Ports
Duration
Date
IP
Nmap scan report for pcookie-us.taobao.com.gds.alibabadns.com (47.246.136.175) Host is up (0.067s latency). Not shown: 999 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 443/tcp open ssl/https |_ssl-date: TLS randomness does not represent time | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 200 OK | Date: Tue, 01 Oct 2024 00:19:03 GMT | Content-Type: image/gif | Content-Length: 43 | Last-Modified: Mon, 28 Sep 1970 06:00:00 GMT | Connection: close | Expires: Thu, 01 Jan 1970 00:00:01 GMT | Cache-Control: no-cache | Pragma: no-cache | GIF89a | GetRequest: | HTTP/1.1 200 OK | Date: Tue, 01 Oct 2024 00:19:02 GMT | Content-Type: image/gif | Content-Length: 43 | Last-Modified: Mon, 28 Sep 1970 06:00:00 GMT | Connection: close | Expires: Thu, 01 Jan 1970 00:00:01 GMT | Cache-Control: no-cache | Pragma: no-cache | GIF89a | HTTPOptions: | HTTP/1.1 405 Method Not Allowed | Date: Tue, 01 Oct 2024 00:19:03 GMT | Content-Type: text/html | Content-Length: 238 | Connection: close | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | <html> | <head><title>405 Method Not Allowed</title></head> | <body bgcolor="white"> | <h1>405 Method Not Allowed</h1> | <p>The requested method is not allowed for the URL.</body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Date: Tue, 01 Oct 2024 00:19:03 GMT | Content-Type: text/html | Content-Length: 242 | Connection: close | <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> | <html> | <head><title>400 Bad Request</title></head> | <body bgcolor="white"> | <h1>400 Bad Request</h1> | <p>Your browser sent a request that this server could not understand.</body> |_ </html> |_http-title: Site doesn't have a title (image/gif). | tls-alpn: |_ http/1.1 | tls-nextprotoneg: |_ http/1.1 | ssl-cert: Subject: commonName=pcookie.taobao.com/organizationName=Alibaba (China) Technology Co., Ltd./stateOrProvinceName=ZheJiang/countryName=CN | Subject Alternative Name: DNS:pcookie.taobao.com, DNS:pcookie.gaode.com, DNS:pcookie.tudou.com, DNS:pcookie.aliexpress.com, DNS:pcookie.soku.com, DNS:pcookie.youku.com, DNS:pcookie.fliggy.com, DNS:pcookie.tmall.com, DNS:pcookie.alibabagroup.com, DNS:pcookie.alibabacloud.com, DNS:pcookie.tanx.com, DNS:pcookie.alibaba.com, DNS:pcookie.wrating.com, DNS:pcookie.alitrip.com, DNS:pcookie.taopiaopiao.com, DNS:pcookie.1688.com, DNS:pcookie.etao.com, DNS:pcookie.amap.com, DNS:pcookie.aliyun.com, DNS:pcookie.tmall.hk, DNS:pcookie.laiwang.com, DNS:pcookie.alimama.com, DNS:pcookie.ele.me | Not valid before: 2024-08-16T05:26:11 |_Not valid after: 2025-09-04T00:00:00 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/30%Time=66FB3FF6%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,124,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Tue,\x2001\x2 SF:0Oct\x202024\x2000:19:02\x20GMT\r\nContent-Type:\x20image/gif\r\nConten SF:t-Length:\x2043\r\nLast-Modified:\x20Mon,\x2028\x20Sep\x201970\x2006:00 SF::00\x20GMT\r\nConnection:\x20close\r\nExpires:\x20Thu,\x2001\x20Jan\x20 SF:1970\x2000:00:01\x20GMT\r\nCache-Control:\x20no-cache\r\nPragma:\x20no- SF:cache\r\n\r\nGIF89a\x01\0\x01\0\x80\x01\0\0\0\0\xff\xff\xff!\xf9\x04\x0 SF:1\0\0\x01\0,\0\0\0\0\x01\0\x01\0\0\x02\x02L\x01\0;")%r(HTTPOptions,177, SF:"HTTP/1\.1\x20405\x20Method\x20Not\x20Allowed\r\nDate:\x20Tue,\x2001\x2 SF:0Oct\x202024\x2000:19:03\x20GMT\r\nContent-Type:\x20text/html\r\nConten SF:t-Length:\x20238\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTML\x20PU SF:BLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head><title SF:>405\x20Method\x20Not\x20Allowed</title></head>\r\n<body\x20bgcolor=\"w SF:hite\">\r\n<h1>405\x20Method\x20Not\x20Allowed</h1>\r\n<p>The\x20reques SF:ted\x20method\x20is\x20not\x20allowed\x20for\x20the\x20URL\.</body>\r\n SF:</html>\r\n")%r(FourOhFourRequest,124,"HTTP/1\.1\x20200\x20OK\r\nDate:\ SF:x20Tue,\x2001\x20Oct\x202024\x2000:19:03\x20GMT\r\nContent-Type:\x20ima SF:ge/gif\r\nContent-Length:\x2043\r\nLast-Modified:\x20Mon,\x2028\x20Sep\ SF:x201970\x2006:00:00\x20GMT\r\nConnection:\x20close\r\nExpires:\x20Thu,\ SF:x2001\x20Jan\x201970\x2000:00:01\x20GMT\r\nCache-Control:\x20no-cache\r SF:\nPragma:\x20no-cache\r\n\r\nGIF89a\x01\0\x01\0\x80\x01\0\0\0\0\xff\xff SF:\xff!\xf9\x04\x01\0\0\x01\0,\0\0\0\0\x01\0\x01\0\0\x02\x02L\x01\0;")%r( SF:tor-versions,174,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Tue,\x SF:2001\x20Oct\x202024\x2000:19:03\x20GMT\r\nContent-Type:\x20text/html\r\ SF:nContent-Length:\x20242\r\nConnection:\x20close\r\n\r\n<!DOCTYPE\x20HTM SF:L\x20PUBLIC\x20\"-//IETF//DTD\x20HTML\x202\.0//EN\">\r\n<html>\r\n<head SF:><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"whit SF:e\">\r\n<h1>400\x20Bad\x20Request</h1>\r\n<p>Your\x20browser\x20sent\x2 SF:0a\x20request\x20that\x20this\x20server\x20could\x20not\x20understand\. SF:</body>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 17 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.62 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.64 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.62 ms hu0-5-0-25.ccr41.lax01.atlas.cogentco.com (38.88.244.128) 5 12.23 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 21.48 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 34.18 ms be2427.ccr21.den01.atlas.cogentco.com (154.54.87.22) 8 44.12 ms be3802.ccr31.oma02.atlas.cogentco.com (154.54.165.78) 9 52.33 ms be5214.ccr41.ord01.atlas.cogentco.com (154.54.165.134) 10 91.78 ms be2717.ccr21.cle04.atlas.cogentco.com (154.54.6.222) 11 70.65 ms be2891.ccr41.dca01.atlas.cogentco.com (154.54.82.250) 12 71.51 ms be2406.ccr42.iad02.atlas.cogentco.com (154.54.85.210) 13 ... 16 17 67.26 ms 47.246.136.175 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 44.13 seconds