Nmap scan report for burgiss.gocleary.com (34.215.54.127)
Host is up (0.028s latency).
Other addresses for burgiss.gocleary.com (not scanned): 35.164.165.99 34.214.45.146
rDNS record for 34.215.54.127: ec2-34-215-54-127.us-west-2.compute.amazonaws.com
Not shown: 998 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http awselb/2.0
|_http-title: 403 Forbidden
| fingerprint-strings:
| DNSVersionBindReqTCP, RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Fri, 12 Sep 2025 23:12:57 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
|
|
400 Bad Request
|
| 400 Bad Request
|
|
| FourOhFourRequest, GetRequest, HTTPOptions:
| HTTP/1.1 403 Forbidden
| Server: awselb/2.0
| Date: Fri, 12 Sep 2025 23:12:51 GMT
| Content-Type: text/html
| Content-Length: 118
| Connection: close
|
| 403 Forbidden
|
| 403 Forbidden
|
|
| RTSPRequest:
|
| 400 Bad Request
|
| 400 Bad Request
|
|
| X11Probe:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Fri, 12 Sep 2025 23:12:51 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
|_
|_http-server-header: awselb/2.0
443/tcp open ssl/https awselb/2.0
|_http-server-header: awselb/2.0
|_http-title: 403 Forbidden
| tls-alpn:
| h2
|_ http/1.1
| ssl-cert: Subject: commonName=gocleary.com
| Subject Alternative Name: DNS:gocleary.com, DNS:*.gocleary.com
| Not valid before: 2024-12-26T00:00:00
|_Not valid after: 2026-01-24T23:59:59
|_ssl-date: TLS randomness does not represent time
| tls-nextprotoneg:
| h2
|_ http/1.1
| fingerprint-strings:
| DNSVersionBindReqTCP, RPCCheck:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Fri, 12 Sep 2025 23:13:03 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
|
| FourOhFourRequest:
| HTTP/1.1 403 Forbidden
| Server: awselb/2.0
| Date: Fri, 12 Sep 2025 23:12:58 GMT
| Content-Type: text/html
| Content-Length: 118
| Connection: close
|
| 403 Forbidden
|
| 403 Forbidden
|
|
| GetRequest, HTTPOptions:
| HTTP/1.1 403 Forbidden
| Server: awselb/2.0
| Date: Fri, 12 Sep 2025 23:12:57 GMT
| Content-Type: text/html
| Content-Length: 118
| Connection: close
|
| 403 Forbidden
|
| 403 Forbidden
|
|
| RTSPRequest:
|
| 400 Bad Request
|
| 400 Bad Request
|
|
| tor-versions:
| HTTP/1.1 400 Bad Request
| Server: awselb/2.0
| Date: Fri, 12 Sep 2025 23:12:58 GMT
| Content-Type: text/html
| Content-Length: 122
| Connection: close
|
| 400 Bad Request
|
| 400 Bad Request
|
|_
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.92%I=7%D=9/12%Time=68C4A8F3%P=x86_64-redhat-linux-gnu%r(
SF:GetRequest,10A,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20awselb/2\.0
SF:\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2023:12:51\x20GMT\r\nContent-Ty
SF:pe:\x20text/html\r\nContent-Length:\x20118\r\nConnection:\x20close\r\n\
SF:r\n\r\n403\x20Forbidden\r\n\r\n
SF:403\x20Forbidden
\r\n\r\n\r\n")%
SF:r(HTTPOptions,10A,"HTTP/1\.1\x20403\x20Forbidden\r\nServer:\x20awselb/2
SF:\.0\r\nDate:\x20Fri,\x2012\x20Sep\x202025\x2023:12:51\x20GMT\r\nContent
SF:-Type:\x20text/html\r\nContent-Length:\x20118\r\nConnection:\x20close\r
SF:\n\r\n\r\n403\x20Forbidden\r\n\
SF:r\n403\x20Forbidden
\r\n\r\n\r\n
SF:")%r(RTSPRequest,7A,"\r\n400\x20Bad\x20Request\r\n\r\n400\x20Bad\x20Request
\
SF:r\n\r\n\r\n")%r(X11Probe,110,"HTTP/1\.1\x20400\x20Bad\x20
SF:Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20Fri,\x2012\x20Sep\x202025
SF:\x2023:12:51\x20GMT\r\nContent-Type:\x20text/html\r\nContent-Length:\x2
SF:0122\r\nConnection:\x20close\r\n\r\n\r\n400\x20Bad\x
SF:20Request\r\n\r\n400\x20Bad\x20Request
SF:
\r\n\r\n\r\n")%r(FourOhFourRequest,10A,"HTT
SF:P/1\.1\x20403\x20Forbidden\r\nServer:\x20awselb/2\.0\r\nDate:\x20Fri,\x
SF:2012\x20Sep\x202025\x2023:12:51\x20GMT\r\nContent-Type:\x20text/html\r\
SF:nContent-Length:\x20118\r\nConnection:\x20close\r\n\r\n\r\n
SF:403\x20Forbidden\r\n\r\n403\x20
SF:Forbidden
\r\n\r\n\r\n")%r(RPCCheck,110,"HTT
SF:P/1\.1\x20400\x20Bad\x20Request\r\nServer:\x20awselb/2\.0\r\nDate:\x20F
SF:ri,\x2012\x20Sep\x202025\x2023:12:57\x20GMT\r\nContent-Type:\x20text/ht
SF:ml\r\nContent-Length:\x20122\r\nConnection:\x20close\r\n\r\n\r\n<
SF:head>400\x20Bad\x20Request\r\n\r\n<
SF:h1>400\x20Bad\x20Request\r\n\r\n