Scan report for "70.127.154.17"

Scan OS information and Traceroute (nmap -A 70.127.154.17)
Starting Nmap 7.80 ( https://nmap.org ) at 2023-03-24 21:35 EDT
Nmap scan report for gen-070-127-154-17.res.spectrum.com (70.127.154.17)
Host is up (0.043s latency).
Not shown: 998 filtered ports
PORT     STATE  SERVICE    VERSION
22/tcp   open   ssh        OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
8080/tcp closed http-proxy
Aggressive OS guesses: Linux 2.6.32 (94%), Linux 2.6.32 or 3.10 (94%), Linux 4.4 (94%), Linux 2.6.32 - 2.6.35 (92%), Linux 2.6.32 - 2.6.39 (92%), Linux 4.0 (91%), Linux 2.6.32 - 3.0 (90%), Linux 3.11 - 4.1 (89%), Linux 3.2 - 3.8 (89%), Linux 2.6.18 (89%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 8080/tcp)
HOP RTT      ADDRESS
1   0.59 ms  207.231.108.193
2   ...
3   0.49 ms  10.9.9.1
4   3.21 ms  ae8-244.cr7-dal3.ip4.gtt.net (69.174.22.113)
5   18.22 ms ae22.cr4-atl2.ip4.gtt.net (89.149.141.94)
6   19.35 ms ip4.gtt.net (208.116.217.30)
7   28.48 ms lag-303.atlngamq46w-bcr00.netops.charter.com (66.109.9.104)
8   32.95 ms lag-11.orldfljo00w-bcr00.netops.charter.com (66.109.1.73)
9   29.34 ms lag-6-10.orld71-car1.netops.charter.com (66.109.9.139)
10  33.45 ms lag-13.tamp20-car2.netops.charter.com (71.44.3.34)
11  38.93 ms lag-10.tamp05-car2.netops.charter.com (72.31.3.171)
12  33.93 ms lag-2.tamp05-ser2.netops.charter.com (72.31.211.91)
13  32.21 ms 071-046-023-038.res.spectrum.com (71.46.23.38)
14  46.35 ms gen-070-127-154-17.res.spectrum.com (70.127.154.17)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 14.20 seconds
Color Scheme
Target
Scan type
Scan OS information and Traceroute
Nmap Command
nmap -A 70.127.154.17
Scan date
24 Mar 2023 21:35
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)