Scan report for "test-ipv6.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A test-ipv6.com)
Nmap scan report for test-ipv6.com (216.218.228.115)
Host is up (0.0088s latency).
rDNS record for 216.218.228.115: cosco.gigo.com
Not shown: 995 closed tcp ports (reset)
PORT     STATE SERVICE    VERSION
22/tcp   open  ssh        OpenSSH 7.6p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 46:24:ab:ff:14:eb:8d:03:8c:ef:de:1d:c1:b1:0d:a5 (RSA)
|   256 03:78:1c:89:db:47:05:ef:e6:64:89:00:94:39:f9:5d (ECDSA)
|_  256 7d:fa:9d:1d:3b:23:71:19:51:b3:13:a8:e0:44:69:bc (ED25519)
80/tcp   open  http       nginx 1.17.6
|_http-server-header: nginx/1.17.6
| http-robots.txt: 1 disallowed entry 
|_/
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-title: Test your IPv6.
443/tcp  open  ssl/http   nginx 1.17.6
|_ssl-date: TLS randomness does not represent time
|_http-server-header: nginx/1.17.6
| ssl-cert: Subject: commonName=test-ipv6.com
| Subject Alternative Name: DNS:*.test-ipv6.com, DNS:test-ipv6.com
| Not valid before: 2024-06-02T01:51:07
|_Not valid after:  2024-08-31T01:51:06
| http-methods: 
|_  Potentially risky methods: TRACE
| http-robots.txt: 1 disallowed entry 
|_/
|_http-title: Test your IPv6.
2222/tcp open  ssh        (protocol 2.0)
| ssh-hostkey: 
|   1024 91:a9:07:5a:a7:ab:e5:6b:d5:5a:b7:98:ba:c7:d9:e7 (DSA)
|   2048 06:a8:f5:2e:09:56:c0:69:75:63:e2:4e:37:df:34:19 (RSA)
|_  256 bf:96:f6:40:b0:b8:fe:15:e3:4a:a2:40:e0:2c:5c:4e (ECDSA)
| fingerprint-strings: 
|   NULL: 
|_    SSH-2.0-Go
5666/tcp open  tcpwrapped
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port2222-TCP:V=7.92%I=7%D=6/11%Time=66680072%P=x86_64-redhat-linux-gnu%
SF:r(NULL,C,"SSH-2\.0-Go\r\n");
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.6
Network Distance: 7 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 3389/tcp)
HOP RTT      ADDRESS
1   0.20 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.59 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.69 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   6.14 ms  hurricane-electric.as6939.any2ix.coresite.com (206.72.210.122)
5   11.93 ms port-channel9.core2.pao1.he.net (184.105.81.101)
6   37.29 ms 100ge14-1.core3.fmt1.he.net (72.52.92.66)
7   9.26 ms  cosco.gigo.com (216.218.228.115)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 50.71 seconds
Color Scheme
Target
test-ipv6.com
Target IP
216.218.228.115
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A test-ipv6.com
Scan date
11 Jun 2024 03:45
Copy scan report
Download report
Remove scan result
$
Total scans
About 3 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: