Scan OS information and Traceroute (nmap -A ipv4-c226-sea001-ix.1.oca.nflxvideo.net)
Nmap scan report for ipv4-c226-sea001-ix.1.oca.nflxvideo.net (198.38.112.176)
Host is up (0.029s latency).
Not shown: 996 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open tcpwrapped
|_ssh-hostkey: ERROR: Script execution failed (use -d to debug)
80/tcp open http nginx
|_http-title: 403 Forbidden
|_http-cors: HEAD GET POST PUT DELETE TRACE OPTIONS CONNECT PATCH
179/tcp open tcpwrapped
443/tcp open ssl/http nginx
|_http-cors: HEAD GET POST PUT DELETE TRACE OPTIONS CONNECT PATCH
|_http-title: 403 Forbidden
| tls-alpn:
| http/1.1
| http/1.0
|_ http/0.9
| ssl-cert: Subject: commonName=*.1.oca.nflxvideo.net/organizationName=Netflix/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.1.oca.nflxvideo.net, DNS:*.1.live.nflxvideo.net
| Not valid before: 2024-05-05T00:00:00
|_Not valid after: 2024-06-08T07:26:28
|_ssl-date: TLS randomness does not represent time
Aggressive OS guesses: FreeBSD 11.0-CURRENT (94%), FreeBSD 11.3-RELEASE (92%), FreeBSD 11.2-RELEASE - 11.3 RELEASE or 11.2-STABLE (91%), FreeBSD 12.0-RELEASE - 13.0-CURRENT (91%), FreeBSD 11.1-RELEASE (91%), FreeBSD 11.2-RELEASE - 11.3-RELEASE (90%), FreeBSD 7.0-CURRENT (90%), FreeBSD 11.0-RELEASE (90%), FreeBSD 7.0-CURRENT (pre-release) (90%), FreeBSD 7.0-RELEASE-p2 - 7.1-PRERELEASE (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 10 hops
TRACEROUTE (using port 110/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.68 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.54 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4 21.73 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5 ...
6 0.60 ms ctl.lax04.atlas.cogentco.com (154.54.10.198)
7 ...
8 29.87 ms 4.69.219.206
9 29.39 ms po7.es01.sea001.ix.nflxvideo.net (198.38.112.4)
10 28.11 ms ipv4-c226-sea001-ix.1.oca.nflxvideo.net (198.38.112.176)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 44.51 seconds