Ports
Durée
Date
IP
Nmap scan report for amcomamc.com (107.21.32.169) Host is up (0.062s latency). rDNS record for 107.21.32.169: ec2-107-21-32-169.compute-1.amazonaws.com Not shown: 994 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 10.0 |_http-title: IIS Windows Server | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/10.0 443/tcp open ssl/http Microsoft IIS httpd 10.0 | http-methods: |_ Potentially risky methods: TRACE |_http-title: IIS Windows Server | ssl-cert: Subject: commonName=*.amcomamc.com | Subject Alternative Name: DNS:*.amcomamc.com, DNS:amcomamc.com | Not valid before: 2024-06-11T22:48:00 |_Not valid after: 2025-07-13T22:48:00 |_ssl-date: 2024-11-28T16:54:57+00:00; -12s from scanner time. |_http-server-header: Microsoft-IIS/10.0 | tls-alpn: | h2 |_ http/1.1 2001/tcp open dc? | fingerprint-strings: | GetRequest, NULL: |_ <?xml version="1.0" encoding="utf-8"?><sdcSolutions><messaging><command><uniqueid>{0e83c4f9-c1fc-445d-a9ec-d59dd1101f71}</uniqueid><name>HANDSHAKE_REQUEST</name><parameters /></command><response><status /><value /><parameters /></response></messaging></sdcSolutions> 2002/tcp closed globe 3000/tcp closed ppp 8090/tcp open http-proxy HAProxy http proxy 1.3.1 or later |_http-title: AmcWcfClientMessaging Service |_http-open-proxy: Proxy might be redirecting requests |_http-server-header: Microsoft-HTTPAPI/2.0 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port2001-TCP:V=7.92%I=7%D=11/28%Time=6748A056%P=x86_64-redhat-linux-gnu SF:%r(NULL,1C48,"\x02<\?xml\x20version=\"1\.0\"\x20encoding=\"utf-8\"\?><s SF:dcSolutions><messaging><command><uniqueid>{0e83c4f9-c1fc-445d-a9ec-d59d SF:d1101f71}</uniqueid><name>HANDSHAKE_REQUEST</name><parameters\x20/></co SF:mmand><response><status\x20/><value\x20/><parameters\x20/></response></ SF:messaging></sdcSolutions>\x03\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0")%r(GetRequest,3890,"\x02<\?xml\x20version=\"1\.0\"\x20 SF:encoding=\"utf-8\"\?><sdcSolutions><messaging><command><uniqueid>{0e83c SF:4f9-c1fc-445d-a9ec-d59dd1101f71}</uniqueid><name>HANDSHAKE_REQUEST</nam SF:e><parameters\x20/></command><response><status\x20/><value\x20/><parame SF:ters\x20/></response></messaging></sdcSolutions>\x03\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"); Aggressive OS guesses: Android 5.0 - 6.0.1 (Linux 3.4) (91%), Linux 3.2 - 3.10 (91%), Linux 3.2 - 3.16 (91%), Linux 3.2 - 4.9 (91%), Linux 4.2 (90%), Linux 3.10 - 3.13 (90%), Linux 2.6.32 (89%), Linux 3.10 (89%), Linux 5.4 (89%), Linux 2.6.32 - 3.10 (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 14 hops Service Info: OS: Windows; Device: load balancer; CPE: cpe:/o:microsoft:windows Host script results: |_clock-skew: -12s TRACEROUTE (using port 2002/tcp) HOP RTT ADDRESS 1 0.23 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.50 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.62 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 12.51 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 21.42 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 32.33 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 32.71 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74) 9 ... 13 14 65.06 ms ec2-107-21-32-169.compute-1.amazonaws.com (107.21.32.169) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 30.35 seconds