Scan report for "pinatafarm.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A pinatafarm.com)
Nmap scan report for pinatafarm.com (174.129.115.75)
Host is up (0.071s latency).
Other addresses for pinatafarm.com (not scanned): 52.205.86.147 3.92.155.109
rDNS record for 174.129.115.75: ec2-174-129-115-75.compute-1.amazonaws.com
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE  VERSION
80/tcp  open  http     awselb/2.0
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 301 Moved Permanently
|     Server: awselb/2.0
|     Date: Thu, 16 May 2024 09:02:18 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     Location: https://awseb-awseb-9rn1bbv4fuu0-1682562488.us-east-1.elb.amazonaws.com:443/nice%20ports%2C/Tri%6Eity.txt%2ebak
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     </body>
|     </html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 301 Moved Permanently
|     Server: awselb/2.0
|     Date: Thu, 16 May 2024 09:02:17 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     Location: https://awseb-awseb-9rn1bbv4fuu0-1682562488.us-east-1.elb.amazonaws.com:443/
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Thu, 16 May 2024 09:02:18 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-server-header: awselb/2.0
|_http-title: Did not follow redirect to https://www.pinatafarm.com:443/
443/tcp open  ssl/http nginx 1.22.1
|_http-title: Did not follow redirect to https://www.pinatafarm.com:443/
| ssl-cert: Subject: commonName=pinatafarm.com
| Subject Alternative Name: DNS:pinatafarm.com, DNS:www.pinatafarm.com
| Not valid before: 2024-04-01T00:00:00
|_Not valid after:  2025-04-29T23:59:59
| tls-alpn: 
|   h2
|_  http/1.1
|_ssl-date: TLS randomness does not represent time
| http-server-header: 
|   awselb/2.0
|_  nginx/1.22.1
| tls-nextprotoneg: 
|   h2
|_  http/1.1
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=5/16%Time=6645CB99%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,17A,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x20
SF:awselb/2\.0\r\nDate:\x20Thu,\x2016\x20May\x202024\x2009:02:17\x20GMT\r\
SF:nContent-Type:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x2
SF:0close\r\nLocation:\x20https://awseb-awseb-9rn1bbv4fuu0-1682562488\.us-
SF:east-1\.elb\.amazonaws\.com:443/\r\n\r\n<html>\r\n<head><title>301\x20M
SF:oved\x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\x20Move
SF:d\x20Permanently</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOption
SF:s,17A,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x20awselb/2\
SF:.0\r\nDate:\x20Thu,\x2016\x20May\x202024\x2009:02:17\x20GMT\r\nContent-
SF:Type:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x20close\r\
SF:nLocation:\x20https://awseb-awseb-9rn1bbv4fuu0-1682562488\.us-east-1\.e
SF:lb\.amazonaws\.com:443/\r\n\r\n<html>\r\n<head><title>301\x20Moved\x20P
SF:ermanently</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20Perm
SF:anently</h1></center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<ht
SF:ml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<
SF:center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\
SF:n")%r(X11Probe,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20aw
SF:selb/2\.0\r\nDate:\x20Thu,\x2016\x20May\x202024\x2009:02:18\x20GMT\r\nC
SF:ontent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20c
SF:lose\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>
SF:\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body
SF:>\r\n</html>\r\n")%r(FourOhFourRequest,19D,"HTTP/1\.1\x20301\x20Moved\x
SF:20Permanently\r\nServer:\x20awselb/2\.0\r\nDate:\x20Thu,\x2016\x20May\x
SF:202024\x2009:02:18\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Leng
SF:th:\x20134\r\nConnection:\x20close\r\nLocation:\x20https://awseb-awseb-
SF:9rn1bbv4fuu0-1682562488\.us-east-1\.elb\.amazonaws\.com:443/nice%20port
SF:s%2C/Tri%6Eity\.txt%2ebak\r\n\r\n<html>\r\n<head><title>301\x20Moved\x2
SF:0Permanently</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20Pe
SF:rmanently</h1></center>\r\n</body>\r\n</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 4.X (87%)
OS CPE: cpe:/o:linux:linux_kernel:4.2
Aggressive OS guesses: Linux 4.2 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.19 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.91 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.76 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.64 ms  hu0-5-0-25.ccr41.lax01.atlas.cogentco.com (38.88.244.128)
5   12.39 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   21.07 ms be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218)
7   36.97 ms be3850.ccr41.iah01.atlas.cogentco.com (154.54.0.53)
8   37.81 ms be2417.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.3.246)
9   37.49 ms 38.88.155.218
10  38.46 ms 52.93.254.205
11  41.15 ms 52.93.64.129
12  ... 16
17  71.07 ms ec2-174-129-115-75.compute-1.amazonaws.com (174.129.115.75)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 34.13 seconds
Color Scheme
Target
pinatafarm.com
Target IP
174.129.115.75
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A pinatafarm.com
Scan date
16 May 2024 05:02
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: