.bbs.3839.com, DNS:microgame.5054399.net, DNS:nitrome.com.4399.com, DNS:s3.chunboimg.com, DNS:jssdk.3304399.net, DNS:*.lof3.xyz, DNS:*.rax0mai4.xyz, DNS:*.4399.cn, DNS:s0.chunboimg.com, DNS:*.3839.com, DNS:www.miniclip.com.4399pk.com, DNS:*.1zhe.com, DNS:ip138.com, DNS:d.3839app.net, DNS:maangh2.chinanetcenter.com, DNS:*.9k9.cn, DNS:*.4399.com, DNS:s1.chunboimg.com, DNS:cdn.h5wan.4399sj.com, DNS:*.service.kugou.com, DNS:lvs.lxdns.net, DNS:*.wscdns.com, DNS:*.walla-app.com, DNS:*.bldimg.com, DNS:*.5054399.com, DNS:*.4399youpai.com, DNS:*.3839app.com, DNS:*.v.cdn20.com, DNS:hls.vda.v.cdn20.com, DNS:*.cntv.cdn20.com, DNS:*.img4399.com, DNS:s2.chunboimg.com, DNS:*.cntv.lxdns.com, DNS:*.ourdvsssvip.com, DNS:*.v.wscdns.com, DNS:*.iwan4399.com, DNS:4399.cn
| Not valid before: 2023-10-25T00:00:00
|_Not valid after:  2024-11-15T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
801/tcp   open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
843/tcp   open  unknown
1080/tcp  open  http        nginx
1088/tcp  open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
1089/tcp  open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
1443/tcp  open  ssl/ies-lm?
1900/tcp  open  http        nginx
1935/tcp  open  http        nginx
2000/tcp  open  http        nginx
2323/tcp  open  3d-nfsd?
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, SIPOptions: 
|     HTTP/1.0 404 FAIL
|     Content-length:5
|     Connection:Close
|_    ERROR
2381/tcp  open  http        nginx
2382/tcp  open  http        nginx
2383/tcp  open  http        nginx
3000/tcp  open  http        nginx
4000/tcp  open  http        nginx
5000/tcp  open  http        nginx
5001/tcp  open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
5002/tcp  open  http        nginx
5566/tcp  open  http        nginx
6666/tcp  open  irc?
|_irc-info: Unable to open connection
7000/tcp  open  http        nginx
7001/tcp  open  http        nginx
7002/tcp  open  http        nginx
7070/tcp  open  http        nginx
7443/tcp  open  ssl/http    nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=default.chinanetcenter.com/organizationName=\xE7\xBD\x91\xE5\xAE\xBF\xE7\xA7\x91\xE6\x8A\x80\xE8\x82\xA1\xE4\xBB\xBD\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8\xE5\x8E\xA6\xE9\x97\xA8\xE5\x88\x86\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE7\xA6\x8F\xE5\xBB\xBA\xE7\x9C\x81/countryName=CN
| Subject Alternative Name: DNS:default.chinanetcenter.com, DNS:*.i3839.com, DNS:*.ourdvsss.com, DNS:*.ziroom.com, DNS:*.blued.com, DNS:sstatic.chunboimg.com, DNS:*.ip138.com, DNS:m.bbs.3839.com, DNS:microgame.5054399.net, DNS:nitrome.com.4399.com, DNS:s3.chunboimg.com, DNS:jssdk.3304399.net, DNS:*.lof3.xyz, DNS:*.rax0mai4.xyz, DNS:*.4399.cn, DNS:s0.chunboimg.com, DNS:*.3839.com, DNS:www.miniclip.com.4399pk.com, DNS:*.1zhe.com, DNS:ip138.com, DNS:d.3839app.net, DNS:maangh2.chinanetcenter.com, DNS:*.9k9.cn, DNS:*.4399.com, DNS:s1.chunboimg.com, DNS:cdn.h5wan.4399sj.com, DNS:*.service.kugou.com, DNS:lvs.lxdns.net, DNS:*.wscdns.com, DNS:*.walla-app.com, DNS:*.bldimg.com, DNS:*.5054399.com, DNS:*.4399youpai.com, DNS:*.3839app.com, DNS:*.v.cdn20.com, DNS:hls.vda.v.cdn20.com, DNS:*.cntv.cdn20.com, DNS:*.img4399.com, DNS:s2.chunboimg.com, DNS:*.cntv.lxdns.com, DNS:*.ourdvsssvip.com, DNS:*.v.wscdns.com, DNS:*.iwan4399.com, DNS:4399.cn
| Not valid before: 2023-10-25T00:00:00
|_Not valid after:  2024-11-15T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
7777/tcp  open  http        nginx
8000/tcp  open  http        nginx
8001/tcp  open  http        nginx
8008/tcp  open  http        nginx
8009/tcp  open  http        nginx
|_ajp-methods: Failed to get a valid response for the OPTION request
8010/tcp  open  http        nginx
8011/tcp  open  http        nginx
8022/tcp  open  http        nginx
8080/tcp  open  http        nginx
8081/tcp  open  http        nginx
8082/tcp  open  http        nginx
8083/tcp  open  http        nginx
8084/tcp  open  http        nginx
8085/tcp  open  http        nginx
8088/tcp  open  http        nginx
8089/tcp  open  http        nginx
8090/tcp  open  http        nginx
8443/tcp  open  ssl/http    nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=default.chinanetcenter.com/organizationName=\xE7\xBD\x91\xE5\xAE\xBF\xE7\xA7\x91\xE6\x8A\x80\xE8\x82\xA1\xE4\xBB\xBD\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8\xE5\x8E\xA6\xE9\x97\xA8\xE5\x88\x86\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE7\xA6\x8F\xE5\xBB\xBA\xE7\x9C\x81/countryName=CN
| Subject Alternative Name: DNS:default.chinanetcenter.com, DNS:*.i3839.com, DNS:*.ourdvsss.com, DNS:*.ziroom.com, DNS:*.blued.com, DNS:sstatic.chunboimg.com, DNS:*.ip138.com, DNS:m.bbs.3839.com, DNS:microgame.5054399.net, DNS:nitrome.com.4399.com, DNS:s3.chunboimg.com, DNS:jssdk.3304399.net, DNS:*.lof3.xyz, DNS:*.rax0mai4.xyz, DNS:*.4399.cn, DNS:s0.chunboimg.com, DNS:*.3839.com, DNS:www.miniclip.com.4399pk.com, DNS:*.1zhe.com, DNS:ip138.com, DNS:d.3839app.net, DNS:maangh2.chinanetcenter.com, DNS:*.9k9.cn, DNS:*.4399.com, DNS:s1.chunboimg.com, DNS:cdn.h5wan.4399sj.com, DNS:*.service.kugou.com, DNS:lvs.lxdns.net, DNS:*.wscdns.com, DNS:*.walla-app.com, DNS:*.bldimg.com, DNS:*.5054399.com, DNS:*.4399youpai.com, DNS:*.3839app.com, DNS:*.v.cdn20.com, DNS:hls.vda.v.cdn20.com, DNS:*.cntv.cdn20.com, DNS:*.img4399.com, DNS:s2.chunboimg.com, DNS:*.cntv.lxdns.com, DNS:*.ourdvsssvip.com, DNS:*.v.wscdns.com, DNS:*.iwan4399.com, DNS:4399.cn
| Not valid before: 2023-10-25T00:00:00
|_Not valid after:  2024-11-15T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
8888/tcp  open  http        nginx
9000/tcp  open  http        nginx
9001/tcp  open  http        nginx
9002/tcp  open  http        nginx
9080/tcp  open  http        nginx
9081/tcp  open  http        nginx
9090/tcp  open  http        nginx
9091/tcp  open  http        nginx
9099/tcp  open  http        nginx
9100/tcp  open  jetdirect?
9101/tcp  open  jetdirect?
9103/tcp  open  jetdirect?
9200/tcp  open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
9998/tcp  open  http        nginx
9999/tcp  open  http        nginx
11111/tcp open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
12000/tcp open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
19350/tcp open  unknown
30000/tcp open  http        nginx
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port2323-TCP:V=7.70%I=7%D=11/20%Time=655B2A57%P=x86_64-redhat-linux-gnu
SF:%r(GetRequest,3E,"HTTP/1\.0\x20404\x20FAIL\r\nContent-length:5\r\nConne
SF:ction:Close\r\n\r\nERROR")%r(HTTPOptions,3E,"HTTP/1\.0\x20404\x20FAIL\r
SF:\nContent-length:5\r\nConnection:Close\r\n\r\nERROR")%r(RTSPRequest,3E,
SF:"HTTP/1\.0\x20404\x20FAIL\r\nContent-length:5\r\nConnection:Close\r\n\r
SF:\nERROR")%r(FourOhFourRequest,3E,"HTTP/1\.0\x20404\x20FAIL\r\nContent-l
SF:ength:5\r\nConnection:Close\r\n\r\nERROR")%r(SIPOptions,3E,"HTTP/1\.0\x
SF:20404\x20FAIL\r\nContent-length:5\r\nConnection:Close\r\n\r\nERROR");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port6666-TCP:V=7.70%I=7%D=11/20%Time=655B2A5E%P=x86_64-redhat-linux-gnu
SF:%r(RPCCheck,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xf
SF:f\xff\0\0\0\x07\x01\0\0\0")%r(SSLSessionReq,1C,"\x80\x03\0\x04\0\0\0\x1
SF:4\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(TLSSessio
SF:nReq,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0
SF:\0\0\x07\x01\0\0\0")%r(Kerberos,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\
SF:0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(SMBProgNeg,1C,"\x80\x
SF:03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\
SF:0\0")%r(X11Probe,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\x
SF:ff\xff\xff\0\0\0\x07\x01\0\0\0")%r(TerminalServer,1C,"\x80\x03\0\x04\0\
SF:0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(Not
SF:esRPC,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\
SF:0\0\0\x07\x01\0\0\0")%r(WMSRequest,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x
SF:02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(afp,1C,"\x80\x03\0
SF:\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0"
SF:);
Device type: phone|general purpose|WAP|firewall|media device|specialized
Running (JUST GUESSING): Google Android 7.X (96%), Linux 3.X|2.6.X (96%), IPCop 2.X (87%), Tiandy embedded (87%), AVtech embedded (87%), Check Point embedded (87%)
OS CPE: cpe:/o:google:android:7.1.2 cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3.0 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:ipcop:ipcop:2.0 cpe:/o:linux:linux_kernel:2.6.18 cpe:/a:checkpoint:vpn-1_firewall-1
Aggressive OS guesses: Android 7.1.2 (Linux 3.10) (96%), Linux 2.6.18 - 2.6.22 (94%), Linux 3.0 (92%), Linux 3.2 (92%), Tomato firmware (Linux 2.6.22) (88%), IPCop 2.0 (Linux 2.6.32) (87%), Linux 2.6.32 (87%), Tiandy NVR (87%), AVtech Room Alert 26W environmental monitor (87%), OpenWrt Chaos Calmer (Linux 3.18) (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops

TRACEROUTE (using port 256/tcp)
HOP RTT      ADDRESS
1   0.20 ms  208.76.251.177
2   93.11 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   1.24 ms  1.162.45.96-dedicated.multacom.com (96.45.162.1)
4   1.21 ms  be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   12.67 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161)
6   21.25 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54)
7   33.75 ms be2668.ccr22.den01.atlas.cogentco.com (154.54.87.30)
8   34.25 ms be2402.rcr21.b006467-6.den01.atlas.cogentco.com (154.54.88.46)
9   34.50 ms 38.140.186.234
10  38.69 ms 192.168.255.251
11  33.94 ms 138.113.19.15

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 576.54 seconds
Color Scheme
Target
pull-rtmp-hs-l1-xg.ixigua.com
Target IP
138.113.19.15
Target Country
CA
Scan method
Scan OS information and Traceroute
Run command
nmap -A pull-rtmp-hs-l1-xg.ixigua.com
Scan date
20 Nov 2023 04:53
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: