Nmap scan report for openphish.com (165.22.207.217) Host is up (0.13s latency). Not shown: 998 closed tcp ports (reset) PORT STATE SERVICE VERSION 80/tcp open http nginx |_http-title: Did not follow redirect to https://openphish.com/ 443/tcp open ssl/http nginx | http-robots.txt: 2 disallowed entries |_/feed.txt /fp_feed.txt |_http-title: OpenPhish - Phishing Intelligence | ssl-cert: Subject: commonName=www.openphish.com | Subject Alternative Name: DNS:www.openphish.com, DNS:openphish.com | Not valid before: 2025-03-22T00:00:00 |_Not valid after: 2026-04-22T23:59:59 |_ssl-date: TLS randomness does not represent time Device type: general purpose Running: Linux 4.X|5.X OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 OS details: Linux 4.15 - 5.6 Network Distance: 15 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 2.27 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.51 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.53 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.38 ms ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242) 6 ... 8 9 133.54 ms ae-0.r22.amstnl07.nl.bb.gin.ntt.net (129.250.5.150) 10 135.11 ms ae-0.a01.amstnl09.nl.bb.gin.ntt.net (129.250.2.253) 11 135.04 ms 213.198.92.119 12 ... 14 15 134.13 ms 165.22.207.217 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 38.36 seconds