Scan report for "tmfmazuhttp-wangka.m.qq.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A tmfmazuhttp-wangka.m.qq.com)
Nmap scan report for tmfmazuhttp-wangka.m.qq.com (43.135.106.184)
Host is up (0.15s latency).
Other addresses for tmfmazuhttp-wangka.m.qq.com (not scanned): 240d:c000:2010:1807:0:95aa:b45a:eab0 240d:c000:2010:1807:0:95aa:b459:4751 43.135.106.117
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http      stgw
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Server: stgw
|     Date: Sun, 09 Jun 2024 16:25:01 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     X-Proxy-Server: IAS
|     <html>
|     <head><title>404 Not Found</title></head>
|     <body>
|     <center><h1>404 Not Found</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Server: stgw
|     Date: Sun, 09 Jun 2024 16:25:00 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     X-Proxy-Server: IAS
|     <html>
|     <head><title>404 Not Found</title></head>
|     <body>
|     <center><h1>404 Not Found</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: stgw
|     Date: Sun, 09 Jun 2024 16:25:06 GMT
|     Content-Type: text/html
|     Content-Length: 149
|     Connection: close
|     X-Proxy-Server: IAS
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: stgw
|     Date: Sun, 09 Jun 2024 16:25:00 GMT
|     Content-Type: text/html
|     Content-Length: 149
|     Connection: close
|     X-Proxy-Server: IAS
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|_    </html>
|_http-title: Did not follow redirect to https://tmfmazuhttp-wangka.m.qq.com/
|_http-server-header: stgw
443/tcp open  ssl/https stgw
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 404 Not Found
|     Server: stgw
|     Date: Sun, 09 Jun 2024 16:25:08 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     X-Proxy-Server: IAS
|     <html>
|     <head><title>404 Not Found</title></head>
|     <body>
|     <center><h1>404 Not Found</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.1 404 Not Found
|     Server: stgw
|     Date: Sun, 09 Jun 2024 16:25:06 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     X-Proxy-Server: IAS
|     <html>
|     <head><title>404 Not Found</title></head>
|     <body>
|     <center><h1>404 Not Found</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Server: stgw
|     Date: Sun, 09 Jun 2024 16:25:07 GMT
|     Content-Type: text/html
|     Content-Length: 145
|     Connection: close
|     X-Proxy-Server: IAS
|     <html>
|     <head><title>404 Not Found</title></head>
|     <body>
|     <center><h1>404 Not Found</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: stgw
|     Date: Sun, 09 Jun 2024 16:25:15 GMT
|     Content-Type: text/html
|     Content-Length: 149
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Server: stgw
|     Date: Sun, 09 Jun 2024 16:25:08 GMT
|     Content-Type: text/html
|     Content-Length: 149
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|_    </html>
|_http-title: Site doesn't have a title (application/json).
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=*.oct17-2023-1.ias.qq.com/organizationName=Tencent Technology (Shenzhen) Company Limited/stateOrProvinceName=Guangdong/countryName=CN
| Subject Alternative Name: DNS:*.oct17-2023-1.ias.qq.com, DNS:*.doctor.qq.com, DNS:*.inews.qq.com, DNS:*.kandian.qq.com, DNS:*.m.qq.com, DNS:*.master.qq.com, DNS:*.open.qq.com, DNS:*.study.qq.com, DNS:*.urlsec.qq.com, DNS:*.wecity.qq.com, DNS:ait.auto.qq.com, DNS:api.gmap.qq.com, DNS:api.prize.qq.com, DNS:auto.qq.com, DNS:bsrv.qq.com, DNS:bt.indoorloc.map.qq.com, DNS:contentapi.mp.qq.com, DNS:db.auto.qq.com, DNS:debugtbs.qq.com, DNS:debugx5.qq.com, DNS:doctor.qq.com, DNS:dtrpt.qq.com, DNS:faceplus.qq.com, DNS:feeds.qq.com, DNS:gh.prize.qq.com, DNS:heat.qq.com, DNS:info.wifi.qq.com, DNS:jiaotong.qq.com, DNS:jiejing.qq.com, DNS:link.andon.qq.com, DNS:mb.qq.com, DNS:mp.lbs.qq.com, DNS:nonstandard.vbusiness.qq.com, DNS:nonstandardtest.vbusiness.qq.com, DNS:oauth.qlabel.qq.com, DNS:open.scan.qq.com, DNS:qgc.qq.com, DNS:qlabel.qq.com, DNS:qqdesk.qq.com, DNS:remott-api.rtc.qq.com, DNS:roll.auto.qq.com, DNS:surl.qq.com, DNS:tai.qq.com, DNS:tas.qq.com, DNS:test.qingtan.qq.com, DNS:tq.qq.com, DNS:update.win10.qq.com, DNS:wsdheat.qq.com, DNS:wxnotify.pacewear.qq.com, DNS:yeah.qq.com, DNS:yybcoupon.qq.com, DNS:oct17-2023-1.ias.qq.com
| Not valid before: 2023-10-16T21:31:07
|_Not valid after:  2024-11-16T21:31:06
| tls-alpn: 
|   h2
|_  http/1.1
| http-server-header: 
|   Trpc httpd
|_  stgw
| tls-nextprotoneg: 
|   h2
|_  http/1.1
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=6/9%Time=6665D75B%P=x86_64-redhat-linux-gnu%r(G
SF:etRequest,134,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20stgw\r\nD
SF:ate:\x20Sun,\x2009\x20Jun\x202024\x2016:25:00\x20GMT\r\nContent-Type:\x
SF:20text/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\nX-Prox
SF:y-Server:\x20IAS\r\n\r\n<html>\r\n<head><title>404\x20Not\x20Found</tit
SF:le></head>\r\n<body>\r\n<center><h1>404\x20Not\x20Found</h1></center>\r
SF:\n<hr><center>stgw</center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,1
SF:34,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20stgw\r\nDate:\x20Sun
SF:,\x2009\x20Jun\x202024\x2016:25:00\x20GMT\r\nContent-Type:\x20text/html
SF:\r\nContent-Length:\x20145\r\nConnection:\x20close\r\nX-Proxy-Server:\x
SF:20IAS\r\n\r\n<html>\r\n<head><title>404\x20Not\x20Found</title></head>\
SF:r\n<body>\r\n<center><h1>404\x20Not\x20Found</h1></center>\r\n<hr><cent
SF:er>stgw</center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,95,"<html>\r
SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cente
SF:r><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>stgw</center>\
SF:r\n</body>\r\n</html>\r\n")%r(X11Probe,13A,"HTTP/1\.1\x20400\x20Bad\x20
SF:Request\r\nServer:\x20stgw\r\nDate:\x20Sun,\x2009\x20Jun\x202024\x2016:
SF:25:00\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20149\r\
SF:nConnection:\x20close\r\nX-Proxy-Server:\x20IAS\r\n\r\n<html>\r\n<head>
SF:<title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>40
SF:0\x20Bad\x20Request</h1></center>\r\n<hr><center>stgw</center>\r\n</bod
SF:y>\r\n</html>\r\n")%r(FourOhFourRequest,134,"HTTP/1\.1\x20404\x20Not\x2
SF:0Found\r\nServer:\x20stgw\r\nDate:\x20Sun,\x2009\x20Jun\x202024\x2016:2
SF:5:01\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20145\r\n
SF:Connection:\x20close\r\nX-Proxy-Server:\x20IAS\r\n\r\n<html>\r\n<head><
SF:title>404\x20Not\x20Found</title></head>\r\n<body>\r\n<center><h1>404\x
SF:20Not\x20Found</h1></center>\r\n<hr><center>stgw</center>\r\n</body>\r\
SF:n</html>\r\n")%r(RPCCheck,13A,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSe
SF:rver:\x20stgw\r\nDate:\x20Sun,\x2009\x20Jun\x202024\x2016:25:06\x20GMT\
SF:r\nContent-Type:\x20text/html\r\nContent-Length:\x20149\r\nConnection:\
SF:x20close\r\nX-Proxy-Server:\x20IAS\r\n\r\n<html>\r\n<head><title>400\x2
SF:0Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20R
SF:equest</h1></center>\r\n<hr><center>stgw</center>\r\n</body>\r\n</html>
SF:\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=6/9%Time=6665D762%P=x86_64-redhat-linux-
SF:gnu%r(GetRequest,134,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20st
SF:gw\r\nDate:\x20Sun,\x2009\x20Jun\x202024\x2016:25:06\x20GMT\r\nContent-
SF:Type:\x20text/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\
SF:nX-Proxy-Server:\x20IAS\r\n\r\n<html>\r\n<head><title>404\x20Not\x20Fou
SF:nd</title></head>\r\n<body>\r\n<center><h1>404\x20Not\x20Found</h1></ce
SF:nter>\r\n<hr><center>stgw</center>\r\n</body>\r\n</html>\r\n")%r(HTTPOp
SF:tions,134,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20stgw\r\nDate:
SF:\x20Sun,\x2009\x20Jun\x202024\x2016:25:07\x20GMT\r\nContent-Type:\x20te
SF:xt/html\r\nContent-Length:\x20145\r\nConnection:\x20close\r\nX-Proxy-Se
SF:rver:\x20IAS\r\n\r\n<html>\r\n<head><title>404\x20Not\x20Found</title><
SF:/head>\r\n<body>\r\n<center><h1>404\x20Not\x20Found</h1></center>\r\n<h
SF:r><center>stgw</center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest
SF:,134,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20stgw\r\nDate:\x20S
SF:un,\x2009\x20Jun\x202024\x2016:25:08\x20GMT\r\nContent-Type:\x20text/ht
SF:ml\r\nContent-Length:\x20145\r\nConnection:\x20close\r\nX-Proxy-Server:
SF:\x20IAS\r\n\r\n<html>\r\n<head><title>404\x20Not\x20Found</title></head
SF:>\r\n<body>\r\n<center><h1>404\x20Not\x20Found</h1></center>\r\n<hr><ce
SF:nter>stgw</center>\r\n</body>\r\n</html>\r\n")%r(tor-versions,125,"HTTP
SF:/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20stgw\r\nDate:\x20Sun,\x200
SF:9\x20Jun\x202024\x2016:25:08\x20GMT\r\nContent-Type:\x20text/html\r\nCo
SF:ntent-Length:\x20149\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><ti
SF:tle>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x
SF:20Bad\x20Request</h1></center>\r\n<hr><center>stgw</center>\r\n</body>\
SF:r\n</html>\r\n")%r(RTSPRequest,95,"<html>\r\n<head><title>400\x20Bad\x2
SF:0Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request<
SF:/h1></center>\r\n<hr><center>stgw</center>\r\n</body>\r\n</html>\r\n")%
SF:r(RPCCheck,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20stgw\r
SF:\nDate:\x20Sun,\x2009\x20Jun\x202024\x2016:25:15\x20GMT\r\nContent-Type
SF::\x20text/html\r\nContent-Length:\x20149\r\nConnection:\x20close\r\n\r\
SF:n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\
SF:r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>stgw<
SF:/center>\r\n</body>\r\n</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 13 hops

TRACEROUTE (using port 443/tcp)
HOP RTT       ADDRESS
1   0.20 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   1.13 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.69 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.36 ms   nextgen-multimedia.as9305.any2ix.coresite.com (206.72.210.114)
5   0.37 ms   218.189.5.141
6   148.16 ms 10.111.171.25
7   148.44 ms 218.189.5.21
8   147.90 ms 218.189.31.158
9   152.00 ms 10.200.180.89
10  152.85 ms 10.196.76.146
11  151.98 ms 10.196.76.138
12  152.46 ms 9.176.252.95
13  155.21 ms 43.135.106.184

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 63.91 seconds
Color Scheme
Target
tmfmazuhttp-wangka.m.qq.com
Target IP
43.135.106.184
Target Country
HK
Scan method
Scan OS information and Traceroute
Run command
nmap -A tmfmazuhttp-wangka.m.qq.com
Scan date
09 Jun 2024 12:25
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: