Scan report for "rr4---sn-4g5ednsz.gvt1.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A rr4---sn-4g5ednsz.gvt1.com)
Nmap scan report for rr4---sn-4g5ednsz.gvt1.com (173.194.188.137)
Host is up (0.15s latency).
Other addresses for rr4---sn-4g5ednsz.gvt1.com (not scanned): 2a00:1450:4001:6c::9
rDNS record for 173.194.188.137: fra16s34-in-f9.1e100.net
Not shown: 996 filtered tcp ports (no-response)
PORT     STATE  SERVICE  VERSION
80/tcp   open   http     Google Video Server 1.0
| http-robots.txt: 1 disallowed entry 
|_/
|_http-title: Error 404 (Not Found)!!1
|_http-server-header: gvs 1.0
443/tcp  open   ssl/http Google Video Server 1.0
| http-robots.txt: 1 disallowed entry 
|_/
|_http-title: Error 404 (Not Found)!!1
| ssl-cert: Subject: commonName=*.c.docs.google.com
| Subject Alternative Name: DNS:*.c.docs.google.com, DNS:*.a1.googlevideo.com, DNS:*.bdn.dev, DNS:*.origin-test.bdn.dev, DNS:*.c.2mdn.net, DNS:*.c.bigcache.googleapis.com, DNS:*.c.chat.google.com, DNS:*.c.doc-0-0-sj.sj.googleusercontent.com, DNS:*.c.drive.google.com, DNS:*.c.googlesyndication.com, DNS:*.c.googlevideo.com, DNS:*.c.mail.google.com, DNS:*.c.mail.googleusercontent.com, DNS:*.c.pack.google.com, DNS:*.c.play.google.com, DNS:*.c.youtube.com, DNS:*.dai.googlevideo.com, DNS:*.googlevideo.com, DNS:*.googlezip.net, DNS:*.gvt1.com, DNS:*.offline-maps.gvt1.com, DNS:*.snap.gvt1.com, DNS:*.gcpcdn.gvt1.com, DNS:xn--ngstr-lra8j.com, DNS:*.xn--ngstr-lra8j.com
| Not valid before: 2024-04-30T14:31:05
|_Not valid after:  2024-07-09T14:31:04
|_ssl-date: TLS randomness does not represent time
|_http-server-header: gvs 1.0
554/tcp  closed rtsp
1935/tcp closed rtmp
Aggressive OS guesses: Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (88%), Linux 2.6.18 (88%), AXIS 211A Network Camera (Linux 2.6.20) (88%), FreeBSD 6.1-RELEASE (88%), Linux 2.6.16 (87%), Linux 3.0 - 3.1 (86%), Linux 3.10 (86%), Linux 3.7 - 3.8 (86%), Linux 4.3 (86%), Crestron XPanel control system (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 19 hops

TRACEROUTE (using port 554/tcp)
HOP RTT       ADDRESS
1   0.19 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.65 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.92 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.52 ms   google.as15169.any2ix.coresite.com (206.72.210.41)
5   0.41 ms   142.251.232.55
6   0.93 ms   142.250.231.88
7   ...
8   31.31 ms  209.85.251.122
9   32.90 ms  108.170.231.7
10  51.73 ms  142.251.67.134
11  56.40 ms  216.239.40.133
12  ...
13  63.94 ms  142.250.215.190
14  140.34 ms 142.251.49.45
15  ...
16  149.28 ms 216.239.40.146
17  148.74 ms 192.178.109.217
18  149.63 ms 209.85.242.9
19  148.64 ms fra16s34-in-f9.1e100.net (173.194.188.137)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 42.58 seconds
Color Scheme
Target
rr4---sn-4g5ednsz.gvt1.com
Target IP
173.194.188.137
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A rr4---sn-4g5ednsz.gvt1.com
Scan date
15 May 2024 23:31
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: