Scan report for "s-usc1f-nss-2539.firebaseio.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A s-usc1f-nss-2539.firebaseio.com)
Nmap scan report for s-usc1f-nss-2539.firebaseio.com (34.120.160.131)
Host is up (0.00044s latency).
Other addresses for s-usc1f-nss-2539.firebaseio.com (not scanned): 2600:1901:0:4d00:: 35.190.39.113 35.201.97.85 34.120.206.254
rDNS record for 34.120.160.131: 131.160.120.34.bc.googleusercontent.com
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE    VERSION
80/tcp  open  tcpwrapped
443/tcp open  ssl/http   nginx
| http-robots.txt: 1 disallowed entry 
|_/
|_http-title: Did not follow redirect to https://console.firebase.google.com/project/fb-monitoring-prod/database/s-usc1f-nss-2539/data/
| tls-alpn: 
|_  http/1.1
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=*.us-central1.firebasedatabase.app
| Subject Alternative Name: DNS:*.us-central1.firebasedatabase.app, DNS:*.firebaseio.com
| Not valid before: 2024-05-06T18:29:06
|_Not valid after:  2024-08-04T18:29:05
| tls-nextprotoneg: 
|_  http/1.1
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 7 hops

TRACEROUTE (using port 80/tcp)
HOP RTT     ADDRESS
1   0.21 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.69 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.69 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.52 ms google.as15169.any2ix.coresite.com (206.72.210.41)
5   2.18 ms 108.170.252.85
6   0.37 ms 142.251.60.109
7   0.49 ms 131.160.120.34.bc.googleusercontent.com (34.120.160.131)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 28.36 seconds
Color Scheme
Target
s-usc1f-nss-2539.firebaseio.com
Target IP
34.120.160.131
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A s-usc1f-nss-2539.firebaseio.com
Scan date
15 May 2024 23:36
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: