Scan OS information and Traceroute (nmap -A dns.com.cn)
Nmap scan report for dns.com.cn (116.198.40.104)
Host is up (0.16s latency).
Not shown: 997 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
43/tcp closed whois
80/tcp open http Tengine httpd 2.2.0
|_http-server-header: Tengine/2.2.0
|_http-title: Did not follow redirect to http://www.dns.com.cn/
443/tcp open ssl/http Tengine httpd 2.2.0
| tls-alpn:
| h2
|_ http/1.1
|_http-server-header: Tengine/2.2.0
| tls-nextprotoneg:
| h2
|_ http/1.1
|_ssl-date: TLS randomness does not represent time
|_http-title: \xE6\x96\xB0\xE7\xBD\x91\xE4\xBA\x92\xE8\x81\x94-\xE6\x82\xA8\xE7\x9A\x84\xE4\xBC\x81\xE4\xB8\x9A\xE4\xBA\x92\xE8\x81\x94\xE7\xBD\x91\xE9\xA1\xBE\xE9\x97\xAE\xEF\xBC\x81\xE5\x9F\x9F\xE5\x90\x8D\xE6\xB3\xA8\xE5\x86\x8C,\xE4\xBA\x91\xE4\xB8\xBB...
| ssl-cert: Subject: commonName=*.dns.com.cn
| Subject Alternative Name: DNS:*.dns.com.cn, DNS:dns.com.cn
| Not valid before: 2024-05-17T00:00:00
|_Not valid after: 2025-05-16T23:59:59
Aggressive OS guesses: HP P2000 G3 NAS device (90%), Linux 3.16 (89%), Linux 2.6.32 (88%), Linux 2.6.32 - 3.1 (88%), Ubiquiti AirMax NanoStation WAP (Linux 2.6.32) (88%), Linux 3.10 (88%), Linux 3.10 - 4.11 (88%), Linux 3.11 - 3.12 (88%), Linux 3.2 (88%), Linux 3.7 (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 23 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.67 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4 0.56 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5 0.60 ms ae-16.r25.lsanca07.us.bb.gin.ntt.net (129.250.3.80)
6 9.23 ms ae-3.r24.snjsca04.us.bb.gin.ntt.net (129.250.4.150)
7 9.34 ms ae-0.a03.snjsca04.us.bb.gin.ntt.net (129.250.2.159)
8 10.06 ms 218.30.53.50
9 ... 13
14 173.57 ms 180.149.137.142
15 169.84 ms 180.149.129.62
16 ... 22
23 165.17 ms 116.198.40.104
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 50.38 seconds