Ports
Durée
Date
IP
Nmap scan report for identity-cus.invisalign.com (52.20.143.65) Host is up (0.064s latency). Other addresses for identity-cus.invisalign.com (not scanned): 35.171.34.221 rDNS record for 52.20.143.65: ec2-52-20-143-65.compute-1.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp closed http 443/tcp open ssl/https awselb/2.0 | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 503 Service Temporarily Unavailable | Server: awselb/2.0 | Date: Thu, 22 Aug 2024 20:21:02 GMT | Content-Type: text/html | Content-Length: 162 | Connection: close | <html> | <head><title>503 Service Temporarily Unavailable</title></head> | <body> | <center><h1>503 Service Temporarily Unavailable</h1></center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Thu, 22 Aug 2024 20:21:08 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Thu, 22 Aug 2024 20:21:02 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> | http-title: Site doesn't have a title (application/json). |_Requested resource was https://identity-cus.invisalign.com/carbon/admin/index.jsp | tls-nextprotoneg: | h2 |_ http/1.1 | ssl-cert: Subject: commonName=*.invisalign.com | Subject Alternative Name: DNS:*.invisalign.com | Not valid before: 2024-08-04T00:00:00 |_Not valid after: 2025-09-02T23:59:59 | tls-alpn: | h2 |_ http/1.1 |_http-server-header: awselb/2.0 |_ssl-date: TLS randomness does not represent time 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=8/22%Time=66C79DAD%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,14C,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Un SF:available\r\nServer:\x20awselb/2\.0\r\nDate:\x20Thu,\x2022\x20Aug\x2020 SF:24\x2020:21:02\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\ SF:x20162\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>503\x20Ser SF:vice\x20Temporarily\x20Unavailable</title></head>\r\n<body>\r\n<center> SF:<h1>503\x20Service\x20Temporarily\x20Unavailable</h1></center>\r\n</bod SF:y>\r\n</html>\r\n")%r(HTTPOptions,14C,"HTTP/1\.1\x20503\x20Service\x20T SF:emporarily\x20Unavailable\r\nServer:\x20awselb/2\.0\r\nDate:\x20Thu,\x2 SF:022\x20Aug\x202024\x2020:21:02\x20GMT\r\nContent-Type:\x20text/html\r\n SF:Content-Length:\x20162\r\nConnection:\x20close\r\n\r\n<html>\r\n<head>< SF:title>503\x20Service\x20Temporarily\x20Unavailable</title></head>\r\n<b SF:ody>\r\n<center><h1>503\x20Service\x20Temporarily\x20Unavailable</h1></ SF:center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,14C,"HTTP/1\.1\ SF:x20503\x20Service\x20Temporarily\x20Unavailable\r\nServer:\x20awselb/2\ SF:.0\r\nDate:\x20Thu,\x2022\x20Aug\x202024\x2020:21:02\x20GMT\r\nContent- SF:Type:\x20text/html\r\nContent-Length:\x20162\r\nConnection:\x20close\r\ SF:n\r\n<html>\r\n<head><title>503\x20Service\x20Temporarily\x20Unavailabl SF:e</title></head>\r\n<body>\r\n<center><h1>503\x20Service\x20Temporarily SF:\x20Unavailable</h1></center>\r\n</body>\r\n</html>\r\n")%r(tor-version SF:s,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\n SF:Date:\x20Thu,\x2022\x20Aug\x202024\x2020:21:02\x20GMT\r\nContent-Type:\ SF:x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n< SF:html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\ SF:n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\ SF:r\n")%r(RTSPRequest,7A,"<html>\r\n<head><title>400\x20Bad\x20Request</t SF:itle></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cente SF:r>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\ SF:x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Thu,\x2022\x20Aug\x202 SF:024\x2020:21:08\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length: SF:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Ba SF:d\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Requ SF:est</h1></center>\r\n</body>\r\n</html>\r\n"); Aggressive OS guesses: Linux 2.6.32 (91%), Linux 3.2 - 4.9 (91%), Linux 2.6.32 - 3.10 (91%), Linux 3.1 (87%), Linux 3.2 (87%), Linux 2.6.32 - 2.6.35 (87%), Linux 2.6.32 - 3.5 (87%), Android 5.0 - 7.0 (Linux 3.4 - 3.10) (87%), Linux 2.6.32 - 3.13 (87%), Linux 3.10 - 3.13 (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 16 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 5.45 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 276.18 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.21 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 4.30 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 0.93 ms ae-16.r24.lsanca07.us.bb.gin.ntt.net (129.250.3.78) 6 32.63 ms ae-3.r22.dllstx14.us.bb.gin.ntt.net (129.250.7.68) 7 32.92 ms ae-5.a00.dllstx14.us.bb.gin.ntt.net (129.250.3.117) 8 43.57 ms ae-1.amazon.dllstx14.us.bb.gin.ntt.net (128.241.14.222) 9 35.77 ms 15.230.130.163 10 35.11 ms 176.32.125.179 11 ... 15 16 64.29 ms ec2-52-20-143-65.compute-1.amazonaws.com (52.20.143.65) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 42.23 seconds