Scan OS information and Traceroute (nmap -A widgets.spklw.com)
Nmap scan report for widgets.spklw.com (52.51.84.117)
Host is up (0.15s latency).
Other addresses for widgets.spklw.com (not scanned): 34.249.50.173
rDNS record for 52.51.84.117: ec2-52-51-84-117.eu-west-1.compute.amazonaws.com
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LDAPSearchReq, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, X11Probe:
| HTTP/1.1 400 BAD_REQUEST
| Content-Length: 0
| Connection: Close
| FourOhFourRequest:
| HTTP/1.1 404 Not Found
| Access-Control-Allow-Credentials: true
| Content-Type: application/json; charset=utf-8
| Date: Mon, 20 Nov 2023 19:13:51 GMT
| Vary: Origin, Accept-Encoding
| Content-Length: 21
| Connection: Close
| {"error":"Not found"}
| GetRequest:
| HTTP/1.1 404 Not Found
| Access-Control-Allow-Credentials: true
| Content-Type: application/json; charset=utf-8
| Date: Mon, 20 Nov 2023 19:13:49 GMT
| Vary: Origin, Accept-Encoding
| Content-Length: 21
| Connection: Close
| {"error":"Not found"}
| HTTPOptions:
| HTTP/1.1 204 No Content
| Access-Control-Allow-Credentials: true
| Access-Control-Allow-Methods: GET
| Access-Control-Max-Age: 3000
| Content-Length: 0
| Date: Mon, 20 Nov 2023 19:13:50 GMT
| Vary: Origin, Access-Control-Request-Headers
|_ Connection: Close
|_http-title: Site doesn't have a title (application/json; charset=utf-8).
443/tcp open ssl/https
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, X11Probe, tor-versions:
| HTTP/1.1 400 BAD_REQUEST
| Content-Length: 0
| Connection: Close
| FourOhFourRequest:
| HTTP/1.1 404 Not Found
| Access-Control-Allow-Credentials: true
| Content-Type: application/json; charset=utf-8
| Date: Mon, 20 Nov 2023 19:14:06 GMT
| Vary: Origin, Accept-Encoding
| Content-Length: 21
| Connection: Close
| {"error":"Not found"}
| GetRequest:
| HTTP/1.1 404 Not Found
| Access-Control-Allow-Credentials: true
| Content-Type: application/json; charset=utf-8
| Date: Mon, 20 Nov 2023 19:13:56 GMT
| Vary: Origin, Accept-Encoding
| Content-Length: 21
| Connection: Close
| {"error":"Not found"}
| HTTPOptions:
| HTTP/1.1 204 No Content
| Access-Control-Allow-Credentials: true
| Access-Control-Allow-Methods: GET
| Access-Control-Max-Age: 3000
| Content-Length: 0
| Date: Mon, 20 Nov 2023 19:14:01 GMT
| Vary: Origin, Access-Control-Request-Headers
|_ Connection: Close
|_http-title: Site doesn't have a title (application/json; charset=utf-8).
| ssl-cert: Subject: commonName=spklw.com
| Subject Alternative Name: DNS:spklw.com, DNS:*.spklw.com, DNS:*.strossle.360yield.com
| Not valid before: 2023-05-12T00:00:00
|_Not valid after: 2024-06-09T23:59:59
|_ssl-date: TLS randomness does not represent time
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/20%Time=655BAFED%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,F1,"HTTP/1\.1\x20404\x20Not\x20Found\r\nAccess-Control-Allo
SF:w-Credentials:\x20true\r\nContent-Type:\x20application/json;\x20charset
SF:=utf-8\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2019:13:49\x20GMT\r\nVary
SF::\x20Origin,\x20Accept-Encoding\r\nContent-Length:\x2021\r\nConnection:
SF:\x20Close\r\n\r\n{\"error\":\"Not\x20found\"}")%r(HTTPOptions,FD,"HTTP/
SF:1\.1\x20204\x20No\x20Content\r\nAccess-Control-Allow-Credentials:\x20tr
SF:ue\r\nAccess-Control-Allow-Methods:\x20GET\r\nAccess-Control-Max-Age:\x
SF:203000\r\nContent-Length:\x200\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2
SF:019:13:50\x20GMT\r\nVary:\x20Origin,\x20Access-Control-Request-Headers\
SF:r\nConnection:\x20Close\r\n\r\n")%r(RTSPRequest,42,"HTTP/1\.1\x20400\x2
SF:0BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%
SF:r(X11Probe,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\
SF:r\nConnection:\x20Close\r\n\r\n")%r(FourOhFourRequest,F1,"HTTP/1\.1\x20
SF:404\x20Not\x20Found\r\nAccess-Control-Allow-Credentials:\x20true\r\nCon
SF:tent-Type:\x20application/json;\x20charset=utf-8\r\nDate:\x20Mon,\x2020
SF:\x20Nov\x202023\x2019:13:51\x20GMT\r\nVary:\x20Origin,\x20Accept-Encodi
SF:ng\r\nContent-Length:\x2021\r\nConnection:\x20Close\r\n\r\n{\"error\":\
SF:"Not\x20found\"}")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nCo
SF:ntent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSVersionBindRe
SF:qTCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nCon
SF:nection:\x20Close\r\n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x20400\
SF:x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n"
SF:)%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length
SF::\x200\r\nConnection:\x20Close\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\
SF:x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r
SF:\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Leng
SF:th:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x
SF:20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\
SF:n\r\n")%r(LDAPSearchReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-
SF:Length:\x200\r\nConnection:\x20Close\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655BAFF8%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,F1,"HTTP/1\.1\x20404\x20Not\x20Found\r\nAccess-Contr
SF:ol-Allow-Credentials:\x20true\r\nContent-Type:\x20application/json;\x20
SF:charset=utf-8\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2019:13:56\x20GMT\
SF:r\nVary:\x20Origin,\x20Accept-Encoding\r\nContent-Length:\x2021\r\nConn
SF:ection:\x20Close\r\n\r\n{\"error\":\"Not\x20found\"}")%r(HTTPOptions,FD
SF:,"HTTP/1\.1\x20204\x20No\x20Content\r\nAccess-Control-Allow-Credentials
SF::\x20true\r\nAccess-Control-Allow-Methods:\x20GET\r\nAccess-Control-Max
SF:-Age:\x203000\r\nContent-Length:\x200\r\nDate:\x20Mon,\x2020\x20Nov\x20
SF:2023\x2019:14:01\x20GMT\r\nVary:\x20Origin,\x20Access-Control-Request-H
SF:eaders\r\nConnection:\x20Close\r\n\r\n")%r(FourOhFourRequest,F1,"HTTP/1
SF:\.1\x20404\x20Not\x20Found\r\nAccess-Control-Allow-Credentials:\x20true
SF:\r\nContent-Type:\x20application/json;\x20charset=utf-8\r\nDate:\x20Mon
SF:,\x2020\x20Nov\x202023\x2019:14:06\x20GMT\r\nVary:\x20Origin,\x20Accept
SF:-Encoding\r\nContent-Length:\x2021\r\nConnection:\x20Close\r\n\r\n{\"er
SF:ror\":\"Not\x20found\"}")%r(tor-versions,42,"HTTP/1\.1\x20400\x20BAD_RE
SF:QUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(RTSPR
SF:equest,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nC
SF:onnection:\x20Close\r\n\r\n")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20BAD_RE
SF:QUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSVe
SF:rsionBindReqTCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\
SF:x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1
SF:\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clo
SF:se\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nCon
SF:tent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(TLSSessionReq,42,
SF:"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:
SF:\x20Close\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nC
SF:ontent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SMBProgNeg,42,"
SF:HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\
SF:x20Close\r\n\r\n")%r(X11Probe,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nCo
SF:ntent-Length:\x200\r\nConnection:\x20Close\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 4.X (87%)
OS CPE: cpe:/o:linux:linux_kernel:4.2
Aggressive OS guesses: Linux 4.2 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 26 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177
2 0.51 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.57 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1)
4 0.84 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5 12.67 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161)
6 12.78 ms be3409.ccr31.phx01.atlas.cogentco.com (154.54.29.237)
7 21.08 ms be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218)
8 36.94 ms be3850.ccr41.iah01.atlas.cogentco.com (154.54.0.53)
9 50.29 ms be2687.ccr41.atl01.atlas.cogentco.com (154.54.28.69)
10 66.90 ms be2112.ccr41.dca01.atlas.cogentco.com (154.54.7.157)
11 72.38 ms be2806.ccr41.jfk02.atlas.cogentco.com (154.54.40.105)
12 141.13 ms 154.54.93.10
13 141.54 ms a100-row.demarc.cogentco.com (149.14.196.218)
14 ... 25
26 144.44 ms ec2-52-51-84-117.eu-west-1.compute.amazonaws.com (52.51.84.117)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 228.47 seconds
Color Scheme
-
Target
-
Target IP
52.51.84.117
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A widgets.spklw.com
-
Scan date
20 Nov 2023 14:17
-
Copy scan report
-
Download report
-
Remove scan result