Ports
Duration
Date
IP
Nmap scan report for 7s6qlatkdud7i2i55csqaa2j2.litix.io (54.196.227.84) Host is up (0.068s latency). rDNS record for 54.196.227.84: ec2-54-196-227-84.compute-1.amazonaws.com Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http envoy | fingerprint-strings: | DNSStatusRequestTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:31 GMT | server: envoy | connection: close | Request | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:30 GMT | server: envoy | connection: close | Request | FourOhFourRequest: | HTTP/1.1 426 Upgrade Required | date: Tue, 21 Nov 2023 05:19:23 GMT | server: envoy | connection: close | content-length: 0 | GetRequest: | HTTP/1.1 426 Upgrade Required | date: Tue, 21 Nov 2023 05:19:18 GMT | server: envoy | connection: close | content-length: 0 | HTTPOptions: | HTTP/1.1 426 Upgrade Required | date: Tue, 21 Nov 2023 05:19:19 GMT | server: envoy | connection: close | content-length: 0 | Help: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:32 GMT | server: envoy | connection: close | RPCCheck: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:29 GMT | server: envoy | connection: close | Request | RTSPRequest: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:20 GMT | server: envoy | connection: close | Request | SSLSessionReq: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:33 GMT | server: envoy | connection: close | Request | X11Probe: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:21 GMT | server: envoy | connection: close |_ Request |_http-cors: GET POST |_http-server-header: envoy |_http-title: Site doesn't have a title (image/gif). 443/tcp open ssl/https envoy | fingerprint-strings: | DNSStatusRequestTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:39 GMT | server: envoy | connection: close | Request | DNSVersionBindReqTCP: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:37 GMT | server: envoy | connection: close | Request | FourOhFourRequest: | HTTP/1.1 426 Upgrade Required | date: Tue, 21 Nov 2023 05:19:27 GMT | server: envoy | connection: close | content-length: 0 | GetRequest: | HTTP/1.1 426 Upgrade Required | date: Tue, 21 Nov 2023 05:19:24 GMT | server: envoy | connection: close | content-length: 0 | HTTPOptions: | HTTP/1.1 426 Upgrade Required | date: Tue, 21 Nov 2023 05:19:25 GMT | server: envoy | connection: close | content-length: 0 | Help: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:40 GMT | server: envoy | connection: close | RPCCheck: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:36 GMT | server: envoy | connection: close | Request | RTSPRequest: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:35 GMT | server: envoy | connection: close | Request | SSLSessionReq: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:41 GMT | server: envoy | connection: close | Request | tor-versions: | HTTP/1.1 400 Bad Request | content-length: 11 | content-type: text/plain | date: Tue, 21 Nov 2023 05:19:28 GMT | server: envoy | connection: close |_ Request |_http-cors: GET POST |_http-server-header: envoy |_http-title: Site doesn't have a title (image/gif). | ssl-cert: Subject: commonName=*.litix.io | Subject Alternative Name: DNS:*.litix.io, DNS:litix.io | Not valid before: 2023-07-24T00:00:00 |_Not valid after: 2024-08-21T23:59:59 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=11/20%Time=655C3DD7%P=x86_64-redhat-linux-gnu%r SF:(GetRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Tue SF:,\x2021\x20Nov\x202023\x2005:19:18\x20GMT\r\nserver:\x20envoy\r\nconnec SF:tion:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,7B,"HTTP SF:/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Tue,\x2021\x20Nov\x2020 SF:23\x2005:19:19\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\nco SF:ntent-length:\x200\r\n\r\n")%r(RTSPRequest,9C,"HTTP/1\.1\x20400\x20Bad\ SF:x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\nd SF:ate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:20\x20GMT\r\nserver:\x20envo SF:y\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(X11Probe,9C,"HTTP/1 SF:\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\ SF:x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:21\x20GMT\ SF:r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(F SF:ourOhFourRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x SF:20Tue,\x2021\x20Nov\x202023\x2005:19:23\x20GMT\r\nserver:\x20envoy\r\nc SF:onnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(RPCCheck,9C,"HT SF:TP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-ty SF:pe:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:29\x20 SF:GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request") SF:%r(DNSVersionBindReqTCP,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nconte SF:nt-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\ SF:x20Nov\x202023\x2005:19:30\x20GMT\r\nserver:\x20envoy\r\nconnection:\x2 SF:0close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9C,"HTTP/1\.1\x204 SF:00\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20text/ SF:plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:31\x20GMT\r\nserve SF:r:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(Help,91," SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent- SF:type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:32\x SF:20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\n")%r(SSLSessio SF:nReq,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ SF:ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x200 SF:5:19:33\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x SF:20Request"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655C3DDD%P=x86_64-redhat-linu SF:x-gnu%r(GetRequest,7B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate: SF:\x20Tue,\x2021\x20Nov\x202023\x2005:19:24\x20GMT\r\nserver:\x20envoy\r\ SF:nconnection:\x20close\r\ncontent-length:\x200\r\n\r\n")%r(HTTPOptions,7 SF:B,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\ndate:\x20Tue,\x2021\x20No SF:v\x202023\x2005:19:25\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20clos SF:e\r\ncontent-length:\x200\r\n\r\n")%r(FourOhFourRequest,7B,"HTTP/1\.1\x SF:20426\x20Upgrade\x20Required\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x200 SF:5:19:27\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\ncontent-l SF:ength:\x200\r\n\r\n")%r(tor-versions,9C,"HTTP/1\.1\x20400\x20Bad\x20Req SF:uest\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x SF:20Tue,\x2021\x20Nov\x202023\x2005:19:28\x20GMT\r\nserver:\x20envoy\r\nc SF:onnection:\x20close\r\n\r\nBad\x20Request")%r(RTSPRequest,9C,"HTTP/1\.1 SF:\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:\x20 SF:text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:35\x20GMT\r\n SF:server:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(RPCC SF:heck,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ SF:ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x200 SF:5:19:36\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x SF:20Request")%r(DNSVersionBindReqTCP,9C,"HTTP/1\.1\x20400\x20Bad\x20Reque SF:st\r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20 SF:Tue,\x2021\x20Nov\x202023\x2005:19:37\x20GMT\r\nserver:\x20envoy\r\ncon SF:nection:\x20close\r\n\r\nBad\x20Request")%r(DNSStatusRequestTCP,9C,"HTT SF:P/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-typ SF:e:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2005:19:39\x20G SF:MT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")% SF:r(Help,91,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\ SF:r\ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x202023\x2 SF:005:19:40\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\n")% SF:r(SSLSessionReq,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-lengt SF:h:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Tue,\x2021\x20Nov\x SF:202023\x2005:19:41\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r SF:\n\r\nBad\x20Request"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 17 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177 2 0.58 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.59 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1) 4 0.92 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57) 5 12.68 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161) 6 20.91 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54) 7 36.80 ms be3851.ccr42.iah01.atlas.cogentco.com (154.54.2.5) 8 38.37 ms be2418.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.6.78) 9 38.21 ms 38.104.61.42 10 39.51 ms 52.93.254.209 11 37.87 ms 52.93.64.81 12 ... 16 17 67.36 ms ec2-54-196-227-84.compute-1.amazonaws.com (54.196.227.84) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 84.48 seconds