Nmap scan report for app.yodeck.com (34.255.91.225) Host is up (0.15s latency). rDNS record for 34.255.91.225: ec2-34-255-91-225.eu-west-1.compute.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http |_http-title: Did not follow redirect to https://app.yodeck.com/ | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, RTSPRequest, X11Probe: | HTTP/1.1 400 Bad request | Content-length: 90 | Cache-Control: no-cache | Connection: close | Content-Type: text/html |

400 Bad request

| Your browser sent an invalid request. | | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.0 200 Found | cache-control: no-cache | content-type: text/html | | | It works! | | |

It works! :)

| |_ 443/tcp open ssl/https nginx | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, RPCCheck, RTSPRequest, tor-versions: | HTTP/1.1 400 Bad request | Content-length: 90 | Cache-Control: no-cache | Connection: close | Content-Type: text/html |

400 Bad request

| Your browser sent an invalid request. | | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.0 200 Found | cache-control: no-cache | content-type: text/html | | | It works! | | |

It works! :)

| |_ |_http-title: 403 Forbidden | ssl-cert: Subject: commonName=*.yodeck.com | Subject Alternative Name: DNS:*.yodeck.com, DNS:yodeck.com | Not valid before: 2024-06-09T00:00:00 |_Not valid after: 2025-06-18T23:59:59 |_ssl-date: TLS randomness does not represent time |_http-server-header: nginx 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=4/15%Time=67FF37AA%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,A4,"HTTP/1\.0\x20200\x20Found\r\ncache-control:\x20no-cache\ SF:r\ncontent-type:\x20text/html\r\n\r\n\n\nIt\x20works SF:!\n\n\n

It\x20works!\x20:\)

\n\n\n")%r(HTTPOptions,A4,"HTTP/1\.0\x20200\x20Found\r\ncache-control:\x SF:20no-cache\r\ncontent-type:\x20text/html\r\n\r\n\n\n SF:It\x20works!\n\n\n

It\x20works!\x20:\)

\n\n\n")%r(RTSPRequest,CF,"HTTP/1\.1\x20400\x20Bad\x20request SF:\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\ SF:x20close\r\nContent-Type:\x20text/html\r\n\r\n

400\x20Ba SF:d\x20request

\nYour\x20browser\x20sent\x20an\x20invalid\x20request\ SF:.\n\n")%r(X11Probe,CF,"HTTP/1\.1\x20400\x20Bad\x20request SF:\r\nContent-length:\x2090\r\nCache-Control:\x20no-cache\r\nConnection:\ SF:x20close\r\nContent-Type:\x20text/html\r\n\r\n

400\x20Ba SF:d\x20request

\nYour\x20browser\x20sent\x20an\x20invalid\x20request\ SF:.\n\n")%r(FourOhFourRequest,A4,"HTTP/1\.0\x20200\x20Found SF:\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\n\n\nIt\x20works!\n\n\n

It\x20wo SF:rks!\x20:\)

\n\n\n")%r(RPCCheck,CF,"HTTP/1\.1\x20400\ SF:x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x20no-cach SF:e\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n

400\x20Bad\x20request

\nYour\x20browser\x20sent\x20an\x20in SF:valid\x20request\.\n\n")%r(DNSVersionBindReqTCP,CF,"HTTP/ SF:1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control SF::\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n SF:\r\n

400\x20Bad\x20request

\nYour\x20browser\x20sent SF:\x20an\x20invalid\x20request\.\n\n")%r(DNSStatusRequestTC SF:P,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCa SF:che-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20te SF:xt/html\r\n\r\n

400\x20Bad\x20request

\nYour\x20brow SF:ser\x20sent\x20an\x20invalid\x20request\.\n\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=4/15%Time=67FF37B0%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,A4,"HTTP/1\.0\x20200\x20Found\r\ncache-control:\x20no SF:-cache\r\ncontent-type:\x20text/html\r\n\r\n\n\nIt\x SF:20works!\n\n\n

It\x20works!\x20:\)

\n\n\n")%r(HTTPOptions,A4,"HTTP/1\.0\x20200\x20Found\r\ncache-con SF:trol:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\n\n\n SF:It\x20works!\n\n\n

It\x20works!\x20:\)\n\n\n")%r(FourOhFourRequest,A4,"HTTP/1\.0\x20200\x20F SF:ound\r\ncache-control:\x20no-cache\r\ncontent-type:\x20text/html\r\n\r\ SF:n\n\nIt\x20works!\n\n\n

It\x SF:20works!\x20:\)

\n\n\n")%r(tor-versions,CF,"HTTP/1\.1 SF:\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control:\x2 SF:0no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\r\n SF:

400\x20Bad\x20request

\nYour\x20browser\x20sent\x20 SF:an\x20invalid\x20request\.\n\n")%r(RTSPRequest,CF,"HTTP/1 SF:\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control: SF:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\ SF:r\n

400\x20Bad\x20request

\nYour\x20browser\x20sent\ SF:x20an\x20invalid\x20request\.\n\n")%r(RPCCheck,CF,"HTTP/1 SF:\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCache-Control: SF:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20text/html\r\n\ SF:r\n

400\x20Bad\x20request

\nYour\x20browser\x20sent\ SF:x20an\x20invalid\x20request\.\n\n")%r(DNSVersionBindReqTC SF:P,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\x2090\r\nCa SF:che-Control:\x20no-cache\r\nConnection:\x20close\r\nContent-Type:\x20te SF:xt/html\r\n\r\n

400\x20Bad\x20request

\nYour\x20brow SF:ser\x20sent\x20an\x20invalid\x20request\.\n\n")%r(DNSStat SF:usRequestTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request\r\nContent-length:\ SF:x2090\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\nContent- SF:Type:\x20text/html\r\n\r\n

400\x20Bad\x20request

\nY SF:our\x20browser\x20sent\x20an\x20invalid\x20request\.\n\n" SF:); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: Linux 2.6.32 - 3.10 (93%), Linux 3.10 (93%), Linux 3.12 - 4.10 (93%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (88%), Crestron XPanel control system (87%), Nintendo Wii game console (86%), Linux 2.6.18 (86%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), OpenWrt White Russian 0.9 (Linux 2.4.30) (86%), Linux 2.6.32 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 19 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.55 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.68 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 11.08 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 19.91 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 30.92 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 37.85 ms port-channel8121.ccr91.jan02.atlas.cogentco.com (154.54.40.250) 9 45.70 ms be3009.ccr41.atl01.atlas.cogentco.com (154.54.29.133) 10 62.83 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157) 11 61.76 ms port-channel8247.ccr91.dca04.atlas.cogentco.com (154.54.171.65) 12 66.64 ms be8073.ccr41.jfk02.atlas.cogentco.com (154.54.170.70) 13 135.23 ms be4324.ccr51.lhr01.atlas.cogentco.com (154.54.93.10) 14 ... 18 19 142.16 ms ec2-34-255-91-225.eu-west-1.compute.amazonaws.com (34.255.91.225) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 62.66 seconds