Ports
Durée
Date
IP
Nmap scan report for 5106cd6d.live.darktracesensor.com (35.176.42.241) Host is up (0.14s latency). Other addresses for 5106cd6d.live.darktracesensor.com (not scanned): 18.175.12.149 rDNS record for 35.176.42.241: ec2-35-176-42-241.eu-west-2.compute.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp closed http 443/tcp open ssl/https awselb/2.0 | ssl-cert: Subject: commonName=*.live.darktracesensor.com | Subject Alternative Name: DNS:*.live.darktracesensor.com | Not valid before: 2024-05-03T00:00:00 |_Not valid after: 2025-06-01T23:59:59 |_ssl-date: TLS randomness does not represent time | fingerprint-strings: | FourOhFourRequest, HTTPOptions: | HTTP/1.1 302 Moved Temporarily | Server: awselb/2.0 | Date: Wed, 25 Dec 2024 03:05:06 GMT | Content-Type: text/html | Content-Length: 110 | Connection: close | Location: https://darktrace.com:443/ | <html> | <head><title>302 Found</title></head> | <body> | <center><h1>302 Found</h1></center> | </body> | </html> | GetRequest: | HTTP/1.1 302 Moved Temporarily | Server: awselb/2.0 | Date: Wed, 25 Dec 2024 03:05:05 GMT | Content-Type: text/html | Content-Length: 110 | Connection: close | Location: https://darktrace.com:443/ | <html> | <head><title>302 Found</title></head> | <body> | <center><h1>302 Found</h1></center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Wed, 25 Dec 2024 03:05:13 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Wed, 25 Dec 2024 03:05:07 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> |_http-title: Site doesn't have a title (text/plain). | http-server-header: | awselb/2.0 |_ nginx 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=12/24%Time=676B7661%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,130,"HTTP/1\.1\x20302\x20Moved\x20Temporarily\r\nSer SF:ver:\x20awselb/2\.0\r\nDate:\x20Wed,\x2025\x20Dec\x202024\x2003:05:05\x SF:20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20110\r\nConnec SF:tion:\x20close\r\nLocation:\x20https://darktrace\.com:443/\r\n\r\n<html SF:>\r\n<head><title>302\x20Found</title></head>\r\n<body>\r\n<center><h1> SF:302\x20Found</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,13 SF:0,"HTTP/1\.1\x20302\x20Moved\x20Temporarily\r\nServer:\x20awselb/2\.0\r SF:\nDate:\x20Wed,\x2025\x20Dec\x202024\x2003:05:06\x20GMT\r\nContent-Type SF::\x20text/html\r\nContent-Length:\x20110\r\nConnection:\x20close\r\nLoc SF:ation:\x20https://darktrace\.com:443/\r\n\r\n<html>\r\n<head><title>302 SF:\x20Found</title></head>\r\n<body>\r\n<center><h1>302\x20Found</h1></ce SF:nter>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,130,"HTTP/1\.1\x2 SF:0302\x20Moved\x20Temporarily\r\nServer:\x20awselb/2\.0\r\nDate:\x20Wed, SF:\x2025\x20Dec\x202024\x2003:05:06\x20GMT\r\nContent-Type:\x20text/html\ SF:r\nContent-Length:\x20110\r\nConnection:\x20close\r\nLocation:\x20https SF:://darktrace\.com:443/\r\n\r\n<html>\r\n<head><title>302\x20Found</titl SF:e></head>\r\n<body>\r\n<center><h1>302\x20Found</h1></center>\r\n</body SF:>\r\n</html>\r\n")%r(tor-versions,110,"HTTP/1\.1\x20400\x20Bad\x20Reque SF:st\r\nServer:\x20awselb/2\.0\r\nDate:\x20Wed,\x2025\x20Dec\x202024\x200 SF:3:05:07\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\ SF:r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Req SF:uest</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1> SF:</center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<html>\r\n<head SF:><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>4 SF:00\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(RPCChe SF:ck,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\ SF:nDate:\x20Wed,\x2025\x20Dec\x202024\x2003:05:13\x20GMT\r\nContent-Type: SF:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n SF:<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r SF:\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html> SF:\r\n"); Aggressive OS guesses: Linux 2.6.32 (91%), Linux 3.2 - 4.9 (91%), Linux 2.6.32 - 3.10 (91%), Linux 3.1 (87%), Linux 3.2 (87%), Linux 2.6.32 - 2.6.35 (87%), Linux 2.6.32 - 3.5 (87%), Linux 2.6.32 - 3.13 (87%), Linux 3.10 - 3.13 (87%), Linux 4.15 - 5.6 (86%) No exact OS matches for host (test conditions non-ideal). Network Distance: 27 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 ... 3 0.88 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 15.31 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 26.49 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 40.66 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 52.62 ms be5024.ccr41.atl01.atlas.cogentco.com (154.54.163.41) 9 63.25 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157) 10 63.01 ms port-channel5042.ccr92.dca04.atlas.cogentco.com (154.54.162.221) 11 68.66 ms be4188.ccr42.jfk02.atlas.cogentco.com (154.54.30.122) 12 138.71 ms be4325.ccr52.lhr01.atlas.cogentco.com (154.54.93.14) 13 137.12 ms amazon.demarc.cogentco.com (149.11.167.138) 14 ... 15 16 156.79 ms 52.95.61.154 17 140.08 ms 52.94.35.9 18 134.53 ms 52.94.35.68 19 139.60 ms 15.230.158.65 20 142.76 ms 15.230.158.222 21 ... 26 27 135.12 ms ec2-35-176-42-241.eu-west-2.compute.amazonaws.com (35.176.42.241) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 60.49 seconds