Ports
Duration
Date
IP
Nmap scan report for district86-my.sharepoint.com (13.107.136.10) Host is up (0.00058s latency). Other addresses for district86-my.sharepoint.com (not scanned): 2620:1ec:8fa::10 2620:1ec:8f8::10 13.107.138.10 Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 53/tcp closed domain 80/tcp open upnp Microsoft IIS httpd |_http-title: Did not follow redirect to https://district86-my.sharepoint.com/ 443/tcp open ssl/https | ssl-cert: Subject: commonName=*.sharepoint.com/organizationName=Microsoft Corporation/stateOrProvinceName=WA/countryName=US | Subject Alternative Name: DNS:*.sharepoint.com, DNS:*.sharepoint.apac.microsoftonline.com, DNS:*.sharepoint.emea.microsoftonline.com, DNS:*.sharepoint.microsoftonline.com, DNS:*.gr.global.aa-rt.sharepoint.com | Not valid before: 2025-03-03T22:46:09 |_Not valid after: 2026-02-26T22:46:09 |_ssl-date: TLS randomness does not represent time | http-robots.txt: 1 disallowed entry |_/ |_http-title: Did not follow redirect to https://login.microsoftonline.com:443/6cf7d1ee-d9aa-4b21-9285-dd2e40265aa4/oauth2/authorize?client%5Fid=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&response%5Fmode=form%5Fpost&response%5Ftype=code%20id%5Ftoken&resource=00000003%2D0000%2D0ff1%2Dce00%2D000000000000&scope=openid&nonce=869B39A169E0281FF484E7A999EC7EEC6568A960C8D6B31D%2DB69B288E6B733EE90EE392B5039E6AF3FDF44EB4A1BC4531C9B3E08C8213ED10&redirect%5Furi=https%3A%2F%2Fdistrict86%2Dmy%2Esharepoint%2Ecom%2F%5Fforms%2Fdefault%2Easpx&state=OD0w&claims=%7B%22id%5Ftoken%22%3A%7B%22xms%5Fcc%22%3A%7B%22values%22%3A%5B%22CP1%22%5D%7D%7D%7D&wsucxt=1&cobrandid=11bd8083%2D87e0%2D41b5%2Dbb78%2D0bc43c8a8e8a&client%2Drequest%2Did=ab8bc1a1%2Dc05f%2D9000%2Df5f6%2D0cd9886c7add Device type: general purpose Running (JUST GUESSING): Microsoft Windows Longhorn|2016|XP|2008|Vista|10|2012 (90%) OS CPE: cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_xp::sp3 cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_vista::sp1 cpe:/o:microsoft:windows_10 cpe:/o:microsoft:windows_server_2012 Aggressive OS guesses: Microsoft Windows Longhorn (90%), Microsoft Windows Server 2016 (89%), Microsoft Windows XP SP3 (88%), Microsoft Windows Server 2008 SP2 (88%), Microsoft Windows Vista SP1 (87%), Microsoft Windows 10 1709 - 1803 (87%), Microsoft Windows 10 1709 - 1909 (87%), Microsoft Windows 10 1809 - 1909 (87%), Microsoft Windows Server 2012 (86%), Microsoft Windows 10 1703 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 11 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 0.52 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.88 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 1.33 ms microsoft.as8075.any2ix.coresite.com (206.72.210.143) 5 ... 6 0.40 ms 13.104.141.153 7 ... 10 11 0.47 ms 13.107.136.10 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 27.08 seconds
Features
5 scans/day
Daily API Calls - 20 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.
Lifetime
Features
10 000 scans/day
Daily API Calls - 100 000 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is best for professionals who need to test their host's open ports from an external source.
Billed Annually @ $45.00 - 50% discount