Scan report for "crtx.info"

Membership level: Free member
Scan OS information and Traceroute (nmap -A crtx.info)
Nmap scan report for crtx.info (34.98.99.30)
Host is up (0.00049s latency).
rDNS record for 34.98.99.30: 30.99.98.34.bc.googleusercontent.com
Not shown: 998 filtered ports
PORT    STATE SERVICE    VERSION
80/tcp  open  http       openresty
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 403 Forbidden
|     Server: openresty
|     Date: Sat, 18 Nov 2023 19:05:27 GMT
|     Content-Type: text/html
|     Content-Length: 291
|     ETag: "6552ae08-123"
|     Via: 1.1 google
|     <!DOCTYPE html>
|     <html lang="en">
|     <head>
|     <meta http-equiv="content-type" content="text/html;charset=utf-8" />
|     <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon" />
|     <title>Forbidden</title>
|     </head>
|     <body>
|     <h1>Access Forbidden</h1>
|     </body>
|     </html>
|   GetRequest: 
|     HTTP/1.0 403 Forbidden
|     Server: openresty
|     Date: Sat, 18 Nov 2023 19:05:22 GMT
|     Content-Type: text/html
|     Content-Length: 291
|     ETag: "6552ae1a-123"
|     Via: 1.1 google
|     <!DOCTYPE html>
|     <html lang="en">
|     <head>
|     <meta http-equiv="content-type" content="text/html;charset=utf-8" />
|     <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon" />
|     <title>Forbidden</title>
|     </head>
|     <body>
|     <h1>Access Forbidden</h1>
|     </body>
|     </html>
|   HTTPOptions: 
|     HTTP/1.0 403 Forbidden
|     Server: openresty
|     Date: Sat, 18 Nov 2023 19:05:22 GMT
|     Content-Type: text/html
|     Content-Length: 150
|     Via: 1.1 google
|     <html>
|     <head><title>403 Forbidden</title></head>
|     <body>
|     <center><h1>403 Forbidden</h1></center>
|     <hr><center>openresty</center>
|     </body>
|     </html>
|   RTSPRequest: 
|     HTTP/1.0 400 Bad Request
|     Content-Type: text/html; charset=UTF-8
|     Referrer-Policy: no-referrer
|     Content-Length: 273
|     Date: Sat, 18 Nov 2023 19:05:22 GMT
|     <html><head>
|     <meta http-equiv="content-type" content="text/html;charset=utf-8">
|     <title>400 Bad Request</title>
|     </head>
|     <body text=#000000 bgcolor=#ffffff>
|     <h1>Error: Bad Request</h1>
|     <h2>Your client has issued a malformed or illegal request.</h2>
|     <h2></h2>
|_    </body></html>
| http-robots.txt: 1 disallowed entry 
|_/
|_http-server-header: openresty
|_http-title: Site doesn't have a title (text/html).
443/tcp open  tcpwrapped
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.70%I=7%D=11/18%Time=65590AF2%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,1CA,"HTTP/1\.0\x20403\x20Forbidden\r\nServer:\x20openresty\
SF:r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2019:05:22\x20GMT\r\nContent-Typ
SF:e:\x20text/html\r\nContent-Length:\x20291\r\nETag:\x20\"6552ae1a-123\"\
SF:r\nVia:\x201\.1\x20google\r\n\r\n<!DOCTYPE\x20html>\n<html\x20lang=\"en
SF:\">\n\x20\x20<head>\n\x20\x20\x20\x20<meta\x20http-equiv=\"content-type
SF:\"\x20content=\"text/html;charset=utf-8\"\x20/>\n\x20\x20\x20\x20<link\
SF:x20rel=\"shortcut\x20icon\"\x20href=\"data:image/x-icon;,\"\x20type=\"i
SF:mage/x-icon\"\x20/>\n\x20\x20\x20\x20<title>Forbidden</title>\n\x20\x20
SF:</head>\n\x20\x20<body>\n\x20\x20\x20\x20<h1>Access\x20Forbidden</h1>\n
SF:\x20\x20</body>\n</html>\n")%r(HTTPOptions,127,"HTTP/1\.0\x20403\x20For
SF:bidden\r\nServer:\x20openresty\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2
SF:019:05:22\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2015
SF:0\r\nVia:\x201\.1\x20google\r\n\r\n<html>\r\n<head><title>403\x20Forbid
SF:den</title></head>\r\n<body>\r\n<center><h1>403\x20Forbidden</h1></cent
SF:er>\r\n<hr><center>openresty</center>\r\n</body>\r\n</html>\r\n")%r(RTS
SF:PRequest,1AD,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20te
SF:xt/html;\x20charset=UTF-8\r\nReferrer-Policy:\x20no-referrer\r\nContent
SF:-Length:\x20273\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2019:05:22\x20GM
SF:T\r\n\r\n\n<html><head>\n<meta\x20http-equiv=\"content-type\"\x20conten
SF:t=\"text/html;charset=utf-8\">\n<title>400\x20Bad\x20Request</title>\n<
SF:/head>\n<body\x20text=#000000\x20bgcolor=#ffffff>\n<h1>Error:\x20Bad\x2
SF:0Request</h1>\n<h2>Your\x20client\x20has\x20issued\x20a\x20malformed\x2
SF:0or\x20illegal\x20request\.</h2>\n<h2></h2>\n</body></html>\n")%r(FourO
SF:hFourRequest,1CA,"HTTP/1\.0\x20403\x20Forbidden\r\nServer:\x20openresty
SF:\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2019:05:27\x20GMT\r\nContent-Ty
SF:pe:\x20text/html\r\nContent-Length:\x20291\r\nETag:\x20\"6552ae08-123\"
SF:\r\nVia:\x201\.1\x20google\r\n\r\n<!DOCTYPE\x20html>\n<html\x20lang=\"e
SF:n\">\n\x20\x20<head>\n\x20\x20\x20\x20<meta\x20http-equiv=\"content-typ
SF:e\"\x20content=\"text/html;charset=utf-8\"\x20/>\n\x20\x20\x20\x20<link
SF:\x20rel=\"shortcut\x20icon\"\x20href=\"data:image/x-icon;,\"\x20type=\"
SF:image/x-icon\"\x20/>\n\x20\x20\x20\x20<title>Forbidden</title>\n\x20\x2
SF:0</head>\n\x20\x20<body>\n\x20\x20\x20\x20<h1>Access\x20Forbidden</h1>\
SF:n\x20\x20</body>\n</html>\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 7 hops

TRACEROUTE (using port 443/tcp)
HOP RTT     ADDRESS
1   0.20 ms 208.76.251.177
2   0.58 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.70 ms multacom.com (96.45.162.9)
4   2.74 ms 206.72.211.148.any2ix.coresite.com (206.72.211.148)
5   0.48 ms 108.170.247.225
6   1.36 ms 209.85.245.229
7   0.44 ms 30.99.98.34.bc.googleusercontent.com (34.98.99.30)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 148.36 seconds
Color Scheme
Target
crtx.info
Target IP
34.98.99.30
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A crtx.info
Scan date
18 Nov 2023 14:07
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: