Scan report for "v26-hca.douyinvod.com"

Membership level: Free member
Summary

Ports

28

Duration

2min 28.02sec (148.02sec)

Date

2024-09-18

IP

39.137.35.135

Report
Scan OS information and Traceroute (nmap -A v26-hca.douyinvod.com)
Nmap scan report for v26-hca.douyinvod.com (39.137.35.135)
Host is up (0.23s latency).
Other addresses for v26-hca.douyinvod.com (not scanned): 116.153.39.142 61.54.86.159 61.54.86.156 116.153.39.141 39.137.107.206 39.137.35.137 39.135.60.79 39.137.107.205 39.135.60.82 39.137.107.201 39.137.107.203
Not shown: 972 filtered tcp ports (no-response)
PORT     STATE  SERVICE     VERSION
80/tcp   open   http        OpenResty web app server
|_http-title: 403 Forbidden
|_http-cors: GET POST OPTIONS
|_http-server-header: openresty
443/tcp  open   ssl/http    OpenResty web app server
| tls-alpn: 
|   h2
|_  http/1.1
| ssl-cert: Subject: commonName=*.douyinvod.com
| Subject Alternative Name: DNS:*.douyinvod.com, DNS:douyinvod.com
| Not valid before: 2024-05-23T00:00:00
|_Not valid after:  2025-05-23T23:59:59
|_http-server-header: openresty
|_http-cors: OPTIONS
|_ssl-date: TLS randomness does not represent time
| tls-nextprotoneg: 
|   h2
|_  http/1.1
|_http-title: 403 Forbidden
1935/tcp open   http        OpenResty web app server
|_http-cors: HEAD POST OPTIONS
|_http-server-header: openresty
|_http-title: 403 Forbidden
2607/tcp closed connection
3000/tcp open   http        OpenResty web app server
|_http-title: 403 Forbidden
|_http-server-header: openresty
|_http-cors: HEAD GET POST
4443/tcp open   ssl/http    OpenResty web app server
| tls-nextprotoneg: 
|   h2
|_  http/1.1
|_http-title: 403 Forbidden
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| ssl-cert: Subject: commonName=*.douyinvod.com
| Subject Alternative Name: DNS:*.douyinvod.com, DNS:douyinvod.com
| Not valid before: 2024-05-23T00:00:00
|_Not valid after:  2025-05-23T23:59:59
|_http-server-header: openresty
|_http-cors: HEAD GET POST OPTIONS
5100/tcp open   http        OpenResty web app server
|_http-title: 403 Forbidden
|_http-cors: POST OPTIONS
|_http-server-header: openresty
5101/tcp closed admdog
5102/tcp closed admeng
6101/tcp closed backupexec
7443/tcp open   ssl/http    OpenResty web app server
|_http-server-header: openresty
| tls-nextprotoneg: 
|   h2
|_  http/1.1
| tls-alpn: 
|   h2
|_  http/1.1
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=*.douyinvod.com
| Subject Alternative Name: DNS:*.douyinvod.com, DNS:douyinvod.com
| Not valid before: 2024-05-23T00:00:00
|_Not valid after:  2025-05-23T23:59:59
|_http-title: 400 The plain HTTP request was sent to HTTPS port
|_http-cors: HEAD GET
7777/tcp closed cbt
8000/tcp open   http        OpenResty web app server
|_http-title: 403 Forbidden
8001/tcp closed vcom-tunnel
8080/tcp open   http        OpenResty web app server
|_http-cors: HEAD GET POST OPTIONS
|_http-title: 403 Forbidden
8081/tcp open   http        OpenResty web app server
|_http-title: 403 Forbidden
|_http-cors: HEAD GET POST OPTIONS
|_http-server-header: openresty
8084/tcp closed websnp
8088/tcp open   http        OpenResty web app server
|_http-cors: HEAD GET POST OPTIONS
|_http-server-header: openresty
|_http-title: 403 Forbidden
8089/tcp closed unknown
8099/tcp closed unknown
8180/tcp open   http        OpenResty web app server
|_http-server-header: openresty
|_http-cors: HEAD GET OPTIONS
|_http-title: 403 Forbidden
8443/tcp open   ssl/http    OpenResty web app server
| ssl-cert: Subject: commonName=*.douyinvod.com
| Subject Alternative Name: DNS:*.douyinvod.com, DNS:douyinvod.com
| Not valid before: 2024-05-23T00:00:00
|_Not valid after:  2025-05-23T23:59:59
|_http-title: 403 Forbidden
|_http-cors: HEAD POST OPTIONS
| tls-nextprotoneg: 
|   h2
|_  http/1.1
|_http-server-header: openresty
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
8888/tcp open   http        OpenResty web app server
|_http-server-header: openresty
|_http-title: 403 Forbidden
|_http-cors: HEAD GET POST OPTIONS
9011/tcp closed d-star
9080/tcp closed glrpc
9081/tcp closed cisco-aqos
9090/tcp closed zeus-admin
9200/tcp open   http        OpenResty web app server
|_http-server-header: openresty
|_http-cors: HEAD GET POST OPTIONS
|_http-title: 403 Forbidden
Aggressive OS guesses: Linux 3.2 - 4.9 (92%), Linux 4.10 (89%), Linux 3.2 (88%), Linux 3.8 (88%), Linux 3.1 (87%), Android 4.1.2 (87%), Android 4.2.2 (Linux 3.4) (87%), Linux 3.7 (87%), Linksys EA3500 WAP (87%), Linux 5.3 - 5.4 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   31.08 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   263.85 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.91 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.40 ms   182.54.129.88
5   0.80 ms   lax-b22-link.ip.twelve99.net (62.115.162.54)
6   0.84 ms   lax-b23-link.ip.twelve99.net (62.115.143.38)
7   9.46 ms   sjo-b23-link.ip.twelve99.net (62.115.116.40)
8   30.80 ms  sea-b1-link.ip.twelve99.net (62.115.132.153)
9   74.69 ms  chinamobile-ic-342124.ip.twelve99-cust.net (62.115.171.221)
10  73.95 ms  223.120.6.53
11  75.68 ms  223.120.7.74
12  205.71 ms 221.183.89.182
13  233.76 ms 221.183.89.182
14  243.96 ms 221.183.89.50
15  241.12 ms 221.183.89.50
16  231.83 ms 117.143.109.186
17  242.14 ms 117.143.109.186
18  238.49 ms 39.137.35.135

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 148.02 seconds
Color Scheme
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Detailed report
Target
Target IP
39.137.35.135
Host status
UP
Target Country
Target IP location is China
China
Free scan
Free scan
Scan method
Scan OS information and Traceroute
Scan status
Identified 28 ports
Run command
nmap -A v26-hca.douyinvod.com
Scan date
18 Sep 2024 01:45
Scan duration
2min 28.02sec (148.02sec)
Download report
Remove scan result
$
Total scans
Scan more
Pricing

PROFESSIONAL


  • 10 000 scans/day
  • Daily API Calls - 100 000 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0.75$7.50/month
Billed Annually @ $9.00$90.00 90% discount
Get Professional

REGISTERED


  • 5 scans/day
  • Daily API Calls - 20 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0/lifetime
 
Register
Scan host
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: