Nmap scan report for ns4.cloudflare.net (162.159.60.253) Host is up (0.00089s latency). Other addresses for ns4.cloudflare.net (not scanned): 2606:4700:57:1:fd14:b411:a29f:3cfd 2400:cb00:2049:1::c629:df83 2a06:98c1:56:1:45a3:de4a:6ca2:c6fd 2803:f800:52:1:e69e:46f0:ac40:28fd 198.41.223.131 172.64.40.253 108.162.198.253 Not shown: 995 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 53/tcp open domain (unknown banner: 2025.8.0) | dns-nsid: | NSID: 445m268 (3434356d323638) | id.server: LAX |_ bind.version: 2025.8.0 | fingerprint-strings: | DNSVersionBindReqTCP: | version | bind |_ 2025.8.0 80/tcp open http Cloudflare http proxy |_http-server-header: cloudflare |_http-title: Site doesn't have a title (text/plain; charset=UTF-8). 443/tcp open ssl/https cloudflare |_http-server-header: cloudflare |_http-title: 400 The plain HTTP request was sent to HTTPS port 8080/tcp open http Cloudflare http proxy |_http-server-header: cloudflare |_http-title: Site doesn't have a title (text/plain; charset=UTF-8). 8443/tcp open ssl/https-alt cloudflare |_http-server-header: cloudflare |_http-title: 400 The plain HTTP request was sent to HTTPS port 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port53-TCP:V=7.92%I=7%D=9/13%Time=68C6664D%P=x86_64-redhat-linux-gnu%r( SF:DNSVersionBindReqTCP,35,"\x003\0\x06\x85\0\0\x01\0\x01\0\0\0\0\x07versi SF:on\x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0<\0\t\x082025\.8\.0"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: FreeBSD 11.0-STABLE (92%), FreeBSD 11.1-STABLE (92%), Linux 3.1 (91%), Linux 3.2 (91%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (91%), Android 4.1 - 6.0 (Linux 3.4 - 3.14) (90%), Android 5.0 - 6.0.1 (Linux 3.4) (90%), Android 5.0 - 7.0 (Linux 3.4 - 3.10) (90%), FreeBSD 11.2-RELEASE - 11.3 RELEASE or 11.2-STABLE (89%), FreeBSD 11.3-RELEASE (89%) No exact OS matches for host (test conditions non-ideal). Network Distance: 8 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 2.19 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 3.18 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 1.10 ms be3271.ccr41.lax04.atlas.cogentco.com (154.54.42.102) 6 1.25 ms 38.104.83.170 7 1.74 ms 141.101.72.25 8 0.78 ms 162.159.60.253 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 32.27 seconds