Nmap scan report for app.yodeck.com (34.255.91.225)
Host is up (0.15s latency).
rDNS record for 34.255.91.225: ec2-34-255-91-225.eu-west-1.compute.amazonaws.com
Not shown: 998 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http
|_http-title: Did not follow redirect to https://app.yodeck.com/
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, RTSPRequest, X11Probe:
| HTTP/1.1 400 Bad request
| Content-length: 90
| Cache-Control: no-cache
| Connection: close
| Content-Type: text/html
|
400 Bad request
| Your browser sent an invalid request.
|
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.0 200 Found
| cache-control: no-cache
| content-type: text/html
|
|
| It works!
|
|
| It works! :)
|
|_
443/tcp open ssl/https nginx
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, RTSPRequest, tor-versions:
| HTTP/1.1 400 Bad request
| Content-length: 90
| Cache-Control: no-cache
| Connection: close
| Content-Type: text/html
| 400 Bad request
| Your browser sent an invalid request.
|
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.0 200 Found
| cache-control: no-cache
| content-type: text/html
|
|
| It works!
|
|
| It works! :)
|
|_
|_http-title: 403 Forbidden
| ssl-cert: Subject: commonName=*.yodeck.com
| Subject Alternative Name: DNS:*.yodeck.com, DNS:yodeck.com
| Not valid before: 2024-06-09T00:00:00
|_Not valid after: 2025-06-18T23:59:59
|_ssl-date: TLS randomness does not represent time
|_http-server-header: nginx
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=4/15%Time=67FF37AA%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,A4,"HTTP/1\.0\x20200\x20Found\r\ncache-control:\x20no-cache\
SF:r\ncontent-type:\x20text/html\r\n\r\n\n\nIt\x20works
SF:!\n\n\nIt\x20works!\x20:\)
\n\n\n")%r(HTTPOptions,A4,"HTTP/1\.0\x20200\x20Found\r\ncache-control:\x
SF:20no-cache\r\ncontent-type:\x20text/html\r\n\r\n\n\n
SF:It\x20works!\n\n\nIt\x20works!\x20:\)
\n
SF:body>\n\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20request
SF:\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\
SF:x20close\r\nContent-Type:\x20text/html\r\n\r\n400\x20Ba
SF:d\x20request
\nYour\x20browser\x20sent\x20an\x20invalid\x20request\
SF:.\n\n")%r(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20request
SF:\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\
SF:x20close\r\nContent-Type:\x20text/html\r\n\r\n400\x20Ba
SF:d\x20request
\nYour\x20browser\x20sent\x20an\x20invalid\x20request\
SF:.\n\n")%r(FourOhFourRequest,A4,"HTTP/1\.0\x20200\x20Found
SF:\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\n\n\nIt\x20works!\n\n\nIt\x20wo
SF:rks!\x20:\)
\n\n\n")%r(RPCCheck,CF,"HTTP/1\.1\x20400\
SF:x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cach
SF:e\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n400\x20Bad\x20request
\nYour\x20browser\x20sent\x20an\x20in
SF:valid\x20request\.\n\n")%r(DNSVersionBindReqTCP,CF,"HTTP/
SF:1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control
SF::\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n
SF:\r\n400\x20Bad\x20request
\nYour\x20browser\x20sent
SF:\x20an\x20invalid\x20request\.\n\n")%r(DNSStatusRequestTC
SF:P,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCa
SF:che-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20te
SF:xt/html\r\n\r\n400\x20Bad\x20request
\nYour\x20brow
SF:ser\x20sent\x20an\x20invalid\x20request\.\n\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=4/15%Time=67FF37B0%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,A4,"HTTP/1\.0\x20200\x20Found\r\ncache-control:\x20no
SF:-cache\r\ncontent-type:\x20text/html\r\n\r\n\n\nIt\x
SF:20works!\n\n\nIt\x20works!\x20:\)
\n\n\n")%r(HTTPOptions,A4,"HTTP/1\.0\x20200\x20Found\r\ncache-con
SF:trol:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\n\n\n
SF:It\x20works!\n\n\nIt\x20works!\x20:\)
SF:h1>\n\n\n")%r(FourOhFourRequest,A4,"HTTP/1\.0\x20200\x20F
SF:ound\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\
SF:n\n\nIt\x20works!\n\n\nIt\x
SF:20works!\x20:\)
\n\n\n")%r(tor-versions,CF,"HTTP/1\.1
SF:\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x2
SF:0no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n
SF:400\x20Bad\x20request
\nYour\x20browser\x20sent\x20
SF:an\x20invalid\x20request\.\n\n")%r(RTSPRequest,CF,"HTTP/1
SF:\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:
SF:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\
SF:r\n400\x20Bad\x20request
\nYour\x20browser\x20sent\
SF:x20an\x20invalid\x20request\.\n\n")%r(RPCCheck,CF,"HTTP/1
SF:\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:
SF:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\
SF:r\n400\x20Bad\x20request
\nYour\x20browser\x20sent\
SF:x20an\x20invalid\x20request\.\n\n")%r(DNSVersionBindReqTC
SF:P,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCa
SF:che-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20te
SF:xt/html\r\n\r\n400\x20Bad\x20request
\nYour\x20brow
SF:ser\x20sent\x20an\x20invalid\x20request\.\n\n")%r(DNSStat
SF:usRequestTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\
SF:x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-
SF:Type:\x20text/html\r\n\r\n400\x20Bad\x20request
\nY
SF:our\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n"
SF:);
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 2.6.32 - 3.10 (93%), Linux 3.10 (93%), Linux 3.12 - 4.10 (93%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (88%), Crestron XPanel control system (87%), Nintendo Wii game console (86%), Linux 2.6.18 (86%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), OpenWrt White Russian 0.9 (Linux 2.4.30) (86%), Linux 2.6.32 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 19 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.55 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.68 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4 ...
5 11.08 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6 19.91 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7 30.92 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8 37.85 ms port-channel8121.ccr91.jan02.atlas.cogentco.com (154.54.40.250)
9 45.70 ms be3009.ccr41.atl01.atlas.cogentco.com (154.54.29.133)
10 62.83 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
11 61.76 ms port-channel8247.ccr91.dca04.atlas.cogentco.com (154.54.171.65)
12 66.64 ms be8073.ccr41.jfk02.atlas.cogentco.com (154.54.170.70)
13 135.23 ms be4324.ccr51.lhr01.atlas.cogentco.com (154.54.93.10)
14 ... 18
19 142.16 ms ec2-34-255-91-225.eu-west-1.compute.amazonaws.com (34.255.91.225)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 62.66 seconds