Ports
Duration
Date
IP
Nmap scan report for api.sitkagear.com (18.65.25.26) Host is up (0.0010s latency). Other addresses for api.sitkagear.com (not scanned): 2600:9000:2364:9400:1f:de0f:140:93a1 2600:9000:2364:4000:1f:de0f:140:93a1 2600:9000:2364:9e00:1f:de0f:140:93a1 2600:9000:2364:6000:1f:de0f:140:93a1 2600:9000:2364:2c00:1f:de0f:140:93a1 2600:9000:2364:0:1f:de0f:140:93a1 2600:9000:2364:1e00:1f:de0f:140:93a1 2600:9000:2364:600:1f:de0f:140:93a1 18.65.25.31 18.65.25.69 18.65.25.85 rDNS record for 18.65.25.26: server-18-65-25-26.lax53.r.cloudfront.net Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http Amazon CloudFront httpd |_http-title: Did not follow redirect to https://api.sitkagear.com/ |_http-server-header: CloudFront 443/tcp open ssl/http Amazon CloudFront httpd |_http-cors: HEAD GET POST PUT | http-robots.txt: 1 disallowed entry |_/ | ssl-cert: Subject: commonName=sitkagear.com | Subject Alternative Name: DNS:sitkagear.com, DNS:*.sitkagear.com | Not valid before: 2024-01-10T00:00:00 |_Not valid after: 2025-02-07T23:59:59 | http-server-header: | AmazonS3 |_ CloudFront |_http-title: Not Found Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): FreeBSD 11.X|12.X (88%) OS CPE: cpe:/o:freebsd:freebsd:11.0 cpe:/o:freebsd:freebsd:12.0 Aggressive OS guesses: FreeBSD 11.0-STABLE (88%), FreeBSD 11.1-RELEASE (88%), FreeBSD 11.1-STABLE (88%), FreeBSD 11.0-RELEASE (86%), FreeBSD 12.0-RELEASE (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 12 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.73 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.68 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.91 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146) 5 ... 10 11 1.09 ms 15.230.16.19 12 1.06 ms server-18-65-25-26.lax53.r.cloudfront.net (18.65.25.26) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 28.68 seconds