Scan report for ""

Membership level: Free member
Scan OS information and Traceroute (nmap -A
Nmap scan report for (
Host is up (0.00038s latency).
Other addresses for (not scanned): 2620:1ec:8f8::10 2620:1ec:8fa::10
Not shown: 997 filtered ports
53/tcp  closed domain
80/tcp  open   upnp    Microsoft IIS httpd
|_http-title: Did not follow redirect to
443/tcp open   https
| http-robots.txt: 1 disallowed entry 
|_http-title: Did not follow redirect to
| ssl-cert: Subject: commonName=* Corporation/stateOrProvinceName=WA/countryName=US
| Subject Alternative Name: DNS:*, DNS:*, DNS:*, DNS:*, DNS:*
| Not valid before: 2023-10-12T00:01:20
|_Not valid after:  2024-10-06T00:01:20
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows Longhorn|2016|2012|2008|Vista|10 (89%)
OS CPE: cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_server_2012 cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_vista::sp1 cpe:/o:microsoft:windows_10:1703
Aggressive OS guesses: Microsoft Windows Longhorn (89%), Microsoft Windows Server 2016 (89%), Microsoft Windows Server 2012 (88%), Microsoft Windows Server 2008 SP2 (87%), Microsoft Windows Vista SP1 (86%), Microsoft Windows 10 1703 (86%), Microsoft Windows Server 2012 R2 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 10 hops

TRACEROUTE (using port 80/tcp)
1   0.18 ms
2   0.53 ms (
3   0.63 ms (
4   6.56 ms (
5   ...
6   0.24 ms
7   ... 9
10  0.34 ms

OS and Service detection performed. Please report any incorrect results at .
Nmap done: 1 IP address (1 host up) scanned in 49.24 seconds
Color Scheme
Target IP
Target Country
Scan method
Scan OS information and Traceroute
Run command
nmap -A
Scan date
20 Nov 2023 14:04
Copy scan report
Download report
Remove scan result
Some firewalls blocks Port scans. For get true positive results add IP addresses ( or CIDR ) to the whitelist
Scan method: