Scan report for "pull-rtmp-f1-xg.bytecdn.cn"

Membership level: Free member
Scan OS information and Traceroute (nmap -A pull-rtmp-f1-xg.bytecdn.cn)
Nmap scan report for pull-rtmp-f1-xg.bytecdn.cn (157.185.145.81)
Host is up (0.032s latency).
Not shown: 930 closed ports
PORT      STATE SERVICE     VERSION
80/tcp    open  http        nginx
81/tcp    open  http        nginx
82/tcp    open  http        nginx
85/tcp    open  http        nginx
88/tcp    open  http        nginx
89/tcp    open  http        nginx
90/tcp    open  http        nginx
443/tcp   open  ssl/http    nginx
| http-server-header: 
|   Cdn Cache Server V2.0
|_  nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=default.chinanetcenter.com/organizationName=\xE7\xBD\x91\xE5\xAE\xBF\xE7\xA7\x91\xE6\x8A\x80\xE8\x82\xA1\xE4\xBB\xBD\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8\xE5\x8E\xA6\xE9\x97\xA8\xE5\x88\x86\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE7\xA6\x8F\xE5\xBB\xBA\xE7\x9C\x81/countryName=CN
| Subject Alternative Name: DNS:default.chinanetcenter.com, DNS:*.i3839.com, DNS:*.ourdvsss.com, DNS:*.ziroom.com, DNS:*.blued.com, DNS:sstatic.chunboimg.com, DNS:*.ip138.com, DNS:m.bbs.3839.com, DNS:microgame.5054399.net, DNS:nitrome.com.4399.com, DNS:s3.chunboimg.com, DNS:jssdk.3304399.net, DNS:*.lof3.xyz, DNS:*.rax0mai4.xyz, DNS:*.4399.cn, DNS:s0.chunboimg.com, DNS:*.3839.com, DNS:www.miniclip.com.4399pk.com, DNS:*.1zhe.com, DNS:ip138.com, DNS:d.3839app.net, DNS:maangh2.chinanetcenter.com, DNS:*.9k9.cn, DNS:*.4399.com, DNS:s1.chunboimg.com, DNS:cdn.h5wan.4399sj.com, DNS:*.service.kugou.com, DNS:lvs.lxdns.net, DNS:*.wscdns.com, DNS:*.walla-app.com, DNS:*.bldimg.com, DNS:*.5054399.com, DNS:*.4399youpai.com, DNS:*.3839app.com, DNS:*.v.cdn20.com, DNS:hls.vda.v.cdn20.com, DNS:*.cntv.cdn20.com, DNS:*.img4399.com, DNS:s2.chunboimg.com, DNS:*.cntv.lxdns.com, DNS:*.ourdvsssvip.com, DNS:*.v.wscdns.com, DNS:*.iwan4399.com, DNS:4399.cn
| Not valid before: 2023-10-25T00:00:00
|_Not valid after:  2024-11-15T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
801/tcp   open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
843/tcp   open  unknown
1080/tcp  open  http        nginx
1088/tcp  open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
1089/tcp  open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
1443/tcp  open  ssl/ies-lm?
1900/tcp  open  http        nginx
1935/tcp  open  http        nginx
2000/tcp  open  http        nginx
2323/tcp  open  3d-nfsd?
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, SIPOptions: 
|     HTTP/1.0 404 FAIL
|     Content-length:5
|     Connection:Close
|_    ERROR
2381/tcp  open  http        nginx
2382/tcp  open  http        nginx
2383/tcp  open  http        nginx
3000/tcp  open  http        nginx
4000/tcp  open  http        nginx
5000/tcp  open  http        nginx
5001/tcp  open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
5002/tcp  open  http        nginx
5566/tcp  open  http        nginx
6666/tcp  open  irc?
|_irc-info: Unable to open connection
7000/tcp  open  http        nginx
7001/tcp  open  http        nginx
7002/tcp  open  http        nginx
7070/tcp  open  http        nginx
7443/tcp  open  ssl/http    nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=default.chinanetcenter.com/organizationName=\xE7\xBD\x91\xE5\xAE\xBF\xE7\xA7\x91\xE6\x8A\x80\xE8\x82\xA1\xE4\xBB\xBD\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8\xE5\x8E\xA6\xE9\x97\xA8\xE5\x88\x86\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE7\xA6\x8F\xE5\xBB\xBA\xE7\x9C\x81/countryName=CN
| Subject Alternative Name: DNS:default.chinanetcenter.com, DNS:*.i3839.com, DNS:*.ourdvsss.com, DNS:*.ziroom.com, DNS:*.blued.com, DNS:sstatic.chunboimg.com, DNS:*.ip138.com, DNS:m.bbs.3839.com, DNS:microgame.5054399.net, DNS:nitrome.com.4399.com, DNS:s3.chunboimg.com, DNS:jssdk.3304399.net, DNS:*.lof3.xyz, DNS:*.rax0mai4.xyz, DNS:*.4399.cn, DNS:s0.chunboimg.com, DNS:*.3839.com, DNS:www.miniclip.com.4399pk.com, DNS:*.1zhe.com, DNS:ip138.com, DNS:d.3839app.net, DNS:maangh2.chinanetcenter.com, DNS:*.9k9.cn, DNS:*.4399.com, DNS:s1.chunboimg.com, DNS:cdn.h5wan.4399sj.com, DNS:*.service.kugou.com, DNS:lvs.lxdns.net, DNS:*.wscdns.com, DNS:*.walla-app.com, DNS:*.bldimg.com, DNS:*.5054399.com, DNS:*.4399youpai.com, DNS:*.3839app.com, DNS:*.v.cdn20.com, DNS:hls.vda.v.cdn20.com, DNS:*.cntv.cdn20.com, DNS:*.img4399.com, DNS:s2.chunboimg.com, DNS:*.cntv.lxdns.com, DNS:*.ourdvsssvip.com, DNS:*.v.wscdns.com, DNS:*.iwan4399.com, DNS:4399.cn
| Not valid before: 2023-10-25T00:00:00
|_Not valid after:  2024-11-15T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
7777/tcp  open  http        nginx
8000/tcp  open  http        nginx
8001/tcp  open  http        nginx
8008/tcp  open  http        nginx
8009/tcp  open  http        nginx
|_ajp-methods: Failed to get a valid response for the OPTION request
8010/tcp  open  http        nginx
8011/tcp  open  http        nginx
8022/tcp  open  http        nginx
8080/tcp  open  http        nginx
8081/tcp  open  http        nginx
8082/tcp  open  http        nginx
8083/tcp  open  http        nginx
8084/tcp  open  http        nginx
8085/tcp  open  http        nginx
8088/tcp  open  http        nginx
8089/tcp  open  http        nginx
8090/tcp  open  http        nginx
8443/tcp  open  ssl/http    nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=default.chinanetcenter.com/organizationName=\xE7\xBD\x91\xE5\xAE\xBF\xE7\xA7\x91\xE6\x8A\x80\xE8\x82\xA1\xE4\xBB\xBD\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8\xE5\x8E\xA6\xE9\x97\xA8\xE5\x88\x86\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE7\xA6\x8F\xE5\xBB\xBA\xE7\x9C\x81/countryName=CN
| Subject Alternative Name: DNS:default.chinanetcenter.com, DNS:*.i3839.com, DNS:*.ourdvsss.com, DNS:*.ziroom.com, DNS:*.blued.com, DNS:sstatic.chunboimg.com, DNS:*.ip138.com, DNS:m.bbs.3839.com, DNS:microgame.5054399.net, DNS:nitrome.com.4399.com, DNS:s3.chunboimg.com, DNS:jssdk.3304399.net, DNS:*.lof3.xyz, DNS:*.rax0mai4.xyz, DNS:*.4399.cn, DNS:s0.chunboimg.com, DNS:*.3839.com, DNS:www.miniclip.com.4399pk.com, DNS:*.1zhe.com, DNS:ip138.com, DNS:d.3839app.net, DNS:maangh2.chinanetcenter.com, DNS:*.9k9.cn, DNS:*.4399.com, DNS:s1.chunboimg.com, DNS:cdn.h5wan.4399sj.com, DNS:*.service.kugou.com, DNS:lvs.lxdns.net, DNS:*.wscdns.com, DNS:*.walla-app.com, DNS:*.bldimg.com, DNS:*.5054399.com, DNS:*.4399youpai.com, DNS:*.3839app.com, DNS:*.v.cdn20.com, DNS:hls.vda.v.cdn20.com, DNS:*.cntv.cdn20.com, DNS:*.img4399.com, DNS:s2.chunboimg.com, DNS:*.cntv.lxdns.com, DNS:*.ourdvsssvip.com, DNS:*.v.wscdns.com, DNS:*.iwan4399.com, DNS:4399.cn
| Not valid before: 2023-10-25T00:00:00
|_Not valid after:  2024-11-15T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
8888/tcp  open  http        nginx
9000/tcp  open  http        nginx
9001/tcp  open  http        nginx
9002/tcp  open  http        nginx
9080/tcp  open  http        nginx
9081/tcp  open  http        nginx
9090/tcp  open  http        nginx
9091/tcp  open  http        nginx
9099/tcp  open  http        nginx
9100/tcp  open  jetdirect?
9101/tcp  open  jetdirect?
9103/tcp  open  jetdirect?
9200/tcp  open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
9998/tcp  open  http        nginx
9999/tcp  open  http        nginx
11111/tcp open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
12000/tcp open  http        nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
19350/tcp open  unknown
30000/tcp open  http        nginx
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port2323-TCP:V=7.70%I=7%D=11/18%Time=6559B257%P=x86_64-redhat-linux-gnu
SF:%r(GetRequest,3E,"HTTP/1\.0\x20404\x20FAIL\r\nContent-length:5\r\nConne
SF:ction:Close\r\n\r\nERROR")%r(HTTPOptions,3E,"HTTP/1\.0\x20404\x20FAIL\r
SF:\nContent-length:5\r\nConnection:Close\r\n\r\nERROR")%r(RTSPRequest,3E,
SF:"HTTP/1\.0\x20404\x20FAIL\r\nContent-length:5\r\nConnection:Close\r\n\r
SF:\nERROR")%r(FourOhFourRequest,3E,"HTTP/1\.0\x20404\x20FAIL\r\nContent-l
SF:ength:5\r\nConnection:Close\r\n\r\nERROR")%r(SIPOptions,3E,"HTTP/1\.0\x
SF:20404\x20FAIL\r\nContent-length:5\r\nConnection:Close\r\n\r\nERROR");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port6666-TCP:V=7.70%I=7%D=11/18%Time=6559B25E%P=x86_64-redhat-linux-gnu
SF:%r(RPCCheck,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xf
SF:f\xff\0\0\0\x07\x01\0\0\0")%r(SSLSessionReq,1C,"\x80\x03\0\x04\0\0\0\x1
SF:4\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(TLSSessio
SF:nReq,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0
SF:\0\0\x07\x01\0\0\0")%r(Kerberos,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\
SF:0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(SMBProgNeg,1C,"\x80\x
SF:03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\
SF:0\0")%r(X11Probe,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\x
SF:ff\xff\xff\0\0\0\x07\x01\0\0\0")%r(TerminalServer,1C,"\x80\x03\0\x04\0\
SF:0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(Not
SF:esRPC,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\
SF:0\0\0\x07\x01\0\0\0")%r(WMSRequest,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x
SF:02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(afp,1C,"\x80\x03\0
SF:\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0"
SF:);
Aggressive OS guesses: Linux 2.6.32 - 3.10 (95%), Linux 3.10 (93%), Linux 3.12 - 4.10 (93%), Linux 3.1 (92%), Linux 3.2 (92%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (92%), Geovision EBD4700 CCTV camera (Linux 3.4) (91%), Dahua or Amcrest network video recorder (Linux) (91%), Linux 2.6.18 (90%), Android 4.1 - 6.0 (Linux 3.4 - 3.14) (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops

TRACEROUTE (using port 587/tcp)
HOP RTT      ADDRESS
1   0.21 ms  208.76.251.177
2   0.63 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.70 ms  1.162.45.96-dedicated.multacom.com (96.45.162.1)
4   0.93 ms  be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   13.00 ms be3177.ccr22.sjc01.atlas.cogentco.com (154.54.40.146)
6   13.91 ms be3179.ccr22.sfo01.atlas.cogentco.com (154.54.43.149)
7   32.73 ms be3717.ccr21.sea02.atlas.cogentco.com (154.54.86.210)
8   32.81 ms be2576.rcr01.b007274-0.sea02.atlas.cogentco.com (154.54.28.110)
9   32.07 ms 38.88.252.74
10  46.36 ms 192.168.255.252
11  31.96 ms 157.185.145.81

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 586.30 seconds
Color Scheme
Target
pull-rtmp-f1-xg.bytecdn.cn
Target IP
157.185.145.81
Target Country
CA
Scan method
Scan OS information and Traceroute
Run command
nmap -A pull-rtmp-f1-xg.bytecdn.cn
Scan date
19 Nov 2023 02:08
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: