Ports
Duration
Date
IP
Nmap scan report for amccore1.amcomamc.com (107.21.32.169) Host is up (0.060s latency). rDNS record for 107.21.32.169: ec2-107-21-32-169.compute-1.amazonaws.com Not shown: 994 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 10.0 | http-methods: |_ Potentially risky methods: TRACE |_http-title: IIS Windows Server |_http-server-header: Microsoft-IIS/10.0 443/tcp open ssl/http Microsoft IIS httpd 10.0 |_http-title: IIS Windows Server | http-methods: |_ Potentially risky methods: TRACE | ssl-cert: Subject: commonName=*.amcomamc.com | Subject Alternative Name: DNS:*.amcomamc.com, DNS:amcomamc.com | Not valid before: 2024-06-11T22:48:00 |_Not valid after: 2025-07-13T22:48:00 |_ssl-date: 2024-11-28T16:52:57+00:00; -13s from scanner time. | tls-alpn: | h2 |_ http/1.1 |_http-server-header: Microsoft-IIS/10.0 2001/tcp open dc? | fingerprint-strings: | GetRequest, NULL: |_ <?xml version="1.0" encoding="utf-8"?><sdcSolutions><messaging><command><uniqueid>{e4b9118a-f497-4cd4-845d-8c6a5b784e47}</uniqueid><name>HANDSHAKE_REQUEST</name><parameters /></command><response><status /><value /><parameters /></response></messaging></sdcSolutions> 2002/tcp closed globe 3000/tcp closed ppp 8090/tcp open http-proxy HAProxy http proxy 1.3.1 or later |_http-open-proxy: Proxy might be redirecting requests |_http-title: AmcWcfClientMessaging Service |_http-server-header: Microsoft-HTTPAPI/2.0 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port2001-TCP:V=7.92%I=7%D=11/28%Time=67489FE0%P=x86_64-redhat-linux-gnu SF:%r(NULL,16A0,"\x02<\?xml\x20version=\"1\.0\"\x20encoding=\"utf-8\"\?><s SF:dcSolutions><messaging><command><uniqueid>{e4b9118a-f497-4cd4-845d-8c6a SF:5b784e47}</uniqueid><name>HANDSHAKE_REQUEST</name><parameters\x20/></co SF:mmand><response><status\x20/><value\x20/><parameters\x20/></response></ SF:messaging></sdcSolutions>\x03\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0")%r(GetRequest,3890,"\x02<\?xml\x20version=\"1\.0\"\x20 SF:encoding=\"utf-8\"\?><sdcSolutions><messaging><command><uniqueid>{e4b91 SF:18a-f497-4cd4-845d-8c6a5b784e47}</uniqueid><name>HANDSHAKE_REQUEST</nam SF:e><parameters\x20/></command><response><status\x20/><value\x20/><parame SF:ters\x20/></response></messaging></sdcSolutions>\x03\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\ SF:0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0 SF:\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"); Aggressive OS guesses: Android 5.0 - 6.0.1 (Linux 3.4) (91%), Linux 3.2 - 3.16 (91%), Linux 3.2 - 4.9 (91%), Linux 4.2 (91%), Linux 3.10 (90%), Linux 3.2 - 3.10 (90%), Linux 3.10 - 3.13 (90%), Linux 5.4 (90%), Linux 4.4 (89%), Linux 2.6.32 (89%) No exact OS matches for host (test conditions non-ideal). Network Distance: 14 hops Service Info: OS: Windows; Device: load balancer; CPE: cpe:/o:microsoft:windows Host script results: |_clock-skew: -13s TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.63 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.62 ms r1b4.n1p1400.lax.multacom.net (64.69.46.9) 4 ... 5 12.69 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 21.31 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 32.37 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 32.52 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74) 9 ... 13 14 58.48 ms ec2-107-21-32-169.compute-1.amazonaws.com (107.21.32.169) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 30.63 seconds