Scan OS information and Traceroute (nmap -A tcs.webex.com)
Nmap scan report for tcs.webex.com (114.29.213.193)
Host is up (0.18s latency).
rDNS record for 114.29.213.193: sin01-nebulaas.webex.com
Not shown: 997 filtered tcp ports (no-response), 1 filtered tcp ports (admin-prohibited)
PORT STATE SERVICE VERSION
80/tcp open http nginx (reverse proxy)
|_http-title: Did not follow redirect to https://tcs.webex.com/
443/tcp open ssl/http nginx (reverse proxy)
| http-robots.txt: 1 disallowed entry
|_/
| http-title: Tata Consultancy Services
|_Requested resource was https://tcs.webex.com/mw3300/mywebex/default.do?siteurl=tcs
| ssl-cert: Subject: commonName=*.webex.com/organizationName=Cisco Systems Inc./stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:webex.com, DNS:*.webex.com, DNS:www.webex.com
| Not valid before: 2023-09-27T15:18:44
|_Not valid after: 2024-10-26T15:17:44
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: load balancer
Running (JUST GUESSING): Citrix embedded (91%)
Aggressive OS guesses: Citrix NetScaler load balancer (91%), Citrix NetScaler VPX load balancer (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.22 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.61 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.67 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4 0.52 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5 0.68 ms ae-0.tata-communications.lsanca07.us.bb.gin.ntt.net (129.250.9.18)
6 169.36 ms if-ae-44-2.tcore2.lvw-losangeles.as6453.net (64.86.252.12)
7 ...
8 151.22 ms if-et-20-2.hcore2.kv8-chiba.as6453.net (64.86.252.217)
9 ...
10 169.69 ms if-bundle-19-2.qcore2.esin4-singapore.as6453.net (63.243.180.130)
11 170.71 ms 114.29.221.57
12 169.07 ms 114.29.208.6
13 169.32 ms sin01-nebulaas.webex.com (114.29.213.193)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 77.91 seconds