Ports
Duration
Date
IP
Nmap scan report for familywatchdog.us (3.209.238.163) Host is up (0.057s latency). Other addresses for familywatchdog.us (not scanned): 52.44.107.187 rDNS record for 3.209.238.163: ec2-3-209-238-163.compute-1.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 302 Object moved | Date: Sat, 10 May 2025 13:56:57 GMT | Content-Type: text/HTML | Content-Length: 149 | Connection: close | Cache-Control: private | Location: http://www.familywatchdog.us | X-Content-Type-Options: nosniff | Referrer-Policy: same-origin | X-Frame-Options: SAMEORIGIN | Set-Cookie: SessionID=%7B360C657B%2D9B32%2D4EE1%2DBAEE%2D2A1BD828F362%7D; path=/ | Set-Cookie: ASPSESSIONIDCACADRDQ=GPPCPFPDFMBFPAFICGNMOOFH; path=/ | <head><title>Object moved</title></head> | <body><h1>Object Moved</h1>This object may be found <a HREF="http://www.familywatchdog.us">here</a>.</body> | GetRequest: | HTTP/1.1 302 Object moved | Date: Sat, 10 May 2025 13:56:56 GMT | Content-Type: text/HTML | Content-Length: 186 | Connection: close | Cache-Control: private | Location: https://awslb2-1249340057.us-east-1.elb.amazonaws.com/Default.asp | Set-Cookie: SessionID=%7B1575A9A0%2D6173%2D4479%2D9B66%2D53FAD62873B4%7D; path=/ | Set-Cookie: ASPSESSIONIDCACADRDQ=FPPCPFPDFLKEMPOFDOHOBIFI; path=/ | <head><title>Object moved</title></head> | <body><h1>Object Moved</h1>This object may be found <a HREF="https://awslb2-1249340057.us-east-1.elb.amazonaws.com/Default.asp">here</a>.</body> | HTTPOptions: | HTTP/1.1 200 OK | Date: Sat, 10 May 2025 13:56:56 GMT | Content-Length: 0 | Connection: close | Allow: OPTIONS, TRACE, GET, HEAD, POST | Public: OPTIONS, TRACE, GET, HEAD, POST | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Sat, 10 May 2025 13:56:56 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> | http-methods: |_ Potentially risky methods: TRACE |_http-title: Did not follow redirect to https://familywatchdog.us/Default.asp | http-cookie-flags: | /: | SessionID: | httponly flag not set | ASPSESSIONIDQAQSRRQC: |_ httponly flag not set | http-robots.txt: 2 disallowed entries |_/images/ / 443/tcp open ssl/https | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 302 Object moved | Date: Sat, 10 May 2025 13:57:03 GMT | Content-Type: text/HTML | Content-Length: 149 | Connection: close | Cache-Control: private | Location: http://www.familywatchdog.us | X-Content-Type-Options: nosniff | Referrer-Policy: same-origin | X-Frame-Options: SAMEORIGIN | Set-Cookie: SessionID=%7BA48A7082%2D19DD%2D498D%2D95FF%2DA4C55A645AC4%7D; path=/ | Set-Cookie: ASPSESSIONIDCACADRDQ=MPPCPFPDLBICGGAAOFGIEPNN; path=/ | <head><title>Object moved</title></head> | <body><h1>Object Moved</h1>This object may be found <a HREF="http://www.familywatchdog.us">here</a>.</body> | GetRequest: | HTTP/1.1 302 Object moved | Date: Sat, 10 May 2025 13:57:02 GMT | Content-Type: text/HTML | Content-Length: 150 | Connection: close | Cache-Control: private | Location: https://www.familywatchdog.us | X-Content-Type-Options: nosniff | Referrer-Policy: same-origin | X-Frame-Options: SAMEORIGIN | Set-Cookie: SessionID=%7B02D24673%2DC81E%2D48E1%2DBCFC%2DAB5702D4C9D0%7D; path=/ | Set-Cookie: ASPSESSIONIDCACADRDQ=LPPCPFPDCKMOJFAMIAHJNEBN; path=/ | <head><title>Object moved</title></head> | <body><h1>Object Moved</h1>This object may be found <a HREF="https://www.familywatchdog.us">here</a>.</body> | HTTPOptions: | HTTP/1.1 200 OK | Date: Sat, 10 May 2025 13:57:03 GMT | Content-Length: 0 | Connection: close | Allow: OPTIONS, TRACE, GET, HEAD, POST | Public: OPTIONS, TRACE, GET, HEAD, POST | tor-versions: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Sat, 10 May 2025 13:57:03 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> | http-cookie-flags: | /: | SessionID: | secure flag not set and HTTPS in use | httponly flag not set | ASPSESSIONIDQAQSRRQC: | secure flag not set and HTTPS in use |_ httponly flag not set |_http-title: Did not follow redirect to https://www.familywatchdog.us | http-robots.txt: 2 disallowed entries |_/images/ / | http-methods: |_ Potentially risky methods: TRACE | tls-nextprotoneg: | h2 |_ http/1.1 | ssl-cert: Subject: commonName=*.familywatchdog.us | Subject Alternative Name: DNS:*.familywatchdog.us, DNS:familywatchdog.us | Not valid before: 2025-02-02T00:00:00 |_Not valid after: 2026-03-03T23:59:59 |_ssl-date: TLS randomness does not represent time | tls-alpn: | h2 |_ http/1.1 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=5/10%Time=681F5B27%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,237,"HTTP/1\.1\x20302\x20Object\x20moved\r\nDate:\x20Sat,\x2 SF:010\x20May\x202025\x2013:56:56\x20GMT\r\nContent-Type:\x20text/HTML\r\n SF:Content-Length:\x20186\r\nConnection:\x20close\r\nCache-Control:\x20pri SF:vate\r\nLocation:\x20https://awslb2-1249340057\.us-east-1\.elb\.amazona SF:ws\.com/Default\.asp\r\nSet-Cookie:\x20SessionID=%7B1575A9A0%2D6173%2D4 SF:479%2D9B66%2D53FAD62873B4%7D;\x20path=/\r\nSet-Cookie:\x20ASPSESSIONIDC SF:ACADRDQ=FPPCPFPDFLKEMPOFDOHOBIFI;\x20path=/\r\n\r\n<head><title>Object\ SF:x20moved</title></head>\n<body><h1>Object\x20Moved</h1>This\x20object\x SF:20may\x20be\x20found\x20<a\x20HREF=\"https://awslb2-1249340057\.us-east SF:-1\.elb\.amazonaws\.com/Default\.asp\">here</a>\.</body>\n")%r(HTTPOpti SF:ons,AF,"HTTP/1\.1\x20200\x20OK\r\nDate:\x20Sat,\x2010\x20May\x202025\x2 SF:013:56:56\x20GMT\r\nContent-Length:\x200\r\nConnection:\x20close\r\nAll SF:ow:\x20OPTIONS,\x20TRACE,\x20GET,\x20HEAD,\x20POST\r\nPublic:\x20OPTION SF:S,\x20TRACE,\x20GET,\x20HEAD,\x20POST\r\n\r\n")%r(RTSPRequest,7A,"<html SF:>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<ce SF:nter><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n" SF:)%r(X11Probe,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awse SF:lb/2\.0\r\nDate:\x20Sat,\x2010\x20May\x202025\x2013:56:56\x20GMT\r\nCon SF:tent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20clo SF:se\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r SF:\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\ SF:r\n</html>\r\n")%r(FourOhFourRequest,249,"HTTP/1\.1\x20302\x20Object\x2 SF:0moved\r\nDate:\x20Sat,\x2010\x20May\x202025\x2013:56:57\x20GMT\r\nCont SF:ent-Type:\x20text/HTML\r\nContent-Length:\x20149\r\nConnection:\x20clos SF:e\r\nCache-Control:\x20private\r\nLocation:\x20http://www\.familywatchd SF:og\.us\r\nX-Content-Type-Options:\x20nosniff\r\nReferrer-Policy:\x20sam SF:e-origin\r\nX-Frame-Options:\x20SAMEORIGIN\r\nSet-Cookie:\x20SessionID= SF:%7B360C657B%2D9B32%2D4EE1%2DBAEE%2D2A1BD828F362%7D;\x20path=/\r\nSet-Co SF:okie:\x20ASPSESSIONIDCACADRDQ=GPPCPFPDFMBFPAFICGNMOOFH;\x20path=/\r\n\r SF:\n<head><title>Object\x20moved</title></head>\n<body><h1>Object\x20Move SF:d</h1>This\x20object\x20may\x20be\x20found\x20<a\x20HREF=\"http://www\. SF:familywatchdog\.us\">here</a>\.</body>\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=5/10%Time=681F5B2E%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,24B,"HTTP/1\.1\x20302\x20Object\x20moved\r\nDate:\x20 SF:Sat,\x2010\x20May\x202025\x2013:57:02\x20GMT\r\nContent-Type:\x20text/H SF:TML\r\nContent-Length:\x20150\r\nConnection:\x20close\r\nCache-Control: SF:\x20private\r\nLocation:\x20https://www\.familywatchdog\.us\r\nX-Conten SF:t-Type-Options:\x20nosniff\r\nReferrer-Policy:\x20same-origin\r\nX-Fram SF:e-Options:\x20SAMEORIGIN\r\nSet-Cookie:\x20SessionID=%7B02D24673%2DC81E SF:%2D48E1%2DBCFC%2DAB5702D4C9D0%7D;\x20path=/\r\nSet-Cookie:\x20ASPSESSIO SF:NIDCACADRDQ=LPPCPFPDCKMOJFAMIAHJNEBN;\x20path=/\r\n\r\n<head><title>Obj SF:ect\x20moved</title></head>\n<body><h1>Object\x20Moved</h1>This\x20obje SF:ct\x20may\x20be\x20found\x20<a\x20HREF=\"https://www\.familywatchdog\.u SF:s\">here</a>\.</body>\n")%r(HTTPOptions,AF,"HTTP/1\.1\x20200\x20OK\r\nD SF:ate:\x20Sat,\x2010\x20May\x202025\x2013:57:03\x20GMT\r\nContent-Length: SF:\x200\r\nConnection:\x20close\r\nAllow:\x20OPTIONS,\x20TRACE,\x20GET,\x SF:20HEAD,\x20POST\r\nPublic:\x20OPTIONS,\x20TRACE,\x20GET,\x20HEAD,\x20PO SF:ST\r\n\r\n")%r(FourOhFourRequest,249,"HTTP/1\.1\x20302\x20Object\x20mov SF:ed\r\nDate:\x20Sat,\x2010\x20May\x202025\x2013:57:03\x20GMT\r\nContent- SF:Type:\x20text/HTML\r\nContent-Length:\x20149\r\nConnection:\x20close\r\ SF:nCache-Control:\x20private\r\nLocation:\x20http://www\.familywatchdog\. SF:us\r\nX-Content-Type-Options:\x20nosniff\r\nReferrer-Policy:\x20same-or SF:igin\r\nX-Frame-Options:\x20SAMEORIGIN\r\nSet-Cookie:\x20SessionID=%7BA SF:48A7082%2D19DD%2D498D%2D95FF%2DA4C55A645AC4%7D;\x20path=/\r\nSet-Cookie SF::\x20ASPSESSIONIDCACADRDQ=MPPCPFPDLBICGGAAOFGIEPNN;\x20path=/\r\n\r\n<h SF:ead><title>Object\x20moved</title></head>\n<body><h1>Object\x20Moved</h SF:1>This\x20object\x20may\x20be\x20found\x20<a\x20HREF=\"http://www\.fami SF:lywatchdog\.us\">here</a>\.</body>\n")%r(tor-versions,110,"HTTP/1\.1\x2 SF:0400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sat,\x2010 SF:\x20May\x202025\x2013:57:03\x20GMT\r\nContent-Type:\x20text/html\r\nCon SF:tent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><tit SF:le>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x2 SF:0Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%) OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.10 - 3.13 (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 14 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.67 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 2.18 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 11.03 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 19.91 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 31.02 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 30.98 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74) 9 ... 13 14 57.26 ms ec2-3-209-238-163.compute-1.amazonaws.com (3.209.238.163) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 41.82 seconds
Features
5 scans/day
Daily API Calls - 20 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.
Lifetime
Features
10 000 scans/day
Daily API Calls - 100 000 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is best for professionals who need to test their host's open ports from an external source.
Billed Annually @ $45.00 - 50% discount