Scan report for "ping.zohospotlight.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A ping.zohospotlight.com)
Nmap scan report for ping.zohospotlight.com (136.143.190.253)
Host is up (0.033s latency).
Not shown: 997 filtered ports
PORT    STATE  SERVICE   VERSION
80/tcp  open   http      AWServer
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 403 Forbidden
|     Date: Mon Nov 20 05:41:32 PST 2023
|   GetRequest: 
|     HTTP/1.1 200 OK
|     Date: Mon, 20 Nov 2023 05:41:27 PST
|     Server: AWServer
|     Connection: Keep-Alive
|     Content-Type: text/html
|     Last-Modified: Fri, 01 Sep 2023 10:19:46 PDT
|     Content-Length: 8
|     Default
|   HTTPOptions, RTSPRequest, SIPOptions: 
|     HTTP/1.1 200 OK
|     Access-Control-Max-Age: 1800
|     Access-Control-Allow-Origin: zoho.com
|     Access-Control-Allow-Credentials: true
|     Access-Control-Allow-Methods: POST,GET
|_    Content-Length: 0
| http-robots.txt: 1 disallowed entry 
|_/*
|_http-server-header: AWServer
|_http-title: Site doesn't have a title (text/html).
113/tcp closed ident
443/tcp open   ssl/https AWServer
| fingerprint-strings: 
|   SIPOptions: 
|     HTTP/1.1 200 OK
|     Access-Control-Max-Age: 1800
|     Access-Control-Allow-Origin: zoho.com
|     Access-Control-Allow-Credentials: true
|     Strict-Transport-Security: max-age=15768000
|     Access-Control-Allow-Methods: POST,GET
|_    Content-Length: 0
| http-robots.txt: 1 disallowed entry 
|_/*
|_http-server-header: AWServer
|_http-title: Site doesn't have a title (text/html).
| ssl-cert: Subject: commonName=*.zohospotlight.com
| Subject Alternative Name: DNS:*.zohospotlight.com, DNS:zohospotlight.com
| Not valid before: 2022-12-27T00:00:00
|_Not valid after:  2024-01-20T23:59:59
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/20%Time=655B6206%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,C4,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Mon,\x2020\x20Nov\x2
SF:02023\x2005:41:27\x20PST\r\nServer:\x20AWServer\r\nConnection:\x20Keep-
SF:Alive\r\nContent-Type:\x20text/html\r\nLast-Modified:\x20Fri,\x2001\x20
SF:Sep\x202023\x2010:19:46\x20PDT\r\nContent-Length:\x208\r\n\r\nDefault\n
SF:")%r(HTTPOptions,BB,"HTTP/1\.1\x20200\x20OK\r\nAccess-Control-Max-Age:\
SF:x201800\r\nAccess-Control-Allow-Origin:\x20zoho\.com\r\nAccess-Control-
SF:Allow-Credentials:\x20true\r\nAccess-Control-Allow-Methods:\x20POST,GET
SF:\r\nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,BB,"HTTP/1\.1\x20200\x
SF:20OK\r\nAccess-Control-Max-Age:\x201800\r\nAccess-Control-Allow-Origin:
SF:\x20zoho\.com\r\nAccess-Control-Allow-Credentials:\x20true\r\nAccess-Co
SF:ntrol-Allow-Methods:\x20POST,GET\r\nContent-Length:\x200\r\n\r\n")%r(Fo
SF:urOhFourRequest,3E,"HTTP/1\.1\x20403\x20Forbidden\r\nDate:\x20Mon\x20No
SF:v\x2020\x2005:41:32\x20PST\x202023\r\n\r\n")%r(SIPOptions,BB,"HTTP/1\.1
SF:\x20200\x20OK\r\nAccess-Control-Max-Age:\x201800\r\nAccess-Control-Allo
SF:w-Origin:\x20zoho\.com\r\nAccess-Control-Allow-Credentials:\x20true\r\n
SF:Access-Control-Allow-Methods:\x20POST,GET\r\nContent-Length:\x200\r\n\r
SF:\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655B6253%P=x86_64-redhat-linu
SF:x-gnu%r(SIPOptions,E8,"HTTP/1\.1\x20200\x20OK\r\nAccess-Control-Max-Age
SF::\x201800\r\nAccess-Control-Allow-Origin:\x20zoho\.com\r\nAccess-Contro
SF:l-Allow-Credentials:\x20true\r\nStrict-Transport-Security:\x20max-age=1
SF:5768000\r\nAccess-Control-Allow-Methods:\x20POST,GET\r\nContent-Length:
SF:\x200\r\n\r\n");
Aggressive OS guesses: Linux 3.10 - 3.12 (99%), Linux 4.4 (99%), Linux 3.18 (98%), Linux 2.6.32 (98%), Linux 2.6.32 or 3.10 (98%), Linux 2.6.39 (98%), WatchGuard Fireware 11.8 (98%), Synology DiskStation Manager 5.1 (97%), Linux 3.10 (97%), Linux 4.9 (97%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops

TRACEROUTE (using port 113/tcp)
HOP RTT      ADDRESS
1   0.24 ms  208.76.251.177
2   0.55 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.68 ms  multacom.com (96.45.162.9)
4   1.28 ms  ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5   1.62 ms  ae-13.r25.lsanca07.us.bb.gin.ntt.net (129.250.3.143)
6   ...
7   7.85 ms  ae-0.r25.snjsca04.us.bb.gin.ntt.net (129.250.3.147)
8   25.68 ms ae-4.r25.sttlwa01.us.bb.gin.ntt.net (129.250.3.125)
9   26.43 ms ae-1.a02.sttlwa01.us.bb.gin.ntt.net (129.250.2.95)
10  34.96 ms xe-2-0-1-2.a03.sttlwa01.us.ce.gin.ntt.net (128.241.1.230)
11  32.79 ms 204.141.42.22
12  30.27 ms 136.143.190.253

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 180.62 seconds
Color Scheme
Target
ping.zohospotlight.com
Target IP
136.143.190.253
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A ping.zohospotlight.com
Scan date
20 Nov 2023 08:44
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: