Scan OS information and Traceroute (nmap -A fingersoft.net)
Nmap scan report for fingersoft.net (52.157.96.15)
Host is up (0.14s latency).
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http nginx 1.18.0 (Ubuntu)
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: Did not follow redirect to https://fingersoft.com/
443/tcp open ssl/http nginx 1.18.0 (Ubuntu)
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: Did not follow redirect to https://fingersoft.com/
| ssl-cert: Subject: commonName=*.fingersoft.net/organizationName=Fingersoft Oy/countryName=FI
| Subject Alternative Name: DNS:*.fingersoft.net, DNS:fingersoft.net
| Not valid before: 2023-11-07T00:00:00
|_Not valid after: 2024-11-26T23:59:59
| tls-alpn:
| h2
|_ http/1.1
| tls-nextprotoneg:
| h2
|_ http/1.1
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 28 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.21 ms 208.76.251.177
2 0.59 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 1.41 ms multacom.com (96.45.162.9)
4 4.26 ms microsoft.as8075.any2ix.coresite.com (206.72.210.143)
5 1.21 ms 104.44.55.75
6 143.52 ms be-21-0.ibr02.lax30.ntwk.msn.net (104.44.33.171)
7 143.72 ms be-4-0.ibr01.sn1.ntwk.msn.net (104.44.17.72)
8 144.15 ms be-8-0.ibr01.atl30.ntwk.msn.net (104.44.18.57)
9 143.31 ms be-11-0.ibr02.atl30.ntwk.msn.net (104.44.28.227)
10 144.59 ms be-7-0.ibr02.bn6.ntwk.msn.net (104.44.29.180)
11 143.38 ms be-8-0.ibr04.bl20.ntwk.msn.net (104.44.30.121)
12 143.20 ms be-9-0.ibr02.nyc30.ntwk.msn.net (104.44.28.54)
13 143.28 ms be-15-0.ibr01.ams30.ntwk.msn.net (104.44.31.1)
14 143.42 ms be-15-0.ibr02.ams30.ntwk.msn.net (104.44.31.3)
15 143.35 ms be-4-0.ibr04.ams06.ntwk.msn.net (104.44.29.245)
16 ... 27
28 143.14 ms 52.157.96.15
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 59.56 seconds