Scan OS information and Traceroute (nmap -A ping.zohospotlight.com)
Nmap scan report for ping.zohospotlight.com (136.143.190.253)
Host is up (0.033s latency).
Not shown: 997 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http AWServer
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 403 Forbidden
| Date: Mon Nov 20 05:41:32 PST 2023
| GetRequest:
| HTTP/1.1 200 OK
| Date: Mon, 20 Nov 2023 05:41:27 PST
| Server: AWServer
| Connection: Keep-Alive
| Content-Type: text/html
| Last-Modified: Fri, 01 Sep 2023 10:19:46 PDT
| Content-Length: 8
| Default
| HTTPOptions, RTSPRequest, SIPOptions:
| HTTP/1.1 200 OK
| Access-Control-Max-Age: 1800
| Access-Control-Allow-Origin: zoho.com
| Access-Control-Allow-Credentials: true
| Access-Control-Allow-Methods: POST,GET
|_ Content-Length: 0
| http-robots.txt: 1 disallowed entry
|_/*
|_http-server-header: AWServer
|_http-title: Site doesn't have a title (text/html).
113/tcp closed ident
443/tcp open ssl/https AWServer
| fingerprint-strings:
| SIPOptions:
| HTTP/1.1 200 OK
| Access-Control-Max-Age: 1800
| Access-Control-Allow-Origin: zoho.com
| Access-Control-Allow-Credentials: true
| Strict-Transport-Security: max-age=15768000
| Access-Control-Allow-Methods: POST,GET
|_ Content-Length: 0
| http-robots.txt: 1 disallowed entry
|_/*
|_http-server-header: AWServer
|_http-title: Site doesn't have a title (text/html).
| ssl-cert: Subject: commonName=*.zohospotlight.com
| Subject Alternative Name: DNS:*.zohospotlight.com, DNS:zohospotlight.com
| Not valid before: 2022-12-27T00:00:00
|_Not valid after: 2024-01-20T23:59:59
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/20%Time=655B6206%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,C4,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Mon,\x2020\x20Nov\x2
SF:02023\x2005:41:27\x20PST\r\nServer:\x20AWServer\r\nConnection:\x20Keep-
SF:Alive\r\nContent-Type:\x20text/html\r\nLast-Modified:\x20Fri,\x2001\x20
SF:Sep\x202023\x2010:19:46\x20PDT\r\nContent-Length:\x208\r\n\r\nDefault\n
SF:")%r(HTTPOptions,BB,"HTTP/1\.1\x20200\x20OK\r\nAccess-Control-Max-Age:\
SF:x201800\r\nAccess-Control-Allow-Origin:\x20zoho\.com\r\nAccess-Control-
SF:Allow-Credentials:\x20true\r\nAccess-Control-Allow-Methods:\x20POST,GET
SF:\r\nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,BB,"HTTP/1\.1\x20200\x
SF:20OK\r\nAccess-Control-Max-Age:\x201800\r\nAccess-Control-Allow-Origin:
SF:\x20zoho\.com\r\nAccess-Control-Allow-Credentials:\x20true\r\nAccess-Co
SF:ntrol-Allow-Methods:\x20POST,GET\r\nContent-Length:\x200\r\n\r\n")%r(Fo
SF:urOhFourRequest,3E,"HTTP/1\.1\x20403\x20Forbidden\r\nDate:\x20Mon\x20No
SF:v\x2020\x2005:41:32\x20PST\x202023\r\n\r\n")%r(SIPOptions,BB,"HTTP/1\.1
SF:\x20200\x20OK\r\nAccess-Control-Max-Age:\x201800\r\nAccess-Control-Allo
SF:w-Origin:\x20zoho\.com\r\nAccess-Control-Allow-Credentials:\x20true\r\n
SF:Access-Control-Allow-Methods:\x20POST,GET\r\nContent-Length:\x200\r\n\r
SF:\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655B6253%P=x86_64-redhat-linu
SF:x-gnu%r(SIPOptions,E8,"HTTP/1\.1\x20200\x20OK\r\nAccess-Control-Max-Age
SF::\x201800\r\nAccess-Control-Allow-Origin:\x20zoho\.com\r\nAccess-Contro
SF:l-Allow-Credentials:\x20true\r\nStrict-Transport-Security:\x20max-age=1
SF:5768000\r\nAccess-Control-Allow-Methods:\x20POST,GET\r\nContent-Length:
SF:\x200\r\n\r\n");
Aggressive OS guesses: Linux 3.10 - 3.12 (99%), Linux 4.4 (99%), Linux 3.18 (98%), Linux 2.6.32 (98%), Linux 2.6.32 or 3.10 (98%), Linux 2.6.39 (98%), WatchGuard Fireware 11.8 (98%), Synology DiskStation Manager 5.1 (97%), Linux 3.10 (97%), Linux 4.9 (97%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 12 hops
TRACEROUTE (using port 113/tcp)
HOP RTT ADDRESS
1 0.24 ms 208.76.251.177
2 0.55 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.68 ms multacom.com (96.45.162.9)
4 1.28 ms ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5 1.62 ms ae-13.r25.lsanca07.us.bb.gin.ntt.net (129.250.3.143)
6 ...
7 7.85 ms ae-0.r25.snjsca04.us.bb.gin.ntt.net (129.250.3.147)
8 25.68 ms ae-4.r25.sttlwa01.us.bb.gin.ntt.net (129.250.3.125)
9 26.43 ms ae-1.a02.sttlwa01.us.bb.gin.ntt.net (129.250.2.95)
10 34.96 ms xe-2-0-1-2.a03.sttlwa01.us.ce.gin.ntt.net (128.241.1.230)
11 32.79 ms 204.141.42.22
12 30.27 ms 136.143.190.253
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 180.62 seconds
Color Scheme
-
Target
-
Target IP
136.143.190.253
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A ping.zohospotlight.com
-
Scan date
20 Nov 2023 08:44
-
Copy scan report
-
Download report
-
Remove scan result