Scan report for "postbox.thinkingphones.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A postbox.thinkingphones.com)
Nmap scan report for postbox.thinkingphones.com (34.204.140.52)
Host is up (0.068s latency).
Other addresses for postbox.thinkingphones.com (not scanned): 52.205.107.166 3.83.57.75
rDNS record for 34.204.140.52: ec2-34-204-140-52.compute-1.amazonaws.com
Not shown: 999 filtered ports
PORT    STATE SERVICE   VERSION
443/tcp open  ssl/https
| fingerprint-strings: 
|   FourOhFourRequest, GetRequest, HTTPOptions: 
|     HTTP/1.1 404 Not Found
|     Date: Tue, 21 Nov 2023 03:51:24 GMT
|     Content-Length: 0
|     Connection: close
|     Access-Control-Allow-Origin: *
|     Access-Control-Allow-Headers: Authorization,Content-Type,Idempotency-Key,X-Long-Encoding,FZ-TransactionID
|     Access-Control-Allow-Methods: POST,GET,DELETE,PUT,PATCH,OPTIONS
|   RPCCheck: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Tue, 21 Nov 2023 03:51:30 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   RTSPRequest: 
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|     </html>
|   tor-versions: 
|     HTTP/1.1 400 Bad Request
|     Server: awselb/2.0
|     Date: Tue, 21 Nov 2023 03:51:25 GMT
|     Content-Type: text/html
|     Content-Length: 122
|     Connection: close
|     <html>
|     <head><title>400 Bad Request</title></head>
|     <body>
|     <center><h1>400 Bad Request</h1></center>
|     </body>
|_    </html>
|_http-cors: GET POST PUT DELETE OPTIONS PATCH
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=postbox.thinkingphones.com
| Subject Alternative Name: DNS:postbox.thinkingphones.com, DNS:postbox-dev.thinkingphones.com, DNS:postbox-stage.thinkingphones.com
| Not valid before: 2023-03-01T00:00:00
|_Not valid after:  2024-03-29T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|   h2
|_  http/1.1
| tls-nextprotoneg: 
|   h2
|_  http/1.1
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655C293B%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,131,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Tu
SF:e,\x2021\x20Nov\x202023\x2003:51:24\x20GMT\r\nContent-Length:\x200\r\nC
SF:onnection:\x20close\r\nAccess-Control-Allow-Origin:\x20\*\r\nAccess-Con
SF:trol-Allow-Headers:\x20Authorization,Content-Type,Idempotency-Key,X-Lon
SF:g-Encoding,FZ-TransactionID\r\nAccess-Control-Allow-Methods:\x20POST,GE
SF:T,DELETE,PUT,PATCH,OPTIONS\r\n\r\n")%r(HTTPOptions,131,"HTTP/1\.1\x2040
SF:4\x20Not\x20Found\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2003:51:24\x20
SF:GMT\r\nContent-Length:\x200\r\nConnection:\x20close\r\nAccess-Control-A
SF:llow-Origin:\x20\*\r\nAccess-Control-Allow-Headers:\x20Authorization,Co
SF:ntent-Type,Idempotency-Key,X-Long-Encoding,FZ-TransactionID\r\nAccess-C
SF:ontrol-Allow-Methods:\x20POST,GET,DELETE,PUT,PATCH,OPTIONS\r\n\r\n")%r(
SF:FourOhFourRequest,131,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Tue
SF:,\x2021\x20Nov\x202023\x2003:51:24\x20GMT\r\nContent-Length:\x200\r\nCo
SF:nnection:\x20close\r\nAccess-Control-Allow-Origin:\x20\*\r\nAccess-Cont
SF:rol-Allow-Headers:\x20Authorization,Content-Type,Idempotency-Key,X-Long
SF:-Encoding,FZ-TransactionID\r\nAccess-Control-Allow-Methods:\x20POST,GET
SF:,DELETE,PUT,PATCH,OPTIONS\r\n\r\n")%r(tor-versions,110,"HTTP/1\.1\x2040
SF:0\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Tue,\x2021\x2
SF:0Nov\x202023\x2003:51:25\x20GMT\r\nContent-Type:\x20text/html\r\nConten
SF:t-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\n<head><title>
SF:400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Ba
SF:d\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,7A
SF:,"<html>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>
SF:\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</htm
SF:l>\r\n")%r(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\
SF:x20awselb/2\.0\r\nDate:\x20Tue,\x2021\x20Nov\x202023\x2003:51:30\x20GMT
SF:\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:
SF:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title></
SF:head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n<
SF:/body>\r\n</html>\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 4.X (87%)
OS CPE: cpe:/o:linux:linux_kernel:4.2
Aggressive OS guesses: Linux 4.2 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.21 ms  208.76.251.177
2   0.56 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.92 ms  1.162.45.96-dedicated.multacom.com (96.45.162.1)
4   1.16 ms  be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57)
5   12.45 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161)
6   21.05 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54)
7   36.99 ms be3851.ccr42.iah01.atlas.cogentco.com (154.54.2.5)
8   38.40 ms be2418.rcr51.b023723-0.iah01.atlas.cogentco.com (154.54.6.78)
9   39.46 ms 38.88.155.218
10  40.08 ms 52.93.254.209
11  40.19 ms 52.93.64.77
12  ... 16
17  67.75 ms ec2-34-204-140-52.compute-1.amazonaws.com (34.204.140.52)

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 57.14 seconds
Color Scheme
Target
postbox.thinkingphones.com
Target IP
34.204.140.52
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A postbox.thinkingphones.com
Scan date
20 Nov 2023 22:52
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: