Scan report for "p9-be-pack-sign.pglstatp-toutiao.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A p9-be-pack-sign.pglstatp-toutiao.com)
Nmap scan report for p9-be-pack-sign.pglstatp-toutiao.com (144.123.124.3)
Host is up (0.18s latency).
Other addresses for p9-be-pack-sign.pglstatp-toutiao.com (not scanned): 240e:947:6001::1fc 240e:947:6001::1f8 240e:947:6001::1fa 240e:947:6001::1fb 240e:947:6001::1f9 183.134.34.60 183.134.34.57 144.123.124.22 183.134.34.56 122.225.83.95 183.134.34.55
Not shown: 991 filtered ports
PORT     STATE SERVICE    VERSION
53/tcp   open  tcpwrapped
80/tcp   open  http       nginx
|_http-server-header: web cache
|_http-title: ERROR: ACCESS DENIED
443/tcp  open  ssl/http   nginx
|_http-server-header: web cache
|_http-title: 400 The plain HTTP request was sent to HTTPS port
| ssl-cert: Subject: commonName=*.pglstatp-toutiao.com
| Subject Alternative Name: DNS:*.pglstatp-toutiao.com, DNS:pglstatp-toutiao.com
| Not valid before: 2023-06-19T14:21:12
|_Not valid after:  2024-07-20T14:21:11
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| tls-nextprotoneg: 
|   h2
|_  http/1.1
843/tcp  open  unknown
1935/tcp open  rtmp?
8080/tcp open  http       nginx
|_http-server-header: web cache
|_http-title: ERROR: ACCESS DENIED
8088/tcp open  http       nginx
|_http-server-header: nginx
|_http-title: 403 Forbidden
8090/tcp open  ssl/http   nginx
|_http-server-header: nginx
|_http-title: 400 Bad Request
| ssl-cert: Subject: commonName=*.pglstatp-toutiao.com
| Subject Alternative Name: DNS:*.pglstatp-toutiao.com, DNS:pglstatp-toutiao.com
| Not valid before: 2023-06-19T14:21:12
|_Not valid after:  2024-07-20T14:21:11
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
8443/tcp open  ssl/http   nginx
|_http-server-header: nginx
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=*.pglstatp-toutiao.com
| Subject Alternative Name: DNS:*.pglstatp-toutiao.com, DNS:pglstatp-toutiao.com
| Not valid before: 2023-06-19T14:21:12
|_Not valid after:  2024-07-20T14:21:11
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 3.16 (89%), Crestron XPanel control system (89%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (89%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (87%), OpenWrt White Russian 0.9 (Linux 2.4.30) (87%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.2 (86%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops

TRACEROUTE (using port 443/tcp)
HOP RTT       ADDRESS
1   0.20 ms   208.76.251.177
2   0.63 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.65 ms   multacom.com (96.45.162.9)
4   0.31 ms   182.54.129.88
5   8.12 ms   218.30.54.189
6   172.30 ms 202.97.27.217
7   ... 9
10  178.77 ms 60.235.112.254
11  189.00 ms 60.235.115.186
12  183.52 ms 144.123.120.14
13  166.71 ms 144.123.124.3

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 249.02 seconds
Color Scheme
Target
p9-be-pack-sign.pglstatp-toutiao.com
Target IP
144.123.124.3
Target Country
CN
Scan method
Scan OS information and Traceroute
Run command
nmap -A p9-be-pack-sign.pglstatp-toutiao.com
Scan date
19 Nov 2023 03:09
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: