Nmap scan report for 8f0661bf726242e11deec30c1d8e32c0bd375af2306095d42e35e9a2489f139.us-east-1.prod.service.minerva.devices.a2z.com (34.198.73.133) Host is up (0.057s latency). Other addresses for 8f0661bf726242e11deec30c1d8e32c0bd375af2306095d42e35e9a2489f139.us-east-1.prod.service.minerva.devices.a2z.com (not scanned): 2600:1f18:3723:ea01:abe9:c3fb:934d:daa4 2600:1f18:3723:ea00:94c2:a885:d124:e99b 2600:1f18:3723:ea00:ea06:4ae1:147c:2d5b 2600:1f18:3723:ea01:6bd7:b6cd:9de5:8369 2600:1f18:3723:ea01:5fe4:54bf:293e:ffbc 2600:1f18:3723:ea02:2822:20de:c9da:2474 2600:1f18:3723:ea00:3ea5:3c7d:1724:e148 2600:1f18:3723:ea00:66fe:f182:59aa:5085 35.173.99.134 54.88.106.33 3.226.95.35 52.21.105.228 34.192.222.158 44.208.84.178 3.226.180.68 rDNS record for 34.198.73.133: ec2-34-198-73-133.compute-1.amazonaws.com Not shown: 999 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-cors: HEAD GET POST PUT DELETE TRACE OPTIONS CONNECT PATCH |_http-title: Site doesn't have a title. | ssl-cert: Subject: commonName=*.us-east-1.prod.service.minerva.devices.a2z.com | Subject Alternative Name: DNS:*.us-east-1.prod.service.minerva.devices.a2z.com | Not valid before: 2025-04-22T00:00:00 |_Not valid after: 2026-05-21T23:59:59 | fingerprint-strings: | DNSVersionBindReqTCP, RPCCheck: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Fri, 12 Sep 2025 14:39:14 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | | 400 Bad Request | |

400 Bad Request

| | | FourOhFourRequest: | HTTP/1.1 403 Forbidden | Date: Fri, 12 Sep 2025 14:39:08 GMT | Content-Length: 83 | Connection: close | x-amzn-RequestId: 35201d22-00ce-4036-9afd-ce32cc001f98 | | Unauthorized | | GetRequest: | HTTP/1.1 403 Forbidden | Date: Fri, 12 Sep 2025 14:39:08 GMT | Content-Length: 83 | Connection: close | x-amzn-RequestId: 0e5958d3-4f8d-48ca-9dcf-6e5d25468659 | | Unauthorized | | HTTPOptions: | HTTP/1.1 403 Forbidden | Date: Fri, 12 Sep 2025 14:39:08 GMT | Content-Length: 83 | Connection: close | x-amzn-RequestId: a4d8d82a-2014-4bbe-85cf-f6a6246cbe98 | | Unauthorized | | RTSPRequest: | | 400 Bad Request | |

400 Bad Request

| | | tor-versions: | HTTP/1.1 400 Bad Request | Server: awselb/2.0 | Date: Fri, 12 Sep 2025 14:39:08 GMT | Content-Type: text/html | Content-Length: 122 | Connection: close | | 400 Bad Request | |

400 Bad Request

| |_ 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.92%T=SSL%I=7%D=9/12%Time=68C4308B%P=x86_64-redhat-linux SF:-gnu%r(GetRequest,F1,"HTTP/1\.1\x20403\x20Forbidden\r\nDate:\x20Fri,\x2 SF:012\x20Sep\x202025\x2014:39:08\x20GMT\r\nContent-Length:\x2083\r\nConne SF:ction:\x20close\r\nx-amzn-RequestId:\x200e5958d3-4f8d-48ca-9dcf-6e5d254 SF:68659\r\n\r\n\n\x20\x20Unauthorized\n\n")%r(HTTPOptions,F1,"HTTP/1\.1\x20403 SF:\x20Forbidden\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2014:39:08\x20GMT\ SF:r\nContent-Length:\x2083\r\nConnection:\x20close\r\nx-amzn-RequestId:\x SF:20a4d8d82a-2014-4bbe-85cf-f6a6246cbe98\r\n\r\n\n SF:\x20\x20Unauthorized\n\n")%r SF:(FourOhFourRequest,F1,"HTTP/1\.1\x20403\x20Forbidden\r\nDate:\x20Fri,\x SF:2012\x20Sep\x202025\x2014:39:08\x20GMT\r\nContent-Length:\x2083\r\nConn SF:ection:\x20close\r\nx-amzn-RequestId:\x2035201d22-00ce-4036-9afd-ce32cc SF:001f98\r\n\r\n\n\x20\x20Unauthorized\n\n")%r(tor-versions,110,"HTTP/1\.1\x20 SF:400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Fri,\x2012\ SF:x20Sep\x202025\x2014:39:08\x20GMT\r\nContent-Type:\x20text/html\r\nCont SF:ent-Length:\x20122\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x20Request\r\n\r\n

400\x20 SF:Bad\x20Request

\r\n\r\n\r\n")%r(RTSPRequest, SF:7A,"\r\n400\x20Bad\x20Request\r\n\r\n

400\x20Bad\x20Request

\r\n\r\n\r\n")%r(RPCCheck,110,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nServer SF::\x20awselb/2\.0\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2014:39:14\x20G SF:MT\r\nContent-Type:\x20text/html\r\nContent-Length:\x20122\r\nConnectio SF:n:\x20close\r\n\r\n\r\n400\x20Bad\x20Request SF:\r\n\r\n

400\x20Bad\x20Request

\r\ SF:n\r\n\r\n")%r(DNSVersionBindReqTCP,110,"HTTP/1\.1\x20400\ SF:x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Fri,\x2012\x20S SF:ep\x202025\x2014:39:14\x20GMT\r\nContent-Type:\x20text/html\r\nContent- SF:Length:\x20122\r\nConnection:\x20close\r\n\r\n\r\n40 SF:0\x20Bad\x20Request\r\n\r\n

400\x20Bad\ SF:x20Request

\r\n\r\n\r\n"); Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): Linux 4.X (85%) OS CPE: cpe:/o:linux:linux_kernel:4.2 Aggressive OS guesses: Linux 4.2 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 17 hops TRACEROUTE (using port 443/tcp) HOP RTT ADDRESS 1 0.19 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.59 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.64 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 ... 5 10.82 ms be2931.ccr31.phx01.atlas.cogentco.com (154.54.44.85) 6 19.78 ms be5471.ccr21.elp02.atlas.cogentco.com (154.54.166.57) 7 31.19 ms be3821.ccr31.dfw01.atlas.cogentco.com (154.54.165.25) 8 31.36 ms be2763.ccr41.dfw03.atlas.cogentco.com (154.54.28.74) 9 ... 16 17 56.71 ms ec2-34-198-73-133.compute-1.amazonaws.com (34.198.73.133) OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 41.90 seconds