34.210.134.29

Regular View Raw Data
Last Seen: 2024-05-12

GeneralInformation

Hostnames ec2-34-210-134-29.us-west-2.compute.amazonaws.com
findhomesinwilmingtonnc.com
anne.findhomesinwilmingtonnc.com
annvacca.findhomesinwilmingtonnc.com
audrey.findhomesinwilmingtonnc.com
audrie.findhomesinwilmingtonnc.com
becky.findhomesinwilmingtonnc.com
charity.findhomesinwilmingtonnc.com
charles.findhomesinwilmingtonnc.com
christian.findhomesinwilmingtonnc.com
domino.findhomesinwilmingtonnc.com
doris.findhomesinwilmingtonnc.com
homes.findhomesinwilmingtonnc.com
janine.findhomesinwilmingtonnc.com
jennifercutler.findhomesinwilmingtonnc.com
joanna.findhomesinwilmingtonnc.com
ketasia.findhomesinwilmingtonnc.com
kiernanshanahan.findhomesinwilmingtonnc.com
kirk.findhomesinwilmingtonnc.com
kristine.findhomesinwilmingtonnc.com
larry.findhomesinwilmingtonnc.com
nancy.findhomesinwilmingtonnc.com
paul.findhomesinwilmingtonnc.com
rick.findhomesinwilmingtonnc.com
seanspivey.findhomesinwilmingtonnc.com
teri.findhomesinwilmingtonnc.com
www.findhomesinwilmingtonnc.com
zach.findhomesinwilmingtonnc.com
Domains amazonaws.com findhomesinwilmingtonnc.com 
Cloud Provider Amazon
Cloud Region us-west-2
Cloud Service EC2
Country United States
City Boardman
Organization Amazon Technologies Inc.
ISP Amazon.com, Inc.
ASN AS16509

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

OpenPorts

1144453381 | 2024-05-11T17:11:29.184881
  
80 / tcp
1954738980 | 2024-05-12T05:05:21.650433
  
443 / tcp



Contact Us

Shodan ® - All rights reserved