Scan report for "api.gofile.io"

Membership level: Free member
Scan OS information and Traceroute (nmap -A api.gofile.io)
Nmap scan report for api.gofile.io (51.178.66.33)
Host is up (0.15s latency).
Other addresses for api.gofile.io (not scanned): 151.80.29.83 51.38.43.18
rDNS record for 51.178.66.33: ns31226493.ip-51-178-66.eu
Not shown: 997 filtered tcp ports (no-response)
PORT    STATE SERVICE  VERSION
22/tcp  open  ssh      OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 98:d3:f0:50:9c:6c:f4:fa:26:39:33:dc:4e:c1:5c:76 (RSA)
|   256 f1:58:8d:47:34:20:50:c5:fa:79:20:fe:c8:57:c9:ce (ECDSA)
|_  256 57:29:89:d9:a4:15:c6:d6:79:f2:8b:b4:e6:f1:1e:1f (ED25519)
80/tcp  open  http     nginx 1.25.5
|_http-title: Did not follow redirect to https://api.gofile.io/
|_http-server-header: nginx/1.25.5
443/tcp open  ssl/http nginx 1.25.5
|_http-title: Site doesn't have a title (application/json; charset=utf-8).
| ssl-cert: Subject: commonName=*.gofile.io
| Subject Alternative Name: DNS:*.gofile.io, DNS:gofile.io
| Not valid before: 2024-05-11T08:00:52
|_Not valid after:  2024-08-09T08:00:51
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|   http/1.1
|   http/1.0
|_  http/0.9
|_http-server-header: nginx/1.25.5
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 2.6.32 (92%), Linux 4.4 (92%), Oracle VM Server 3.4.2 (Linux 4.1) (91%), Crestron XPanel control system (90%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.16 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), CyanogenMod 12 (Android 5.0.2) (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 443/tcp)
HOP RTT       ADDRESS
1   12.77 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   1.31 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.67 ms   r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   0.73 ms   ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73)
5   1.05 ms   lax-b22-link.ip.twelve99.net (213.248.103.170)
6   13.25 ms  palo-b24-link.ip.twelve99.net (62.115.119.90)
7   11.95 ms  be105.pao-sv8-pb1-8k.ca.us (192.99.146.32)
8   ... 12
13  155.61 ms be102.sbg-g2-nc5.fr.eu (91.121.215.218)
14  ... 17
18  146.29 ms ns31226493.ip-51-178-66.eu (51.178.66.33)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 42.42 seconds
Color Scheme
Target
api.gofile.io
Target IP
51.178.66.33
Target Country
FR
Scan method
Scan OS information and Traceroute
Run command
nmap -A api.gofile.io
Scan date
11 Jun 2024 05:57
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: