Ports
Duration
Date
IP
Nmap scan report for hfma.pornpics.com (45.133.44.50) Host is up (0.00041s latency). Other addresses for hfma.pornpics.com (not scanned): 2a02:b48:8301::50 2a02:b48:8300::50 45.133.44.51 Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http nginx 1.20.2 |_http-title: Did not follow redirect to https://hfma.pornpics.com/ |_http-server-header: nginx/1.20.2 82/tcp open http nginx 1.20.2 |_http-title: 403 Forbidden |_http-server-header: nginx/1.20.2 443/tcp open ssl/http nginx 1.20.2 |_http-title: 403 Forbidden |_http-cors: HEAD GET OPTIONS | tls-nextprotoneg: | h2 |_ http/1.1 | http-server-header: | Angie |_ nginx/1.20.2 | ssl-cert: Subject: commonName=hfma.pornpics.com | Subject Alternative Name: DNS:hfma.pornpics.com | Not valid before: 2024-08-27T03:02:56 |_Not valid after: 2024-11-25T03:02:55 | tls-alpn: | h2 |_ http/1.1 |_ssl-date: TLS randomness does not represent time Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: specialized|general purpose Running (JUST GUESSING): Oracle VM Server 3.X (99%), Linux 4.X|3.X (99%), Crestron 2-Series (90%) OS CPE: cpe:/o:oracle:vm_server:3.4.2 cpe:/o:linux:linux_kernel:4.1 cpe:/o:linux:linux_kernel:3.2 cpe:/o:crestron:2_series Aggressive OS guesses: Oracle VM Server 3.4.2 (Linux 4.1) (99%), Linux 3.2 (93%), Crestron XPanel control system (90%) No exact OS matches for host (test conditions non-ideal). Network Distance: 8 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.55 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.71 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.59 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 5.00 ms ae-16.r24.lsanca07.us.bb.gin.ntt.net (129.250.3.78) 6 9.89 ms ae-1.a03.lsanca07.us.bb.gin.ntt.net (129.250.3.142) 7 0.84 ms ce-3-3-0.a03.lsanca07.us.ce.gin.ntt.net (128.241.6.151) 8 0.37 ms 45.133.44.50 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 26.72 seconds