Ports
Durée
Date
IP
Nmap scan report for district86-my.sharepoint.com (13.107.136.10) Host is up (0.00058s latency). Other addresses for district86-my.sharepoint.com (not scanned): 2620:1ec:8fa::10 2620:1ec:8f8::10 13.107.138.10 Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 53/tcp closed domain 80/tcp open upnp Microsoft IIS httpd |_http-title: Did not follow redirect to https://district86-my.sharepoint.com/ 443/tcp open ssl/https | ssl-cert: Subject: commonName=*.sharepoint.com/organizationName=Microsoft Corporation/stateOrProvinceName=WA/countryName=US | Subject Alternative Name: DNS:*.sharepoint.com, DNS:*.sharepoint.apac.microsoftonline.com, DNS:*.sharepoint.emea.microsoftonline.com, DNS:*.sharepoint.microsoftonline.com, DNS:*.gr.global.aa-rt.sharepoint.com | Not valid before: 2025-03-03T22:46:09 |_Not valid after: 2026-02-26T22:46:09 |_ssl-date: TLS randomness does not represent time | http-robots.txt: 1 disallowed entry |_/ |_http-title: Did not follow redirect to https://login.microsoftonline.com:443/6cf7d1ee-d9aa-4b21-9285-dd2e40265aa4/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=869B39A169E0281FF484E7A999EC7EEC6568A960C8D6B31D%2DB69B288E6B733EE90EE392B5039E6AF3FDF44EB4A1BC4531C9B3E08C8213ED10&redirect%5Furi=https%3A%2F%2Fdistrict86%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=ab8bc1a1%2Dc05f%2D9000%2Df5f6%2D0cd9886c7add Device type: general purpose Running (JUST GUESSING): Microsoft Windows Longhorn|2016|XP|2008|Vista|10|2012 (90%) OS CPE: cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_xp::sp3 cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_vista::sp1 cpe:/o:microsoft:windows_10 cpe:/o:microsoft:windows_server_2012 Aggressive OS guesses: Microsoft Windows Longhorn (90%), Microsoft Windows Server 2016 (89%), Microsoft Windows XP SP3 (88%), Microsoft Windows Server 2008 SP2 (88%), Microsoft Windows Vista SP1 (87%), Microsoft Windows 10 1709 - 1803 (87%), Microsoft Windows 10 1709 - 1909 (87%), Microsoft Windows 10 1809 - 1909 (87%), Microsoft Windows Server 2012 (86%), Microsoft Windows 10 1703 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 11 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.52 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.88 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 1.33 ms microsoft.as8075.any2ix.coresite.com (206.72.210.143) 5 ... 6 0.40 ms 13.104.141.153 7 ... 10 11 0.47 ms 13.107.136.10 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 27.08 seconds
Caractéristiques
5 scans/jour
Appels API quotidiens - 20 requêtes
Enregistrer le journal
Analyse publique
Analyse OSINT
Analyse non répertoriée
Analyse privé
Pas de Ads
Supprimer après l'analyse
Supprimer le résultat de l'analyse
Méthodes supplémentaires de numérisation
Cette option convient aux débutants qui souhaitent vérifier si leur hôte dispose de ports ouverts accessibles de l'extérieur.
Durée de vie
Caractéristiques
10 000 scans/jour
Appels API quotidiens - 100 000 requêtes
Enregistrer le journal
Analyse publique
Analyse OSINT
Analyse non répertoriée
Analyse privé
Pas de Ads
Supprimer après l'analyse
Supprimer le résultat de l'analyse
Méthodes supplémentaires de numérisation
Cette option est idéale pour les professionnels qui ont besoin de tester les ports ouverts de leur hôte à partir d'une source externe.
Facturé annuellement @ $45.00 - 50% réduction