Nmap scan report for amcnetworks.com (23.20.143.62) Host is up (0.068s latency). Other addresses for amcnetworks.com (not scanned): 3.222.199.172 54.85.180.116 rDNS record for 23.20.143.62: ec2-23-20-143-62.compute-1.amazonaws.com Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http awselb/2.0 | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 403 Forbidden | Server: awselb/2.0 | Date: Sun, 19 Nov 2023 21:20:19 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 203 | Connection: close | | | | | base-domain-redirect Access Denied | | |

Access to base-domain-redirect denied.

| | | GetRequest, HTTPOptions: | HTTP/1.1 403 Forbidden | Server: awselb/2.0 | Date: Sun, 19 Nov 2023 21:20:18 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 203 | Connection: close | | | | | base-domain-redirect Access Denied | | |

Access to base-domain-redirect denied.

| | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

| | | X11Probe: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Sun, 19 Nov 2023 21:20:19 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | | 400 Bad Request | |

400 Bad Request

| |_ |_http-server-header: awselb/2.0 |_http-title: Did not follow redirect to https://www.amcnetworks.com:443/ 443/tcp open ssl/https awselb/2.0 | fingerprint-strings: | FourOhFourRequest, HTTPOptions: | HTTP/1.1 403 Forbidden | Server: awselb/2.0 | Date: Sun, 19 Nov 2023 21:20:25 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 203 | Connection: close | | | | | base-domain-redirect Access Denied | | |

Access to base-domain-redirect denied.

| | | GetRequest: | HTTP/1.1 403 Forbidden | Server: awselb/2.0 | Date: Sun, 19 Nov 2023 21:20:24 GMT | Content-Type: text/html; charset=utf-8 | Content-Length: 203 | Connection: close | | | | | base-domain-redirect Access Denied | | |

Access to base-domain-redirect denied.

| | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

| | | tor-versions: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Sun, 19 Nov 2023 21:20:25 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | | 400 Bad Request | |

400 Bad Request

| |_ |_http-server-header: awselb/2.0 |_http-title: Did not follow redirect to https://www.amcnetworks.com:443/ | ssl-cert: Subject: commonName=amcnetworks.com | Subject Alternative Name: DNS:amcnetworks.com, DNS:amcplus.com | Not valid before: 2023-10-29T00:00:00 |_Not valid after: 2024-11-27T23:59:59 |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 | tls-nextprotoneg: | h2 |_ http/1.1 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=655A7C12%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,16E,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20awselb/2\. SF:0\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2021:20:18\x20GMT\r\nContent-T SF:ype:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20203\r\nConnec SF:tion:\x20close\r\n\r\n\n\n SF:\n\x20\x20\n\x20\x20base-domain-redir SF:ect\x20Access\x20Denied\n\n\n\x20\x20

Access\x20 SF:to\x20base-domain-redirect\x20denied\.

\n\n\n") SF:%r(HTTPOptions,16E,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20awselb/ SF:2\.0\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2021:20:18\x20GMT\r\nConten SF:t-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20203\r\nCon SF:nection:\x20close\r\n\r\n\n\n\n\x20\x20\n\x20\x20base-domain-re SF:direct\x20Access\x20Denied\n\n\n\x20\x20

Access\ SF:x20to\x20base-domain-redirect\x20denied\.

\n\n\ SF:n")%r(RTSPRequest,7A,"\r\n400\x20Bad\x20Request</tit SF:le></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center> SF:\r\n</body>\r\n</html>\r\n")%r(X11Probe,110,"HTTP/1\.1\x20400\x20Bad\x2 SF:0Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sun,\x2019\x20Nov\x20202 SF:3\x2021:20:19\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x SF:20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\ SF:x20Request\r\n\r\n

400\x20Bad\x20Reques SF:t

\r\n\r\n\r\n")%r(FourOhFourRequest,16E,"HT SF:TP/1\.1\x20403\x20Forbidden\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sun,\ SF:x2019\x20Nov\x202023\x2021:20:19\x20GMT\r\nContent-Type:\x20text/html;\ SF:x20charset=utf-8\r\nContent-Length:\x20203\r\nConnection:\x20close\r\n\ SF:r\n\n\n\n\x20\x20\n\x20\x20base-domain-redirect\x20Access\x20De SF:nied\n\n\n\x20\x20

Access\x20to\x20base-domai SF:n-redirect\x20denied\.

\n\n\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655A7C18%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,16E,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20aws SF:elb/2\.0\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2021:20:24\x20GMT\r\nCo SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20203\r\ SF:nConnection:\x20close\r\n\r\n\n\ SF:n\n\x20\x20\n\x20\x20base-domai SF:n-redirect\x20Access\x20Denied\n\n\n\x20\x20

Acc SF:ess\x20to\x20base-domain-redirect\x20denied\.

\n\n\n")%r(HTTPOptions,16E,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20 SF:awselb/2\.0\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2021:20:25\x20GMT\r\ SF:nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20203 SF:\r\nConnection:\x20close\r\n\r\n\n\n\n\x20\x20\n\x20\x20base-do SF:main-redirect\x20Access\x20Denied\n\n\n\x20\x20

SF:Access\x20to\x20base-domain-redirect\x20denied\.

\n\n< SF:/html>\n")%r(FourOhFourRequest,16E,"HTTP/1\.1\x20403\x20Forbidden\r\nSe SF:rver:\x20awselb/2\.0\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2021:20:25\ SF:x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Lengt SF:h:\x20203\r\nConnection:\x20close\r\n\r\n\n\n\n\x20\x20\n\x20\x20base-domain-redirect\x20Access\x20Denied\n\n\n\x SF:20\x20

Access\x20to\x20base-domain-redirect\x20denied\.

\n< SF:/body>\n\n")%r(tor-versions,110,"HTTP/1\.1\x20400\x20Bad\x20Requ SF:est\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x20 SF:21:20:25\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122 SF:\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Re SF:quest\r\n\r\n

400\x20Bad\x20Request

\r\n\r\n\r\n")%r(RTSPRequest,7A,"\r\n400\x20Bad\x20Request\r\n\r\n

SF:400\x20Bad\x20Request

\r\n\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.52 ms 208.76.251.177 2 0.60 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.69 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1) 4 0.99 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57) 5 12.95 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161) 6 21.06 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54) 7 37.06 ms be3851.ccr42.iah01.atlas.cogentco.com (154.54.2.5) 8 38.28 ms be2418.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.6.78) 9 37.67 ms 38.104.61.42 10 38.18 ms 52.93.254.217 11 37.90 ms 52.93.64.177 12 ... 30 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 61.62 seconds