Scan OS information and Traceroute (nmap -A c1552172.ssl.cf0.rackcdn.com)
Nmap scan report for c1552172.ssl.cf0.rackcdn.com (23.64.185.185)
Host is up (0.00080s latency).
rDNS record for 23.64.185.185: a23-64-185-185.deploy.static.akamaitechnologies.com
Not shown: 998 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http AkamaiGHost (Akamai's HTTP Acceleration/Mirror service)
|_http-title: Access Denied
443/tcp open ssl/http AkamaiGHost (Akamai's HTTP Acceleration/Mirror service)
| tls-nextprotoneg:
| http/1.1
|_ http/1.0
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
| tls-alpn:
| http/1.1
|_ http/1.0
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=*.ssl.cf0.rackcdn.com/organizationName=Rackspace US, Inc./stateOrProvinceName=Texas/countryName=US
| Subject Alternative Name: DNS:*.ssl.cf0.rackcdn.com, DNS:ssl.cf0.rackcdn.com
| Not valid before: 2023-11-19T00:00:00
|_Not valid after: 2024-11-19T23:59:59
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 4.15 - 5.6 (92%), Linux 5.4 (92%), Linux 5.0 - 5.3 (91%), Linux 5.0 - 5.4 (90%), Crestron XPanel control system (90%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.16 (87%), Linux 3.2 (87%), Linux 2.6.32 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 9 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.21 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.56 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.72 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4 0.55 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5 0.98 ms ae-16.r24.lsanca07.us.bb.gin.ntt.net (129.250.3.78)
6 0.66 ms ae-0.a03.lsanca20.us.bb.gin.ntt.net (129.250.3.94)
7 0.56 ms ae-0.akamai-onnet.lsanca20.us.bb.gin.ntt.net (140.174.28.58)
8 ...
9 0.78 ms a23-64-185-185.deploy.static.akamaitechnologies.com (23.64.185.185)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 26.13 seconds