Scan report for ""

Membership level: Free member
Scan OS information and Traceroute (nmap -A
Nmap scan report for (
Host is up (0.00036s latency).
Other addresses for (not scanned): 2620:1ec:8fa::10 2620:1ec:8f8::10
Not shown: 997 filtered ports
53/tcp  closed domain
80/tcp  open   upnp    Microsoft IIS httpd
|_http-title: Did not follow redirect to
443/tcp open   https
| http-robots.txt: 1 disallowed entry 
|_http-title: Did not follow redirect to
| ssl-cert: Subject: commonName=* Corporation/stateOrProvinceName=WA/countryName=US
| Subject Alternative Name: DNS:*, DNS:*, DNS:*, DNS:*, DNS:*
| Not valid before: 2023-10-12T00:01:20
|_Not valid after:  2024-10-06T00:01:20
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows Longhorn|2012|2016|2008|Vista|10 (89%)
OS CPE: cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2012 cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_vista::sp1 cpe:/o:microsoft:windows_10:1703
Aggressive OS guesses: Microsoft Windows Longhorn (89%), Microsoft Windows Server 2012 (88%), Microsoft Windows Server 2016 (88%), Microsoft Windows Server 2008 SP2 (87%), Microsoft Windows Vista SP1 (86%), Microsoft Windows 10 1703 (86%), Microsoft Windows Server 2012 R2 (86%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 11 hops

TRACEROUTE (using port 80/tcp)
1   0.22 ms
2   0.63 ms (
3   5.97 ms (
4   8.33 ms (
5   ...
6   0.41 ms
7   ... 10
11  0.36 ms

OS and Service detection performed. Please report any incorrect results at .
Nmap done: 1 IP address (1 host up) scanned in 48.40 seconds
Color Scheme
Target IP
Target Country
Scan method
Scan OS information and Traceroute
Run command
nmap -A
Scan date
19 Nov 2023 15:01
Copy scan report
Download report
Remove scan result
Some firewalls blocks Port scans. For get true positive results add IP addresses ( or CIDR ) to the whitelist
Scan method: