Scan OS information and Traceroute (nmap -A exposure-analytics.insight.rapid7.com)
Nmap scan report for exposure-analytics.insight.rapid7.com (54.208.223.79)
Host is up (0.067s latency).
Other addresses for exposure-analytics.insight.rapid7.com (not scanned): 52.86.192.22 52.21.75.143
rDNS record for 54.208.223.79: ec2-54-208-223-79.compute-1.amazonaws.com
Not shown: 998 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http
| fingerprint-strings:
| DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, X11Probe:
| HTTP/1.1 400 BAD_REQUEST
| Content-Length: 0
| Connection: Close
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.1 503 Service Unavailable: Back-end server is at capacity
| Content-Length: 0
|_ Connection: Close
|_http-title: Site doesn't have a title.
443/tcp open ssl/http Jetty
|_http-title: Rapid7 Exposure Analytics
| ssl-cert: Subject: commonName=exposure-analytics.insight.rapid7.com
| Subject Alternative Name: DNS:exposure-analytics.insight.rapid7.com
| Not valid before: 2023-10-24T00:00:00
|_Not valid after: 2024-11-19T23:59:59
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.70%I=7%D=11/18%Time=6559B0A5%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,6A,"HTTP/1\.1\x20503\x20Service\x20Unavailable:\x20Back-end
SF:\x20server\x20is\x20at\x20capacity\r\nContent-Length:\x200\r\nConnectio
SF:n:\x20Close\r\n\r\n")%r(HTTPOptions,6A,"HTTP/1\.1\x20503\x20Service\x20
SF:Unavailable:\x20Back-end\x20server\x20is\x20at\x20capacity\r\nContent-L
SF:ength:\x200\r\nConnection:\x20Close\r\n\r\n")%r(RTSPRequest,42,"HTTP/1\
SF:.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clos
SF:e\r\n\r\n")%r(X11Probe,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-L
SF:ength:\x200\r\nConnection:\x20Close\r\n\r\n")%r(FourOhFourRequest,6A,"H
SF:TTP/1\.1\x20503\x20Service\x20Unavailable:\x20Back-end\x20server\x20is\
SF:x20at\x20capacity\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r
SF:\n")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\
SF:x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSVersionBindReqTCP,42,"HTTP/
SF:1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Cl
SF:ose\r\n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST
SF:\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SSLSession
SF:Req,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConn
SF:ection:\x20Close\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20BAD_
SF:REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(Ker
SF:beros,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nCo
SF:nnection:\x20Close\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x20BAD_R
SF:EQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(LDAP
SF:SearchReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r
SF:\nConnection:\x20Close\r\n\r\n")%r(LDAPBindReq,42,"HTTP/1\.1\x20400\x20
SF:BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r
SF:(SIPOptions,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200
SF:\r\nConnection:\x20Close\r\n\r\n")%r(LANDesk-RC,42,"HTTP/1\.1\x20400\x2
SF:0BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%
SF:r(TerminalServer,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:
SF:\x200\r\nConnection:\x20Close\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|PBX
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%), Vodavi embedded (87%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/h:vodavi:xts-ip
Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.10 - 3.13 (88%), Vodavi XTS-IP PBX (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.18 ms 208.76.251.177
2 0.56 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.77 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1)
4 1.06 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5 12.66 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161)
6 20.89 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54)
7 36.99 ms be3851.ccr42.iah01.atlas.cogentco.com (154.54.2.5)
8 38.31 ms be2418.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.6.78)
9 37.98 ms 38.88.155.218
10 41.87 ms 52.93.254.215
11 42.39 ms 52.93.64.139
12 ... 16
17 67.28 ms ec2-54-208-223-79.compute-1.amazonaws.com (54.208.223.79)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 66.45 seconds