Scan report for ""

OS Detection (nmap -O
Starting Nmap 7.80 ( ) at 2023-09-19 22:00 EDT
Nmap scan report for (
Host is up (0.00092s latency).
Other addresses for (not scanned): 2a03:2880:f134:183:face:b00c:0:25de
rDNS record for
Not shown: 996 filtered ports
80/tcp   open   http
443/tcp  open   https
843/tcp  closed unknown
5222/tcp closed xmpp-client
Device type: general purpose|PBX|printer
Running (JUST GUESSING): FreeBSD 11.X|8.X|7.X|6.X (87%), Linux 2.6.X (86%), Vodavi embedded (85%), Lexmark embedded (85%)
OS CPE: cpe:/o:freebsd:freebsd:11.0 cpe:/o:linux:linux_kernel:2.6.24 cpe:/o:freebsd:freebsd:8.0 cpe:/h:vodavi:xts-ip cpe:/o:freebsd:freebsd:7.0 cpe:/o:freebsd:freebsd:6.1
Aggressive OS guesses: FreeBSD 11.0-CURRENT (87%), FreeBSD 11.0-STABLE (86%), Linux 2.6.24 (86%), FreeBSD 8.0-STABLE (85%), Vodavi XTS-IP PBX (85%), FreeBSD 7.0-STABLE (85%), Lexmark 1400-series printer (85%), Lexmark E332n printer (85%), FreeBSD 6.1-RELEASE (85%)
No exact OS matches for host (test conditions non-ideal).

OS detection performed. Please report any incorrect results at .
Nmap done: 1 IP address (1 host up) scanned in 8.05 seconds
Color Scheme
Scan type
OS Detection
Nmap Command
nmap -O
Scan date
19 Sep 2023 22:00
API - Scan ID
Copy scan report
Download report
Remove scan result
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add IP addresses ( to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Scan type:


Scan block:
Schedule scan:
Schedule scan (GMT-4)