Scan report for "ptugnins.net"

Membership level: Free member
Scan OS information and Traceroute (nmap -A ptugnins.net)
Nmap scan report for ptugnins.net (139.45.197.245)
Host is up (0.15s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE  VERSION
80/tcp  open  http     nginx
| http-robots.txt: 1 disallowed entry 
|_/
|_http-cors: GET POST PUT DELETE OPTIONS
|_http-title: Site doesn't have a title (application/octet-stream, text/plain).
443/tcp open  ssl/http nginx
|_http-title: Site doesn't have a title (application/octet-stream, text/plain).
| ssl-cert: Subject: commonName=ptugnins.net
| Subject Alternative Name: DNS:ptugnins.net
| Not valid before: 2023-12-13T05:40:17
|_Not valid after:  2024-03-12T05:40:16
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   http/1.1
|   http/1.0
|_  http/0.9
| http-robots.txt: 1 disallowed entry 
|_/
|_http-cors: GET POST PUT DELETE OPTIONS
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Crestron XPanel control system (92%), ASUS RT-N56U WAP (Linux 3.4) (90%), Linux 3.1 (90%), Linux 3.16 (90%), Linux 3.2 (90%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (89%), HP P2000 G3 NAS device (89%), MikroTik RouterOS 6.0 (88%), CyanogenMod 11 (Android 4.4.4) (88%), CyanogenMod 12 (Android 5.0.2) (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops

TRACEROUTE (using port 443/tcp)
HOP RTT       ADDRESS
1   0.23 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.64 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.75 ms   r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   0.83 ms   be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   0.80 ms   be3360.ccr41.lax04.atlas.cogentco.com (154.54.25.150)
6   ... 7
8   68.10 ms  4.30.181.50
9   155.14 ms et341-7.RT.IR9.AMS.NL.retn.net (87.245.234.11)
10  148.35 ms 89.19.38.7
11  149.40 ms 139.45.197.245

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 40.63 seconds
Color Scheme
Target
ptugnins.net
Target IP
139.45.197.245
Target Country
GB
Scan method
Scan OS information and Traceroute
Run command
nmap -A ptugnins.net
Scan date
13 Feb 2024 11:40
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: