Scan report for "apac.ctnsnet.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A apac.ctnsnet.com)
Nmap scan report for apac.ctnsnet.com (35.227.210.113)
Host is up (0.00045s latency).
rDNS record for 35.227.210.113: 113.210.227.35.bc.googleusercontent.com
Not shown: 998 filtered ports
PORT    STATE SERVICE  VERSION
80/tcp  open  http     Apache Tomcat/Coyote JSP engine 1.1
| http-methods: 
|_  Potentially risky methods: PUT DELETE
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: Apache-Coyote/1.1
|_http-title: Error report
443/tcp open  ssl/http Apache Tomcat/Coyote JSP engine 1.1
| http-methods: 
|_  Potentially risky methods: PUT DELETE
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: Apache-Coyote/1.1
|_http-title: Error report
| ssl-cert: Subject: commonName=*.ctnsnet.com/organizationName=Crimtan Holdings Ltd/countryName=GB
| Subject Alternative Name: DNS:*.ctnsnet.com, DNS:ctnsnet.com
| Not valid before: 2023-10-13T00:00:00
|_Not valid after:  2024-11-10T23:59:59
|_ssl-date: 2023-11-19T08:57:43+00:00; 0s from scanner time.
| tls-alpn: 
|   grpc-exp
|   h2
|_  http/1.1
| tls-nextprotoneg: 
|   grpc-exp
|   h2
|_  http/1.1
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 7 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   23.90 ms 208.76.251.177
2   0.56 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.63 ms  multacom.com (96.45.162.9)
4   0.49 ms  206.72.211.148.any2ix.coresite.com (206.72.211.148)
5   1.32 ms  108.170.247.193
6   0.41 ms  142.251.233.235
7   0.50 ms  113.210.227.35.bc.googleusercontent.com (35.227.210.113)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 41.38 seconds
Color Scheme
Target
apac.ctnsnet.com
Target IP
35.227.210.113
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A apac.ctnsnet.com
Scan date
19 Nov 2023 03:57
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: