Scan OS information and Traceroute (nmap -A live-screencaps.vscdns.com)
Nmap scan report for live-screencaps.vscdns.com (143.244.51.207)
Host is up (0.00081s latency).
Other addresses for live-screencaps.vscdns.com (not scanned): 2a02:6ea0:c800::6 2a02:6ea0:c800::19 2a02:6ea0:c800::7 2a02:6ea0:c800::20 2a02:6ea0:c800::8 2a02:6ea0:c800::15 89.187.187.20 185.180.13.214 89.187.187.15 185.180.13.210 89.187.187.12
rDNS record for 143.244.51.207: 170482485.lax.cdn77.com
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http nginx (reverse proxy)
|_http-title: Did not follow redirect to https://live-screencaps.vscdns.com/
443/tcp open ssl/http nginx (reverse proxy)
|_http-server-header: CDN77-Turbo
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=*.vscdns.com
| Subject Alternative Name: DNS:*.vscdns.com, DNS:vscdns.com
| Not valid before: 2023-02-07T07:34:19
|_Not valid after: 2024-03-10T07:34:19
| tls-alpn:
| h2
|_ http/1.1
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (87%)
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
Aggressive OS guesses: Linux 2.6.32 - 3.0 (87%), Linux 2.6.18 - 2.6.22 (86%), Linux 2.6.32 (86%), Linux 3.2 - 3.8 (86%), Linux 3.2 - 4.9 (86%), Linux 2.6.32 - 3.10 (85%), Linux 2.6.32 - 3.13 (85%), Linux 2.6.32 or 3.10 (85%), Linux 3.10 - 3.12 (85%), Linux 4.4 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 8 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.22 ms 208.76.251.177
2 0.62 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.95 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1)
4 0.84 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5 0.96 ms be3360.ccr41.lax04.atlas.cogentco.com (154.54.25.150)
6 0.44 ms 38.142.33.186
7 0.35 ms vl221.lax-cs2-dist-1.cdn77.com (138.199.0.87)
8 0.81 ms 170482485.lax.cdn77.com (143.244.51.207)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 55.98 seconds