Ports
Durée
Date
IP
Nmap scan report for x5.remotixcloud.com (176.9.70.53) Host is up (0.15s latency). Other addresses for x5.remotixcloud.com (not scanned): 176.9.61.210 rDNS record for 176.9.70.53: static.53.70.9.176.clients.your-server.de Not shown: 997 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0) 80/tcp open http nginx 443/tcp open ssl/http nginx |_http-trane-info: Problem with XML parsing of /evox/about | http-title: Acronis Cyber Protect Connect |_Requested resource was /login | ssl-cert: Subject: commonName=x5.remotixcloud.com | Subject Alternative Name: DNS:x5.remotixcloud.com, DNS:x6.remotixcloud.com | Not valid before: 2024-09-27T04:27:31 |_Not valid after: 2024-12-26T04:27:30 | tls-alpn: |_ http/1.1 | tls-nextprotoneg: |_ http/1.1 |_ssl-date: TLS randomness does not represent time Aggressive OS guesses: Linux 4.15 - 5.6 (96%), Linux 3.11 (96%), Linux 5.3 - 5.4 (95%), Linux 5.0 - 5.3 (95%), Linux 2.6.32 (95%), Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), Linux 3.10 (94%), Linux 2.6.18 (93%) No exact OS matches for host (test conditions non-ideal). Network Distance: 13 hops Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.92 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.78 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.56 ms 182.54.129.104 5 0.73 ms lax-b22-link.ip.twelve99.net (62.115.162.54) 6 56.44 ms rest-bb1-link.ip.twelve99.net (62.115.114.87) 7 133.10 ms prs-bb2-link.ip.twelve99.net (62.115.122.158) 8 147.56 ms nug-b2-link.ip.twelve99.net (62.115.112.215) 9 150.65 ms hetzner-ic-351603.ip.twelve99-cust.net (62.115.183.233) 10 150.49 ms core23.fsn1.hetzner.com (213.239.252.246) 11 147.37 ms ex9k2.dc6.fsn1.hetzner.com (213.239.229.82) 12 ... 13 147.36 ms static.53.70.9.176.clients.your-server.de (176.9.70.53) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 40.72 seconds