Scan report for "myohio.gov"

Membership level: Free member
Scan OS information and Traceroute (nmap -A myohio.gov)
Nmap scan report for myohio.gov (34.201.207.12)
Host is up (0.064s latency).
Other addresses for myohio.gov (not scanned): 52.204.80.140
rDNS record for 34.201.207.12: ec2-34-201-207-12.compute-1.amazonaws.com
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE  VERSION
80/tcp  open  http     nginx
|_http-title: Did not follow redirect to https://dx.myohio.gov/
443/tcp open  ssl/http nginx
|_http-title: Did not follow redirect to https://dx.myohio.gov/
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=ohio.gov
| Subject Alternative Name: DNS:ohio.gov, DNS:gateway.ohio.gov, DNS:www.dys.ohio.gov, DNS:www.supplier.ohio.gov, DNS:www.aging.ohio.gov, DNS:www.dvs.ohio.gov, DNS:www.myohio.gov, DNS:dx.myohio.gov, DNS:beltss.ohio.gov, DNS:core.ohio.gov, DNS:boldbeginning.ohio.gov, DNS:ohid.ohio.gov, DNS:oh.id.ohio.gov, DNS:ohiodnr.gov, DNS:dys.ohio.gov, DNS:www.ohid.ohio.gov, DNS:supplier.ohio.gov, DNS:opsb.ohio.gov, DNS:tax.ohio.gov, DNS:myohio.gov, DNS:dvs.ohio.gov, DNS:www.elderjustice.aging.ohio.gov, DNS:odh.ohio.gov, DNS:www.ltc.ohio.gov, DNS:cswmft.ohio.gov, DNS:ohio.org, DNS:www.core.ohio.gov, DNS:www.roadtrips.ohio.org, DNS:www.odh.ohio.gov, DNS:www.opd.ohio.gov, DNS:www.ohiodnr.gov, DNS:www.trails.ohio.org, DNS:www.jobsearch.ohio.gov, DNS:www.oh.id.ohio.gov, DNS:opd.ohio.gov, DNS:www.cswmft.ohio.gov, DNS:www.boldbeginning.ohio.gov, DNS:www.opsb.ohio.gov, DNS:aging.ohio.gov, DNS:trails.ohio.org, DNS:www.puco.ohio.gov, DNS:ltc.ohio.gov, DNS:jobsearch.ohio.gov, DNS:puco.ohio.gov, DNS:www.tax.ohio.gov, DNS:data.ohio.gov, DNS:www.data.ohio.gov, DNS:www.beltss.ohio.gov, DNS:www.ohio.org, DNS:elderjustice.aging.ohio.gov, DNS:roadtrips.ohio.org
| Not valid before: 2024-03-09T00:00:00
|_Not valid after:  2025-04-07T23:59:59
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.10 - 3.13 (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 16 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   0.19 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.52 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.72 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   12.53 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   20.99 ms be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218)
7   32.05 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8   32.13 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74)
9   ...
10  32.23 ms 15.230.48.32
11  ... 15
16  64.02 ms ec2-34-201-207-12.compute-1.amazonaws.com (34.201.207.12)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 33.80 seconds
Color Scheme
Target
myohio.gov
Target IP
34.201.207.12
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A myohio.gov
Scan date
10 Jun 2024 09:57
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: