Scan OS information and Traceroute (nmap -A api-user.e2ro.com)
Nmap scan report for api-user.e2ro.com (52.41.255.114)
Host is up (0.026s latency).
Other addresses for api-user.e2ro.com (not scanned): 35.162.230.117 34.209.33.254
rDNS record for 52.41.255.114: ec2-52-41-255-114.us-west-2.compute.amazonaws.com
Not shown: 999 filtered ports
PORT STATE SERVICE VERSION
443/tcp open ssl/https envoy
| fingerprint-strings:
| DNSStatusRequestTCP:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 17:50:47 GMT
| server: envoy
| connection: close
| Request
| DNSVersionBindReqTCP:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 17:50:46 GMT
| server: envoy
| connection: close
| Request
| FourOhFourRequest:
| HTTP/1.0 404 Not Found
| vary: Origin
| date: Mon, 20 Nov 2023 17:50:35 GMT
| content-type: application/json
| content-length: 45
| x-envoy-upstream-service-time: 2
| server: envoy
| connection: close
| {"error":{"requestId":14523908,"message":""}}
| GetRequest:
| HTTP/1.0 200 OK
| vary: Origin
| date: Mon, 20 Nov 2023 17:50:30 GMT
| content-type: text/plain; charset=UTF-8
| content-length: 8
| x-envoy-upstream-service-time: 1
| server: envoy
| connection: close
| api-user
| HTTPOptions:
| HTTP/1.0 404 Not Found
| vary: Origin
| date: Mon, 20 Nov 2023 17:50:33 GMT
| content-type: application/json
| content-length: 45
| x-envoy-upstream-service-time: 2
| server: envoy
| connection: close
| {"error":{"requestId":14508820,"message":""}}
| RPCCheck:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 17:50:44 GMT
| server: envoy
| connection: close
| Request
| RTSPRequest:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 17:50:43 GMT
| server: envoy
| connection: close
| Request
| tor-versions:
| HTTP/1.1 400 Bad Request
| content-length: 11
| content-type: text/plain
| date: Mon, 20 Nov 2023 17:50:37 GMT
| server: envoy
| connection: close
|_ Request
|_http-server-header: envoy
|_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
| ssl-cert: Subject: commonName=*.e2ro.com
| Subject Alternative Name: DNS:*.e2ro.com
| Not valid before: 2023-02-10T00:00:00
|_Not valid after: 2024-02-09T23:59:59
|_ssl-date: TLS randomness does not represent time
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655B9C68%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,CE,"HTTP/1\.0\x20200\x20OK\r\nvary:\x20Origin\r\ndat
SF:e:\x20Mon,\x2020\x20Nov\x202023\x2017:50:30\x20GMT\r\ncontent-type:\x20
SF:text/plain;\x20charset=UTF-8\r\ncontent-length:\x208\r\nx-envoy-upstrea
SF:m-service-time:\x201\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\
SF:napi-user")%r(HTTPOptions,F2,"HTTP/1\.0\x20404\x20Not\x20Found\r\nvary:
SF:\x20Origin\r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2017:50:33\x20GMT\r\n
SF:content-type:\x20application/json\r\ncontent-length:\x2045\r\nx-envoy-u
SF:pstream-service-time:\x202\r\nserver:\x20envoy\r\nconnection:\x20close\
SF:r\n\r\n{\"error\":{\"requestId\":14508820,\"message\":\"\"}}")%r(FourOh
SF:FourRequest,F2,"HTTP/1\.0\x20404\x20Not\x20Found\r\nvary:\x20Origin\r\n
SF:date:\x20Mon,\x2020\x20Nov\x202023\x2017:50:35\x20GMT\r\ncontent-type:\
SF:x20application/json\r\ncontent-length:\x2045\r\nx-envoy-upstream-servic
SF:e-time:\x202\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\n{\"erro
SF:r\":{\"requestId\":14523908,\"message\":\"\"}}")%r(tor-versions,9C,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-typ
SF:e:\x20text/plain\r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2017:50:37\x20G
SF:MT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")%
SF:r(RTSPRequest,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-length:
SF:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Mon,\x2020\x20Nov\x20
SF:2023\x2017:50:43\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20close\r\n
SF:\r\nBad\x20Request")%r(RPCCheck,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\
SF:r\ncontent-length:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Mon
SF:,\x2020\x20Nov\x202023\x2017:50:44\x20GMT\r\nserver:\x20envoy\r\nconnec
SF:tion:\x20close\r\n\r\nBad\x20Request")%r(DNSVersionBindReqTCP,9C,"HTTP/
SF:1\.1\x20400\x20Bad\x20Request\r\ncontent-length:\x2011\r\ncontent-type:
SF:\x20text/plain\r\ndate:\x20Mon,\x2020\x20Nov\x202023\x2017:50:46\x20GMT
SF:\r\nserver:\x20envoy\r\nconnection:\x20close\r\n\r\nBad\x20Request")%r(
SF:DNSStatusRequestTCP,9C,"HTTP/1\.1\x20400\x20Bad\x20Request\r\ncontent-l
SF:ength:\x2011\r\ncontent-type:\x20text/plain\r\ndate:\x20Mon,\x2020\x20N
SF:ov\x202023\x2017:50:47\x20GMT\r\nserver:\x20envoy\r\nconnection:\x20clo
SF:se\r\n\r\nBad\x20Request");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
No OS matches for host
Network Distance: 17 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.50 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.81 ms multacom.com (96.45.162.9)
4 0.33 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146)
5 ... 16
17 26.24 ms ec2-52-41-255-114.us-west-2.compute.amazonaws.com (52.41.255.114)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 93.06 seconds
Color Scheme
-
Target
-
Target IP
52.41.255.114
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A api-user.e2ro.com
-
Scan date
20 Nov 2023 12:51
-
Copy scan report
-
Download report
-
Remove scan result