Scan report for "airvisual.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A airvisual.com)
Nmap scan report for airvisual.com (13.113.205.76)
Host is up (0.11s latency).
Other addresses for airvisual.com (not scanned): 52.196.241.143
rDNS record for 13.113.205.76: ec2-13-113-205-76.ap-northeast-1.compute.amazonaws.com
Not shown: 998 filtered ports
PORT    STATE SERVICE  VERSION
80/tcp  open  http     awselb/2.0
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 301 Moved Permanently
|     Server: awselb/2.0
|     Date: Sun, 19 Nov 2023 07:14:22 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     Location: https://airvisual-2062301339.ap-northeast-1.elb.amazonaws.com:443/nice%20ports%2C/Tri%6Eity.txt%2ebak
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     </body>
|     </html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 301 Moved Permanently
|     Server: awselb/2.0
|     Date: Sun, 19 Nov 2023 07:14:22 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     Location: https://airvisual-2062301339.ap-northeast-1.elb.amazonaws.com:443/
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     </body>
|     </html>
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Sun, 19 Nov 2023 07:14:28 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Sun, 19 Nov 2023 07:14:22 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-server-header: awselb/2.0
|_http-title: Did not follow redirect to https://airvisual.com:443/
443/tcp open  ssl/http nginx 1.19.6
| http-server-header: 
|   awselb/2.0
|_  nginx/1.19.6
|_http-title: Did not follow redirect to https://www.airvisual.com:443/
| ssl-cert: Subject: commonName=airvisual.com
| Subject Alternative Name: DNS:airvisual.com
| Not valid before: 2023-05-29T00:00:00
|_Not valid after:  2024-06-26T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| tls-nextprotoneg: 
|   h2
|_  http/1.1
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.70%I=7%D=11/18%Time=6559B5CD%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,170,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x2
SF:0awselb/2\.0\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:14:22\x20GMT\r
SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x
SF:20close\r\nLocation:\x20https://airvisual-2062301339\.ap-northeast-1\.e
SF:lb\.amazonaws\.com:443/\r\n\r\n<html>\r\n<head><title>301\x20Moved\x20P
SF:ermanently</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20Perm
SF:anently</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,170,"HT
SF:TP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x20awselb/2\.0\r\nDat
SF:e:\x20Sun,\x2019\x20Nov\x202023\x2007:14:22\x20GMT\r\nContent-Type:\x20
SF:text/html\r\nContent-Length:\x20134\r\nConnection:\x20close\r\nLocation
SF::\x20https://airvisual-2062301339\.ap-northeast-1\.elb\.amazonaws\.com:
SF:443/\r\n\r\n<html>\r\n<head><title>301\x20Moved\x20Permanently</title><
SF:/head>\r\n<body>\r\n<center><h1>301\x20Moved\x20Permanently</h1></cente
SF:r>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<html>\r\n<head><title
SF:>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20B
SF:ad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(X11Probe,110,
SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\
SF:x20Sun,\x2019\x20Nov\x202023\x2007:14:22\x20GMT\r\nContent-Type:\x20tex
SF:t/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\
SF:r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cent
SF:er><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%
SF:r(FourOhFourRequest,193,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nSe
SF:rver:\x20awselb/2\.0\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x2007:14:22\
SF:x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20134\r\nConne
SF:ction:\x20close\r\nLocation:\x20https://airvisual-2062301339\.ap-northe
SF:ast-1\.elb\.amazonaws\.com:443/nice%20ports%2C/Tri%6Eity\.txt%2ebak\r\n
SF:\r\n<html>\r\n<head><title>301\x20Moved\x20Permanently</title></head>\r
SF:\n<body>\r\n<center><h1>301\x20Moved\x20Permanently</h1></center>\r\n</
SF:body>\r\n</html>\r\n")%r(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sun,\x2019\x20Nov\x202023\x200
SF:7:14:28\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\
SF:r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Req
SF:uest</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1>
SF:</center>\r\n</body>\r\n</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|PBX
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%), Vodavi embedded (87%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:vodavi:xts-ip
Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Vodavi XTS-IP PBX (87%), Linux 3.10 - 3.13 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 16 hops

TRACEROUTE (using port 443/tcp)
HOP RTT       ADDRESS
1   16.30 ms  208.76.251.177
2   0.92 ms   gw.mcom-colocationamerica.com (208.64.231.81)
3   0.92 ms   multacom.com (96.45.162.9)
4   0.53 ms   ae-8.a03.lsanca07.us.bb.gin.ntt.net (129.250.205.121)
5   1.21 ms   ae-13.r24.lsanca07.us.bb.gin.ntt.net (129.250.3.141)
6   ...
7   103.48 ms ae-2.r03.osakjp02.jp.bb.gin.ntt.net (129.250.7.33)
8   108.93 ms ae-1.amazon.osakjp02.jp.bb.gin.ntt.net (61.200.80.86)
9   105.97 ms 52.93.150.111
10  109.73 ms 150.222.91.39
11  ... 15
16  110.63 ms ec2-13-113-205-76.ap-northeast-1.compute.amazonaws.com (13.113.205.76)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 54.96 seconds
Color Scheme
Target
airvisual.com
Target IP
13.113.205.76
Target Country
JP
Scan method
Scan OS information and Traceroute
Run command
nmap -A airvisual.com
Scan date
19 Nov 2023 02:15
Copy scan report
Download report
Remove scan result
$
Total scans
About 2 times
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: