Scan report for "20443-ipv4v6.gr.global.aa-rt.sharepoint.com"

Membership level: Free member
Scan OS information and Traceroute (nmap -A 20443-ipv4v6.gr.global.aa-rt.sharepoint.com)
Nmap scan report for 20443-ipv4v6.gr.global.aa-rt.sharepoint.com (40.108.210.45)
Host is up (0.059s latency).
Other addresses for 20443-ipv4v6.gr.global.aa-rt.sharepoint.com (not scanned): 2a01:111:f402:a402::45
Not shown: 998 filtered ports
PORT    STATE SERVICE VERSION
80/tcp  open  http    Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
443/tcp open  ssl     Microsoft SChannel TLS
| fingerprint-strings: 
|   TLSSessionReq: 
|     (xfpz
|     I^06
|     DigiCert Inc1%0#
|     DigiCert Cloud Services CA-10
|     230627000000Z
|     240626235959Z0o1
|     Washington1
|     Redmond1
|     Microsoft Corporation1
|     *.sharepoint.com0
|     y}BF
|     os5F
|     \x03
|     H3}uW
|     *.sharepoint.com
|     %*.sharepoint.apac.microsoftonline.com
|     %*.sharepoint.emea.microsoftonline.com
|     *.sharepoint.microsoftonline.com
|_    *.gr.global.aa-rt.sharep
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
| ssl-cert: Subject: commonName=*.sharepoint.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
| Subject Alternative Name: DNS:*.sharepoint.com, DNS:*.sharepoint.apac.microsoftonline.com, DNS:*.sharepoint.emea.microsoftonline.com, DNS:*.sharepoint.microsoftonline.com, DNS:*.gr.global.aa-rt.sharepoint.com
| Not valid before: 2023-06-27T00:00:00
|_Not valid after:  2024-06-26T23:59:59
|_ssl-date: 2023-11-20T20:37:13+00:00; 0s from scanner time.
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port443-TCP:V=7.70%I=7%D=11/20%Time=655BC363%P=x86_64-redhat-linux-gnu%
SF:r(TLSSessionReq,C4A,"\x16\x03\x03\x0cE\x02\0\0M\x03\x03e\[\xc3\^\x9cD\x
SF:c7T\xc7!\x1dLK\xc9\t\xf7~\xe9\xb1a\xcb\x1d0\xdd\xd9\(xfpz\xec\xfd\x20F\
SF:x13\0\0\xb6\xab\x20M\xef\x05\x8e\x9a\xb67\0\x1e\x94\xc1\xa11!\x90\x9cI\
SF:^06\x94\xd4\xddjw\0/\0\0\x05\xff\x01\0\x01\0\x0b\0\x0b\xec\0\x0b\xe9\0\
SF:x07M0\x82\x07I0\x82\x061\xa0\x03\x02\x01\x02\x02\x10\x0fr6\"\xc4\xd4\xd
SF:8\x9b\x98\xd1\xa0\xf5t\xe1\*\xff0\r\x06\t\*\x86H\x86\xf7\r\x01\x01\x0b\
SF:x05\x000K1\x0b0\t\x06\x03U\x04\x06\x13\x02US1\x150\x13\x06\x03U\x04\n\x
SF:13\x0cDigiCert\x20Inc1%0#\x06\x03U\x04\x03\x13\x1cDigiCert\x20Cloud\x20
SF:Services\x20CA-10\x1e\x17\r230627000000Z\x17\r240626235959Z0o1\x0b0\t\x
SF:06\x03U\x04\x06\x13\x02US1\x130\x11\x06\x03U\x04\x08\x13\nWashington1\x
SF:100\x0e\x06\x03U\x04\x07\x13\x07Redmond1\x1e0\x1c\x06\x03U\x04\n\x13\x1
SF:5Microsoft\x20Corporation1\x190\x17\x06\x03U\x04\x03\x0c\x10\*\.sharepo
SF:int\.com0\x82\x01\"0\r\x06\t\*\x86H\x86\xf7\r\x01\x01\x01\x05\0\x03\x82
SF:\x01\x0f\x000\x82\x01\n\x02\x82\x01\x01\0\xcd\x99\)\xaa\x04\xda\xc7\xbb
SF:\x8c\xa5\xb1\xa7\x11C\xf4l\xc3\xad>\x85\xd3\xf2\xcd\xac\xe2\xefy}BF\xad
SF:\xdd\xeb\x89os5F\x9aP\x90@\xee\xa8\x94Y\xb3\xf2\x13\x8d\xbe\\\x03\x85c\
SF:x8cm\x9e\xe0\xf4;\xe2\[<\x0f&;\x05\x03K\xd2!N\(\xd3\x1e`\"f\x80\$o\x8b\
SF:xd0l;\xf0\x98H3}uW\xe4\x06\x94\x0b\x91u\x20\x8f\x03\xad\xb5\x0c-43\x08\
SF:x817\xb52\xd5U\xd5q\xb8\xb6\x86\x88/e\xdf\$\x1f\x10\xde\x18\xedm\xeen,e
SF:\x98\xee2mT\xa7\x98bq`\xa4\x8f\x8c\[\xae\$j\xee\xd5\xc2y=4\xee=\x9fXf\x
SF:ce\0\xfc\x88\x7f\xe81s\xdeBH\x0c\xba\^z\x97\)\xdf{\xd3\x8c\xa7\xb9\xd0\
SF:xf6\x9e\xa8\(\x1d\x19\x86\[g\xb7l\xf5\x12\x97n\xe0\x9e\xe2\x8a\x9e\xb1h
SF:\x99/m\xde\xbd\xd6\xfa\xdf\n\xbft\xabj\x8a\xca8\x8a\xa7\x14\xf5\xea\n\x
SF:f6\xa4\x1d\xc0\x8c\x13,\x16\x10n\x01\x1a\xe9\x99\xe6\xe0\xbd\x1b\xf9\x8
SF:0O\x7f@\x11a\x02\x03\x01\0\x01\xa3\x82\x04\x030\x82\x03\xff0\x1f\x06\x0
SF:3U\x1d#\x04\x180\x16\x80\x14\xddQ\xd0\xa21s\xa9s\xae\x8f\xb4\x01~\]\x8c
SF:W\xcb\x9f\xf0\xf70\x1d\x06\x03U\x1d\x0e\x04\x16\x04\x145\xd7\xc2\x08\xe
SF:9\x94\x05:\xc6\x02V}\xae\xd1E\xa2{\x95RK0\x81\xaf\x06\x03U\x1d\x11\x04\
SF:x81\xa70\x81\xa4\x82\x10\*\.sharepoint\.com\x82%\*\.sharepoint\.apac\.m
SF:icrosoftonline\.com\x82%\*\.sharepoint\.emea\.microsoftonline\.com\x82\
SF:x20\*\.sharepoint\.microsoftonline\.com\x82\x20\*\.gr\.global\.aa-rt\.s
SF:harep");
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: load balancer|firewall
Running (JUST GUESSING): F5 Networks TMOS 11.6.X|11.4.X (90%), F5 Networks embedded (89%)
OS CPE: cpe:/o:f5:tmos:11.6 cpe:/o:f5:tmos:11.4
Aggressive OS guesses: F5 BIG-IP Local Traffic Manager load balancer (TMOS 11.6) (90%), F5 BIG-IP 3650 Local Traffic Manager load balancer (89%), F5 BIG-IP AFM firewall (85%), F5 BIG-IP load balancer (TMOS 11.4) (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 18 hops
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

TRACEROUTE (using port 443/tcp)
HOP RTT      ADDRESS
1   0.21 ms  208.76.251.177
2   0.61 ms  gw.mcom-colocationamerica.com (208.64.231.81)
3   0.80 ms  multacom.com (96.45.162.9)
4   0.48 ms  microsoft.as8075.any2ix.coresite.com (206.72.210.143)
5   7.62 ms  104.44.55.75
6   59.95 ms be-21-0.ibr02.lax30.ntwk.msn.net (104.44.33.171)
7   58.45 ms be-7-0.ibr02.phx10.ntwk.msn.net (104.44.30.8)
8   55.94 ms be-6-0.ibr02.sn1.ntwk.msn.net (104.44.16.182)
9   64.24 ms be-8-0.ibr01.atl30.ntwk.msn.net (104.44.18.57)
10  63.99 ms be-5-0.ibr01.bn6.ntwk.msn.net (104.44.29.178)
11  59.98 ms be-10-0.ibr03.bl20.ntwk.msn.net (104.44.30.119)
12  59.38 ms ae160-0.icr01.bl20.ntwk.msn.net (104.44.22.210)
13  ... 17
18  63.41 ms 40.108.210.45

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 45.27 seconds
Color Scheme
Target
20443-ipv4v6.gr.global.aa-rt.sharepoint.com
Target IP
40.108.210.45
Target Country
US
Scan method
Scan OS information and Traceroute
Run command
nmap -A 20443-ipv4v6.gr.global.aa-rt.sharepoint.com
Scan date
20 Nov 2023 15:37
Copy scan report
Download report
Remove scan result
$
Some firewalls blocks Port scans. For get true positive results add portscanner.online IP addresses (208.76.253.232-208.76.253.239 or CIDR 208.76.253.232/29 ) to the whitelist
[scan_method]
Visibility:
Scan method: