Scan report for "sportshop.winterthur.ch"

OS Detection (nmap -O sportshop.winterthur.ch)
Starting Nmap 7.80 ( https://nmap.org ) at 2024-04-26 03:53 EDT
Nmap scan report for sportshop.winterthur.ch (185.69.162.94)
Host is up (0.13s latency).
Not shown: 997 filtered ports
PORT    STATE  SERVICE
80/tcp  open   http
113/tcp closed ident
443/tcp open   https
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2016|10|2012|2008|Vista (93%), FreeBSD 6.X (90%)
OS CPE: cpe:/o:microsoft:windows_server_2016 cpe:/o:freebsd:freebsd:6.2 cpe:/o:microsoft:windows_10 cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2008::beta3 cpe:/o:microsoft:windows_server_2008 cpe:/o:microsoft:windows_vista::sp1:home_premium
Aggressive OS guesses: Microsoft Windows Server 2016 (93%), FreeBSD 6.2-RELEASE (90%), Microsoft Windows 10 (89%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (87%), Microsoft Windows Server 2008 or 2008 Beta 3 (87%), Microsoft Windows Vista Home Premium SP1 (85%)
No exact OS matches for host (test conditions non-ideal).

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.89 seconds
Color Scheme
Target
Scan type
OS Detection
Nmap Command
nmap -O sportshop.winterthur.ch
Scan date
26 Apr 2024 03:53
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)