Scan OS information and Traceroute (nmap -A analytic-proxy.theathletic.com)
Nmap scan report for analytic-proxy.theathletic.com (35.155.180.228)
Host is up (0.026s latency).
Other addresses for analytic-proxy.theathletic.com (not scanned): 54.185.103.180 50.112.197.45
rDNS record for 35.155.180.228: ec2-35-155-180-228.us-west-2.compute.amazonaws.com
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
80/tcp open http awselb/2.0
| fingerprint-strings:
| DNSVersionBindReqTCP, RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Mon, 20 Nov 2023 16:15:18 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.1 503 Service Temporarily Unavailable
| Server: awselb/2.0
| Date: Mon, 20 Nov 2023 16:15:13 GMT
| Content-Type: text/plain; charset=utf-8
| Content-Length: 0
| Connection: close
| RTSPRequest:
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| X11Probe:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Mon, 20 Nov 2023 16:15:13 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
|_http-server-header: awselb/2.0
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
443/tcp open ssl/https awselb/2.0
| fingerprint-strings:
| DNSVersionBindReqTCP, RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Mon, 20 Nov 2023 16:15:25 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| FourOhFourRequest, GetRequest:
| HTTP/1.1 503 Service Temporarily Unavailable
| Server: awselb/2.0
| Date: Mon, 20 Nov 2023 16:15:19 GMT
| Content-Type: text/plain; charset=utf-8
| Content-Length: 59
| Connection: close
| Http Request Method Error - This endpoint only accepts POST
| HTTPOptions:
| HTTP/1.1 503 Service Temporarily Unavailable
| Server: awselb/2.0
| Date: Mon, 20 Nov 2023 16:15:19 GMT
| Content-Type: text/plain; charset=utf-8
| Content-Length: 14
| Connection: close
| route found
| RTSPRequest:
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
| </html>
| tor-versions:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Mon, 20 Nov 2023 16:15:20 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
| <html>
| <head><title>400 Bad Request</title></head>
| <body>
| <center><h1>400 Bad Request</h1></center>
| </body>
|_ </html>
|_http-server-header: awselb/2.0
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
| ssl-cert: Subject: commonName=*.theathletic.com
| Subject Alternative Name: DNS:*.theathletic.com
| Not valid before: 2023-02-26T00:00:00
|_Not valid after: 2024-03-26T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
| h2
|_ http/1.1
| tls-nextprotoneg:
| h2
|_ http/1.1
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=11/20%Time=655B8610%P=x86_64-redhat-linux-gnu%r
SF:(GetRequest,B8,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Unavailab
SF:le\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x201
SF:6:15:13\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\nCont
SF:ent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(HTTPOptions,B8,"HT
SF:TP/1\.1\x20503\x20Service\x20Temporarily\x20Unavailable\r\nServer:\x20a
SF:wselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2016:15:13\x20GMT\r\n
SF:Content-Type:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x200\r
SF:\nConnection:\x20close\r\n\r\n")%r(RTSPRequest,7A,"<html>\r\n<head><tit
SF:le>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x2
SF:0Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(X11Probe,11
SF:0,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate
SF::\x20Mon,\x2020\x20Nov\x202023\x2016:15:13\x20GMT\r\nContent-Type:\x20t
SF:ext/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html
SF:>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<ce
SF:nter><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n"
SF:)%r(FourOhFourRequest,B8,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x2
SF:0Unavailable\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x2
SF:02023\x2016:15:13\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf
SF:-8\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(RPCCheck
SF:,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nD
SF:ate:\x20Mon,\x2020\x20Nov\x202023\x2016:15:18\x20GMT\r\nContent-Type:\x
SF:20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<h
SF:tml>\r\n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n
SF:<center><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r
SF:\n")%r(DNSVersionBindReqTCP,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\n
SF:Server:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2016:15:1
SF:8\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nCon
SF:nection:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</
SF:title></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></cent
SF:er>\r\n</body>\r\n</html>\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=11/20%Time=655B8616%P=x86_64-redhat-linu
SF:x-gnu%r(GetRequest,F4,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Un
SF:available\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x2020
SF:23\x2016:15:19\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\
SF:r\nContent-Length:\x2059\r\nConnection:\x20close\r\n\r\nHttp\x20Request
SF:\x20Method\x20Error\x20-\x20This\x20endpoint\x20only\x20accepts\x20POST
SF:")%r(HTTPOptions,C7,"HTTP/1\.1\x20503\x20Service\x20Temporarily\x20Unav
SF:ailable\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023
SF:\x2016:15:19\x20GMT\r\nContent-Type:\x20text/plain;\x20charset=utf-8\r\
SF:nContent-Length:\x2014\r\nConnection:\x20close\r\n\r\nNo\x20route\x20fo
SF:und")%r(FourOhFourRequest,F4,"HTTP/1\.1\x20503\x20Service\x20Temporaril
SF:y\x20Unavailable\r\nServer:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20No
SF:v\x202023\x2016:15:19\x20GMT\r\nContent-Type:\x20text/plain;\x20charset
SF:=utf-8\r\nContent-Length:\x2059\r\nConnection:\x20close\r\n\r\nHttp\x20
SF:Request\x20Method\x20Error\x20-\x20This\x20endpoint\x20only\x20accepts\
SF:x20POST")%r(tor-versions,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nSer
SF:ver:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2016:15:20\x
SF:20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnec
SF:tion:\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</tit
SF:le></head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>
SF:\r\n</body>\r\n</html>\r\n")%r(RTSPRequest,7A,"<html>\r\n<head><title>4
SF:00\x20Bad\x20Request</title></head>\r\n<body>\r\n<center><h1>400\x20Bad
SF:\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(RPCCheck,110,"H
SF:TTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x2
SF:0Mon,\x2020\x20Nov\x202023\x2016:15:25\x20GMT\r\nContent-Type:\x20text/
SF:html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n<html>\r\
SF:n<head><title>400\x20Bad\x20Request</title></head>\r\n<body>\r\n<center
SF:><h1>400\x20Bad\x20Request</h1></center>\r\n</body>\r\n</html>\r\n")%r(
SF:DNSVersionBindReqTCP,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:
SF:\x20awselb/2\.0\r\nDate:\x20Mon,\x2020\x20Nov\x202023\x2016:15:25\x20GM
SF:T\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection
SF::\x20close\r\n\r\n<html>\r\n<head><title>400\x20Bad\x20Request</title><
SF:/head>\r\n<body>\r\n<center><h1>400\x20Bad\x20Request</h1></center>\r\n
SF:</body>\r\n</html>\r\n");
Aggressive OS guesses: Linux 2.6.32 (93%), Linux 3.2 - 4.9 (93%), Linux 2.6.32 - 3.10 (92%), Vodavi XTS-IP PBX (91%), Lexmark 1400-series printer (90%), Linux 3.1 (90%), Linux 3.2 (90%), Linux 3.10 - 3.13 (90%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (90%), Linux 2.6.32 - 3.13 (90%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 20 hops
TRACEROUTE (using port 25/tcp)
HOP RTT ADDRESS
1 0.84 ms 208.76.251.177
2 0.65 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.75 ms multacom.com (96.45.162.9)
4 0.52 ms 206.72.211.146.any2ix.coresite.com (206.72.211.146)
5 ... 19
20 26.20 ms ec2-35-155-180-228.us-west-2.compute.amazonaws.com (35.155.180.228)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 48.46 seconds
Color Scheme
-
Target
-
Target IP
35.155.180.228
-
Target Country
-
Scan method
Scan OS information and Traceroute
-
Run command
nmap -A analytic-proxy.theathletic.com
-
Scan date
20 Nov 2023 11:15
-
Copy scan report
-
Download report
-
Remove scan result