Scan report for "cspacehostings.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A cspacehostings.com)
Nmap scan report for cspacehostings.com (45.142.100.36)
Host is up (0.19s latency).
Other addresses for cspacehostings.com (not scanned): 2a10:46c0:0:3::4
Not shown: 997 filtered tcp ports (no-response)
PORT     STATE SERVICE  VERSION
80/tcp   open  http     Apache httpd 2.4.59
|_http-title: Did not follow redirect to https://cspacehostings.com/
|_http-server-header: Apache/2.4.59 (Debian)
443/tcp  open  ssl/http Apache httpd 2.4.59
| tls-alpn: 
|_  http/1.1
|_http-title: CSpace Hostings.com | Your reliable Web Hosting and Infrastruc...
| ssl-cert: Subject: commonName=*.cspacehostings.com
| Subject Alternative Name: DNS:*.cspacehostings.com, DNS:cspacehostings.com
| Not valid before: 2024-04-19T00:00:00
|_Not valid after:  2025-04-19T23:59:59
|_http-server-header: Apache/2.4.59 (Debian)
|_ssl-date: TLS randomness does not represent time
3000/tcp open  ssl/ppp?
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.0 302 Found
|     Cache-Control: no-store
|     Content-Type: text/html; charset=utf-8
|     Location: /login
|     Set-Cookie: redirect_to=%2Fnice%2520ports%252C%2FTri%256Eity.txt%252ebak; Path=/; HttpOnly; SameSite=Lax
|     X-Content-Type-Options: nosniff
|     X-Frame-Options: deny
|     X-Xss-Protection: 1; mode=block
|     Date: Sun, 09 Jun 2024 19:26:25 GMT
|     Content-Length: 29
|     href="/login">Found</a>.
|   GenericLines, Help, Kerberos, RTSPRequest, SSLSessionReq, TLSSessionReq, TerminalServerCookie: 
|     HTTP/1.1 400 Bad Request
|     Content-Type: text/plain; charset=utf-8
|     Connection: close
|     Request
|   GetRequest: 
|     HTTP/1.0 302 Found
|     Cache-Control: no-store
|     Content-Type: text/html; charset=utf-8
|     Location: /login
|     X-Content-Type-Options: nosniff
|     X-Frame-Options: deny
|     X-Xss-Protection: 1; mode=block
|     Date: Sun, 09 Jun 2024 19:25:51 GMT
|     Content-Length: 29
|     href="/login">Found</a>.
|   HTTPOptions: 
|     HTTP/1.0 302 Found
|     Cache-Control: no-store
|     Location: /login
|     X-Content-Type-Options: nosniff
|     X-Frame-Options: deny
|     X-Xss-Protection: 1; mode=block
|     Date: Sun, 09 Jun 2024 19:25:52 GMT
|_    Content-Length: 0
| ssl-cert: Subject: commonName=*.cspacehostings.com
| Subject Alternative Name: DNS:*.cspacehostings.com, DNS:cspacehostings.com
| Not valid before: 2024-04-19T00:00:00
|_Not valid after:  2025-04-19T23:59:59
| tls-alpn: 
|_  http/1.1
|_ssl-date: TLS randomness does not represent time
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port3000-TCP:V=7.92%T=SSL%I=7%D=6/9%Time=666601BE%P=x86_64-redhat-linux
SF:-gnu%r(GenericLines,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-T
SF:ype:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400
SF:\x20Bad\x20Request")%r(GetRequest,118,"HTTP/1\.0\x20302\x20Found\r\nCac
SF:he-Control:\x20no-store\r\nContent-Type:\x20text/html;\x20charset=utf-8
SF:\r\nLocation:\x20/login\r\nX-Content-Type-Options:\x20nosniff\r\nX-Fram
SF:e-Options:\x20deny\r\nX-Xss-Protection:\x201;\x20mode=block\r\nDate:\x2
SF:0Sun,\x2009\x20Jun\x202024\x2019:25:51\x20GMT\r\nContent-Length:\x2029\
SF:r\n\r\n<a\x20href=\"/login\">Found</a>\.\n\n")%r(HTTPOptions,D2,"HTTP/1
SF:\.0\x20302\x20Found\r\nCache-Control:\x20no-store\r\nLocation:\x20/logi
SF:n\r\nX-Content-Type-Options:\x20nosniff\r\nX-Frame-Options:\x20deny\r\n
SF:X-Xss-Protection:\x201;\x20mode=block\r\nDate:\x20Sun,\x2009\x20Jun\x20
SF:2024\x2019:25:52\x20GMT\r\nContent-Length:\x200\r\n\r\n")%r(RTSPRequest
SF:,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;
SF:\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request"
SF:)%r(Help,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20tex
SF:t/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20
SF:Request")%r(SSLSessionReq,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nCon
SF:tent-Type:\x20text/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\
SF:r\n400\x20Bad\x20Request")%r(TerminalServerCookie,67,"HTTP/1\.1\x20400\
SF:x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nC
SF:onnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(TLSSessionReq,67,"
SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/plain;\x20c
SF:harset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(K
SF:erberos,67,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\x20text
SF:/plain;\x20charset=utf-8\r\nConnection:\x20close\r\n\r\n400\x20Bad\x20R
SF:equest")%r(FourOhFourRequest,182,"HTTP/1\.0\x20302\x20Found\r\nCache-Co
SF:ntrol:\x20no-store\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nL
SF:ocation:\x20/login\r\nSet-Cookie:\x20redirect_to=%2Fnice%2520ports%252C
SF:%2FTri%256Eity\.txt%252ebak;\x20Path=/;\x20HttpOnly;\x20SameSite=Lax\r\
SF:nX-Content-Type-Options:\x20nosniff\r\nX-Frame-Options:\x20deny\r\nX-Xs
SF:s-Protection:\x201;\x20mode=block\r\nDate:\x20Sun,\x2009\x20Jun\x202024
SF:\x2019:26:25\x20GMT\r\nContent-Length:\x2029\r\n\r\n<a\x20href=\"/login
SF:\">Found</a>\.\n\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|storage-misc
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X|5.X (93%), Synology DiskStation Manager 5.X (87%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5 cpe:/a:synology:diskstation_manager:5.2
Aggressive OS guesses: Linux 2.6.32 (93%), Linux 2.6.32 or 3.10 (93%), Linux 4.15 - 5.6 (92%), Linux 5.0 - 5.3 (92%), Linux 4.4 (91%), Linux 5.0 - 5.4 (91%), Linux 5.4 (90%), Linux 2.6.32 - 2.6.35 (90%), Linux 2.6.32 - 2.6.39 (89%), Linux 3.2 - 4.9 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 13 hops
Service Info: Host: billing.cspacehostings.com

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   0.19 ms   208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.51 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.56 ms   r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.66 ms   hu0-5-0-25.ccr41.lax01.atlas.cogentco.com (38.88.244.128)
5   1.12 ms   be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102)
6   0.75 ms   lax-b22-link.ip.twelve99.net (80.239.160.64)
7   59.96 ms  ash-bb2-link.ip.twelve99.net (62.115.121.221)
8   69.46 ms  nyk-bb2-link.ip.twelve99.net (62.115.136.200)
9   147.87 ms kbn-bb6-link.ip.twelve99.net (80.91.254.90)
10  162.84 ms sto-bb2-link.ip.twelve99.net (62.115.139.172)
11  182.17 ms adm-bb1-link.ip.twelve99.net (62.115.134.96)
12  165.97 ms cspacehostings-ic-381560.ip.twelve99-cust.net (62.115.188.33)
13  192.43 ms cspacehostings.com (45.142.100.36)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 158.45 seconds
Color Scheme
Target
cspacehostings.com
Target IP
45.142.100.36
Target Country
EE
Scan method
Scan OS information and Traceroute
Run command
nmap -A cspacehostings.com
Scan date
09 Jun 2024 15:27
Copy scan report
Download report
Remove scan result
$
Total scans
About 3 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: