Scan report for "zen-video-preview.s3.dzeninfra.ru"

Membership level: Free member
Scan OS information and Traceroute (nmap -A zen-video-preview.s3.dzeninfra.ru)
Nmap scan report for zen-video-preview.s3.dzeninfra.ru (62.217.160.4)
Host is up (0.19s latency).
rDNS record for 62.217.160.4: avatars.dzeninfra.ru
Not shown: 997 filtered tcp ports (no-response)
PORT     STATE  SERVICE   VERSION
80/tcp   open   http
|_http-title: Site doesn't have a title (application/xml; charset=UTF-8).
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LPDString, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, WMSRequest, afp, ms-sql-s, oracle-tns: 
|     HTTP/1.1 400 Bad request
|     Connection: Close
|_    Content-Length: 0
443/tcp  open   ssl/https
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LPDString, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, TerminalServerCookie, WMSRequest, afp, ms-sql-s, oracle-tns, tor-versions: 
|     HTTP/1.1 400 Bad request
|     Connection: Close
|_    Content-Length: 0
|_http-title: Site doesn't have a title (application/xml; charset=UTF-8).
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   http/1.1
|_  h2
| ssl-cert: Subject: commonName=*.s3.dzeninfra.ru/organizationName=VK LLC/stateOrProvinceName=Moscow/countryName=RU
| Subject Alternative Name: DNS:*.s3.dzeninfra.ru, DNS:s3.dzeninfra.ru
| Not valid before: 2024-05-14T16:41:15
|_Not valid after:  2025-06-15T16:41:14
1935/tcp closed rtmp
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=6/10%Time=66673784%P=x86_64-redhat-linux-gnu%r(
SF:RTSPRequest,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x20Cl
SF:ose\r\nContent-Length:\x200\r\n\r\n")%r(RPCCheck,42,"HTTP/1\.1\x20400\x
SF:20Bad\x20request\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\
SF:n")%r(DNSVersionBindReqTCP,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nCo
SF:nnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(DNSStatusRequest
SF:TCP,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x20Close\r\nC
SF:ontent-Length:\x200\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20B
SF:ad\x20request\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")
SF:%r(TerminalServerCookie,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConne
SF:ction:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(TLSSessionReq,42,"H
SF:TTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x20Close\r\nContent-Le
SF:ngth:\x200\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x20400\x20Bad\x20request\
SF:r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(SMBProgNeg,
SF:42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x20Close\r\nConte
SF:nt-Length:\x200\r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20re
SF:quest\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(SIPOp
SF:tions,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x20Close\r\
SF:nContent-Length:\x200\r\n\r\n")%r(TerminalServer,42,"HTTP/1\.1\x20400\x
SF:20Bad\x20request\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\
SF:n")%r(WMSRequest,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\
SF:x20Close\r\nContent-Length:\x200\r\n\r\n")%r(oracle-tns,42,"HTTP/1\.1\x
SF:20400\x20Bad\x20request\r\nConnection:\x20Close\r\nContent-Length:\x200
SF:\r\n\r\n")%r(ms-sql-s,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnect
SF:ion:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(afp,42,"HTTP/1\.1\x20
SF:400\x20Bad\x20request\r\nConnection:\x20Close\r\nContent-Length:\x200\r
SF:\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=6/10%Time=66673791%P=x86_64-redhat-linux
SF:-gnu%r(tor-versions,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnectio
SF:n:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,42,"HTTP/1\
SF:.1\x20400\x20Bad\x20request\r\nConnection:\x20Close\r\nContent-Length:\
SF:x200\r\n\r\n")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nCon
SF:nection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(DNSVersionBindReq
SF:TCP,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x20Close\r\nC
SF:ontent-Length:\x200\r\n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x2040
SF:0\x20Bad\x20request\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n
SF:\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnec
SF:tion:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(TerminalServerCookie
SF:,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x20Close\r\nCont
SF:ent-Length:\x200\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20Bad\
SF:x20request\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(
SF:Kerberos,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x20Close
SF:\r\nContent-Length:\x200\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x2
SF:0Bad\x20request\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n
SF:")%r(LPDString,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x2
SF:0Close\r\nContent-Length:\x200\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x20
SF:400\x20Bad\x20request\r\nConnection:\x20Close\r\nContent-Length:\x200\r
SF:\n\r\n")%r(TerminalServer,42,"HTTP/1\.1\x20400\x20Bad\x20request\r\nCon
SF:nection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(WMSRequest,42,"HT
SF:TP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x20Close\r\nContent-Len
SF:gth:\x200\r\n\r\n")%r(oracle-tns,42,"HTTP/1\.1\x20400\x20Bad\x20request
SF:\r\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n")%r(ms-sql-s,4
SF:2,"HTTP/1\.1\x20400\x20Bad\x20request\r\nConnection:\x20Close\r\nConten
SF:t-Length:\x200\r\n\r\n")%r(afp,42,"HTTP/1\.1\x20400\x20Bad\x20request\r
SF:\nConnection:\x20Close\r\nContent-Length:\x200\r\n\r\n");
Aggressive OS guesses: Linux 3.1 (89%), Linux 3.2 (89%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (88%), Linux 3.7 (87%), Websense Content Gateway (87%), Crestron XPanel control system (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.16 (86%), Linux 4.10 (85%), Linux 3.6 - 3.10 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

TRACEROUTE (using port 1935/tcp)
HOP RTT       ADDRESS
1   0.20 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.48 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.96 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   12.53 ms  be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   20.97 ms  be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218)
7   32.03 ms  be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8   46.72 ms  be5024.ccr41.atl01.atlas.cogentco.com (154.54.163.41)
9   62.70 ms  be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
10  138.47 ms be3095.ccr41.par01.atlas.cogentco.com (154.54.89.222)
11  148.60 ms be5161.ccr42.fra03.atlas.cogentco.com (130.117.50.225)
12  148.25 ms be2846.rcr22.fra06.atlas.cogentco.com (154.54.37.30)
13  ... 16
17  188.75 ms avatars.dzeninfra.ru (62.217.160.4)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 210.94 seconds
Color Scheme
Target
zen-video-preview.s3.dzeninfra.ru
Target IP
62.217.160.4
Target Country
RU
Scan method
Scan OS information and Traceroute
Run command
nmap -A zen-video-preview.s3.dzeninfra.ru
Scan date
10 Jun 2024 13:30
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: