Scan report for "prod.foreflight.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A prod.foreflight.com)
Nmap scan report for prod.foreflight.com (54.234.190.127)
Host is up (0.072s latency).
Other addresses for prod.foreflight.com (not scanned): 3.209.124.9 52.201.206.59
rDNS record for 54.234.190.127: ec2-54-234-190-127.compute-1.amazonaws.com
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http      awselb/2.0
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 301 Moved Permanently
|     Server: awselb/2.0
|     Date: Mon, 20 Nov 2023 05:07:21 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     Location: https://alb-20180912191814321300000003-1181786623.us-east-1.elb.amazonaws.com:443/nice%20ports%2C/Tri%6Eity.txt%2ebak
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     </body>
|     </html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 301 Moved Permanently
|     Server: awselb/2.0
|     Date: Mon, 20 Nov 2023 05:07:20 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     Location: https://alb-20180912191814321300000003-1181786623.us-east-1.elb.amazonaws.com:443/
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Mon, 20 Nov 2023 05:07:21 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-server-header: awselb/2.0
|_http-title: Did not follow redirect to https://prod.foreflight.com:443/
443/tcp open  ssl/https awselb/2.0
| fingerprint-strings: 
|   DNSVersionBindReqTCP, RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Mon, 20 Nov 2023 05:07:33 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   FourOhFourRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Server: awselb/2.0
|     Date: Mon, 20 Nov 2023 05:07:27 GMT
|     Content-Type: text/plain; charset=utf-8
|     Content-Length: 21
|     Connection: close
|     Something went wrong!
|   GetRequest: 
|     HTTP/1.1 404 Not Found
|     Server: awselb/2.0
|     Date: Mon, 20 Nov 2023 05:07:26 GMT
|     Content-Type: text/plain; charset=utf-8
|     Content-Length: 21
|     Connection: close
|     Something went wrong!
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Mon, 20 Nov 2023 05:07:27 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-server-header: awselb/2.0
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
| ssl-cert: Subject: commonName=prod.foreflight.com
| Subject Alternative Name: DNS:prod.foreflight.com, DNS:*.prod.foreflight.com, DNS:*.foreflight.com, DNS:*.prod.foreflight.io, DNS:prod.foreflight.io, DNS:4ff.io
| Not valid before: 2023-06-05T00:00:00
|_Not valid after:  2024-07-03T23:59:59
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/19%Time=655AE988%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,180,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x2
SF:0awselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:07:20\x20GMT\r
SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x
SF:20close\r\nLocation:\x20https://alb-20180912191814321300000003-11817866
SF:23\.us-east-1\.elb\.amazonaws\.com:443/\r\n\r\n<html>\r\n<head><title>3
SF:01\x20Moved\x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\
SF:x20Moved\x20Permanently</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTT
SF:POptions,180,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x20aw
SF:selb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:07:20\x20GMT\r\nC
SF:ontent-Type:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x20c
SF:lose\r\nLocation:\x20https://alb-20180912191814321300000003-1181786623\
SF:.us-east-1\.elb\.amazonaws\.com:443/\r\n\r\n<html>\r\n<head><title>301\
SF:x20Moved\x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\x20
SF:Moved\x20Permanently</h1></center>\r\n</body>\r\n</html>\r\n")%r(RTSPRe
SF:quest,7A,"<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r
SF:\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\
SF:r\n</html>\r\n")%r(X11Probe,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n
SF:Server:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:07:2
SF:1\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nCon
SF:nection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</
SF:title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cent
SF:er>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,1A3,"HTTP/1\.1\x203
SF:01\x20Moved\x20Permanently\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x
SF:2020\x20Nov\x202023\x2005:07:21\x20GMT\r\nContent-Type:\x20text/html\r\
SF:nContent-Length:\x20134\r\nConnection:\x20close\r\nLocation:\x20https:/
SF:/alb-20180912191814321300000003-1181786623\.us-east-1\.elb\.amazonaws\.
SF:com:443/nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\n\r\n<html>\r\n<head><ti
SF:tle>301\x20Moved\x20Permanently</title></head>\r\n<body>\r\n<center><h1
SF:>301\x20Moved\x20Permanently</h1></center>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/19%Time=655AE98E%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,B8,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20a
SF:wselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:07:26\x20GMT\r\n
SF:Content-Type:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x2021\
SF:r\nConnection:\x20close\r\n\r\nSomething\x20went\x20wrong!")%r(HTTPOpti
SF:ons,B8,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20awselb/2\.0\r\nD
SF:ate:\x20Mon,\x2020\x20Nov\x202023\x2005:07:27\x20GMT\r\nContent-Type:\x
SF:20text/plain;\x20charset=utf-8\r\nContent-Length:\x2021\r\nConnection:\
SF:x20close\r\n\r\nSomething\x20went\x20wrong!")%r(FourOhFourRequest,B8,"H
SF:TTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20awselb/2\.0\r\nDate:\x20M
SF:on,\x2020\x20Nov\x202023\x2005:07:27\x20GMT\r\nContent-Type:\x20text/pl
SF:ain;\x20charset=utf-8\r\nContent-Length:\x2021\r\nConnection:\x20close\
SF:r\n\r\nSomething\x20went\x20wrong!")%r(tor-versions,110,"HTTP/1\.1\x204
SF:00\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x
SF:20Nov\x202023\x2005:07:27\x20GMT\r\nContent-Type:\x20text/html\r\nConte
SF:nt-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title
SF:>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20B
SF:ad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,7
SF:A,"<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body
SF:>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</ht
SF:ml>\r\n")%r(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
SF:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2005:07:33\x20GM
SF:T\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection
SF::\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title><
SF:/head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n
SF:</body>\r\n</html>\r\n")%r(DNSVersionBindReqTCP,110,"HTTP/1\.1\x20400\x
SF:20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20No
SF:v\x202023\x2005:07:33\x20GMT\r\nContent-Type:\x20text/html\r\nContent-L
SF:ength:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400
SF:\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x
SF:20Request</h1></center>\r\n</body>\r\n</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|PBX
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%), Vodavi embedded (87%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:vodavi:xts-ip
Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.10 - 3.13 (88%), Vodavi XTS-IP PBX (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

TRACEROUTE (using port 80/tcp)
HOP RTT      ADDRESS
1   0.18 ms  208.76.251.177
2   0.51 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.77 ms  1.162.45.96-dedicated.multacom.com (96.45.162.1)
4   1.39 ms  be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   13.04 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161)
6   20.92 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54)
7   36.98 ms be3851.ccr42.iah01.atlas.cogentco.com (154.54.2.5)
8   38.39 ms be2418.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.6.78)
9   38.79 ms 38.88.155.218
10  39.02 ms 52.93.254.229
11  37.98 ms 52.93.64.175
12  ... 16
17  72.33 ms ec2-54-234-190-127.compute-1.amazonaws.com (54.234.190.127)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 61.71 seconds
Color Scheme
Target
prod.foreflight.com
Target IP
54.234.190.127
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A prod.foreflight.com
Scan date
20 Nov 2023 00:08
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: