Scan report for "s6110-flv-spe-ml.gslb.ksyuncdn.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A s6110-flv-spe-ml.gslb.ksyuncdn.com)
Nmap scan report for s6110-flv-spe-ml.gslb.ksyuncdn.com (120.240.79.106)
Host is up (0.17s latency).
Not shown: 965 filtered ports, 31 closed ports
PORT     STATE SERVICE  VERSION
80/tcp   open  http     OpenResty web app server
|_http-server-header: openresty
|_http-title: 403 Forbidden
443/tcp  open  ssl/http OpenResty web app server
|_http-server-header: openresty
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=download.ks-cdn.com
| Subject Alternative Name: DNS:download.ks-cdn.com, DNS:*.cntv.kcdnvip.com, DNS:*.dianping.com, DNS:*.download.ks-cdn.com, DNS:*.meituan.net, DNS:*.v.kcdnvip.com, DNS:*.yfcloud.com, DNS:*.zservey.net
| Not valid before: 2022-12-30T00:00:00
|_Not valid after:  2023-12-30T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
843/tcp  open  unknown
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, Kerberos, RPCCheck, RTSPRequest, SSLSessionReq, TLSSessionReq: 
|     <?xml version="1.0" encoding="utf-8"?>
|     <cross-domain-policy> 
|     <allow-access-from domain="*" to-ports="*" /> 
|     </cross-domain-policy>
|   GetRequest: 
|     <?xml version="1.0" encoding="utf-8"?>
|     <cross-domain-policy> 
|     <allow-access-from domain="*"/> 
|     </cross-domain-policy>
|   HTTPOptions: 
|     <html>
|     <head><title>405 Not Allowed</title></head>
|     <body bgcolor="white">
|     <center><h1>405 Not Allowed</h1></center>
|     <hr><center>nginx</center>
|     </body>
|_    </html>
1935/tcp open  rtmp?
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port843-TCP:V=7.70%I=7%D=11/19%Time=655ACD43%P=x86_64-redhat-linux-gnu%
SF:r(GetRequest,7B,"<\?xml\x20version=\"1\.0\"\x20encoding=\"utf-8\"\?>\r\
SF:n<cross-domain-policy>\x20\r\n\t<allow-access-from\x20domain=\"\*\"/>\x
SF:20\x20\r\n</cross-domain-policy>\x20")%r(HTTPOptions,A6,"<html>\r\n<hea
SF:d><title>405\x20Not\x20Allowed</title></head>\r\n<body\x20bgcolor=\"whi
SF:te\">\r\n<center><h1>405\x20Not\x20Allowed</h1></center>\r\n<hr><center
SF:>nginx</center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,8B,"<\?xml\x2
SF:0version=\"1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20
SF:\r\n\t<allow-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\
SF:x20\r\n</cross-domain-policy>\x20\r\n")%r(RPCCheck,8B,"<\?xml\x20versio
SF:n=\"1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r\n\t<
SF:allow-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x20\r\n
SF:</cross-domain-policy>\x20\r\n")%r(DNSVersionBindReqTCP,8B,"<\?xml\x20v
SF:ersion=\"1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r
SF:\n\t<allow-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x2
SF:0\r\n</cross-domain-policy>\x20\r\n")%r(DNSStatusRequestTCP,8B,"<\?xml\
SF:x20version=\"1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x
SF:20\r\n\t<allow-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x2
SF:0\x20\r\n</cross-domain-policy>\x20\r\n")%r(Help,8B,"<\?xml\x20version=
SF:\"1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r\n\t<al
SF:low-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x20\r\n</
SF:cross-domain-policy>\x20\r\n")%r(SSLSessionReq,8B,"<\?xml\x20version=\"
SF:1\.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r\n\t<allo
SF:w-access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x20\r\n</cr
SF:oss-domain-policy>\x20\r\n")%r(TLSSessionReq,8B,"<\?xml\x20version=\"1\
SF:.0\"\x20encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r\n\t<allow-
SF:access-from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x20\r\n</cros
SF:s-domain-policy>\x20\r\n")%r(Kerberos,8B,"<\?xml\x20version=\"1\.0\"\x2
SF:0encoding=\"utf-8\"\?>\r\n<cross-domain-policy>\x20\r\n\t<allow-access-
SF:from\x20domain=\"\*\"\x20to-ports=\"\*\"\x20/>\x20\x20\r\n</cross-domai
SF:n-policy>\x20\r\n");
Device type: general purpose|specialized|webcam|media device|storage-misc
Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%), Philips embedded (88%), Geovision embedded (88%), Western Digital embedded (88%)
OS CPE: cpe:/o:linux:linux_kernel:3.16 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel cpe:/h:geovision:ebd4700 cpe:/o:linux:linux_kernel:3.4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:2.6.17
Aggressive OS guesses: Linux 3.16 (91%), Linux 3.12 - 4.10 (90%), Linux 3.1 (88%), Linux 3.2 (88%), Philips Hue Bridge 2.0 (Linux) (88%), Geovision EBD4700 CCTV camera (Linux 3.4) (88%), Linux 2.6.32 - 3.10 (88%), Dahua or Amcrest network video recorder (Linux) (88%), Western Digital My Cloud DL4100 NAS (Linux 3.10) (88%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 15 hops

TRACEROUTE (using port 8080/tcp)
HOP RTT       ADDRESS
1   0.22 ms   208.76.251.177
2   0.57 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.70 ms   multacom.com (96.45.162.9)
4   5.99 ms   china-mobile.as58453.any2ix.coresite.com (206.72.210.219)
5   5.85 ms   223.120.6.17
6   141.64 ms 223.120.12.106
7   165.00 ms 221.183.55.82
8   165.21 ms 221.183.92.21
9   164.68 ms 221.183.89.242
10  ... 14
15  174.63 ms 120.240.79.106

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1956.51 seconds
Color Scheme
Target
s6110-flv-spe-ml.gslb.ksyuncdn.com
Target IP
120.240.79.106
Target Country
CN
Scan method
Scan OS information and Traceroute
Run command
nmap -A s6110-flv-spe-ml.gslb.ksyuncdn.com
Scan date
19 Nov 2023 22:09
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: