Ports
Durée
Date
IP
Nmap scan report for lincoln.ne.gov (52.247.170.120) Host is up (0.061s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 10.0 |_http-title: Did not follow redirect to https://www.lincoln.ne.gov/ |_http-server-header: Microsoft-IIS/10.0 443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-title: Did not follow redirect to https://www.lincoln.ne.gov/ | ssl-cert: Subject: commonName=lincoln.ne.gov | Subject Alternative Name: DNS:lincoln.ne.gov | Not valid before: 2024-10-16T07:21:14 |_Not valid after: 2025-01-14T07:21:13 | tls-alpn: | h2 |_ http/1.1 |_ssl-date: 2024-12-22T10:25:14+00:00; 0s from scanner time. | http-server-header: | Microsoft-HTTPAPI/2.0 |_ Microsoft-IIS/10.0 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): Microsoft Windows 2016 (89%), FreeBSD 6.X (85%) OS CPE: cpe:/o:microsoft:windows_server_2016 cpe:/o:freebsd:freebsd:6.2 Aggressive OS guesses: Microsoft Windows Server 2016 (89%), FreeBSD 6.2-RELEASE (85%) No exact OS matches for host (test conditions non-ideal). Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 15.04 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.75 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 3.54 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 0.88 ms be3243.ccr41.lax05.atlas.cogentco.com (154.54.27.118) 6 0.58 ms 38.104.76.207 7 0.54 ms ae29-0.ear04.lax31.ntwk.msn.net (51.10.1.128) 8 25.45 ms be-23-0.ibr01.lax30.ntwk.msn.net (104.44.33.173) 9 23.41 ms be-9-0.ibr03.cys04.ntwk.msn.net (104.44.16.227) 10 25.95 ms be-6-0.ibr02.sn1.ntwk.msn.net (104.44.16.182) 11 22.93 ms ae24-0.cys01-96cbe-1a.ntwk.msn.net (104.44.225.245) 12 22.88 ms 131.253.125.68 13 22.91 ms 131.253.75.20 14 24.96 ms 131.253.75.28 15 64.96 ms 131.253.75.13 16 ... 30 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 33.66 seconds