Scan OS information and Traceroute (nmap -A iaas.wps.cn)
Nmap scan report for iaas.wps.cn (114.116.235.116)
Host is up (0.15s latency).
rDNS record for 114.116.235.116: ecs-114-116-235-116.compute.hwclouds-dns.com
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http elb
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:39 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| GetRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:38 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:44 GMT
| Content-Type: text/html
| Content-Length: 138
| Connection: close
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| RTSPRequest:
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| X11Probe:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:39 GMT
| Content-Type: text/html
| Content-Length: 138
| Connection: close
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
|_http-server-header: elb
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
443/tcp open ssl/https elb
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:46 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| GetRequest:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:44 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| HTTPOptions:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:45 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:53 GMT
| Content-Type: text/html
| Content-Length: 138
| Connection: close
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| RTSPRequest:
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| tor-versions:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:46 GMT
| Content-Type: text/html
| Content-Length: 138
| Connection: close
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
|_http-server-header: elb
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
| ssl-cert: Subject: commonName=*.wps.cn/organizationName=Zhuhai Kingsoft Office Software Co., Ltd./stateOrProvinceName=Guangdong Province/countryName=CN
| Subject Alternative Name: DNS:*.wps.cn, DNS:wps.cn
| Not valid before: 2023-04-26T00:00:00
|_Not valid after: 2024-04-26T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
8080/tcp open http-proxy elb
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:39 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| GetRequest, HTTPOptions:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:38 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 159
| Connection: close
| X-KLB: 2
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| <hr><center>ZLB/2.38.2.8.1</center>
| </body>
| </html>
| RTSPRequest:
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| Socks4, Socks5:
| HTTP/1.1 400 Bad Request
| Date: Sun, 19 Nov 2023 04:52:39 GMT
| Content-Type: text/html
| Content-Length: 138
| Connection: close
| Server: elb
| <html>
| <head><title>400 Bad Request</title></head>
| <body bgcolor="white">
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
|_http-server-header: elb
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
3 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/18%Time=65599495%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2
SF:019\x20Nov\x202023\x2004:52:38\x20GMT\r\nContent-Type:\x20text/html;\x2
SF:0charset=utf-8\r\nContent-Length:\x20159\r\nConnection:\x20close\r\nX-K
SF:LB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20
SF:Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</
SF:h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\n</body>\r\n<
SF:/html>\r\n")%r(HTTPOptions,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nD
SF:ate:\x20Sun,\x2019\x20Nov\x202023\x2004:52:38\x20GMT\r\nContent-Type:\x
SF:20text/html;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConnection:\
SF:x20close\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title
SF:>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20B
SF:ad\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\
SF:r\n</body>\r\n</html>\r\n")%r(RTSPRequest,8A,"<html>\r\n<head><title>40
SF:0\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<c
SF:enter><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n
SF:")%r(X11Probe,119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\
SF:x2019\x20Nov\x202023\x2004:52:39\x20GMT\r\nContent-Type:\x20text/html\r
SF:\nContent-Length:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\r\n\
SF:r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body
SF:\x20bgcolor=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></cente
SF:r>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,147,"HTTP/1\.1\x2040
SF:0\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2004:52:39\x
SF:20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length
SF::\x20159\r\nConnection:\x20close\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r
SF:\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>
SF:\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>ZLB/
SF:2\.38\.2\.8\.1</center>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,119,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x
SF:2004:52:44\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x201
SF:38\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><ti
SF:tle>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">
SF:\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</htm
SF:l>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/18%Time=6559949C%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20
SF:Sun,\x2019\x20Nov\x202023\x2004:52:44\x20GMT\r\nContent-Type:\x20text/h
SF:tml;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConnection:\x20close
SF:\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>400\x20
SF:Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Re
SF:quest</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\n</bod
SF:y>\r\n</html>\r\n")%r(HTTPOptions,147,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2004:52:45\x20GMT\r\nContent-
SF:Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConne
SF:ction:\x20close\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head
SF:><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>4
SF:00\x20Bad\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</c
SF:enter>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,147,"HTTP/1\.1\x
SF:20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2004:52:
SF:46\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le
SF:ngth:\x20159\r\nConnection:\x20close\r\nX-KLB:\x202\r\nServer:\x20elb\r
SF:\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<b
SF:ody>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>
SF:ZLB/2\.38\.2\.8\.1</center>\r\n</body>\r\n</html>\r\n")%r(tor-versions,
SF:119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x
SF:202023\x2004:52:46\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Leng
SF:th:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<html>\r\n<
SF:head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"
SF:white\">\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\
SF:r\n</html>\r\n")%r(RTSPRequest,8A,"<html>\r\n<head><title>400\x20Bad\x2
SF:0Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>4
SF:00\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(RPCChe
SF:ck,119,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20No
SF:v\x202023\x2004:52:53\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L
SF:ength:\x20138\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<html>\r
SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor
SF:=\"white\">\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</bod
SF:y>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port8080-TCP:V=7.70%I=7%D=11/18%Time=65599495%P=x86_64-redhat-linux-gnu
SF:%r(GetRequest,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\
SF:x2019\x20Nov\x202023\x2004:52:38\x20GMT\r\nContent-Type:\x20text/html;\
SF:x20charset=utf-8\r\nContent-Length:\x20159\r\nConnection:\x20close\r\nX
SF:-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>400\x20Bad\x
SF:20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request
SF:</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\n</body>\r\
SF:n</html>\r\n")%r(HTTPOptions,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
SF:nDate:\x20Sun,\x2019\x20Nov\x202023\x2004:52:38\x20GMT\r\nContent-Type:
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConnection
SF::\x20close\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><tit
SF:le>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x2
SF:0Bad\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center
SF:>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,8A,"<html>\r\n<head><title>
SF:400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r\n
SF:<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r
SF:\n")%r(FourOhFourRequest,147,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nDat
SF:e:\x20Sun,\x2019\x20Nov\x202023\x2004:52:39\x20GMT\r\nContent-Type:\x20
SF:text/html;\x20charset=utf-8\r\nContent-Length:\x20159\r\nConnection:\x2
SF:0close\r\nX-KLB:\x202\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>4
SF:00\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad
SF:\x20Request</h1></center>\r\n<hr><center>ZLB/2\.38\.2\.8\.1</center>\r\
SF:n</body>\r\n</html>\r\n")%r(Socks5,119,"HTTP/1\.1\x20400\x20Bad\x20Requ
SF:est\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2004:52:39\x20GMT\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x20138\r\nConnection:\x20close\r
SF:\nServer:\x20elb\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</t
SF:itle></head>\r\n<body\x20bgcolor=\"white\">\r\n<center><h1>400\x20Bad\x
SF:20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(Socks4,119,"HTTP/
SF:1\.1\x20400\x20Bad\x20Request\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x20
SF:04:52:39\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20138
SF:\r\nConnection:\x20close\r\nServer:\x20elb\r\n\r\n<html>\r\n<head><titl
SF:e>400\x20Bad\x20Request</title></head>\r\n<body\x20bgcolor=\"white\">\r
SF:\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>
SF:\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 4.X (87%)
OS CPE: cpe:/o:linux:linux_kernel:4.9
Aggressive OS guesses: Linux 4.9 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 29 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.64 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.96 ms multacom.com (96.45.162.9)
4 0.36 ms 182.54.129.90
5 11.75 ms 10.31.0.238
6 157.38 ms 219.158.33.77
7 153.82 ms 219.158.98.57
8 151.62 ms 219.158.16.65
9 ... 10
11 148.44 ms 125.33.185.110
12 149.10 ms 61.49.137.6
13 ... 28
29 154.85 ms ecs-114-116-235-116.compute.hwclouds-dns.com (114.116.235.116)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 95.19 seconds
Color Scheme
-
Target
-
Target IP
114.116.235.116
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A iaas.wps.cn
-
Scan date
18 Nov 2023 23:53
-
Copy scan report
-
Download report
-
Remove scan result