Ports
Durée
Date
IP
Nmap scan report for eschool23.esp.k12.ar.us (165.29.122.56) Host is up (0.072s latency). rDNS record for 165.29.122.56: tac23.esp.k12.ar.us Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http-proxy F5 BIG-IP load balancer http proxy |_http-open-proxy: Proxy might be redirecting requests |_http-server-header: BigIP 443/tcp open ssl/https? | ssl-cert: Subject: commonName=*.esp.k12.ar.us/organizationName=Arkansas Department of Education/stateOrProvinceName=Arkansas/countryName=US | Subject Alternative Name: DNS:*.esp.k12.ar.us | Not valid before: 2023-05-16T00:00:00 |_Not valid after: 2024-05-15T23:59:59 |_ssl-date: TLS randomness does not represent time Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|WAP|media device Running (JUST GUESSING): Linux 2.6.X (97%), D-Link embedded (94%), TRENDnet embedded (94%), Apple Apple TV 5.X (87%) OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:dlink:dwl-624%2b cpe:/h:dlink:dwl-2000ap cpe:/h:trendnet:tew-432brp cpe:/a:apple:apple_tv:5.2.1 cpe:/a:apple:apple_tv:5.3 Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (97%), D-Link DWL-624+ or DWL-2000AP, or TRENDnet TEW-432BRP WAP (94%), Apple TV 5.2.1 or 5.3 (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 15 hops Service Info: Device: load balancer TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177 2 0.60 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.65 ms multacom.com (96.45.162.9) 4 ... 5 6 33.65 ms port-channel11.core4.dal1.he.net (184.104.199.245) 7 65.41 ms port-channel12.core2.atl1.he.net (184.104.196.153) 8 ... 9 57.78 ms 74-220-130-37.ritternet.com (74.220.130.37) 10 61.44 ms 74-220-130-129.ritternet.com (74.220.130.129) 11 60.95 ms 74-220-130-186.ritternet.com (74.220.130.186) 12 64.25 ms 216-163-19-31.ritternet.com (216.163.19.31) 13 ... 14 15 65.34 ms tac23.esp.k12.ar.us (165.29.122.56) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 180.49 seconds