Scan report for "rr5---sn-nv47lnly.googlevideo.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A rr5---sn-nv47lnly.googlevideo.com)
Nmap scan report for rr5---sn-nv47lnly.googlevideo.com (172.217.130.106)
Host is up (0.19s latency).
Other addresses for rr5---sn-nv47lnly.googlevideo.com (not scanned): 2a00:1450:4017:2::a
rDNS record for 172.217.130.106: sof02s29-in-f10.1e100.net
Not shown: 996 filtered tcp ports (no-response)
PORT     STATE  SERVICE  VERSION
80/tcp   open   http     Google Video Server 1.0
| http-robots.txt: 1 disallowed entry 
|_/
|_http-title: Error 404 (Not Found)!!1
|_http-server-header: gvs 1.0
443/tcp  open   ssl/http Google Video Server 1.0
|_http-title: Error 404 (Not Found)!!1
| http-robots.txt: 1 disallowed entry 
|_/
| ssl-cert: Subject: commonName=*.c.docs.google.com
| Subject Alternative Name: DNS:*.c.docs.google.com, DNS:*.a1.googlevideo.com, DNS:*.bdn.dev, DNS:*.origin-test.bdn.dev, DNS:*.c.2mdn.net, DNS:*.c.bigcache.googleapis.com, DNS:*.c.chat.google.com, DNS:*.c.doc-0-0-sj.sj.googleusercontent.com, DNS:*.c.drive.google.com, DNS:*.c.googlesyndication.com, DNS:*.c.googlevideo.com, DNS:*.c.mail.google.com, DNS:*.c.mail.googleusercontent.com, DNS:*.c.pack.google.com, DNS:*.c.play.google.com, DNS:*.c.youtube.com, DNS:*.dai.googlevideo.com, DNS:*.googlevideo.com, DNS:*.googlezip.net, DNS:*.gvt1.com, DNS:*.offline-maps.gvt1.com, DNS:*.snap.gvt1.com, DNS:*.gcpcdn.gvt1.com, DNS:xn--ngstr-lra8j.com, DNS:*.xn--ngstr-lra8j.com
| Not valid before: 2024-01-16T14:30:52
|_Not valid after:  2024-03-26T14:30:51
|_ssl-date: TLS randomness does not represent time
|_http-server-header: gvs 1.0
554/tcp  closed rtsp
1935/tcp closed rtmp
Aggressive OS guesses: Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (88%), Linux 2.6.18 (88%), AXIS 211A Network Camera (Linux 2.6.20) (88%), FreeBSD 6.1-RELEASE (88%), Linux 2.6.16 (87%), Linux 3.10 (86%), Linux 3.7 - 3.8 (86%), Linux 4.3 (86%), Crestron XPanel control system (86%), Lexmark C534dn printer (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 19 hops

TRACEROUTE (using port 554/tcp)
HOP RTT       ADDRESS
1   0.21 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.62 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   1.01 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   4.84 ms   google.as15169.any2ix.coresite.com (206.72.210.41)
5   1.02 ms   108.170.247.148
6   1.82 ms   108.170.230.135
7   7.97 ms   142.250.238.76
8   35.93 ms  142.250.227.246
9   35.89 ms  108.170.229.86
10  42.85 ms  72.14.238.224
11  54.55 ms  216.239.40.12
12  54.23 ms  142.250.208.208
13  141.94 ms 74.125.37.42
14  189.08 ms 172.253.65.53
15  162.72 ms 192.178.82.4
16  162.26 ms 216.239.58.174
17  187.95 ms 216.239.48.241
18  188.68 ms 216.239.59.217
19  187.14 ms sof02s29-in-f10.1e100.net (172.217.130.106)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 41.88 seconds
Color Scheme
Target
rr5---sn-nv47lnly.googlevideo.com
Target IP
172.217.130.106
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A rr5---sn-nv47lnly.googlevideo.com
Scan date
13 Feb 2024 11:59
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: