Analyser le rapport pour "admin.microsoft365.com"

Niveau d'adhésion: Membre gratuit
Analyser les informations du système d'exploitation et Traceroute (nmap -A admin.microsoft365.com)
Nmap scan report for admin.microsoft365.com (13.107.6.156)
Host is up (0.00037s latency).
Other addresses for admin.microsoft365.com (not scanned): 2620:1ec:a92::156
Not shown: 997 filtered ports
PORT    STATE  SERVICE VERSION
53/tcp  closed domain
80/tcp  open   upnp    Microsoft IIS httpd
|_http-title: Did not follow redirect to https://admin.microsoft365.com/
443/tcp open   https
| http-robots.txt: 7 disallowed entries 
| /Signup /Start /Partner /signup /start /partner 
|_/*?*auth_upn=
|_http-title: Site doesn't have a title (text/html; charset=utf-8).
| ssl-cert: Subject: commonName=portal.office.com/organizationName=Microsoft Corporation/stateOrProvinceName=WA/countryName=US
| Subject Alternative Name: DNS:portal.office.com, DNS:portal.microsoftonline.com, DNS:portalprv.microsoftonline.com, DNS:ncuportalprv.office.com, DNS:office.com, DNS:portal.microsoft.com, DNS:home.office.com, DNS:portal-sdf.office.com, DNS:prod.msocdn.com, DNS:www.office.com, DNS:*.portal.office.com, DNS:*.www.office.com, DNS:admin.microsoft.com, DNS:admin.microsoft365.com, DNS:www.microsoft365.com, DNS:ntp.www.office.com, DNS:fluid.office.com, DNS:microsoft365.com, DNS:word.office.com, DNS:excel.office.com, DNS:powerpoint.office.com, DNS:visio.office.com, DNS:apps.office.com, DNS:stream.office.com, DNS:portal.office365.com, DNS:m365.go.microsoft, DNS:m365.cloud.microsoft
| Not valid before: 2023-09-13T22:45:31
|_Not valid after:  2024-09-07T22:45:31
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows Longhorn|2016|Vista|10|2012|2008|7|8.1 (90%)
OS CPE: cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_vista::sp1 cpe:/o:microsoft:windows_10:1703 cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_7:::ultimate cpe:/o:microsoft:windows_8.1
Aggressive OS guesses: Microsoft Windows Longhorn (90%), Microsoft Windows Server 2016 (88%), Microsoft Windows Vista SP1 (87%), Microsoft Windows 10 1703 (86%), Microsoft Windows Server 2012 R2 (86%), Microsoft Windows Server 2008 SP2 (86%), Microsoft Windows Server 2012 (85%), Microsoft Windows 7, Windows Server 2012, or Windows 8.1 Update 1 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 9 hops

TRACEROUTE (using port 80/tcp)
HOP RTT     ADDRESS
1   0.19 ms 208.76.251.177
2   0.64 ms gw.mcom-colocationamerica.com (208.64.231.81)
3   0.70 ms multacom.com (96.45.162.9)
4   3.64 ms microsoft.as8075.any2ix.coresite.com (206.72.210.143)
5   ...
6   0.29 ms 13.104.141.151
7   ... 8
9   0.27 ms 13.107.6.156

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 46.00 seconds
Schéma de couleur
Cible
admin.microsoft365.com
IP cible
13.107.6.156
Pays cible
US
Méthode de numérisation
Analyser les informations du système d'exploitation et Traceroute
Exécuter la commande
nmap -A admin.microsoft365.com
Scan date
18 Nov 2023 16:09
Copier le rapport de numérisation
Télécharger le rapport
Remove scan result
$
Certains pare-feu bloquent les analyses de port. Pour obtenir de vrais résultats positifs, ajoutez les adresses IP portscanner.online (208.76.253.232-208.76.253.239 ou CIDR 208.76.253.232/29) à la liste blanche
[scan_method]
Visibilité:
Méthode de numérisation: