Nmap scan report for resadmin.mschosting.com (110.4.47.104) Host is up (0.21s latency). rDNS record for 110.4.47.104: klia.mschosting.com Not shown: 981 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 20/tcp closed ftp-data 21/tcp open tcpwrapped | ssl-cert: Subject: commonName=klia.mschosting.com | Subject Alternative Name: DNS:klia.mschosting.com | Not valid before: 2024-04-30T00:00:00 |_Not valid after: 2025-04-30T23:59:59 25/tcp open tcpwrapped |_smtp-commands: Couldn't establish connection on port 25 53/tcp open tcpwrapped 80/tcp open tcpwrapped 110/tcp open tcpwrapped |_ssl-date: ERROR: Script execution failed (use -d to debug) |_sslv2: ERROR: Script execution failed (use -d to debug) |_ssl-cert: ERROR: Script execution failed (use -d to debug) |_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug) |_tls-alpn: ERROR: Script execution failed (use -d to debug) 125/tcp closed locus-map 143/tcp open tcpwrapped |_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug) |_ssl-date: ERROR: Script execution failed (use -d to debug) |_tls-alpn: ERROR: Script execution failed (use -d to debug) |_sslv2: ERROR: Script execution failed (use -d to debug) |_imap-ntlm-info: ERROR: Script execution failed (use -d to debug) 443/tcp open tcpwrapped 465/tcp open tcpwrapped |_smtp-commands: Couldn't establish connection on port 465 587/tcp open tcpwrapped |_smtp-commands: Couldn't establish connection on port 587 993/tcp open tcpwrapped 995/tcp open tcpwrapped 3071/tcp closed csd-mgmt-port 3306/tcp open tcpwrapped |_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug) |_ssl-date: ERROR: Script execution failed (use -d to debug) |_tls-alpn: ERROR: Script execution failed (use -d to debug) |_ssl-cert: ERROR: Script execution failed (use -d to debug) |_sslv2: ERROR: Script execution failed (use -d to debug) 8888/tcp closed sun-answerbook 12265/tcp closed unknown 12345/tcp closed netbus 49153/tcp closed unknown Device type: firewall Running (JUST GUESSING): Fortinet embedded (87%) OS CPE: cpe:/h:fortinet:fortigate_100d Aggressive OS guesses: Fortinet FortiGate 100D firewall (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 16 hops TRACEROUTE (using port 8888/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.99 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.04 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.56 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.34 ms ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242) 6 99.23 ms ae-14.r33.tokyjp05.jp.bb.gin.ntt.net (129.250.3.192) 7 ... 8 177.25 ms ae-7.r23.kslrml02.my.bb.gin.ntt.net (129.250.2.169) 9 193.01 ms ae-5.r22.kslrml02.my.bb.gin.ntt.net (129.250.3.155) 10 189.21 ms ae-1.r00.kslrml02.my.bb.gin.ntt.net (129.250.3.197) 11 ... 12 13 191.95 ms 223.28.52.106 14 178.94 ms 223.28.53.206 15 174.65 ms 223.28.53.206 16 183.57 ms klia.mschosting.com (110.4.47.104) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 637.17 seconds