# Nmap 7.60 scan initiated Fri Nov 22 21:53:42 2019 as: nmap --privileged -oA data/natlas.2m5xldgpfpaoa7o8/nmap.2m5xldgpfpaoa7o8 --servicedb ./natlas-services -sV -O --script=default,ssh-auth-methods,ssl-enum-ciphers --open --script-timeout=60 --host-timeout=600 --osscan-limit 67.195.231.19 Nmap scan report for api-prod-amt.amt.vip.gq1.yahoo.com (67.195.231.19) Host is up (0.070s latency). Not shown: 1838 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE VERSION 443/tcp open ssl/https amt | fingerprint-strings: | FourOhFourRequest: | HTTP/1.1 404 Not Found | Connection: close | Server: amt | Content-Length: 0 | Date: Fri, 22 Nov 2019 21:55:25 GMT | GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SIPOptions, SMBProgNeg, SSLSessionReq, TLSSessionReq, WMSRequest, oracle-tns: | HTTP/1.1 400 Bad Request | Content-Length: 0 | Connection: close | GetRequest: | HTTP/1.1 404 Not Found | Connection: close | Server: amt | Content-Length: 0 | Date: Fri, 22 Nov 2019 21:55:24 GMT | HTTPOptions: | HTTP/1.1 500 Internal Server Error | Connection: close | Content-Type: text/html;charset=UTF-8 | Content-Length: 80 | Date: Fri, 22 Nov 2019 21:55:25 GMT |_ ErrorInternal Server Error |_http-server-header: amt |_http-title: Site doesn't have a title. | ssl-cert: Subject: commonName=api.amt.oath.com/organizationName=Oath Inc/stateOrProvinceName=California/countryName=US | Subject Alternative Name: DNS:api.amt.oath.com | Not valid before: 2019-07-19T00:00:00 |_Not valid after: 2020-01-15T12:00:00 |_ssl-date: 2019-11-22T21:56:36+00:00; 0s from scanner time. | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port443-TCP:V=7.60%T=SSL%I=7%D=11/22%Time=5DD8594C%P=x86_64-pc-linux-gn SF:u%r(GetRequest,72,"HTTP/1\.1\x20404\x20Not\x20Found\r\nConnection:\x20c SF:lose\r\nServer:\x20amt\r\nContent-Length:\x200\r\nDate:\x20Fri,\x2022\x SF:20Nov\x202019\x2021:55:24\x20GMT\r\n\r\n")%r(HTTPOptions,E9,"HTTP/1\.1\ SF:x20500\x20Internal\x20Server\x20Error\r\nConnection:\x20close\r\nConten SF:t-Type:\x20text/html;charset=UTF-8\r\nContent-Length:\x2080\r\nDate:\x2 SF:0Fri,\x2022\x20Nov\x202019\x2021:55:25\x20GMT\r\n\r\nErrorInternal\x20Server\x20Error")% SF:r(FourOhFourRequest,72,"HTTP/1\.1\x20404\x20Not\x20Found\r\nConnection: SF:\x20close\r\nServer:\x20amt\r\nContent-Length:\x200\r\nDate:\x20Fri,\x2 SF:022\x20Nov\x202019\x2021:55:25\x20GMT\r\n\r\n")%r(GenericLines,42,"HTTP SF:/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x SF:20close\r\n\r\n")%r(RTSPRequest,42,"HTTP/1\.1\x20400\x20Bad\x20Request\ SF:r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(Help,42,"HT SF:TP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection: SF:\x20close\r\n\r\n")%r(SSLSessionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Requ SF:est\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(TLSSess SF:ionReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r SF:\nConnection:\x20close\r\n\r\n")%r(Kerberos,42,"HTTP/1\.1\x20400\x20Bad SF:\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r SF:(SMBProgNeg,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x SF:200\r\nConnection:\x20close\r\n\r\n")%r(LPDString,42,"HTTP/1\.1\x20400\ SF:x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20close\r\n\r SF:\n")%r(LDAPSearchReq,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent- SF:Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(SIPOptions,42,"HTTP/1\ SF:.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnection:\x20c SF:lose\r\n\r\n")%r(WMSRequest,42,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nC SF:ontent-Length:\x200\r\nConnection:\x20close\r\n\r\n")%r(oracle-tns,42," SF:HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Length:\x200\r\nConnectio SF:n:\x20close\r\n\r\n"); Read from .: natlas-services. Read from /usr/bin/../share/nmap: nmap-os-db nmap-payloads nmap-service-probes. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Fri Nov 22 21:56:44 2019 -- 1 IP address (1 host up) scanned in 183.33 seconds