Ports
Duration
Date
IP
Nmap scan report for m-dev-app-elb-wifi-450011643.us-west-2.elb.amazonaws.com (34.215.109.71) Host is up (0.025s latency). rDNS record for 34.215.109.71: ec2-34-215-109-71.us-west-2.compute.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp closed http 443/tcp open ssl/https awselb/2.0 | ssl-cert: Subject: commonName=wifiprotect.mcafee.com/organizationName=McAfee, LLC/stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:wifiprotect.mcafee.com, DNS:wifiprotectqa.mcafee.com | Not valid before: 2024-04-09T00:00:00 |_Not valid after: 2025-04-09T23:59:59 |_http-title: 503 Service Temporarily Unavailable | tls-nextprotoneg: | h2 |_ http/1.1 | tls-alpn: | h2 |_ http/1.1 |_ssl-date: TLS randomness does not represent time |_http-server-header: awselb/2.0 | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions: | HTTP/1.1 503 Service Temporarily Unavailable | Server: awselb/2.0 | Date: Tue, 01 Oct 2024 15:30:58 GMT | Content-Type: text/html | Content-Length: 162 | Connection: close | <html> | <head><title>503 Service Temporarily Unavailable</title></head> | <body> | <center><h1>503 Service Temporarily Unavailable</h1></center> | </body> | </html> | RPCCheck: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Tue, 01 Oct 2024 15:31:04 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Tue, 01 Oct 2024 15:30:58 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=10/1%Time=66FC15B1%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,14C,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Un SF:available\r\nServer:\x20awselb/2\.0\r\nDate:\x20Tue,\x2001\x20Oct\x2020 SF:24\x2015:30:58\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\ SF:x20162\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>503\x20Ser SF:vice\x20Temporarily\x20Unavailable</title></head>\r\n<body>\r\n<center> SF:<h1>503\x20Service\x20Temporarily\x20Unavailable</h1></center>\r\n</bod SF:y>\r\n</html>\r\n")%r(HTTPOptions,14C,"HTTP/1\.1\x20503\x20Service\x20T SF:emporarily\x20Unavailable\r\nServer:\x20awselb/2\.0\r\nDate:\x20Tue,\x2 SF:001\x20Oct\x202024\x2015:30:58\x20GMT\r\nContent-Type:\x20text/html\r\n SF:Content-Length:\x20162\r\nConnection:\x20close\r\n\r\n<html>\r\n<head>< SF:title>503\x20Service\x20Temporarily\x20Unavailable</title></head>\r\n<b SF:ody>\r\n<center><h1>503\x20Service\x20Temporarily\x20Unavailable</h1></ SF:center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,14C,"HTTP/1\.1\ SF:x20503\x20Service\x20Temporarily\x20Unavailable\r\nServer:\x20awselb/2\ SF:.0\r\nDate:\x20Tue,\x2001\x20Oct\x202024\x2015:30:58\x20GMT\r\nContent- SF:Type:\x20text/html\r\nContent-Length:\x20162\r\nConnection:\x20close\r\ SF:n\r\n<html>\r\n<head><title>503\x20Service\x20Temporarily\x20Unavailabl SF:e</title></head>\r\n<body>\r\n<center><h1>503\x20Service\x20Temporarily SF:\x20Unavailable</h1></center>\r\n</body>\r\n</html>\r\n")%r(tor-version SF:s,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\n SF:Date:\x20Tue,\x2001\x20Oct\x202024\x2015:30:58\x20GMT\r\nContent-Type:\ SF:x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n< SF:html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\ SF:n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\ SF:r\n")%r(RTSPRequest,7A,"<html>\r\n<head><title>400\x20Bad\x20Request</t SF:itle></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cente SF:r>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\ SF:x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Tue,\x2001\x20Oct\x202 SF:024\x2015:31:04\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length: SF:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Ba SF:d\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Requ SF:est</h1></center>\r\n</body>\r\n</html>\r\n"); Aggressive OS guesses: Linux 2.6.32 (91%), Linux 3.2 - 4.9 (91%), Linux 2.6.32 - 3.10 (91%), Linux 3.1 (87%), Linux 3.2 (87%), Linux 2.6.32 - 2.6.35 (87%), Linux 2.6.32 - 3.5 (87%), Android 5.0 - 7.0 (Linux 3.4 - 3.10) (87%), Linux 2.6.32 - 3.13 (87%), Linux 3.10 - 3.13 (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 11 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 64.41 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 1.02 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.63 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146) 5 ... 10 11 25.67 ms ec2-34-215-109-71.us-west-2.compute.amazonaws.com (34.215.109.71) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 34.47 seconds