Scan report for "data-sdp-tag-collector-pipeline.primary-a.us-east-1.kic-prod.shuttercloud.org"

Membership level: Free member
Scan OS information and Traceroute (nmap -A data-sdp-tag-collector-pipeline.primary-a.us-east-1.kic-prod.shuttercloud.org)
Nmap scan report for data-sdp-tag-collector-pipeline.primary-a.us-east-1.kic-prod.shuttercloud.org (54.204.50.221)
Host is up (0.070s latency).
Other addresses for data-sdp-tag-collector-pipeline.primary-a.us-east-1.kic-prod.shuttercloud.org (not scanned): 44.221.27.246 52.7.66.189 54.175.226.54 54.243.253.14
rDNS record for 54.204.50.221: ec2-54-204-50-221.compute-1.amazonaws.com
Not shown: 998 filtered tcp ports (no-response)
PORT    STATE SERVICE   VERSION
80/tcp  open  http
|_http-title: Site doesn't have a title (image/gif).
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LDAPBindReq, LDAPSearchReq, RPCCheck, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: 
|     HTTP/1.1 400 BAD_REQUEST
|     Content-Length: 0
|     Connection: Close
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.1 200 OK
|     Content-Type: image/gif
|     Content-Length: 35
|     Connection: Close
|_    GIF89a
443/tcp open  ssl/https
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Kerberos, LDAPBindReq, LDAPSearchReq, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe, tor-versions: 
|     HTTP/1.1 400 BAD_REQUEST
|     Content-Length: 0
|     Connection: Close
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.1 200 OK
|     Content-Type: image/gif
|     Content-Length: 35
|     Connection: Close
|_    GIF89a
|_http-title: Site doesn't have a title (image/gif).
| ssl-cert: Subject: commonName=*.primary-a.us-east-1.kic-prod.shuttercloud.org
| Subject Alternative Name: DNS:*.primary-a.us-east-1.kic-prod.shuttercloud.org, DNS:premiumbeat.com, DNS:novalibrary.net, DNS:*.submit.shutterstock.com, DNS:shutterstock.com, DNS:shutterstock.mobi, DNS:*.pbcorp.net, DNS:*.bigstockcorp.net, DNS:pbcorp.net, DNS:shutterstock.info, DNS:*.managed.kic-prod.shuttercloud.org, DNS:shuttercorp.net, DNS:*.freestock.com, DNS:*.offsetcorp.net, DNS:picdn.net, DNS:bigstockphoto.com, DNS:*.shutterstock.info, DNS:*.shutterstock.mobi, DNS:*.shuttercorp.net, DNS:bigstockcorp.net, DNS:*.novalibrary.net, DNS:*.premiumbeat.com, DNS:*.picdn.net, DNS:*.shutterstock.com, DNS:*.bigstockphoto.com, DNS:freestock.com, DNS:offset.com, DNS:*.offset.com, DNS:offsetcorp.net
| Not valid before: 2024-05-05T00:00:00
|_Not valid after:  2025-06-03T23:59:59
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=5/15%Time=6645AA6E%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,76,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20image/gif\r\n
SF:Content-Length:\x2035\r\nConnection:\x20Close\r\n\r\nGIF89a\x01\0\x01\0
SF:\x80\0\0\xff\xff\xff\0\0\0,\0\0\0\0\x01\0\x01\0\0\x02\x02D\x01\0;")%r(H
SF:TTPOptions,76,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20image/gif\r\n
SF:Content-Length:\x2035\r\nConnection:\x20Close\r\n\r\nGIF89a\x01\0\x01\0
SF:\x80\0\0\xff\xff\xff\0\0\0,\0\0\0\0\x01\0\x01\0\0\x02\x02D\x01\0;")%r(R
SF:TSPRequest,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\
SF:r\nConnection:\x20Close\r\n\r\n")%r(X11Probe,42,"HTTP/1\.1\x20400\x20BA
SF:D_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(F
SF:ourOhFourRequest,76,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20image/g
SF:if\r\nContent-Length:\x2035\r\nConnection:\x20Close\r\n\r\nGIF89a\x01\0
SF:\x01\0\x80\0\0\xff\xff\xff\0\0\0,\0\0\0\0\x01\0\x01\0\0\x02\x02D\x01\0;
SF:")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x2
SF:00\r\nConnection:\x20Close\r\n\r\n")%r(DNSVersionBindReqTCP,42,"HTTP/1\
SF:.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clos
SF:e\r\n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r
SF:\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SSLSessionRe
SF:q,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnec
SF:tion:\x20Close\r\n\r\n")%r(TerminalServerCookie,42,"HTTP/1\.1\x20400\x2
SF:0BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%
SF:r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\
SF:x200\r\nConnection:\x20Close\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x20400\
SF:x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n"
SF:)%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x
SF:200\r\nConnection:\x20Close\r\n\r\n")%r(LDAPSearchReq,42,"HTTP/1\.1\x20
SF:400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\
SF:r\n")%r(LDAPBindReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Leng
SF:th:\x200\r\nConnection:\x20Close\r\n\r\n")%r(SIPOptions,42,"HTTP/1\.1\x
SF:20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\
SF:n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=5/15%Time=6645AA79%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,76,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20image/
SF:gif\r\nContent-Length:\x2035\r\nConnection:\x20Close\r\n\r\nGIF89a\x01\
SF:0\x01\0\x80\0\0\xff\xff\xff\0\0\0,\0\0\0\0\x01\0\x01\0\0\x02\x02D\x01\0
SF:;")%r(HTTPOptions,76,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20image/
SF:gif\r\nContent-Length:\x2035\r\nConnection:\x20Close\r\n\r\nGIF89a\x01\
SF:0\x01\0\x80\0\0\xff\xff\xff\0\0\0,\0\0\0\0\x01\0\x01\0\0\x02\x02D\x01\0
SF:;")%r(FourOhFourRequest,76,"HTTP/1\.1\x20200\x20OK\r\nContent-Type:\x20
SF:image/gif\r\nContent-Length:\x2035\r\nConnection:\x20Close\r\n\r\nGIF89
SF:a\x01\0\x01\0\x80\0\0\xff\xff\xff\0\0\0,\0\0\0\0\x01\0\x01\0\0\x02\x02D
SF:\x01\0;")%r(tor-versions,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent
SF:-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(RTSPRequest,42,"HTTP/
SF:1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Cl
SF:ose\r\n\r\n")%r(RPCCheck,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent
SF:-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(DNSVersionBindReqTCP,
SF:42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnecti
SF:on:\x20Close\r\n\r\n")%r(DNSStatusRequestTCP,42,"HTTP/1\.1\x20400\x20BA
SF:D_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(S
SF:SLSessionReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x20
SF:0\r\nConnection:\x20Close\r\n\r\n")%r(TerminalServerCookie,42,"HTTP/1\.
SF:1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Close
SF:\r\n\r\n")%r(TLSSessionReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nConte
SF:nt-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(Kerberos,42,"HTTP/1
SF:\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clo
SF:se\r\n\r\n")%r(SMBProgNeg,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nConten
SF:t-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(X11Probe,42,"HTTP/1\
SF:.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x20Clos
SF:e\r\n\r\n")%r(LDAPSearchReq,42,"HTTP/1\.1\x20400\x20BAD_REQUEST\r\nCont
SF:ent-Length:\x200\r\nConnection:\x20Close\r\n\r\n")%r(LDAPBindReq,42,"HT
SF:TP/1\.1\x20400\x20BAD_REQUEST\r\nContent-Length:\x200\r\nConnection:\x2
SF:0Close\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.10 - 3.13 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.20 ms  208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2   0.50 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.82 ms  r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4   ...
5   12.28 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6   21.07 ms be2979.ccr21.elp02.atlas.cogentco.com (154.54.5.218)
7   37.31 ms be3850.ccr41.iah01.atlas.cogentco.com (154.54.0.53)
8   38.08 ms be2417.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.3.246)
9   37.49 ms 38.88.155.218
10  38.67 ms 52.93.254.229
11  40.19 ms 52.93.64.81
12  ... 16
17  70.26 ms ec2-54-204-50-221.compute-1.amazonaws.com (54.204.50.221)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 162.68 seconds
Color Scheme
Target
data-sdp-tag-collector-pipeline.primary-a.us-east-1.kic-prod.shuttercloud.org
Target IP
54.204.50.221
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A data-sdp-tag-collector-pipeline.primary-a.us-east-1.kic-prod.shuttercloud.org
Scan date
16 May 2024 02:43
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: