Scan report for "192.3.161.242"

Scan OS information and Traceroute (nmap -A 192.3.161.242)
Starting Nmap 7.80 ( https://nmap.org ) at 2024-11-23 04:55 EST
Nmap scan report for 192-3-161-242-host.colocrossing.com (192.3.161.242)
Host is up (0.0016s latency).
Not shown: 998 closed ports
PORT    STATE    SERVICE VERSION
80/tcp  filtered http
443/tcp filtered https
Too many fingerprints match this host to give specific OS details
Network Distance: 9 hops

TRACEROUTE (using port 110/tcp)
HOP RTT     ADDRESS
1   0.39 ms 207.231.108.193
2   ...
3   0.51 ms 10.9.9.1
4   ...
5   1.11 ms be2764.ccr32.dfw01.atlas.cogentco.com (154.54.47.213)
6   1.08 ms be5247.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.165.242)
7   ... 8
9   1.19 ms 192-3-161-242-host.colocrossing.com (192.3.161.242)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 7.96 seconds
st up) scanned in 6.88 seconds
Color Scheme
Target
Scan type
Scan OS information and Traceroute
Nmap Command
nmap -A 192.3.161.242
Scan date
23 Nov 2024 04:55
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)