Ports
Duration
Date
IP
Nmap scan report for p9-be-pack-sign.pglstatp-toutiao.com (144.123.124.3) Host is up (0.18s latency). Other addresses for p9-be-pack-sign.pglstatp-toutiao.com (not scanned): 240e:947:6001::1fc 240e:947:6001::1f8 240e:947:6001::1fa 240e:947:6001::1fb 240e:947:6001::1f9 183.134.34.60 183.134.34.57 144.123.124.22 183.134.34.56 122.225.83.95 183.134.34.55 Not shown: 991 filtered ports PORT STATE SERVICE VERSION 53/tcp open tcpwrapped 80/tcp open http nginx |_http-server-header: web cache |_http-title: ERROR: ACCESS DENIED 443/tcp open ssl/http nginx |_http-server-header: web cache |_http-title: 400 The plain HTTP request was sent to HTTPS port | ssl-cert: Subject: commonName=*.pglstatp-toutiao.com | Subject Alternative Name: DNS:*.pglstatp-toutiao.com, DNS:pglstatp-toutiao.com | Not valid before: 2023-06-19T14:21:12 |_Not valid after: 2024-07-20T14:21:11 |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 | tls-nextprotoneg: | h2 |_ http/1.1 843/tcp open unknown 1935/tcp open rtmp? 8080/tcp open http nginx |_http-server-header: web cache |_http-title: ERROR: ACCESS DENIED 8088/tcp open http nginx |_http-server-header: nginx |_http-title: 403 Forbidden 8090/tcp open ssl/http nginx |_http-server-header: nginx |_http-title: 400 Bad Request | ssl-cert: Subject: commonName=*.pglstatp-toutiao.com | Subject Alternative Name: DNS:*.pglstatp-toutiao.com, DNS:pglstatp-toutiao.com | Not valid before: 2023-06-19T14:21:12 |_Not valid after: 2024-07-20T14:21:11 |_ssl-date: TLS randomness does not represent time | tls-alpn: |_ http/1.1 | tls-nextprotoneg: |_ http/1.1 8443/tcp open ssl/http nginx |_http-server-header: nginx |_http-title: 403 Forbidden | ssl-cert: Subject: commonName=*.pglstatp-toutiao.com | Subject Alternative Name: DNS:*.pglstatp-toutiao.com, DNS:pglstatp-toutiao.com | Not valid before: 2023-06-19T14:21:12 |_Not valid after: 2024-07-20T14:21:11 |_ssl-date: TLS randomness does not represent time | tls-alpn: |_ http/1.1 | tls-nextprotoneg: |_ http/1.1 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 3.16 (89%), Crestron XPanel control system (89%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (87%), OpenWrt White Russian 0.9 (Linux 2.4.30) (87%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.2 (86%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 13 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177 2 0.63 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.65 ms multacom.com (96.45.162.9) 4 0.31 ms 182.54.129.88 5 8.12 ms 218.30.54.189 6 172.30 ms 202.97.27.217 7 ... 9 10 178.77 ms 60.235.112.254 11 189.00 ms 60.235.115.186 12 183.52 ms 144.123.120.14 13 166.71 ms 144.123.124.3 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 249.02 seconds