Analyser le rapport pour "relay.amazon.com"

Niveau d'adhésion: Membre gratuit
Sommaire

Ports

2

Durée

49.92seconde

Date

2024-10-06

IP

44.215.116.208

Rapporter
Analyser les informations du système d'exploitation et Traceroute (nmap -A relay.amazon.com)
Nmap scan report for relay.amazon.com (44.215.116.208)
Host is up (0.063s latency).
rDNS record for 44.215.116.208: ec2-44-215-116-208.compute-1.amazonaws.com
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http      Server
|_http-title: Did not follow redirect to https://relay.amazon.com/
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 301 Moved Permanently
|     Server: Server
|     Date: Sun, 06 Oct 2024 15:22:55 GMT
|     Content-Type: text/html
|     Content-Length: 163
|     Connection: close
|     Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     <hr><center>Server</center>
|     </body>
|     </html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 301 Moved Permanently
|     Server: Server
|     Date: Sun, 06 Oct 2024 15:22:55 GMT
|     Content-Type: text/html
|     Content-Length: 163
|     Connection: close
|     Location: https:///
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     <hr><center>Server</center>
|     </body>
|     </html>
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: Server
|     Date: Sun, 06 Oct 2024 15:23:01 GMT
|     Content-Type: text/html
|     Content-Length: 151
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>Server</center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>Server</center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: Server
|     Date: Sun, 06 Oct 2024 15:22:55 GMT
|     Content-Type: text/html
|     Content-Length: 151
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     <hr><center>Server</center>
|     </body>
|_    </html>
|_http-server-header: Server
443/tcp open  ssl/https Server
| tls-alpn: 
|_  http/1.1
| tls-nextprotoneg: 
|_  http/1.1
|_http-trane-info: Problem with XML parsing of /evox/about
|_http-title: Amazon Relay | Load board &amp; trucking contracts for carriers
| ssl-cert: Subject: commonName=relay.amazon.com
| Subject Alternative Name: DNS:relay.amazon.com, DNS:origin-relay.amazon.com
| Not valid before: 2024-01-18T00:00:00
|_Not valid after:  2024-12-26T23:59:59
|_http-server-header: Server
|_ssl-date: TLS randomness does not represent time
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 200 OK
|     Server: Server
|     Date: Sun, 06 Oct 2024 15:23:01 GMT
|     Content-Type: text/html;charset=UTF-8
|     Connection: close
|     x-amz-rid: VYXKW0Q2YGG6ZNQFB60K
|     Set-Cookie: sess-id-owpus=142-4708102-7337520; Domain=.amazon.com; Expires=Tue, 01 Jan 2036 08:00:01 GMT; Path=/; Secure
|     Set-Cookie: sess-time-owpus=2082787201l; Domain=.amazon.com; Expires=Tue, 01 Jan 2036 08:00:01 GMT; Path=/; Secure
|     X-XSS-Protection: 1; mode=block
|     Content-Language: en-US
|     Vary: origin,access-control-request-method,access-control-request-headers,accept-encoding,Content-Type,Accept-Encoding,User-Agent
|     Strict-Transport-Security: max-age=47474747; includeSubDomains; preload
|     <!DOCTYPE html>
|     <html class="Page" lang="en">
|     <script type='text/javascript'>var ue_t0=ue_t0||+new Date();</script>
|     <script type='text/javascript'>
|     window.ue_ihb = (window.ue_ihb || window.ueinit || 0) + 1;
|     (window.ue_ihb ===
|   HTTPOptions: 
|     HTTP/1.1 400 Bad Request
|     Server: Server
|     Date: Sun, 06 Oct 2024 15:23:02 GMT
|     Content-Type: application/json;charset=UTF-8
|     Connection: close
|     x-amz-rid: H4C2R90YJ26VRTYZREDP
|     Set-Cookie: sess-id-owpus=140-8027704-1437429; Domain=.amazon.com; Expires=Tue, 01 Jan 2036 08:00:01 GMT; Path=/; Secure
|     Set-Cookie: sess-time-owpus=2082787201l; Domain=.amazon.com; Expires=Tue, 01 Jan 2036 08:00:01 GMT; Path=/; Secure
|     X-XSS-Protection: 1; mode=block
|     Vary: origin,access-control-request-method,access-control-request-headers,accept-encoding,Content-Type,Accept-Encoding,User-Agent
|     Strict-Transport-Security: max-age=47474747; includeSubDomains; preload
|_    {"errorCode":"bad_request","errorMessage":"Invalid csrf token in request.","params":{"cause":"No CSRF token present! @ InvalidCsrfTokenException"}}
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=10/6%Time=6702AB4F%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,150,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x20
SF:Server\r\nDate:\x20Sun,\x2006\x20Oct\x202024\x2015:22:55\x20GMT\r\nCont
SF:ent-Type:\x20text/html\r\nContent-Length:\x20163\r\nConnection:\x20clos
SF:e\r\nLocation:\x20https:///\r\n\r\n<html>\r\n<head><title>301\x20Moved\
SF:x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20
SF:Permanently</h1></center>\r\n<hr><center>Server</center>\r\n</body>\r\n
SF:</html>\r\n")%r(HTTPOptions,150,"HTTP/1\.1\x20301\x20Moved\x20Permanent
SF:ly\r\nServer:\x20Server\r\nDate:\x20Sun,\x2006\x20Oct\x202024\x2015:22:
SF:55\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20163\r\nCo
SF:nnection:\x20close\r\nLocation:\x20https:///\r\n\r\n<html>\r\n<head><ti
SF:tle>301\x20Moved\x20Permanently</title></head>\r\n<body>\r\n<center><h1
SF:>301\x20Moved\x20Permanently</h1></center>\r\n<hr><center>Server</cente
SF:r>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,97,"<html>\r\n<head><title
SF:>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20B
SF:ad\x20Request</h1></center>\r\n<hr><center>Server</center>\r\n</body>\r
SF:\n</html>\r\n")%r(X11Probe,129,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nS
SF:erver:\x20Server\r\nDate:\x20Sun,\x2006\x20Oct\x202024\x2015:22:55\x20G
SF:MT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20151\r\nConnectio
SF:n:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title>
SF:</head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\
SF:n<hr><center>Server</center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRe
SF:quest,173,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x20Serve
SF:r\r\nDate:\x20Sun,\x2006\x20Oct\x202024\x2015:22:55\x20GMT\r\nContent-T
SF:ype:\x20text/html\r\nContent-Length:\x20163\r\nConnection:\x20close\r\n
SF:Location:\x20https:///nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\n\r\n<html
SF:>\r\n<head><title>301\x20Moved\x20Permanently</title></head>\r\n<body>\
SF:r\n<center><h1>301\x20Moved\x20Permanently</h1></center>\r\n<hr><center
SF:>Server</center>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,129,"HTTP/1\.1\
SF:x20400\x20Bad\x20Request\r\nServer:\x20Server\r\nDate:\x20Sun,\x2006\x2
SF:0Oct\x202024\x2015:23:01\x20GMT\r\nContent-Type:\x20text/html\r\nConten
SF:t-Length:\x20151\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>
SF:400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Ba
SF:d\x20Request</h1></center>\r\n<hr><center>Server</center>\r\n</body>\r\
SF:n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=10/6%Time=6702AB55%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,82BC,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20Server\r\n
SF:Date:\x20Sun,\x2006\x20Oct\x202024\x2015:23:01\x20GMT\r\nContent-Type:\
SF:x20text/html;charset=UTF-8\r\nConnection:\x20close\r\nx-amz-rid:\x20VYX
SF:KW0Q2YGG6ZNQFB60K\r\nSet-Cookie:\x20sess-id-owpus=142-4708102-7337520;\
SF:x20Domain=\.amazon\.com;\x20Expires=Tue,\x2001\x20Jan\x202036\x2008:00:
SF:01\x20GMT;\x20Path=/;\x20Secure\r\nSet-Cookie:\x20sess-time-owpus=20827
SF:87201l;\x20Domain=\.amazon\.com;\x20Expires=Tue,\x2001\x20Jan\x202036\x
SF:2008:00:01\x20GMT;\x20Path=/;\x20Secure\r\nX-XSS-Protection:\x201;\x20m
SF:ode=block\r\nContent-Language:\x20en-US\r\nVary:\x20origin,access-contr
SF:ol-request-method,access-control-request-headers,accept-encoding,Conten
SF:t-Type,Accept-Encoding,User-Agent\r\nStrict-Transport-Security:\x20max-
SF:age=47474747;\x20includeSubDomains;\x20preload\r\n\r\n\n\n\n\n\n\n<!DOC
SF:TYPE\x20html>\n<html\x20\x20class=\"Page\"\x20lang=\"en\">\n\n\n<script
SF:\x20type='text/javascript'>var\x20ue_t0=ue_t0\|\|\+new\x20Date\(\);</sc
SF:ript>\n<script\x20type='text/javascript'>\nwindow\.ue_ihb\x20=\x20\(win
SF:dow\.ue_ihb\x20\|\|\x20window\.ueinit\x20\|\|\x200\)\x20\+\x201;\nif\x2
SF:0\(window\.ue_ihb\x20===")%r(HTTPOptions,321,"HTTP/1\.1\x20400\x20Bad\x
SF:20Request\r\nServer:\x20Server\r\nDate:\x20Sun,\x2006\x20Oct\x202024\x2
SF:015:23:02\x20GMT\r\nContent-Type:\x20application/json;charset=UTF-8\r\n
SF:Connection:\x20close\r\nx-amz-rid:\x20H4C2R90YJ26VRTYZREDP\r\nSet-Cooki
SF:e:\x20sess-id-owpus=140-8027704-1437429;\x20Domain=\.amazon\.com;\x20Ex
SF:pires=Tue,\x2001\x20Jan\x202036\x2008:00:01\x20GMT;\x20Path=/;\x20Secur
SF:e\r\nSet-Cookie:\x20sess-time-owpus=2082787201l;\x20Domain=\.amazon\.co
SF:m;\x20Expires=Tue,\x2001\x20Jan\x202036\x2008:00:01\x20GMT;\x20Path=/;\
SF:x20Secure\r\nX-XSS-Protection:\x201;\x20mode=block\r\nVary:\x20origin,a
SF:ccess-control-request-method,access-control-request-headers,accept-enco
SF:ding,Content-Type,Accept-Encoding,User-Agent\r\nStrict-Transport-Securi
SF:ty:\x20max-age=47474747;\x20includeSubDomains;\x20preload\r\n\r\n{\"err
SF:orCode\":\"bad_request\",\"errorMessage\":\"Invalid\x20csrf\x20token\x2
SF:0in\x20request\.\",\"params\":{\"cause\":\"No\x20CSRF\x20token\x20prese
SF:nt!\x20@\x20InvalidCsrfTokenException\"}}");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 30 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   1.78 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.77 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.69 ms  r1b4.n1p1400.lax.multacom.net (64.69.46.9)
4   ...
5   12.35 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   21.35 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7   32.46 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8   32.80 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74)
9   ... 29
30  62.66 ms ec2-44-215-116-208.compute-1.amazonaws.com (44.215.116.208)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 49.92 seconds
Schéma de couleur
Online Port scanner - portscanner, nmap, unicornscan | Product Hunt
Rapport détaillé
Cible
IP cible
44.215.116.208
Statut d'hôte
UP
Pays cible
L'emplacement IP cible est États-Unis d'Amérique
États-Unis d'Amérique
Scan gratuit
Scan gratuit
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
État de l'analyse
Ports 2 identifiés
Exécuter la commande
nmap -A relay.amazon.com
Scan date
06 Oct 2024 11:23
Durée de l'analyse
49.92seconde
Télécharger le rapport
Remove scan result
$
Total scans
Scannez plus
Prix

PROFESSIONNELLE


  • 5 scans/jour
  • Appels API quotidiens - 100 000 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0.75$7.50/mois
Facturé annuellement @ $9.00$90.00 90% de réduction
Devenez professionnel

INSCRITE


  • 5 scans/jour
  • Appels API quotidiens - 20 requêtes
  • Enregistrer le journal
  • Analyse publique
  • Analyse OSINT
  • Analyse non répertoriée
  • Balayage privé
  • Pas de ads
  • Supprimer le résultat de l'analyse
  • Supprimer après analyse
  • Méthodes supplémentaires de numérisation
$0/durée de vie
 
Enregistrer
Scanner l'hôte
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: