Detected technology

Aws Waf

Below is a recent sample of public scans on ScanMalware.com where Aws Waf was detected as part of the site's technology stack. Use this as a jumping-off point for investigating how Aws Waf is deployed across the web — including on potentially malicious or compromised hosts.

Public scans matching Aws Waf
1,506
Category
Detected technology

Recent scans where Aws Waf was detected

URLTitleSubmitted
https://api.geckoengage.com2026-05-07
https://dl.cws.xfinity.com2026-05-07
https://be-reg-groceries-bff-jumbo.ecomm.cencosud.comERROR: The request could not be satisfied2026-05-07
https://insomniaccia.com2026-05-07
https://8xv25wb5th.execute-api.ap-southeast-1.amazonaws.com2026-05-07
https://xw0vq7mhbi.execute-api.ap-southeast-1.amazonaws.com2026-05-06
https://mailchi.mp/templeton.org/templetonideas_20260506?e=9a9b26aac6The Boldest Thing in Science Isn’t Knowing2026-05-06
https://avpk-aoqangg4nu6nc-1.na.api.amazonvideo.comavpk-aoqangg4nu6nc-1.na.api.amazonvideo.com2026-05-06
https://ove.comERROR: The request could not be satisfied2026-05-06
https://lambda.ap-southeast-1.amazonaws.com2026-05-06
https://okta-auth.nasba.org2026-05-06
https://cdn-geo.priv.center2026-05-06
https://flickrprints.comERROR: The request could not be satisfied2026-05-06
https://b-fb26e881.kinesisvideo.us-west-2.amazonaws.com2026-05-06
https://includemodal.global.ssl.fastly.netERROR: The request could not be satisfied2026-05-06
https://api.ssrn.com2026-05-06
https://api-sps.foxweather.com2026-05-06
https://ewshlxsxbed7vngb4drr4pd4um0oqoex.lambda-url.us-east-1.on.aws2026-05-06
https://apigwrst.extremeterrain.com2026-05-05
https://www.tuko.co.keERROR: The request could not be satisfied2026-05-05

How ScanMalware detects Aws Waf

Each public scan on ScanMalware.com is analysed for the technologies that make up the site's stack — web servers, frameworks, CDNs, analytics, and security middleware. When Aws Waf is observed (via response headers, fingerprintable URLs, JavaScript globals, or known asset patterns), the scan is tagged accordingly. This page lists scans where Aws Waf was identified as part of the underlying stack.

Want to dig deeper? You can pivot from any scan into related signals — JARM TLS fingerprints, ASN ownership, BGP routing, or co-resident technologies — to map how Aws Waf is being used across the public web.