Scan report for "t8.zcvh.net"

Membership level: Free member
Summary

Ports

5

Duration

33.35sec

Date

2024-09-19

IP

67.217.49.154

Report
Scan OS information and Traceroute (nmap -A t8.zcvh.net)
Nmap scan report for t8.zcvh.net (67.217.49.154)
Host is up (0.068s latency).
Not shown: 995 closed tcp ports (reset)
PORT     STATE SERVICE    VERSION
80/tcp   open  http       nginx
|_http-title: Did not follow redirect to https://t8.zcvh.net/404.html
443/tcp  open  ssl/http   nginx
|_ssl-date: TLS randomness does not represent time
| http-title: 404 Not Found
|_Requested resource was https://t8.zcvh.net/404.html
| tls-alpn: 
|   http/1.1
|   http/1.0
|_  http/0.9
| ssl-cert: Subject: commonName=*.zcvh.net
| Subject Alternative Name: DNS:*.zcvh.net, DNS:zcvh.net
| Not valid before: 2024-09-09T04:02:28
|_Not valid after:  2024-12-08T04:02:27
2222/tcp open  ssh        OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 a1:a8:c0:f4:bc:d5:ca:50:55:56:a5:a0:2f:ce:93:5c (ECDSA)
|_  256 2a:88:ab:ad:4e:ec:aa:76:e3:d5:42:5b:8d:54:25:c9 (ED25519)
8081/tcp open  http       Golang net/http server (Go-IPFS json-rpc or InfluxDB API)
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
9100/tcp open  jetdirect?
Aggressive OS guesses: CyanogenMod 11 (Android 4.4.4) (97%), Linux 2.6.32 (96%), Linux 3.2 - 4.9 (96%), Netgear ReadyNAS 2100 (RAIDiator 4.2.24) (96%), Linux 2.6.32 - 3.10 (96%), Linux 5.0 - 5.3 (96%), Oracle VM Server 3.4.2 (Linux 4.1) (96%), Amazon Kindle Paperwhite (95%), CyanogenMod 12 (Android 5.0.2) (95%), Sony Android TV (Android 5.0) (95%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 1723/tcp)
HOP RTT      ADDRESS
1   0.20 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.69 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.75 ms  r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   ...
5   34.53 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   21.35 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7   42.44 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8   46.67 ms be5024.ccr41.atl01.atlas.cogentco.com (154.54.163.41)
9   63.31 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
10  68.08 ms be4943.ccr41.jfk02.atlas.cogentco.com (154.54.165.14)
11  68.25 ms be2273.rcr21.ewr03.atlas.cogentco.com (154.54.83.206)
12  68.66 ms be3938.nr61.b017536-1.ewr03.atlas.cogentco.com (154.24.11.54)
13  69.55 ms 38.122.117.162
14  68.25 ms 64.20.32.235
15  73.92 ms edge32b-teb6.trouble-free.net (64.20.32.197)
16  68.27 ms 67.217.55.75
17  68.34 ms 67.217.49.154

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 33.35 seconds
Color Scheme
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Detailed report
Target
Target IP
67.217.49.154
Host status
UP
Target Country
Target IP location is United States of America
United States of America
Free scan
Free scan
Scan method
Scan OS information and Traceroute
Scan status
Identified 5 ports
Run command
nmap -A t8.zcvh.net
Scan date
19 Sep 2024 21:33
Scan duration
33.35sec
Download report
Remove scan result
$
Total scans
Scan more
Pricing

PROFESSIONAL


  • 10 000 scans/day
  • Daily API Calls - 100 000 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0.75$7.50/month
Billed Annually @ $9.00$90.00 90% discount
Get Professional

REGISTERED


  • 5 scans/day
  • Daily API Calls - 20 request
  • Save log
  • Public scan
  • OSINT scan
  • Unlisted scan
  • Private scan
  • No ads
  • Remove scan result
  • Remove after scan
  • Additional methods for scan
$0/lifetime
 
Register
Scan host
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: