Nmap scan report for suggest1.ingles.com (44.194.199.159)
Host is up (0.057s latency).
Other addresses for suggest1.ingles.com (not scanned): 2600:1f18:ad9:2001:4073:fd59:489b:8150 2600:1f18:ad9:2000:fff5:8109:4384:2774 34.238.8.76
rDNS record for 44.194.199.159: ec2-44-194-199-159.compute-1.amazonaws.com
Not shown: 998 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http
|_http-title: Error
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 404 Not Found
| Date: Thu, 11 Sep 2025 23:00:55 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 174
| Connection: close
| Vary: Origin
| Content-Security-Policy: default-src 'none'
| X-Content-Type-Options: nosniff
|
|
|
|
| Error
|
|
| Cannot GET /nice%20ports%2C/Tri%6Eity.txt%2ebak
|
|
| GetRequest:
| HTTP/1.1 404 Not Found
| Date: Thu, 11 Sep 2025 23:00:54 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 139
| Connection: close
| Vary: Origin
| Content-Security-Policy: default-src 'none'
| X-Content-Type-Options: nosniff
|
|
|
|
| Error
|
|
| Cannot GET /
|
|
| HTTPOptions:
| HTTP/1.1 204 No Content
| Date: Thu, 11 Sep 2025 23:00:54 GMT
| Content-Length: 0
| Connection: close
| Vary: Origin, Access-Control-Request-Headers
| Access-Control-Allow-Methods: GET
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Thu, 11 Sep 2025 23:01:00 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
|
| RTSPRequest:
|
| 400 Bad Request
|
| 400 Bad Request
|
|
| X11Probe:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Thu, 11 Sep 2025 23:00:55 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
|_
443/tcp open ssl/https
|_http-title: Error
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.1 404 Not Found
| Date: Thu, 11 Sep 2025 23:01:01 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 174
| Connection: close
| Vary: Origin
| Content-Security-Policy: default-src 'none'
| X-Content-Type-Options: nosniff
|
|
|
|
| Error
|
|
| Cannot GET /nice%20ports%2C/Tri%6Eity.txt%2ebak
|
|
| GetRequest:
| HTTP/1.1 404 Not Found
| Date: Thu, 11 Sep 2025 23:01:00 GMT
| Content-Type: text/html; charset=utf-8
| Content-Length: 139
| Connection: close
| Vary: Origin
| Content-Security-Policy: default-src 'none'
| X-Content-Type-Options: nosniff
|
|
|
|
| Error
|
|
| Cannot GET /
|
|
| HTTPOptions:
| HTTP/1.1 204 No Content
| Date: Thu, 11 Sep 2025 23:01:01 GMT
| Content-Length: 0
| Connection: close
| Vary: Origin, Access-Control-Request-Headers
| Access-Control-Allow-Methods: GET
| RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Thu, 11 Sep 2025 23:01:07 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
|
| RTSPRequest:
|
| 400 Bad Request
|
| 400 Bad Request
|
|
| tor-versions:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Thu, 11 Sep 2025 23:01:01 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
|_
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=*.ingles.com
| Subject Alternative Name: DNS:*.ingles.com, DNS:ingles.com
| Not valid before: 2025-05-08T00:00:00
|_Not valid after: 2026-06-06T23:59:59
| tls-nextprotoneg:
| h2
|_ http/1.1
| tls-alpn:
| h2
|_ http/1.1
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=9/11%Time=68C354A6%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,176,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Thu,\x2011
SF:\x20Sep\x202025\x2023:00:54\x20GMT\r\nContent-Type:\x20text/html;\x20ch
SF:arset=utf-8\r\nContent-Length:\x20139\r\nConnection:\x20close\r\nVary:\
SF:x20Origin\r\nContent-Security-Policy:\x20default-src\x20'none'\r\nX-Con
SF:tent-Type-Options:\x20nosniff\r\n\r\n\n\n\n\nError\n\n\nCannot\x20GET\x20/
\n\n\n")%r(HTT
SF:POptions,B7,"HTTP/1\.1\x20204\x20No\x20Content\r\nDate:\x20Thu,\x2011\x
SF:20Sep\x202025\x2023:00:54\x20GMT\r\nContent-Length:\x200\r\nConnection:
SF:\x20close\r\nVary:\x20Origin,\x20Access-Control-Request-Headers\r\nAcce
SF:ss-Control-Allow-Methods:\x20GET\r\n\r\n")%r(RTSPRequest,7A,"\r\n
SF:400\x20Bad\x20Request\r\n\r\n
SF:400\x20Bad\x20Request
\r\n\r\n\r\n")%r(X
SF:11Probe,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\
SF:.0\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x2023:00:55\x20GMT\r\nContent-
SF:Type:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\
SF:n\r\n\r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\r\n\r\n
SF:html>\r\n")%r(FourOhFourRequest,199,"HTTP/1\.1\x20404\x20Not\x20Found\r
SF:\nDate:\x20Thu,\x2011\x20Sep\x202025\x2023:00:55\x20GMT\r\nContent-Type
SF::\x20text/html;\x20charset=utf-8\r\nContent-Length:\x20174\r\nConnectio
SF:n:\x20close\r\nVary:\x20Origin\r\nContent-Security-Policy:\x20default-s
SF:rc\x20'none'\r\nX-Content-Type-Options:\x20nosniff\r\n\r\n\n\n\n\nError\n\n\nCannot\x20GET\x20/nice%20ports%
SF:2C/Tri%6Eity\.txt%2ebak
\n\n\n")%r(RPCCheck,110,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20T
SF:hu,\x2011\x20Sep\x202025\x2023:01:00\x20GMT\r\nContent-Type:\x20text/ht
SF:ml\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n\r\n<
SF:head>400\x20Bad\x20Request\r\n\r\n<
SF:h1>400\x20Bad\x20Request\r\n\r\n\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/11%Time=68C354AC%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,176,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Thu
SF:,\x2011\x20Sep\x202025\x2023:01:00\x20GMT\r\nContent-Type:\x20text/html
SF:;\x20charset=utf-8\r\nContent-Length:\x20139\r\nConnection:\x20close\r\
SF:nVary:\x20Origin\r\nContent-Security-Policy:\x20default-src\x20'none'\r
SF:\nX-Content-Type-Options:\x20nosniff\r\n\r\n\n\n\n\nError\n\n\nCannot\x20GET\x20/
\n\n\n"
SF:)%r(HTTPOptions,B7,"HTTP/1\.1\x20204\x20No\x20Content\r\nDate:\x20Thu,\
SF:x2011\x20Sep\x202025\x2023:01:01\x20GMT\r\nContent-Length:\x200\r\nConn
SF:ection:\x20close\r\nVary:\x20Origin,\x20Access-Control-Request-Headers\
SF:r\nAccess-Control-Allow-Methods:\x20GET\r\n\r\n")%r(FourOhFourRequest,1
SF:99,"HTTP/1\.1\x20404\x20Not\x20Found\r\nDate:\x20Thu,\x2011\x20Sep\x202
SF:025\x2023:01:01\x20GMT\r\nContent-Type:\x20text/html;\x20charset=utf-8\
SF:r\nContent-Length:\x20174\r\nConnection:\x20close\r\nVary:\x20Origin\r\
SF:nContent-Security-Policy:\x20default-src\x20'none'\r\nX-Content-Type-Op
SF:tions:\x20nosniff\r\n\r\n\n\n\n\nError\n\n
SF:\nCannot\x20GET\x20/nice%20ports%2C/Tri%6Eity\.txt%2ebak
\n
SF:body>\n\n")%r(tor-versions,110,"HTTP/1\.1\x20400\x20Bad\x20Reque
SF:st\r\nServer:\x20awselb/2\.0\r\nDate:\x20Thu,\x2011\x20Sep\x202025\x202
SF:3:01:01\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\
SF:r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Req
SF:uest\r\n\r\n400\x20Bad\x20Request
SF:\r\n\r\n\r\n")%r(RTSPRequest,7A,"\r\n400\x20Bad\x20Request\r\n\r\n4
SF:00\x20Bad\x20Request
\r\n\r\n\r\n")%r(RPCChe
SF:ck,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\
SF:nDate:\x20Thu,\x2011\x20Sep\x202025\x2023:01:07\x20GMT\r\nContent-Type:
SF:\x20text/html\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n
SF:\r\n400\x20Bad\x20Request\r\n\r
SF:\n400\x20Bad\x20Request
\r\n\r\n
SF:\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (90%)
OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
Aggressive OS guesses: Linux 2.6.32 (90%), Linux 3.2 - 4.9 (90%), Linux 2.6.32 - 3.10 (89%), Linux 2.6.32 - 3.13 (89%), Linux 3.10 - 3.13 (88%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 14 hops
TRACEROUTE (using port 80/tcp)
HOP RTT ADDRESS
1 0.21 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.57 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.60 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4 ...
5 11.07 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6 20.00 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7 31.06 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8 31.11 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74)
9 ... 13
14 56.87 ms ec2-44-194-199-159.compute-1.amazonaws.com (44.194.199.159)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 40.96 seconds