Scan report for "cofensereporter.prudential.com"

Scan OS information and Traceroute (nmap -A cofensereporter.prudential.com)
Starting Nmap 7.92 ( https://nmap.org ) at 2022-11-24 22:12 EST
Nmap scan report for cofensereporter.prudential.com (161.151.155.50)
Host is up (0.0066s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE  VERSION
80/tcp  open  http     Microsoft IIS httpd 10.0
|_http-title: Cofense Reporter
|_http-server-header: Microsoft-IIS/10.0
| http-methods: 
|_  Potentially risky methods: TRACE
443/tcp open  ssl/http Microsoft IIS httpd 10.0
|_http-title: Cofense Reporter
| http-methods: 
|_  Potentially risky methods: TRACE
| ssl-cert: Subject: commonName=cofensereporter.prudential.com/organizationName=Prudential Financial Inc/stateOrProvinceName=New Jersey/countryName=US
| Subject Alternative Name: DNS:cofensereporter.prudential.com
| Not valid before: 2022-07-22T09:24:18
|_Not valid after:  2023-07-21T09:24:18
|_http-server-header: Microsoft-IIS/10.0
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): OpenBSD 4.X (86%)
OS CPE: cpe:/o:openbsd:openbsd:4.0
Aggressive OS guesses: OpenBSD 4.0 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 16 hops
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

TRACEROUTE (using port 443/tcp)
HOP RTT     ADDRESS
1   1.06 ms 91.214.64.185
2   ...
3   0.23 ms 45.92.192.124
4   0.32 ms border1.ae10.dedipath-48.nyj004.pnap.net (74.201.164.149)
5   0.82 ms core1.be1-bbnet1.nyj004.pnap.net (216.52.95.25)
6   0.79 ms be5760.nr51.b045024-0.ewr03.atlas.cogentco.com (38.104.74.129)
7   0.86 ms be2131.rcr22.ewr03.atlas.cogentco.com (154.24.3.121)
8   1.35 ms be3020.ccr42.jfk02.atlas.cogentco.com (154.54.41.113)
9   1.06 ms be3363.ccr31.jfk04.atlas.cogentco.com (154.54.3.126)
10  ... 12
13  6.54 ms 47.19.182.106
14  ... 15
16  6.46 ms 161.151.155.50

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 25.96 seconds
Color Scheme
Target
Scan type
Scan OS information and Traceroute
Nmap Command
nmap -A cofensereporter.prudential.com
Scan date
24 Nov 2022 22:12
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)