Scan report for "facebook.com"

OS Detection (nmap -O facebook.com)
Starting Nmap 7.80 ( https://nmap.org ) at 2023-02-18 16:08 EST
Nmap scan report for facebook.com (31.13.93.35)
Host is up (0.00072s latency).
Other addresses for facebook.com (not scanned): 2a03:2880:f134:183:face:b00c:0:25de
rDNS record for 31.13.93.35: edge-star-mini-shv-02-dfw5.facebook.com
Not shown: 996 filtered ports
PORT     STATE  SERVICE
80/tcp   open   http
443/tcp  open   https
843/tcp  closed unknown
5222/tcp closed xmpp-client
Aggressive OS guesses: Linux 2.6.24 (89%), Lexmark 1400-series printer (89%), Lexmark E332n printer (88%), FreeBSD 11.0-CURRENT (86%), Linux 2.4.26 (Slackware 10.0.0) (86%), Asus RT-N10 router or AXIS 211A Network Camera (Linux 2.6) (86%), Linux 2.6.18 (86%), AXIS 211A Network Camera (Linux 2.6.20) (86%), FreeBSD 7.0-STABLE (86%), Linksys RV042 router (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 10 hops

OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.07 seconds
Color Scheme
Target
Scan type
OS Detection
Nmap Command
nmap -O facebook.com
Scan date
18 Feb 2023 16:08
API - Scan ID
Copy scan report
Download report
Remove scan result
$
Total scans
Enter domain name or IP address and select scan method. After scan finished you get Nmap scan result for your target.
Some firewalls blocks Nmap scans. For get true positive results add nmap.online IP addresses (91.214.64.186-91.214.64.187) to the whitelist
Scan Options: [scan_type] of [scan_block] with an [scan_output]. Change Options
Visibility:
Scan type:

Options

Scan block:
Output:
Schedule scan:
Schedule scan (GMT-4)