Nmap scan report for youtu.qq.com (140.207.124.64)
Host is up (0.17s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http stgw
|_http-server-header: stgw
| fingerprint-strings:
| DNSStatusRequestTCP, Help:
| HTTP/1.1 400 Bad Request
| Server: stgw
| Date: Fri, 12 Sep 2025 12:03:21 GMT
| Content-Type: text/html
| Content-Length: 149
| Connection: close
|
|
400 Bad Request
|
| 400 Bad Request
|
stgw
|
|
| DNSVersionBindReqTCP, RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: stgw
| Date: Fri, 12 Sep 2025 12:03:20 GMT
| Content-Type: text/html
| Content-Length: 149
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
stgw
|
|
| RTSPRequest:
|
| 400 Bad Request
|
| 400 Bad Request
|
stgw
|
|
| X11Probe:
| HTTP/1.1 400 Bad Request
| Server: stgw
| Date: Fri, 12 Sep 2025 12:03:14 GMT
| Content-Type: text/html
| Content-Length: 149
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
stgw
|
|_
|_http-title: Did not follow redirect to https://youtu.qq.com/
443/tcp open ssl/https stgw
|_ssl-date: TLS randomness does not represent time
| fingerprint-strings:
| DNSStatusRequestTCP, Help:
| HTTP/1.1 400 Bad Request
| Server: stgw
| Date: Fri, 12 Sep 2025 12:03:32 GMT
| Content-Type: text/html
| Content-Length: 149
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
stgw
|
|
| DNSVersionBindReqTCP:
| HTTP/1.1 400 Bad Request
| Server: stgw
| Date: Fri, 12 Sep 2025 12:03:31 GMT
| Content-Type: text/html
| Content-Length: 149
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
stgw
|
|
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: stgw
| Date: Fri, 12 Sep 2025 12:03:30 GMT
| Content-Type: text/html
| Content-Length: 149
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
stgw
|
|
| RTSPRequest:
|
| 400 Bad Request
|
| 400 Bad Request
|
stgw
|
|
| tor-versions:
| HTTP/1.1 400 Bad Request
| Server: stgw
| Date: Fri, 12 Sep 2025 12:03:22 GMT
| Content-Type: text/html
| Content-Length: 149
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
stgw
|
|_
| tls-alpn:
| h2
|_ http/1.1
| http-server-header:
| nginx
|_ stgw
| tls-nextprotoneg:
| h2
|_ http/1.1
| ssl-cert: Subject: commonName=ssl.ptlogin2.b.qq.com/organizationName=Shenzhen Tencent Computer Systems Company Limited/stateOrProvinceName=Guangdong/countryName=CN
| Subject Alternative Name: DNS:ssl.ptlogin2.b.qq.com, DNS:badjs.vip.qq.com, DNS:c.gdt.qq.com, DNS:cgi.connect.qq.com, DNS:cgi.vip.qq.com, DNS:g.vip.qq.com, DNS:gpay.vip.qq.com, DNS:gxh.vip.qq.com, DNS:h5.vip.qq.com, DNS:hm.vip.qq.com, DNS:huayang.qq.com, DNS:i.gdt.qq.com, DNS:im.qq.com, DNS:iyouxi.vip.qq.com, DNS:jump.weiyun.qq.com, DNS:mi.gdt.qq.com, DNS:mq.vip.qq.com, DNS:office.connect.qq.com, DNS:open.vip.qq.com, DNS:qun.qq.com, DNS:t.gdt.qq.com, DNS:v.gdt.qq.com, DNS:xc.gdt.qq.com, DNS:youtu.qq.com
| Not valid before: 2024-09-14T00:56:02
|_Not valid after: 2025-10-16T00:56:01
|_http-title: Site doesn't have a title.
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=9/12%Time=68C40C02%P=x86_64-redhat-linux-gnu%r(
SF:RTSPRequest,95,"\r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\r\nstgw\r\n\r\n\r\n")%r(X11Probe,125,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20stgw\r\nDate:\x20Fri,\x20
SF:12\x20Sep\x202025\x2012:03:14\x20GMT\r\nContent-Type:\x20text/html\r\nC
SF:ontent-Length:\x20149\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n400\
SF:x20Bad\x20Request
\r\n
stgw\r\n
SF:\r\n\r\n")%r(RPCCheck,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\
SF:nServer:\x20stgw\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2012:03:20\x20G
SF:MT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20149\r\nConnectio
SF:n:\x20close\r\n\r\n\r\n400\x20Bad\x20Request
SF:\r\n\r\n400\x20Bad\x20Request
\r\
SF:n
stgw\r\n\r\n\r\n")%r(DNSVersionBind
SF:ReqTCP,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20stgw\r\nDa
SF:te:\x20Fri,\x2012\x20Sep\x202025\x2012:03:20\x20GMT\r\nContent-Type:\x2
SF:0text/html\r\nContent-Length:\x20149\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n<
SF:center>400\x20Bad\x20Request
\r\n
stgw\r\n\r\n\r\n")%r(DNSStatusRequestTCP,125,"HTTP/1\.1\x
SF:20400\x20Bad\x20Request\r\nServer:\x20stgw\r\nDate:\x20Fri,\x2012\x20Se
SF:p\x202025\x2012:03:21\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L
SF:ength:\x20149\r\nConnection:\x20close\r\n\r\n\r\n400
SF:\x20Bad\x20Request\r\n\r\n400\x20Bad\x
SF:20Request
\r\n
stgw\r\n\r\n\r\n")%r(Help,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20
SF:stgw\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2012:03:21\x20GMT\r\nConten
SF:t-Type:\x20text/html\r\nContent-Length:\x20149\r\nConnection:\x20close\
SF:r\n\r\n\r\n400\x20Bad\x20Request\r\n<
SF:body>\r\n400\x20Bad\x20Request
\r\n
stgw\r\n\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/12%Time=68C40C0A%P=x86_64-redhat-linux
SF:-gnu%r(tor-versions,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\
SF:x20stgw\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2012:03:22\x20GMT\r\nCon
SF:tent-Type:\x20text/html\r\nContent-Length:\x20149\r\nConnection:\x20clo
SF:se\r\n\r\n\r\n400\x20Bad\x20Request\r
SF:\n\r\n400\x20Bad\x20Request
\r\n
stgw\r\n\r\n\r\n")%r(RTSPRequest,95,"\
SF:r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\r\n
stgw
SF:\r\n\r\n\r\n")%r(RPCCheck,125,"HTTP/1\.1\x20400\x20Bad\x2
SF:0Request\r\nServer:\x20stgw\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2012
SF::03:30\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20149\r
SF:\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Requ
SF:est\r\n\r\n400\x20Bad\x20Request
<
SF:/center>\r\n
stgw\r\n\r\n\r\n")%r(DNS
SF:VersionBindReqTCP,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x2
SF:0stgw\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2012:03:31\x20GMT\r\nConte
SF:nt-Type:\x20text/html\r\nContent-Length:\x20149\r\nConnection:\x20close
SF:\r\n\r\n\r\n400\x20Bad\x20Request\r\n
SF:\r\n400\x20Bad\x20Request
\r\n
stgw\r\n\r\n\r\n")%r(DNSStatusRequestTCP,125,"
SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20stgw\r\nDate:\x20Fri,\
SF:x2012\x20Sep\x202025\x2012:03:32\x20GMT\r\nContent-Type:\x20text/html\r
SF:\nContent-Length:\x20149\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n4
SF:00\x20Bad\x20Request
\r\n
stgw\r\n\r\n\r\n")%r(Help,125,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n
SF:Server:\x20stgw\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2012:03:32\x20GM
SF:T\r\nContent-Type:\x20text/html\r\nContent-Length:\x20149\r\nConnection
SF::\x20close\r\n\r\n\r\n400\x20Bad\x20Request<
SF:/head>\r\n\r\n400\x20Bad\x20Request
\r\n
SF:
stgw\r\n\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 16 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.65 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.61 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4 0.58 ms 182.54.129.110
5 155.92 ms 219.158.33.77
6 ...
7 144.79 ms 219.158.3.49
8 ... 15
16 176.72 ms 140.207.124.64
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 93.67 seconds