Ports
Duration
Date
IP
Nmap scan report for hubblecontent.osi.office.net.mcas.ms (4.205.74.7) Host is up (0.061s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 80/tcp open http OpenResty web app server |_http-title: Continue |_http-trane-info: Problem with XML parsing of /evox/about 443/tcp open ssl/http OpenResty web app server |_http-title: Continue |_http-trane-info: Problem with XML parsing of /evox/about | ssl-cert: Subject: commonName=*.osi.office.net.mcas.ms/organizationName=Microsoft Corporation/stateOrProvinceName=WA/countryName=US | Subject Alternative Name: DNS:*.osi.office.net.mcas.ms, DNS:*.osi.office.net.admin-mcas.ms, DNS:*.osi.office.net.mcas-df.ms, DNS:*.osi.office.net.admin-mcas-df.ms | Not valid before: 2024-07-30T06:22:35 |_Not valid after: 2025-07-25T06:22:35 |_ssl-date: TLS randomness does not represent time |_http-server-header: openresty Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port OS fingerprint not ideal because: Missing a closed TCP port so results incomplete No OS matches for host Network Distance: 25 hops TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177.rdns.ColocationAmerica.com (208.76.251.177) 2 300.04 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.79 ms r2b4.n1.p1401.lax.multacom.net (64.69.46.11) 4 1.01 ms microsoft.as8075.any2ix.coresite.com (206.72.210.143) 5 9.47 ms ae27-0.ear03.lax31.ntwk.msn.net (104.44.49.168) 6 63.59 ms be-22-0.ibr01.lax31.ntwk.msn.net (104.44.33.177) 7 59.42 ms be-10-0.ibr04.cys04.ntwk.msn.net (104.44.7.41) 8 63.53 ms be-2-0.ibr02.cys04.ntwk.msn.net (104.44.16.157) 9 59.29 ms be-2-0.ibr01.dsm05.ntwk.msn.net (104.44.17.34) 10 62.24 ms be-4-0.ibr01.ch2.ntwk.msn.net (104.44.18.214) 11 63.78 ms be-3-0.ibr02.cle02.ntwk.msn.net (104.44.29.252) 12 59.43 ms be-3-0.ibr01.yto20.ntwk.msn.net (104.44.28.106) 13 68.55 ms ae102-0.icr02.yto20.ntwk.msn.net (104.44.20.150) 14 ... 24 25 63.40 ms 4.205.74.7 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 39.70 seconds