3.132.93.26

Regular View Raw Data
Last Seen: 2024-04-20

GeneralInformation

Hostnames adventurelanding.com
buffalo.adventurelanding.com
charlotte.adventurelanding.com
crest.adventurelanding.com
dallas.adventurelanding.com
gastonia.adventurelanding.com
greece.adventurelanding.com
jacksonville-beach.adventurelanding.com
jacksonville-blanding.adventurelanding.com
mmfc.adventurelanding.com
raleigh.adventurelanding.com
st-augustine.adventurelanding.com
winston-salem.adventurelanding.com
www.adventurelanding.com
ec2-3-132-93-26.us-east-2.compute.amazonaws.com
coolcrest.com
www.coolcrest.com
magicmountainfuncenter.com
www.magicmountainfuncenter.com
Domains adventurelanding.com amazonaws.com coolcrest.com magicmountainfuncenter.com 
Cloud Provider Amazon
Cloud Region us-east-2
Cloud Service EC2
Country United States
City Columbus
Organization Amazon Technologies Inc.
ISP Amazon.com, Inc.
ASN AS16509
Operating System Ubuntu

WebTechnologies

Advertising
Blogs
Databases
Form builders
JavaScript graphics
Photo galleries
Programming languages
Tag managers
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2021-23017 6.8A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.

OpenPorts

589765266 | 2024-04-18T15:51:13.584120
  
80 / tcp
-24509543 | 2024-04-20T07:59:54.171213
  
443 / tcp



Contact Us

Shodan ® - All rights reserved