Scan report for "0.rhel.pool.ntp.org"

Membership level: Free member
Scan OS information and Traceroute (nmap -A 0.rhel.pool.ntp.org)
Nmap scan report for 0.rhel.pool.ntp.org (171.66.97.126)
Host is up (0.0084s latency).
Other addresses for 0.rhel.pool.ntp.org (not scanned): 66.205.249.28 50.205.57.38 23.131.160.7
rDNS record for 171.66.97.126: srcf-ntp.stanford.edu
Not shown: 999 closed ports
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 b6:36:f4:10:4c:2a:0c:d8:0a:d4:f4:5f:56:4b:3d:1c (RSA)
|   256 cd:38:94:a5:38:a0:f3:08:cf:0d:06:84:91:b1:ab:aa (ECDSA)
|_  256 1f:4d:1d:8f:5c:e8:12:fc:52:20:27:1d:28:d1:c9:bd (ED25519)
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 8 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 111/tcp)
HOP RTT     ADDRESS
1   0.21 ms 208.76.251.177
2   0.55 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.70 ms multacom.com (96.45.162.9)
4   ...
5   8.23 ms port-channel9.core2.pao1.he.net (184.105.81.101)
6   9.25 ms stanford-university.e0-62.core2.pao1.he.net (184.105.177.238)
7   8.21 ms srn-srcf-rtr-vlan12.SUNet (171.66.0.225)
8   9.01 ms srcf-ntp.stanford.edu (171.66.97.126)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 23.53 seconds
Color Scheme
Target
0.rhel.pool.ntp.org
Target IP
171.66.97.126
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A 0.rhel.pool.ntp.org
Scan date
20 Nov 2023 07:51
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: