Scan OS information and Traceroute (nmap -A mp.360.cn)
Nmap scan report for mp.360.cn (180.163.242.95)
Host is up (0.14s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http nginx 1.14.2
|_http-server-header: nginx/1.14.2
|_http-title: Did not follow redirect to https://mp.360.cn/
443/tcp open ssl/http nginx 1.14.2
|_http-server-header: nginx/1.14.2
|_http-title: 360\xE5\xB0\x8F\xE7\xA8\x8B\xE5\xBA\x8F
| ssl-cert: Subject: commonName=*.mp.360.cn
| Subject Alternative Name: DNS:*.mp.360.cn, DNS:mp.360.cn
| Not valid before: 2023-02-13T00:00:00
|_Not valid after: 2024-02-13T23:59:59
|_ssl-date: 2023-11-21T03:35:58+00:00; +1s from scanner time.
| tls-nextprotoneg:
|_ http/1.1
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|firewall|media device|broadband router|security-misc
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (96%), IPCop 2.X (96%), Tiandy embedded (96%), D-Link embedded (94%), Draytek embedded (94%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:ipcop:ipcop:2.0 cpe:/o:linux:linux_kernel:3.4 cpe:/o:linux:linux_kernel:3.2 cpe:/o:linux:linux_kernel:4.9 cpe:/h:dlink:dsl-2890al cpe:/h:draytek:vigor_2960 cpe:/o:linux:linux_kernel:2.6.25.20
Aggressive OS guesses: IPCop 2.0 (Linux 2.6.32) (96%), Linux 2.6.32 (96%), IPCop 2 firewall (Linux 3.4) (96%), Linux 3.2 (96%), Tiandy NVR (96%), Linux 3.18 (95%), Linux 4.9 (95%), D-Link DSL-2890AL ADSL router (94%), Draytek Vigor 2960 VPN firewall (94%), OpenWrt Kamikaze 8.09 (Linux 2.6.25.20) (94%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.22 ms 208.76.251.177
2 0.67 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.92 ms multacom.com (96.45.162.9)
4 0.35 ms 182.54.129.88
5 1.98 ms 218.30.54.189
6 ...
7 134.93 ms 202.97.39.202
8 ...
9 137.05 ms 101.95.88.89
10 ...
11 145.84 ms 101.95.246.98
12 146.03 ms 180.163.219.30
13 ... 17
18 136.23 ms 180.163.242.95
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 59.23 seconds