Nmap scan report for and-clog2.pulse.weatherbug.net (52.6.29.172) Host is up (0.068s latency). Other addresses for and-clog2.pulse.weatherbug.net (not scanned): 54.157.102.238 52.206.66.200 rDNS record for 52.6.29.172: ec2-52-6-29-172.compute-1.amazonaws.com Not shown: 999 filtered ports PORT STATE SERVICE VERSION 443/tcp open ssl/https | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 404 Not Found | Content-Type: text/html | Date: Tue, 21 Nov 2023 13:09:36 GMT | X-Content-Type-Options: nosniff | X-Frame-Options: SAMEORIGIN | Content-Length: 150 | Connection: Close | | 404 Not Found | |

404 Not Found

|
openresty
| | | GetRequest: | HTTP/1.1 200 OK | Accept-Ranges: bytes | Content-Type: text/html | Date: Tue, 21 Nov 2023 13:09:26 GMT | ETag: "5cddf697-289" | Last-Modified: Thu, 16 May 2019 23:47:35 GMT | X-Content-Type-Options: nosniff | X-Frame-Options: SAMEORIGIN | Content-Length: 649 | Connection: Close | | | | Welcome to OpenResty! | | | |

Welcome to OpenResty!

|

If you see this page, the OpenResty web platform is successfully installed and | working. Further configuration is required.

|

For online documentation and support please refer to | href="https://openresty.org/">openresty.org.
| Commercial support is available at | href="https://openresty.com/">openresty.com.

|

Thank you for flying OpenResty. | 405 Not Allowed | |

405 Not Allowed

|
openresty
| |_ |_http-cors: HEAD GET POST OPTIONS |_http-title: Welcome to OpenResty! | ssl-cert: Subject: commonName=*.origin.weatherbug.net | Subject Alternative Name: DNS:*.origin.weatherbug.net, DNS:*.ca.weatherbug.com, DNS:weatherbug.com, DNS:*.weather.weatherbug.com, DNS:*.pulse.weatherbug.com, DNS:*.cdn.weatherbug.com, DNS:*.pulse.weatherbug.net, DNS:*.cdn.weatherbug.net, DNS:*.weatherbug.com, DNS:*.origin.weatherbug.com, DNS:weatherbug.net, DNS:*.weatherbug.net | Not valid before: 2023-01-19T00:00:00 |_Not valid after: 2024-02-16T23:59:59 |_ssl-date: TLS randomness does not represent time 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/21%Time=655CAC0A%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,39A,"HTTP/1\.1\x20200\x20OK\r\nAccept-Ranges:\x20byt SF:es\r\nContent-Type:\x20text/html\r\nDate:\x20Tue,\x2021\x20Nov\x202023\ SF:x2013:09:26\x20GMT\r\nETag:\x20\"5cddf697-289\"\r\nLast-Modified:\x20Th SF:u,\x2016\x20May\x202019\x2023:47:35\x20GMT\r\nX-Content-Type-Options:\x SF:20nosniff\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Length:\x20649\r SF:\nConnection:\x20Close\r\n\r\n\n\n\nWelcome\x20to\x20OpenResty!\n\n\n\n

Welcome\x20to\x20OpenResty!

SF:\n

If\x20you\x20see\x20this\x20page,\x20the\x20OpenResty\x20web\x20pl SF:atform\x20is\x20successfully\x20installed\x20and\nworking\.\x20Further\ SF:x20configuration\x20is\x20required\.

\n\n

For\x20online\x20documen SF:tation\x20and\x20support\x20please\x20refer\x20to\nopenresty\.org\.
\nCommercial\x20support\x20 SF:is\x20available\x20at\nopenresty SF:\.com\.

\n\n

Thank\x20you\x20for\x20flying\x20OpenResty\.< SF:/em")%r(HTTPOptions,15A,"HTTP/1\.1\x20405\x20Not\x20Allowed\r\nContent- SF:Type:\x20text/html\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2013:09:31\x2 SF:0GMT\r\nX-Content-Type-Options:\x20nosniff\r\nX-Frame-Options:\x20SAMEO SF:RIGIN\r\nContent-Length:\x20154\r\nConnection:\x20Close\r\n\r\n\r SF:\n405\x20Not\x20Allowed\r\n\r\n

405\x20Not\x20Allowed

\r\n
openresty\r\n\r\n\r\n")%r(FourOhFourRequest,154,"HTTP/1\.1\x20 SF:404\x20Not\x20Found\r\nContent-Type:\x20text/html\r\nDate:\x20Tue,\x202 SF:1\x20Nov\x202023\x2013:09:36\x20GMT\r\nX-Content-Type-Options:\x20nosni SF:ff\r\nX-Frame-Options:\x20SAMEORIGIN\r\nContent-Length:\x20150\r\nConne SF:ction:\x20Close\r\n\r\n\r\n404\x20Not\x20Found</titl SF:e></head>\r\n<body>\r\n<center><h1>404\x20Not\x20Found</h1></center>\r\ SF:n<hr><center>openresty</center>\r\n</body>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose|PBX Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%), Vodavi embedded (87%) OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:vodavi:xts-ip Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.10 - 3.13 (88%), Vodavi XTS-IP PBX (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 17 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177 2 0.62 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.84 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1) 4 0.93 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57) 5 12.40 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161) 6 21.07 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54) 7 36.97 ms be3851.ccr42.iah01.atlas.cogentco.com (154.54.2.5) 8 38.26 ms be2418.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.6.78) 9 37.88 ms 38.104.61.42 10 38.21 ms 52.93.254.217 11 37.87 ms 52.93.64.113 12 ... 16 17 67.90 ms ec2-52-6-29-172.compute-1.amazonaws.com (52.6.29.172) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 166.77 seconds