Ports
Durée
Date
IP
Nmap scan report for callfilter.app (159.203.178.220) Host is up (0.064s latency). Not shown: 985 filtered tcp ports (no-response), 11 filtered tcp ports (admin-prohibited) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.0 (protocol 2.0) | ssh-hostkey: | 3072 fe:e4:ae:f2:14:e1:18:56:8f:ff:f6:5f:1d:b7:ab:41 (RSA) | 256 98:e0:4b:75:89:25:e4:ef:97:c1:2f:d2:6f:77:65:61 (ECDSA) |_ 256 3f:2f:a8:4f:44:38:de:65:bc:2d:91:e8:1f:0c:4f:8a (ED25519) 80/tcp open http nginx 1.14.1 |_http-title: Did not follow redirect to https://callfilter.app/ |_http-server-header: nginx/1.14.1 443/tcp open ssl/http nginx 1.14.1 | http-robots.txt: 2 disallowed entries |_/add /statAjax |_http-title: 503 Service Temporarily Unavailable | ssl-cert: Subject: commonName=*.callfilter.app | Subject Alternative Name: DNS:*.callfilter.app, DNS:callfilter.app | Not valid before: 2024-01-19T00:00:00 |_Not valid after: 2025-01-18T23:59:59 |_http-server-header: nginx/1.14.1 | tls-nextprotoneg: | h2 |_ http/1.1 |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 9090/tcp closed zeus-admin Aggressive OS guesses: Linux 5.1 (98%), Linux 3.10 - 4.11 (97%), Linux 3.2 - 4.9 (96%), Linux 3.16 - 4.6 (95%), Linux 5.0 - 5.4 (95%), Linux 2.6.32 - 3.13 (95%), Linux 4.10 (93%), Linux 2.6.22 - 2.6.36 (93%), Linux 5.4 (93%), Linux 2.6.39 (93%) No exact OS matches for host (test conditions non-ideal). Network Distance: 16 hops TRACEROUTE (using port 9090/tcp) HOP RTT ADDRESS 1 0.27 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.57 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.87 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.41 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.36 ms ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242) 6 ... 7 58.76 ms ae-10.r23.nwrknj03.us.bb.gin.ntt.net (129.250.6.20) 8 66.95 ms ae-15.a00.nwrknj03.us.bb.gin.ntt.net (129.250.4.19) 9 63.37 ms ae-0.digital-ocean.nycmny17.us.bb.gin.ntt.net (157.238.179.70) 10 ... 15 16 63.76 ms 159.203.178.220 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 30.09 seconds