Ports
Duration
Date
IP
Nmap scan report for ic.gc.ca (192.197.183.149) Host is up (0.073s latency). Not shown: 864 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 3/tcp open tcpwrapped 4/tcp open tcpwrapped 6/tcp open tcpwrapped 13/tcp open tcpwrapped 17/tcp open tcpwrapped 80/tcp open http Apache httpd |_http-title: Did not follow redirect to https://www.ic.gc.ca/ |_http-server-header: Apache 84/tcp open tcpwrapped 113/tcp closed ident 443/tcp open ssl/http Apache httpd |_http-title: Language selection - Innovation, Science and Economic Developm... | ssl-cert: Subject: commonName=*.ic.gc.ca/organizationName=Innovation, Science and Economic Development Canada/stateOrProvinceName=Ontario/countryName=CA | Subject Alternative Name: DNS:*.ic.gc.ca, DNS:ic.gc.ca | Not valid before: 2024-08-28T13:07:07 |_Not valid after: 2025-09-28T13:07:06 |_http-server-header: Apache |_ssl-date: TLS randomness does not represent time | http-robots.txt: 8 disallowed entries | /app/scr/opic-cipo/mc-tm/rd-dr | /app/scr/cc/CorporationsCanada/fdrlCrpDtls.html /app/opic-cipo/trdmrks/srch/viewTrademark.html | /pics/lm /opic-cipo/cpd/eng/patent /opic-cipo/cpd/fra/brevet |_/opic-cipo/cpd/fra/recherche : /opic-cipo/cpd/eng/search 513/tcp open tcpwrapped 548/tcp open tcpwrapped |_afp-serverinfo: ERROR: Script execution failed (use -d to debug) 563/tcp closed snews 625/tcp open tcpwrapped 648/tcp open tcpwrapped 666/tcp open tcpwrapped 691/tcp open tcpwrapped 705/tcp open tcpwrapped 714/tcp open tcpwrapped 808/tcp open tcpwrapped 873/tcp open tcpwrapped 880/tcp open tcpwrapped 912/tcp open tcpwrapped 1000/tcp open tcpwrapped 1010/tcp open tcpwrapped 1034/tcp open tcpwrapped 1037/tcp open tcpwrapped 1054/tcp open tcpwrapped 1068/tcp open tcpwrapped 1069/tcp open tcpwrapped 1074/tcp open tcpwrapped 1084/tcp open tcpwrapped 1093/tcp open tcpwrapped 1104/tcp open tcpwrapped 1106/tcp open tcpwrapped 1112/tcp open tcpwrapped 1113/tcp open tcpwrapped 1149/tcp open tcpwrapped 1198/tcp open tcpwrapped 1218/tcp open tcpwrapped 1311/tcp open tcpwrapped 1494/tcp open tcpwrapped 1524/tcp open tcpwrapped 1658/tcp open tcpwrapped 1971/tcp open tcpwrapped 2003/tcp open tcpwrapped 2038/tcp open tcpwrapped 2047/tcp open tcpwrapped 2196/tcp open tcpwrapped 2251/tcp open tcpwrapped 2500/tcp open tcpwrapped 2525/tcp open tcpwrapped 2604/tcp open tcpwrapped 2638/tcp open tcpwrapped 2710/tcp open tcpwrapped 2800/tcp open tcpwrapped 2869/tcp open tcpwrapped 2998/tcp open tcpwrapped 3269/tcp open tcpwrapped 3283/tcp open tcpwrapped 3300/tcp open tcpwrapped 3323/tcp open tcpwrapped 3871/tcp open tcpwrapped 3920/tcp open tcpwrapped 3998/tcp open tcpwrapped 4446/tcp open tcpwrapped 5009/tcp open tcpwrapped 5060/tcp open tcpwrapped 5414/tcp open tcpwrapped 5432/tcp open tcpwrapped |_tls-nextprotoneg: ERROR: Script execution failed (use -d to debug) |_ssl-cert: ERROR: Script execution failed (use -d to debug) |_tls-alpn: ERROR: Script execution failed (use -d to debug) |_ssl-date: ERROR: Script execution failed (use -d to debug) |_sslv2: ERROR: Script execution failed (use -d to debug) 5555/tcp open tcpwrapped 5631/tcp open tcpwrapped 5810/tcp open tcpwrapped 5811/tcp open tcpwrapped 5815/tcp open tcpwrapped 5910/tcp open tcpwrapped 5922/tcp open tcpwrapped 5960/tcp open tcpwrapped 6002/tcp open tcpwrapped |_x11-access: ERROR: Script execution failed (use -d to debug) 6006/tcp open tcpwrapped |_x11-access: ERROR: Script execution failed (use -d to debug) 6025/tcp open tcpwrapped 6100/tcp open tcpwrapped 6502/tcp open tcpwrapped 6543/tcp open tcpwrapped 6565/tcp open tcpwrapped 7000/tcp open tcpwrapped |_irc-info: Unable to open connection 7001/tcp open tcpwrapped 7007/tcp open tcpwrapped 7025/tcp open tcpwrapped 7100/tcp open tcpwrapped 7106/tcp open tcpwrapped 7921/tcp open tcpwrapped 7938/tcp open tcpwrapped 7999/tcp open tcpwrapped 8088/tcp open tcpwrapped 8093/tcp open tcpwrapped 8290/tcp open tcpwrapped 8333/tcp open tcpwrapped 8873/tcp open tcpwrapped 9003/tcp open tcpwrapped 9415/tcp open tcpwrapped 9418/tcp open tcpwrapped 9485/tcp open tcpwrapped 9535/tcp open tcpwrapped 9618/tcp open tcpwrapped 9929/tcp open tcpwrapped 10004/tcp open tcpwrapped 10012/tcp open tcpwrapped 10025/tcp open tcpwrapped 10082/tcp open tcpwrapped 10180/tcp open tcpwrapped 10215/tcp open tcpwrapped 10616/tcp open tcpwrapped 10628/tcp open tcpwrapped 16080/tcp open tcpwrapped 16113/tcp open tcpwrapped 16992/tcp open tcpwrapped 16993/tcp open tcpwrapped 20222/tcp open tcpwrapped 27353/tcp open tcpwrapped 27355/tcp open tcpwrapped 31038/tcp open tcpwrapped 32774/tcp open tcpwrapped 32776/tcp open tcpwrapped 32777/tcp open tcpwrapped 34573/tcp open tcpwrapped 38292/tcp open tcpwrapped 49165/tcp open tcpwrapped 50000/tcp open tcpwrapped |_drda-info: TIMEOUT 50389/tcp open tcpwrapped 50500/tcp open tcpwrapped 50636/tcp open tcpwrapped 52673/tcp open tcpwrapped 52822/tcp open tcpwrapped 61532/tcp open tcpwrapped 65000/tcp open tcpwrapped 65389/tcp open tcpwrapped Device type: general purpose Running: Linux 3.X OS CPE: cpe:/o:linux:linux_kernel:3.0 OS details: Linux 3.0 or 3.5 TRACEROUTE (using port 563/tcp) HOP RTT ADDRESS 1 0.21 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.63 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.63 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 0.43 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.36 ms ae-1.r27.lsanca07.us.bb.gin.ntt.net (129.250.3.242) 6 5.31 ms ae-0.a03.lsanca20.us.bb.gin.ntt.net (129.250.3.94) 7 ... 10 11 67.25 ms ae9.cr1.den3.us.zip.zayo.com (64.125.28.253) 12 66.95 ms ae2.cr2.ord9.us.zip.zayo.com (64.125.31.52) 13 ... 14 15 66.62 ms ae16.mpr1.tor3.ca.zip.zayo.com (64.125.26.141) 16 71.17 ms ae14.mpr1.yow2.ca.zip.zayo.com (64.125.31.13) 17 ... 30 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 301.37 seconds
Features
5 scans/day
Daily API Calls - 20 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.
Lifetime
Features
10 000 scans/day
Daily API Calls - 100 000 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is best for professionals who need to test their host's open ports from an external source.
Billed Annually @ $45.00 - 50% discount