Nmap scan report for 8f0661bf726242e11deec30c1d8e32c0bd375af2306095d42e35e9a2489f139.us-east-1.prod.service.minerva.devices.a2z.com (34.198.73.133)
Host is up (0.057s latency).
Other addresses for 8f0661bf726242e11deec30c1d8e32c0bd375af2306095d42e35e9a2489f139.us-east-1.prod.service.minerva.devices.a2z.com (not scanned): 2600:1f18:3723:ea01:abe9:c3fb:934d:daa4 2600:1f18:3723:ea00:94c2:a885:d124:e99b 2600:1f18:3723:ea00:ea06:4ae1:147c:2d5b 2600:1f18:3723:ea01:6bd7:b6cd:9de5:8369 2600:1f18:3723:ea01:5fe4:54bf:293e:ffbc 2600:1f18:3723:ea02:2822:20de:c9da:2474 2600:1f18:3723:ea00:3ea5:3c7d:1724:e148 2600:1f18:3723:ea00:66fe:f182:59aa:5085 35.173.99.134 54.88.106.33 3.226.95.35 52.21.105.228 34.192.222.158 44.208.84.178 3.226.180.68
rDNS record for 34.198.73.133: ec2-34-198-73-133.compute-1.amazonaws.com
Not shown: 999 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
443/tcp open ssl/https
|_http-cors: HEAD GET POST PUT DELETE TRACE OPTIONS CONNECT PATCH
|_http-title: Site doesn't have a title.
| ssl-cert: Subject: commonName=*.us-east-1.prod.service.minerva.devices.a2z.com
| Subject Alternative Name: DNS:*.us-east-1.prod.service.minerva.devices.a2z.com
| Not valid before: 2025-04-22T00:00:00
|_Not valid after: 2026-05-21T23:59:59
| fingerprint-strings:
| DNSVersionBindReqTCP, RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Fri, 12 Sep 2025 14:39:14 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
|
|
400 Bad Request
|
| 400 Bad Request
|
|
| FourOhFourRequest:
| HTTP/1.1 403 Forbidden
| Date: Fri, 12 Sep 2025 14:39:08 GMT
| Content-Length: 83
| Connection: close
| x-amzn-RequestId: 35201d22-00ce-4036-9afd-ce32cc001f98
|
| Unauthorized
|
| GetRequest:
| HTTP/1.1 403 Forbidden
| Date: Fri, 12 Sep 2025 14:39:08 GMT
| Content-Length: 83
| Connection: close
| x-amzn-RequestId: 0e5958d3-4f8d-48ca-9dcf-6e5d25468659
|
| Unauthorized
|
| HTTPOptions:
| HTTP/1.1 403 Forbidden
| Date: Fri, 12 Sep 2025 14:39:08 GMT
| Content-Length: 83
| Connection: close
| x-amzn-RequestId: a4d8d82a-2014-4bbe-85cf-f6a6246cbe98
|
| Unauthorized
|
| RTSPRequest:
|
| 400 Bad Request
|
| 400 Bad Request
|
|
| tor-versions:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Fri, 12 Sep 2025 14:39:08 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
|_
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/12%Time=68C4308B%P=x86_64-redhat-linux
SF:-gnu%r(GetRequest,F1,"HTTP/1\.1\x20403\x20Forbidden\r\nDate:\x20Fri,\x2
SF:012\x20Sep\x202025\x2014:39:08\x20GMT\r\nContent-Length:\x2083\r\nConne
SF:ction:\x20close\r\nx-amzn-RequestId:\x200e5958d3-4f8d-48ca-9dcf-6e5d254
SF:68659\r\n\r\n\n\x20\x20Unauthorized\n\n")%r(HTTPOptions,F1,"HTTP/1\.1\x20403
SF:\x20Forbidden\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2014:39:08\x20GMT\
SF:r\nContent-Length:\x2083\r\nConnection:\x20close\r\nx-amzn-RequestId:\x
SF:20a4d8d82a-2014-4bbe-85cf-f6a6246cbe98\r\n\r\n\n
SF:\x20\x20Unauthorized\n\n")%r
SF:(FourOhFourRequest,F1,"HTTP/1\.1\x20403\x20Forbidden\r\nDate:\x20Fri,\x
SF:2012\x20Sep\x202025\x2014:39:08\x20GMT\r\nContent-Length:\x2083\r\nConn
SF:ection:\x20close\r\nx-amzn-RequestId:\x2035201d22-00ce-4036-9afd-ce32cc
SF:001f98\r\n\r\n\n\x20\x20Unauthorized\n\n")%r(tor-versions,110,"HTTP/1\.1\x20
SF:400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Fri,\x2012\
SF:x20Sep\x202025\x2014:39:08\x20GMT\r\nContent-Type:\x20text/html\r\nCont
SF:ent-Length:\x20122\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n400\x20
SF:Bad\x20Request
\r\n\r\n\r\n")%r(RTSPRequest,
SF:7A,"\r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\r\n\r\n\r\n")%r(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer
SF::\x20awselb/2\.0\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2014:39:14\x20G
SF:MT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnectio
SF:n:\x20close\r\n\r\n\r\n400\x20Bad\x20Request
SF:\r\n\r\n400\x20Bad\x20Request
\r\
SF:n\r\n\r\n")%r(DNSVersionBindReqTCP,110,"HTTP/1\.1\x20400\
SF:x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Fri,\x2012\x20S
SF:ep\x202025\x2014:39:14\x20GMT\r\nContent-Type:\x20text/html\r\nContent-
SF:Length:\x20122\r\nConnection:\x20close\r\n\r\n\r\n40
SF:0\x20Bad\x20Request\r\n\r\n400\x20Bad\
SF:x20Request
\r\n\r\n\r\n");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Linux 4.X (85%)
OS CPE: cpe:/o:linux:linux_kernel:4.2
Aggressive OS guesses: Linux 4.2 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 17 hops
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177)
2 0.59 ms gw.mcom-colocationamerica.com (208.64.231.81)
3 0.64 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11)
4 ...
5 10.82 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85)
6 19.78 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57)
7 31.19 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25)
8 31.36 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74)
9 ... 16
17 56.71 ms ec2-34-198-73-133.compute-1.amazonaws.com (34.198.73.133)
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 41.90 seconds