Scan report for "api.headliner.link"

Membership level: Free member
Scan OS information and Traceroute (nmap -A api.headliner.link)
Nmap scan report for api.headliner.link (35.71.166.51)
Host is up (0.00025s latency).
Other addresses for api.headliner.link (not scanned): 52.223.8.97
rDNS record for 35.71.166.51: a45b8da306d0539af.awsglobalaccelerator.com
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http      awselb/2.0
| fingerprint-strings: 
|   FourOhFourRequest: 
|     HTTP/1.1 301 Moved Permanently
|     Server: awselb/2.0
|     Date: Sat, 18 Nov 2023 14:48:19 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     Location: https://use1prdpubwidgetapplb-1879289338.us-east-1.elb.amazonaws.com:443/nice%20ports%2C/Tri%6Eity.txt%2ebak
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     </body>
|     </html>
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 301 Moved Permanently
|     Server: awselb/2.0
|     Date: Sat, 18 Nov 2023 14:48:19 GMT
|     Content-Type: text/html
|     Content-Length: 134
|     Connection: close
|     Location: https://use1prdpubwidgetapplb-1879289338.us-east-1.elb.amazonaws.com:443/
|     <html>
|     <head><title>301 Moved Permanently</title></head>
|     <body>
|     <center><h1>301 Moved Permanently</h1></center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   X11Probe: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Sat, 18 Nov 2023 14:48:19 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-server-header: awselb/2.0
|_http-title: Did not follow redirect to https://api.headliner.link:443/
443/tcp open  ssl/https awselb/2.0
| fingerprint-strings: 
|   DNSVersionBindReqTCP: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Sat, 18 Nov 2023 14:48:32 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   FourOhFourRequest: 
|     HTTP/1.1 503 Service Temporarily Unavailable
|     Server: awselb/2.0
|     Date: Sat, 18 Nov 2023 14:48:26 GMT
|     Content-Type: text/plain; charset=utf-8
|     Content-Length: 19
|     Connection: close
|     unsupported request
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 503 Service Temporarily Unavailable
|     Server: awselb/2.0
|     Date: Sat, 18 Nov 2023 14:48:25 GMT
|     Content-Type: text/plain; charset=utf-8
|     Content-Length: 19
|     Connection: close
|     unsupported request
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Sat, 18 Nov 2023 14:48:31 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Sat, 18 Nov 2023 14:48:26 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-server-header: awselb/2.0
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
| ssl-cert: Subject: commonName=*.headliner.link
| Subject Alternative Name: DNS:*.headliner.link, DNS:headliner.link
| Not valid before: 2023-03-05T00:00:00
|_Not valid after:  2024-04-02T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| tls-nextprotoneg: 
|   h2
|_  http/1.1
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/18%Time=6558CEB2%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,177,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x2
SF:0awselb/2\.0\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2014:48:19\x20GMT\r
SF:\nContent-Type:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x
SF:20close\r\nLocation:\x20https://use1prdpubwidgetapplb-1879289338\.us-ea
SF:st-1\.elb\.amazonaws\.com:443/\r\n\r\n<html>\r\n<head><title>301\x20Mov
SF:ed\x20Permanently</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\
SF:x20Permanently</h1></center>\r\n</body>\r\n</html>\r\n")%r(HTTPOptions,
SF:177,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nServer:\x20awselb/2\.0
SF:\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2014:48:19\x20GMT\r\nContent-Ty
SF:pe:\x20text/html\r\nContent-Length:\x20134\r\nConnection:\x20close\r\nL
SF:ocation:\x20https://use1prdpubwidgetapplb-1879289338\.us-east-1\.elb\.a
SF:mazonaws\.com:443/\r\n\r\n<html>\r\n<head><title>301\x20Moved\x20Perman
SF:ently</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20Permanent
SF:ly</h1></center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<html>\r
SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cente
SF:r><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r
SF:(X11Probe,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/
SF:2\.0\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2014:48:19\x20GMT\r\nConten
SF:t-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\
SF:r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<
SF:body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n
SF:</html>\r\n")%r(FourOhFourRequest,19A,"HTTP/1\.1\x20301\x20Moved\x20Per
SF:manently\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sat,\x2018\x20Nov\x20202
SF:3\x2014:48:19\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x
SF:20134\r\nConnection:\x20close\r\nLocation:\x20https://use1prdpubwidgeta
SF:pplb-1879289338\.us-east-1\.elb\.amazonaws\.com:443/nice%20ports%2C/Tri
SF:%6Eity\.txt%2ebak\r\n\r\n<html>\r\n<head><title>301\x20Moved\x20Permane
SF:ntly</title></head>\r\n<body>\r\n<center><h1>301\x20Moved\x20Permanentl
SF:y</h1></center>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/18%Time=6558CEB8%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,CC,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Un
SF:available\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sat,\x2018\x20Nov\x2020
SF:23\x2014:48:25\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\
SF:r\nContent-Length:\x2019\r\nConnection:\x20close\r\n\r\nunsupported\x20
SF:request")%r(HTTPOptions,CC,"HTTP/1\.1\x20503\x20Service\x20Temporarily\
SF:x20Unavailable\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sat,\x2018\x20Nov\
SF:x202023\x2014:48:25\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=u
SF:tf-8\r\nContent-Length:\x2019\r\nConnection:\x20close\r\n\r\nunsupporte
SF:d\x20request")%r(FourOhFourRequest,CC,"HTTP/1\.1\x20503\x20Service\x20T
SF:emporarily\x20Unavailable\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sat,\x2
SF:018\x20Nov\x202023\x2014:48:26\x20GMT\r\nContent-Type:\x20text/plain;\x
SF:20charset=utf-8\r\nContent-Length:\x2019\r\nConnection:\x20close\r\n\r\
SF:nunsupported\x20request")%r(tor-versions,110,"HTTP/1\.1\x20400\x20Bad\x
SF:20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sat,\x2018\x20Nov\x2020
SF:23\x2014:48:26\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\
SF:x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad
SF:\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Reque
SF:st</h1></center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<html>\r
SF:\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<cente
SF:r><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r
SF:(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/
SF:2\.0\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x2014:48:31\x20GMT\r\nConten
SF:t-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\
SF:r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<
SF:body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n
SF:</html>\r\n")%r(DNSVersionBindReqTCP,110,"HTTP/1\.1\x20400\x20Bad\x20Re
SF:quest\r\nServer:\x20awselb/2\.0\r\nDate:\x20Sat,\x2018\x20Nov\x202023\x
SF:2014:48:32\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x201
SF:22\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20
SF:Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</
SF:h1></center>\r\n</body>\r\n</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: phone
Running (JUST GUESSING): Google Android 5.X (87%)
OS CPE: cpe:/o:google:android:5.0.1
Aggressive OS guesses: Android 5.0.1 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 7 hops

TRACEROUTE (using port 80/tcp)
HOP RTT     ADDRESS
1   0.22 ms 208.76.251.177
2   1.99 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   1.32 ms multacom.com (96.45.162.9)
4   0.28 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146)
5   ... 6
7   0.23 ms a45b8da306d0539af.awsglobalaccelerator.com (35.71.166.51)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 57.72 seconds
Color Scheme
Target
api.headliner.link
Target IP
35.71.166.51
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A api.headliner.link
Scan date
18 Nov 2023 09:49
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: