Scan OS information and Traceroute (nmap -A s6110-flv-spe-ml.gslb.ksyuncdn.com)
Nmap scan report for s6110-flv-spe-ml.gslb.ksyuncdn.com (120.240.79.106)
Host is up (0.17s latency).
Not shown: 965 filtered ports, 31 closed ports
PORT STATE SERVICE VERSION
80/tcp open http OpenResty web app server
|_http-server-header: openresty
|_http-title: 403 Forbidden
443/tcp open ssl/http OpenResty web app server
|_http-server-header: openresty
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=download.ks-cdn.com
| Subject Alternative Name: DNS:download.ks-cdn.com, DNS:*.cntv.kcdnvip.com, DNS:*.dianping.com, DNS:*.download.ks-cdn.com, DNS:*.meituan.net, DNS:*.v.kcdnvip.com, DNS:*.yfcloud.com, DNS:*.zservey.net
| Not valid before: 2022-12-30T00:00:00
|_Not valid after: 2023-12-30T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
843/tcp open unknown
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, RPCCheck, RTSPRequest, SSLSessionReq, TLSSessionReq:
| <?xml version="1.0" encoding="utf-8"?>
| <cross-domain-policy>
| <allow-access-from domain="*" to-ports="*" />
| </cross-domain-policy>
| GetRequest:
| <?xml version="1.0" encoding="utf-8"?>
| <cross-domain-policy>
| <allow-access-from domain="*"/>
| </cross-domain-policy>
| HTTPOptions:
| <html>
| <head><title>405 Not Allowed</title></head>
| <body bgcolor="white">
| <center><h1>405 Not Allowed</h1></center>
| <hr><center>nginx</center>
| </body>
|_ </html>
1935/tcp open rtmp?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port843-TCP:V=7.70%I=7%D=11/19%Time=655ACD43%P=x86_64-redhat-linux-gnu%
SF:r(GetRequest,7B,"<\?xml\x20version=\"1\.0\"\x20encoding=\"utf-8\"\?>\r\
SF:n<cross-domain-policy>\x20\r\n\t<allow-access-from\x20domain=\"\*\"/>\x
SF:20\x20\r\n</cross-domain-policy>\x20")%r(HTTPOptions,A6,"<html>\r\n<hea
SF:d><title>405\x20Not\x20Allowed</title></head>\r\n<body\x20bgcolor=\"whi
SF:te\">\r\n<center><h1>405\x20Not\x20Allowed</h1></center>\r\n<hr><center
SF:>nginx</center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,8B,"<\?xml\x2
SF:0version=\"1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20
SF:\r\n\t<allow-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\
SF:x20\r\n</cross-domain-policy>\x20\r\n")%r(RPCCheck,8B,"<\?xml\x20versio
SF:n=\"1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r\n\t<
SF:allow-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x20\r\n
SF:</cross-domain-policy>\x20\r\n")%r(DNSVersionBindReqTCP,8B,"<\?xml\x20v
SF:ersion=\"1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r
SF:\n\t<allow-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x2
SF:0\r\n</cross-domain-policy>\x20\r\n")%r(DNSStatusRequestTCP,8B,"<\?xml\
SF:x20version=\"1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x
SF:20\r\n\t<allow-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x2
SF:0\x20\r\n</cross-domain-policy>\x20\r\n")%r(Help,8B,"<\?xml\x20version=
SF:\"1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r\n\t<al
SF:low-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x20\r\n</
SF:cross-domain-policy>\x20\r\n")%r(SSLSessionReq,8B,"<\?xml\x20version=\"
SF:1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r\n\t<allo
SF:w-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x20\r\n</cr
SF:oss-domain-policy>\x20\r\n")%r(TLSSessionReq,8B,"<\?xml\x20version=\"1\
SF:.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r\n\t<allow-
SF:access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x20\r\n</cros
SF:s-domain-policy>\x20\r\n")%r(Kerberos,8B,"<\?xml\x20version=\"1\.0\"\x2
SF:0encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r\n\t<allow-access-
SF:from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x20\r\n</cross-domai
SF:n-policy>\x20\r\n");
Device type: general purpose|specialized|webcam|media device|storage-misc
Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%), Philips embedded (88%), Geovision embedded (88%), Western Digital embedded (88%)
OS CPE: cpe:/o:linux:linux_kernel:3.16 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel cpe:/h:geovision:ebd4700 cpe:/o:linux:linux_kernel:3.4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.6.17
Aggressive OS guesses: Linux 3.16 (91%), Linux 3.12 - 4.10 (90%), Linux 3.1 (88%), Linux 3.2 (88%), Philips Hue Bridge 2.0 (Linux) (88%), Geovision EBD4700 CCTV camera (Linux 3.4) (88%), Linux 2.6.32 - 3.10 (88%), Dahua or Amcrest network video recorder (Linux) (88%), Western Digital My Cloud DL4100 NAS (Linux 3.10) (88%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 15 hops
TRACEROUTE (using port 8080/tcp)
HOP RTT ADDRESS
1 0.22 ms 208.76.251.177
2 0.57 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.70 ms multacom.com (96.45.162.9)
4 5.99 ms china-mobile.as58453.any2ix.coresite.com (206.72.210.219)
5 5.85 ms 223.120.6.17
6 141.64 ms 223.120.12.106
7 165.00 ms 221.183.55.82
8 165.21 ms 221.183.92.21
9 164.68 ms 221.183.89.242
10 ... 14
15 174.63 ms 120.240.79.106
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1956.51 seconds
Color Scheme
-
Target
-
Target IP
120.240.79.106
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A s6110-flv-spe-ml.gslb.ksyuncdn.com
-
Scan date
19 Nov 2023 22:09
-
Copy scan report
-
Download report
-
Remove scan result