Nmap scan report for apic1.yunxuetang.cn (8.212.117.159) Host is up (0.42s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http Tengine httpd |_http-server-header: Tengine |_http-title: Site doesn't have a title (text/html; charset=utf-8). 443/tcp open ssl/http Tengine httpd | tls-alpn: | h2 |_ http/1.1 | ssl-cert: Subject: commonName=*.yunxuetang.cn/organizationName=\xE6\xB1\x9F\xE8\x8B\x8F\xE4\xBA\x91\xE5\xAD\xA6\xE5\xA0\x82\xE7\xBD\x91\xE7\xBB\x9C\xE7\xA7\x91\xE6\x8A\x80\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE6\xB1\x9F\xE8\x8B\x8F\xE7\x9C\x81/countryName=CN | Subject Alternative Name: DNS:*.yunxuetang.cn, DNS:yunxuetang.cn | Not valid before: 2024-10-23T00:00:00 |_Not valid after: 2025-11-09T23:59:59 |_http-title: Site doesn't have a title (text/html; charset=utf-8). |_ssl-date: TLS randomness does not represent time | tls-nextprotoneg: | h2 |_ http/1.1 |_http-server-header: Tengine Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 3.10 - 4.11 (94%), Linux 3.16 - 4.6 (94%), Linux 3.2 - 4.9 (94%), Linux 4.10 (94%), Linux 4.4 (94%), Linux 2.6.32 - 3.10 (93%), Linux 5.1 (92%), Synology DiskStation Manager 5.2-5644 (92%), Linux 3.13 (91%), Linux 4.2 (90%) No exact OS matches for host (test conditions non-ideal). Network Distance: 15 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.57 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.75 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.53 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.34 ms ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242) 6 103.33 ms ae-14.r33.tokyjp05.jp.bb.gin.ntt.net (129.250.3.192) 7 ... 8 9 500.13 ms ae-20.a01.newthk04.hk.bb.gin.ntt.net (129.250.2.255) 10 ... 11 515.33 ms 47.246.115.97 12 ... 14 15 346.87 ms 8.212.117.159 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 88.92 seconds