Scan OS information and Traceroute (nmap -A p9-be-pack-sign.pglstatp-toutiao.com)
Nmap scan report for p9-be-pack-sign.pglstatp-toutiao.com (144.123.124.3)
Host is up (0.18s latency).
Other addresses for p9-be-pack-sign.pglstatp-toutiao.com (not scanned): 240e:947:6001::1fc 240e:947:6001::1f8 240e:947:6001::1fa 240e:947:6001::1fb 240e:947:6001::1f9 183.134.34.60 183.134.34.57 144.123.124.22 183.134.34.56 122.225.83.95 183.134.34.55
Not shown: 991 filtered ports
PORT STATE SERVICE VERSION
53/tcp open tcpwrapped
80/tcp open http nginx
|_http-server-header: web cache
|_http-title: ERROR: ACCESS DENIED
443/tcp open ssl/http nginx
|_http-server-header: web cache
|_http-title: 400 The plain HTTP request was sent to HTTPS port
| ssl-cert: Subject: commonName=*.pglstatp-toutiao.com
| Subject Alternative Name: DNS:*.pglstatp-toutiao.com, DNS:pglstatp-toutiao.com
| Not valid before: 2023-06-19T14:21:12
|_Not valid after: 2024-07-20T14:21:11
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
| h2
|_ http/1.1
| tls-nextprotoneg:
| h2
|_ http/1.1
843/tcp open unknown
1935/tcp open rtmp?
8080/tcp open http nginx
|_http-server-header: web cache
|_http-title: ERROR: ACCESS DENIED
8088/tcp open http nginx
|_http-server-header: nginx
|_http-title: 403 Forbidden
8090/tcp open ssl/http nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=*.pglstatp-toutiao.com
| Subject Alternative Name: DNS:*.pglstatp-toutiao.com, DNS:pglstatp-toutiao.com
| Not valid before: 2023-06-19T14:21:12
|_Not valid after: 2024-07-20T14:21:11
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
8443/tcp open ssl/http nginx
|_http-server-header: nginx
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=*.pglstatp-toutiao.com
| Subject Alternative Name: DNS:*.pglstatp-toutiao.com, DNS:pglstatp-toutiao.com
| Not valid before: 2023-06-19T14:21:12
|_Not valid after: 2024-07-20T14:21:11
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 3.16 (89%), Crestron XPanel control system (89%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (87%), OpenWrt White Russian 0.9 (Linux 2.4.30) (87%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.2 (86%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.20 ms 208.76.251.177
2 0.63 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.65 ms multacom.com (96.45.162.9)
4 0.31 ms 182.54.129.88
5 8.12 ms 218.30.54.189
6 172.30 ms 202.97.27.217
7 ... 9
10 178.77 ms 60.235.112.254
11 189.00 ms 60.235.115.186
12 183.52 ms 144.123.120.14
13 166.71 ms 144.123.124.3
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 249.02 seconds