Scan report for "ccccoreprod.saas.appdynamics.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A ccccoreprod.saas.appdynamics.com)
Nmap scan report for ccccoreprod.saas.appdynamics.com (54.68.4.220)
Host is up (0.026s latency).
Other addresses for ccccoreprod.saas.appdynamics.com (not scanned): 35.167.129.64 54.148.39.144
rDNS record for 54.68.4.220: ec2-54-68-4-220.us-west-2.compute.amazonaws.com
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http
|_http-title: Did not follow redirect to https://ccccoreprod.saas.appdynamics.com/
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: 
|     HTTP/1.1 400 BAD_REQUEST
|     Content-Length: 0
|     Connection: Close
|   FourOhFourRequest: 
|     HTTP/1.1 302 Moved Temporarily
|     Date: Thu, 16 May 2024 00:14:43 GMT
|     Location: https://10.161.237.248/nice%20ports%2C/Tri%6Eity.txt%2ebak
|     X-Content-Type-Options: nosniff
|     Content-Length: 58
|     Connection: Close
|     https://10.161.237.248/nice%20ports%2C/Tri%6Eity.txt%2ebak
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 302 Moved Temporarily
|     Date: Thu, 16 May 2024 00:14:42 GMT
|     Location: https://10.161.237.248/
|     X-Content-Type-Options: nosniff
|     Content-Length: 23
|     Connection: Close
|_    https://10.161.237.248/
443/tcp open  ssl/https
|_http-title: AppDynamics 
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, RPCCheck, RTSPRequest, SSLSessionReq, TLSSessionReq, TerminalServerCookie, tor-versions: 
|     HTTP/1.1 400 BAD_REQUEST
|     Content-Length: 0
|     Connection: Close
|   FourOhFourRequest: 
|     HTTP/1.1 503 Service Temporarily Unavailable
|     Content-Type: application/json; charset=utf-8
|     Date: Thu, 16 May 2024 00:14:59 GMT
|     X-Content-Type-Options: nosniff
|     Content-Length: 40
|     Connection: Close
|     "message":"name resolution failed"
|   GetRequest: 
|     HTTP/1.1 503 Service Temporarily Unavailable
|     Content-Type: application/json; charset=utf-8
|     Date: Thu, 16 May 2024 00:14:49 GMT
|     X-Content-Type-Options: nosniff
|     Content-Length: 40
|     Connection: Close
|     "message":"name resolution failed"
|   HTTPOptions: 
|     HTTP/1.1 503 Service Temporarily Unavailable
|     Content-Type: application/json; charset=utf-8
|     Date: Thu, 16 May 2024 00:14:54 GMT
|     X-Content-Type-Options: nosniff
|     Content-Length: 40
|     Connection: Close
|_    "message":"name resolution failed"
| ssl-cert: Subject: commonName=*.saas.appdynamics.com/organizationName=AppDynamics LLC/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.saas.appdynamics.com
| Not valid before: 2023-08-08T00:00:00
|_Not valid after:  2024-09-07T23:59:59
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=5/15%Time=66454FF3%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,C9,"HTTP/1\.1\x20302\x20Moved\x20Temporarily\r\nDate:\x20Thu
SF:,\x2016\x20May\x202024\x2000:14:42\x20GMT\r\nLocation:\x20https://10\.1
SF:61\.237\.248/\r\nX-Content-Type-Options:\x20nosniff\r\nContent-Length:\
SF:x2023\r\nConnection:\x20Close\r\n\r\nhttps://10\.161\.237\.248/")%r(HTT
SF:POptions,C9,"HTTP/1\.1\x20302\x20Moved\x20Temporarily\r\nDate:\x20Thu,\
SF:x2016\x20May\x202024\x2000:14:42\x20GMT\r\nLocation:\x20https://10\.161
SF:\.237\.248/\r\nX-Content-Type-Options:\x20nosniff\r\nContent-Length:\x2
SF:023\r\nConnection:\x20Close\r\n\r\nhttps://10\.161\.237\.248/")%r(RTSPR
SF:equest,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nC
SF:onnection:\x20Close\r\n\r\n")%r(X11Probe,42,"HTTP/1\.1\x20400\x20BAD_RE
SF:QUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(FourO
SF:hFourRequest,10F,"HTTP/1\.1\x20302\x20Moved\x20Temporarily\r\nDate:\x20
SF:Thu,\x2016\x20May\x202024\x2000:14:43\x20GMT\r\nLocation:\x20https://10
SF:\.161\.237\.248/nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\nX-Content-Type-
SF:Options:\x20nosniff\r\nContent-Length:\x2058\r\nConnection:\x20Close\r\
SF:n\r\nhttps://10\.161\.237\.248/nice%20ports%2C/Tri%6Eity\.txt%2ebak")%r
SF:(RPCCheck,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r
SF:\nConnection:\x20Close\r\n\r\n")%r(DNSVersionBindReqTCP,42,"HTTP/1\.1\x
SF:20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\
SF:n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nCo
SF:ntent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SSLSessionReq,42
SF:,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection
SF::\x20Close\r\n\r\n")%r(TerminalServerCookie,42,"HTTP/1\.1\x20400\x20BAD
SF:_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(TL
SF:SSessionReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200
SF:\r\nConnection:\x20Close\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x20400\x20B
SF:AD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(
SF:SMBProgNeg,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\
SF:r\nConnection:\x20Close\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=5/15%Time=66454FFE%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,F4,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Una
SF:vailable\r\nContent-Type:\x20application/json;\x20charset=utf-8\r\nDate
SF::\x20Thu,\x2016\x20May\x202024\x2000:14:49\x20GMT\r\nX-Content-Type-Opt
SF:ions:\x20nosniff\r\nContent-Length:\x2040\r\nConnection:\x20Close\r\n\r
SF:\n{\n\x20\x20\"message\":\"name\x20resolution\x20failed\"\n}")%r(HTTPOp
SF:tions,F4,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Unavailable\r\n
SF:Content-Type:\x20application/json;\x20charset=utf-8\r\nDate:\x20Thu,\x2
SF:016\x20May\x202024\x2000:14:54\x20GMT\r\nX-Content-Type-Options:\x20nos
SF:niff\r\nContent-Length:\x2040\r\nConnection:\x20Close\r\n\r\n{\n\x20\x2
SF:0\"message\":\"name\x20resolution\x20failed\"\n}")%r(FourOhFourRequest,
SF:F4,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Unavailable\r\nConten
SF:t-Type:\x20application/json;\x20charset=utf-8\r\nDate:\x20Thu,\x2016\x2
SF:0May\x202024\x2000:14:59\x20GMT\r\nX-Content-Type-Options:\x20nosniff\r
SF:\nContent-Length:\x2040\r\nConnection:\x20Close\r\n\r\n{\n\x20\x20\"mes
SF:sage\":\"name\x20resolution\x20failed\"\n}")%r(tor-versions,42,"HTTP/1\
SF:.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clos
SF:e\r\n\r\n")%r(RTSPRequest,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nConten
SF:t-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(RPCCheck,42,"HTTP/1\
SF:.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clos
SF:e\r\n\r\n")%r(DNSVersionBindReqTCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\
SF:r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSStatusRe
SF:questTCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\
SF:nConnection:\x20Close\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x2
SF:0BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%
SF:r(TerminalServerCookie,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-L
SF:ength:\x200\r\nConnection:\x20Close\r\n\r\n")%r(TLSSessionReq,42,"HTTP/
SF:1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Cl
SF:ose\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent
SF:-Length:\x200\r\nConnection:\x20Close\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.10 - 3.13 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.19 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.60 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.87 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   0.42 ms  206.72.211.146.any2ix.coresite.com (206.72.211.146)
5   ... 8
9   25.55 ms 108.166.232.70
10  ...
11  24.22 ms ec2-54-68-4-220.us-west-2.compute.amazonaws.com (54.68.4.220)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 163.84 seconds
Color Scheme
Target
ccccoreprod.saas.appdynamics.com
Target IP
54.68.4.220
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A ccccoreprod.saas.appdynamics.com
Scan date
15 May 2024 20:17
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: