Ports
Duration
Date
IP
Nmap scan report for config-buf-nfl.yinzcam.com (18.210.124.251) Host is up (0.064s latency). Other addresses for config-buf-nfl.yinzcam.com (not scanned): 44.219.107.216 34.203.118.146 54.205.120.124 44.214.86.180 34.197.189.62 44.215.59.56 52.2.1.212 rDNS record for 18.210.124.251: ec2-18-210-124-251.compute-1.amazonaws.com Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http |_http-title: Site doesn't have a title. | fingerprint-strings: | DNSVersionBindReqTCP, RPCCheck: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Mon, 23 Sep 2024 02:21:01 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | FourOhFourRequest: | HTTP/1.1 460 Unknown Error | Date: Mon, 23 Sep 2024 02:20:56 GMT | Content-Length: 0 | Connection: close | Vary: Accept, Accept-Language, X-YinzCam-Segmentation-Token | Accept-Ranges: bytes | Age: 32168 | X-Id: 2097296467 2092283024 | GetRequest: | HTTP/1.1 460 Unknown Error | Date: Mon, 23 Sep 2024 02:20:55 GMT | Content-Length: 0 | Connection: close | Vary: Accept, Accept-Language, X-YinzCam-Segmentation-Token | Accept-Ranges: bytes | Age: 31600 | X-Id: 813338384 808401557 | HTTPOptions: | HTTP/1.1 460 Unknown Error | Date: Mon, 23 Sep 2024 02:20:55 GMT | Content-Length: 0 | Connection: close | Vary: Accept, Accept-Language, X-YinzCam-Segmentation-Token | Accept-Ranges: bytes | Age: 31891 | X-Id: 1116959712 1111984426 | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | X11Probe: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Mon, 23 Sep 2024 02:20:56 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> 443/tcp open ssl/https |_http-title: Site doesn't have a title. | fingerprint-strings: | DNSVersionBindReqTCP, RPCCheck: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Mon, 23 Sep 2024 02:21:08 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | FourOhFourRequest: | HTTP/1.1 460 Unknown Error | Date: Mon, 23 Sep 2024 02:21:02 GMT | Content-Length: 0 | Connection: close | Vary: Accept, Accept-Language, X-YinzCam-Segmentation-Token | Accept-Ranges: bytes | Age: 31607 | X-Id: 813339251 808401557 | GetRequest: | HTTP/1.1 460 Unknown Error | Date: Mon, 23 Sep 2024 02:21:02 GMT | Content-Length: 0 | Connection: close | Vary: Accept, Accept-Language, X-YinzCam-Segmentation-Token | Accept-Ranges: bytes | Age: 32174 | X-Id: 2097297195 2092283024 | HTTPOptions: | HTTP/1.1 460 Unknown Error | Date: Mon, 23 Sep 2024 02:21:02 GMT | Content-Length: 0 | Connection: close | Vary: Accept, Accept-Language, X-YinzCam-Segmentation-Token | Accept-Ranges: bytes | Age: 31606 | X-Id: 813339205 808401557 | RTSPRequest: | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> | </html> | tor-versions: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Mon, 23 Sep 2024 02:21:02 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | <html> | <head><title>400 Bad Request</title></head> | <body> | <center><h1>400 Bad Request</h1></center> | </body> |_ </html> | ssl-cert: Subject: commonName=*.yinzcam.com | Subject Alternative Name: DNS:*.yinzcam.com, DNS:yinzcam.com | Not valid before: 2024-04-26T11:37:29 |_Not valid after: 2025-05-28T11:37:29 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.92%I=7%D=9/22%Time=66F0D087%P=x86_64-redhat-linux-gnu%r( SF:GetRequest,E3,"HTTP/1\.1\x20460\x20Unknown\x20Error\r\nDate:\x20Mon,\x2 SF:023\x20Sep\x202024\x2002:20:55\x20GMT\r\nContent-Length:\x200\r\nConnec SF:tion:\x20close\r\nVary:\x20Accept,\x20Accept-Language,\x20X-YinzCam-Seg SF:mentation-Token\r\nAccept-Ranges:\x20bytes\r\nAge:\x2031600\r\nX-Id:\x2 SF:0813338384\x20808401557\r\n\r\n")%r(HTTPOptions,E5,"HTTP/1\.1\x20460\x2 SF:0Unknown\x20Error\r\nDate:\x20Mon,\x2023\x20Sep\x202024\x2002:20:55\x20 SF:GMT\r\nContent-Length:\x200\r\nConnection:\x20close\r\nVary:\x20Accept, SF:\x20Accept-Language,\x20X-YinzCam-Segmentation-Token\r\nAccept-Ranges:\ SF:x20bytes\r\nAge:\x2031891\r\nX-Id:\x201116959712\x201111984426\r\n\r\n" SF:)%r(RTSPRequest,7A,"<html>\r\n<head><title>400\x20Bad\x20Request</title SF:></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r SF:\n</body>\r\n</html>\r\n")%r(X11Probe,110,"HTTP/1\.1\x20400\x20Bad\x20R SF:equest\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x2023\x20Sep\x202024\ SF:x2002:20:56\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20 SF:122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x2 SF:0Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request< SF:/h1></center>\r\n</body>\r\n</html>\r\n")%r(FourOhFourRequest,E5,"HTTP/ SF:1\.1\x20460\x20Unknown\x20Error\r\nDate:\x20Mon,\x2023\x20Sep\x202024\x SF:2002:20:56\x20GMT\r\nContent-Length:\x200\r\nConnection:\x20close\r\nVa SF:ry:\x20Accept,\x20Accept-Language,\x20X-YinzCam-Segmentation-Token\r\nA SF:ccept-Ranges:\x20bytes\r\nAge:\x2032168\r\nX-Id:\x202097296467\x2020922 SF:83024\r\n\r\n")%r(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nS SF:erver:\x20awselb/2\.0\r\nDate:\x20Mon,\x2023\x20Sep\x202024\x2002:21:01 SF:\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConn SF:ection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</t SF:itle></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cente SF:r>\r\n</body>\r\n</html>\r\n")%r(DNSVersionBindReqTCP,110,"HTTP/1\.1\x2 SF:0400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x2023 SF:\x20Sep\x202024\x2002:21:01\x20GMT\r\nContent-Type:\x20text/html\r\nCon SF:tent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><tit SF:le>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x2 SF:0Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/22%Time=66F0D08D%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,E5,"HTTP/1\.1\x20460\x20Unknown\x20Error\r\nDate:\x20 SF:Mon,\x2023\x20Sep\x202024\x2002:21:02\x20GMT\r\nContent-Length:\x200\r\ SF:nConnection:\x20close\r\nVary:\x20Accept,\x20Accept-Language,\x20X-Yinz SF:Cam-Segmentation-Token\r\nAccept-Ranges:\x20bytes\r\nAge:\x2032174\r\nX SF:-Id:\x202097297195\x202092283024\r\n\r\n")%r(HTTPOptions,E3,"HTTP/1\.1\ SF:x20460\x20Unknown\x20Error\r\nDate:\x20Mon,\x2023\x20Sep\x202024\x2002: SF:21:02\x20GMT\r\nContent-Length:\x200\r\nConnection:\x20close\r\nVary:\x SF:20Accept,\x20Accept-Language,\x20X-YinzCam-Segmentation-Token\r\nAccept SF:-Ranges:\x20bytes\r\nAge:\x2031606\r\nX-Id:\x20813339205\x20808401557\r SF:\n\r\n")%r(FourOhFourRequest,E3,"HTTP/1\.1\x20460\x20Unknown\x20Error\r SF:\nDate:\x20Mon,\x2023\x20Sep\x202024\x2002:21:02\x20GMT\r\nContent-Leng SF:th:\x200\r\nConnection:\x20close\r\nVary:\x20Accept,\x20Accept-Language SF:,\x20X-YinzCam-Segmentation-Token\r\nAccept-Ranges:\x20bytes\r\nAge:\x2 SF:031607\r\nX-Id:\x20813339251\x20808401557\r\n\r\n")%r(tor-versions,110, SF:"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\ SF:x20Mon,\x2023\x20Sep\x202024\x2002:21:02\x20GMT\r\nContent-Type:\x20tex SF:t/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\ SF:r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cent SF:er><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")% SF:r(RTSPRequest,7A,"<html>\r\n<head><title>400\x20Bad\x20Request</title>< SF:/head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n SF:</body>\r\n</html>\r\n")%r(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\x20Req SF:uest\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x2023\x20Sep\x202024\x2 SF:002:21:08\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2012 SF:2\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20R SF:equest</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h SF:1></center>\r\n</body>\r\n</html>\r\n")%r(DNSVersionBindReqTCP,110,"HTT SF:P/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20M SF:on,\x2023\x20Sep\x202024\x2002:21:08\x20GMT\r\nContent-Type:\x20text/ht SF:ml\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n< SF:head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center>< SF:h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%) OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.10 - 3.13 (88%) No exact OS matches for host (test conditions non-ideal). Network Distance: 17 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.62 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.79 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 0.42 ms ce-1-4-2.a04.lsanca07.us.bb.gin.ntt.net (128.241.15.73) 5 ... 6 32.63 ms ae-3.r22.dllstx14.us.bb.gin.ntt.net (129.250.7.68) 7 32.78 ms ae-29.a00.dllstx14.us.bb.gin.ntt.net (129.250.3.47) 8 33.60 ms ae-2.amazon.dllstx14.us.bb.gin.ntt.net (129.250.201.10) 9 33.72 ms 15.230.130.157 10 33.19 ms 15.230.48.10 11 ... 16 17 63.70 ms ec2-18-210-124-251.compute-1.amazonaws.com (18.210.124.251) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 42.26 seconds