Scan report for "h5.gdt.qq.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A h5.gdt.qq.com)
Nmap scan report for h5.gdt.qq.com (157.255.220.233)
Host is up (0.19s latency).
Other addresses for h5.gdt.qq.com (not scanned): 2408:8711:10:10::55
Not shown: 997 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http      stgw
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Help: 
|     HTTP/1.1 400 Bad Request
|     Server: stgw
|     Date: Mon, 20 Nov 2023 05:02:34 GMT
|     Content-Type: text/html
|     Content-Length: 149
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: stgw
|     Date: Mon, 20 Nov 2023 05:02:33 GMT
|     Content-Type: text/html
|     Content-Length: 149
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: stgw
|     Date: Mon, 20 Nov 2023 05:02:27 GMT
|     Content-Type: text/html
|     Content-Length: 149
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|_    </html>
|_http-server-header: stgw
|_http-title: Site doesn't have a title.
443/tcp open  ssl/https
| fingerprint-strings: 
|   DNSStatusRequestTCP: 
|     HTTP/1.1 400 Bad Request
|     Server: stgw
|     Date: Mon, 20 Nov 2023 05:02:44 GMT
|     Content-Type: text/html
|     Content-Length: 149
|     Connection: close
|     alt-svc: quic=":443"; ma=2592000; v="39,38,37,36,35"
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   DNSVersionBindReqTCP, RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: stgw
|     Date: Mon, 20 Nov 2023 05:02:43 GMT
|     Content-Type: text/html
|     Content-Length: 149
|     Connection: close
|     alt-svc: quic=":443"; ma=2592000; v="39,38,37,36,35"
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Server: stgw
|     Date: Mon, 20 Nov 2023 05:02:35 GMT
|     Content-Type: text/html
|     Content-Length: 149
|     Connection: close
|     alt-svc: quic=":443"; ma=2592000; v="39,38,37,36,35"
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>stgw</center>
|     </body>
|_    </html>
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=e.qq.com/organizationName=Shenzhen Tencent Computer Systems Company Limited/stateOrProvinceName=Guangdong Province/countryName=CN
| Subject Alternative Name: DNS:e.qq.com, DNS:*.ad.qq.com, DNS:*.e.qq.com, DNS:*.fymall4.com, DNS:*.fymall5.com, DNS:*.gdt.qq.com, DNS:*.gdtimg.com, DNS:*.gtimg.cn, DNS:*.media.qq.com, DNS:*.spark-page.com, DNS:ad.qq.com, DNS:c.l.qq.com, DNS:gdt.qq.com, DNS:page.media.qq.com, DNS:spark-page.com
| Not valid before: 2023-10-10T00:00:00
|_Not valid after:  2024-11-09T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| tls-nextprotoneg: 
|   h2
|_  http/1.1
843/tcp open  unknown
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=655AE863%P=x86_64-redhat-linux-gnu%r
SF:(RTSPRequest,95,"<html>\r\n<head><title>400\x20Bad\x20Request</title></
SF:head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<
SF:hr><center>stgw</center>\r\n</body>\r\n</html>\r\n")%r(X11Probe,125,"HT
SF:TP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20stgw\r\nDate:\x20Mon,\x2
SF:020\x20Nov\x202023\x2005:02:27\x20GMT\r\nContent-Type:\x20text/html\r\n
SF:Content-Length:\x20149\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><
SF:title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400
SF:\x20Bad\x20Request</h1></center>\r\n<hr><center>stgw</center>\r\n</body
SF:>\r\n</html>\r\n")%r(RPCCheck,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r
SF:\nServer:\x20stgw\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:02:33\x20
SF:GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20149\r\nConnecti
SF:on:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title
SF:></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r
SF:\n<hr><center>stgw</center>\r\n</body>\r\n</html>\r\n")%r(DNSVersionBin
SF:dReqTCP,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20stgw\r\nD
SF:ate:\x20Mon,\x2020\x20Nov\x202023\x2005:02:34\x20GMT\r\nContent-Type:\x
SF:20text/html\r\nContent-Length:\x20149\r\nConnection:\x20close\r\n\r\n<h
SF:tml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n
SF:<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>stgw</ce
SF:nter>\r\n</body>\r\n</html>\r\n")%r(DNSStatusRequestTCP,125,"HTTP/1\.1\
SF:x20400\x20Bad\x20Request\r\nServer:\x20stgw\r\nDate:\x20Mon,\x2020\x20N
SF:ov\x202023\x2005:02:34\x20GMT\r\nContent-Type:\x20text/html\r\nContent-
SF:Length:\x20149\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>40
SF:0\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\
SF:x20Request</h1></center>\r\n<hr><center>stgw</center>\r\n</body>\r\n</h
SF:tml>\r\n")%r(Help,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x2
SF:0stgw\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:02:34\x20GMT\r\nConte
SF:nt-Type:\x20text/html\r\nContent-Length:\x20149\r\nConnection:\x20close
SF:\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n
SF:<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><cente
SF:r>stgw</center>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655AE86C%P=x86_64-redhat-linu
SF:x-gnu%r(tor-versions,15B,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
SF:\x20stgw\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:02:35\x20GMT\r\nCo
SF:ntent-Type:\x20text/html\r\nContent-Length:\x20149\r\nConnection:\x20cl
SF:ose\r\nalt-svc:\x20quic=\":443\";\x20ma=2592000;\x20v=\"39,38,37,36,35\
SF:"\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\
SF:n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><cent
SF:er>stgw</center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,95,"<html>\r
SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cente
SF:r><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>stgw</center>\
SF:r\n</body>\r\n</html>\r\n")%r(RPCCheck,15B,"HTTP/1\.1\x20400\x20Bad\x20
SF:Request\r\nServer:\x20stgw\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:
SF:02:43\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20149\r\
SF:nConnection:\x20close\r\nalt-svc:\x20quic=\":443\";\x20ma=2592000;\x20v
SF:=\"39,38,37,36,35\"\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request
SF:</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></ce
SF:nter>\r\n<hr><center>stgw</center>\r\n</body>\r\n</html>\r\n")%r(DNSVer
SF:sionBindReqTCP,15B,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20st
SF:gw\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:02:43\x20GMT\r\nContent-
SF:Type:\x20text/html\r\nContent-Length:\x20149\r\nConnection:\x20close\r\
SF:nalt-svc:\x20quic=\":443\";\x20ma=2592000;\x20v=\"39,38,37,36,35\"\r\n\
SF:r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body
SF:>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<hr><center>stg
SF:w</center>\r\n</body>\r\n</html>\r\n")%r(DNSStatusRequestTCP,15B,"HTTP/
SF:1\.1\x20400\x20Bad\x20Request\r\nServer:\x20stgw\r\nDate:\x20Mon,\x2020
SF:\x20Nov\x202023\x2005:02:44\x20GMT\r\nContent-Type:\x20text/html\r\nCon
SF:tent-Length:\x20149\r\nConnection:\x20close\r\nalt-svc:\x20quic=\":443\
SF:";\x20ma=2592000;\x20v=\"39,38,37,36,35\"\r\n\r\n<html>\r\n<head><title
SF:>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20B
SF:ad\x20Request</h1></center>\r\n<hr><center>stgw</center>\r\n</body>\r\n
SF:</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 18 hops

TRACEROUTE (using port 443/tcp)
HOP RTT       ADDRESS
1   0.18 ms   208.76.251.177
2   0.71 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.73 ms   multacom.com (96.45.162.9)
4   0.35 ms   182.54.129.90
5   9.86 ms   10.31.0.238
6   173.62 ms 219.158.33.77
7   172.09 ms 219.158.117.1
8   190.16 ms 219.158.111.122
9   195.85 ms 219.158.97.26
10  194.70 ms 219.158.24.125
11  ... 17
18  187.94 ms 157.255.220.233

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 130.35 seconds
Color Scheme
Target
h5.gdt.qq.com
Target IP
157.255.220.233
Target Country
CN
Scan method
Scan OS information and Traceroute
Run command
nmap -A h5.gdt.qq.com
Scan date
20 Nov 2023 00:04
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: