$ nmap -p 1863,443 64.4.45.0/24 -A -v Starting Nmap 6.47 ( http://nmap.org ) at 2014-12-02 08:52 ART NSE: Loaded 118 scripts for scanning. NSE: Script Pre-scanning. Initiating Ping Scan at 08:52 Scanning 256 hosts [2 ports/host] Completed Ping Scan at 08:52, 14.58s elapsed (256 total hosts) Initiating Parallel DNS resolution of 256 hosts. at 08:52 Completed Parallel DNS resolution of 256 hosts. at 08:52, 2.53s elapsed Nmap scan report for 64.4.45.0 [host down] Nmap scan report for 64.4.45.1 [host down] Nmap scan report for 64.4.45.4 [host down] Nmap scan report for 64.4.45.5 [host down] Nmap scan report for 64.4.45.6 [host down] Nmap scan report for 64.4.45.7 [host down] Nmap scan report for 64.4.45.8 [host down] Nmap scan report for 64.4.45.9 [host down] Nmap scan report for 64.4.45.10 [host down] Nmap scan report for 64.4.45.11 [host down] Nmap scan report for 64.4.45.12 [host down] Nmap scan report for 64.4.45.14 [host down] Nmap scan report for 64.4.45.15 [host down] Nmap scan report for 64.4.45.16 [host down] Nmap scan report for 64.4.45.17 [host down] Nmap scan report for 64.4.45.18 [host down] Nmap scan report for 64.4.45.19 [host down] Nmap scan report for 64.4.45.20 [host down] Nmap scan report for 64.4.45.26 [host down] Nmap scan report for 64.4.45.27 [host down] Nmap scan report for 64.4.45.28 [host down] Nmap scan report for 64.4.45.29 [host down] Nmap scan report for 64.4.45.30 [host down] Nmap scan report for 64.4.45.32 [host down] Nmap scan report for 64.4.45.35 [host down] Nmap scan report for 64.4.45.36 [host down] Nmap scan report for 64.4.45.37 [host down] Nmap scan report for 64.4.45.38 [host down] Nmap scan report for 64.4.45.39 [host down] Nmap scan report for 64.4.45.40 [host down] Nmap scan report for 64.4.45.48 [host down] Nmap scan report for 64.4.45.49 [host down] Nmap scan report for 64.4.45.50 [host down] Nmap scan report for 64.4.45.51 [host down] Nmap scan report for 64.4.45.52 [host down] Nmap scan report for 64.4.45.53 [host down] Nmap scan report for 64.4.45.54 [host down] Nmap scan report for 64.4.45.55 [host down] Nmap scan report for 64.4.45.56 [host down] Nmap scan report for 64.4.45.59 [host down] Nmap scan report for 64.4.45.60 [host down] Nmap scan report for 64.4.45.61 [host down] Nmap scan report for 64.4.45.63 [host down] Nmap scan report for 64.4.45.64 [host down] Nmap scan report for 64.4.45.65 [host down] Nmap scan report for 64.4.45.66 [host down] Nmap scan report for 64.4.45.67 [host down] Nmap scan report for 64.4.45.68 [host down] Nmap scan report for 64.4.45.69 [host down] Nmap scan report for 64.4.45.70 [host down] Nmap scan report for 64.4.45.71 [host down] Nmap scan report for 64.4.45.72 [host down] Nmap scan report for 64.4.45.73 [host down] Nmap scan report for 64.4.45.74 [host down] Nmap scan report for 64.4.45.75 [host down] Nmap scan report for 64.4.45.76 [host down] Nmap scan report for 64.4.45.77 [host down] Nmap scan report for 64.4.45.78 [host down] Nmap scan report for 64.4.45.79 [host down] Nmap scan report for 64.4.45.80 [host down] Nmap scan report for 64.4.45.81 [host down] Nmap scan report for 64.4.45.82 [host down] Nmap scan report for 64.4.45.83 [host down] Nmap scan report for 64.4.45.84 [host down] Nmap scan report for 64.4.45.85 [host down] Nmap scan report for 64.4.45.86 [host down] Nmap scan report for 64.4.45.87 [host down] Nmap scan report for 64.4.45.88 [host down] Nmap scan report for 64.4.45.89 [host down] Nmap scan report for 64.4.45.90 [host down] Nmap scan report for 64.4.45.91 [host down] Nmap scan report for 64.4.45.92 [host down] Nmap scan report for 64.4.45.93 [host down] Nmap scan report for 64.4.45.94 [host down] Nmap scan report for 64.4.45.95 [host down] Nmap scan report for 64.4.45.96 [host down] Nmap scan report for 64.4.45.97 [host down] Nmap scan report for 64.4.45.98 [host down] Nmap scan report for 64.4.45.99 [host down] Nmap scan report for 64.4.45.100 [host down] Nmap scan report for 64.4.45.101 [host down] Nmap scan report for 64.4.45.102 [host down] Nmap scan report for 64.4.45.103 [host down] Nmap scan report for 64.4.45.104 [host down] Nmap scan report for 64.4.45.105 [host down] Nmap scan report for 64.4.45.106 [host down] Nmap scan report for 64.4.45.107 [host down] Nmap scan report for 64.4.45.108 [host down] Nmap scan report for 64.4.45.109 [host down] Nmap scan report for 64.4.45.110 [host down] Nmap scan report for 64.4.45.111 [host down] Nmap scan report for 64.4.45.112 [host down] Nmap scan report for 64.4.45.113 [host down] Nmap scan report for 64.4.45.114 [host down] Nmap scan report for 64.4.45.115 [host down] Nmap scan report for 64.4.45.116 [host down] Nmap scan report for 64.4.45.117 [host down] Nmap scan report for 64.4.45.118 [host down] Nmap scan report for 64.4.45.119 [host down] Nmap scan report for 64.4.45.120 [host down] Nmap scan report for 64.4.45.121 [host down] Nmap scan report for 64.4.45.122 [host down] Nmap scan report for 64.4.45.123 [host down] Nmap scan report for 64.4.45.124 [host down] Nmap scan report for 64.4.45.125 [host down] Nmap scan report for 64.4.45.126 [host down] Nmap scan report for 64.4.45.127 [host down] Nmap scan report for 64.4.45.128 [host down] Nmap scan report for 64.4.45.129 [host down] Nmap scan report for 64.4.45.130 [host down] Nmap scan report for 64.4.45.131 [host down] Nmap scan report for 64.4.45.132 [host down] Nmap scan report for 64.4.45.133 [host down] Nmap scan report for 64.4.45.134 [host down] Nmap scan report for 64.4.45.135 [host down] Nmap scan report for 64.4.45.136 [host down] Nmap scan report for 64.4.45.137 [host down] Nmap scan report for 64.4.45.138 [host down] Nmap scan report for 64.4.45.139 [host down] Nmap scan report for 64.4.45.140 [host down] Nmap scan report for 64.4.45.141 [host down] Nmap scan report for 64.4.45.142 [host down] Nmap scan report for 64.4.45.143 [host down] Nmap scan report for 64.4.45.144 [host down] Nmap scan report for 64.4.45.145 [host down] Nmap scan report for 64.4.45.146 [host down] Nmap scan report for 64.4.45.147 [host down] Nmap scan report for 64.4.45.148 [host down] Nmap scan report for 64.4.45.149 [host down] Nmap scan report for 64.4.45.150 [host down] Nmap scan report for 64.4.45.151 [host down] Nmap scan report for 64.4.45.152 [host down] Nmap scan report for 64.4.45.153 [host down] Nmap scan report for 64.4.45.154 [host down] Nmap scan report for 64.4.45.155 [host down] Nmap scan report for 64.4.45.156 [host down] Nmap scan report for 64.4.45.157 [host down] Nmap scan report for 64.4.45.158 [host down] Nmap scan report for 64.4.45.159 [host down] Nmap scan report for 64.4.45.160 [host down] Nmap scan report for 64.4.45.161 [host down] Nmap scan report for 64.4.45.162 [host down] Nmap scan report for 64.4.45.163 [host down] Nmap scan report for 64.4.45.164 [host down] Nmap scan report for 64.4.45.165 [host down] Nmap scan report for 64.4.45.166 [host down] Nmap scan report for 64.4.45.167 [host down] Nmap scan report for 64.4.45.168 [host down] Nmap scan report for 64.4.45.169 [host down] Nmap scan report for 64.4.45.170 [host down] Nmap scan report for 64.4.45.171 [host down] Nmap scan report for 64.4.45.172 [host down] Nmap scan report for 64.4.45.173 [host down] Nmap scan report for 64.4.45.174 [host down] Nmap scan report for 64.4.45.175 [host down] Nmap scan report for 64.4.45.176 [host down] Nmap scan report for 64.4.45.177 [host down] Nmap scan report for 64.4.45.178 [host down] Nmap scan report for 64.4.45.179 [host down] Nmap scan report for 64.4.45.180 [host down] Nmap scan report for 64.4.45.181 [host down] Nmap scan report for 64.4.45.182 [host down] Nmap scan report for 64.4.45.183 [host down] Nmap scan report for 64.4.45.184 [host down] Nmap scan report for 64.4.45.185 [host down] Nmap scan report for 64.4.45.186 [host down] Nmap scan report for 64.4.45.187 [host down] Nmap scan report for 64.4.45.188 [host down] Nmap scan report for 64.4.45.189 [host down] Nmap scan report for 64.4.45.190 [host down] Nmap scan report for 64.4.45.191 [host down] Nmap scan report for 64.4.45.192 [host down] Nmap scan report for 64.4.45.199 [host down] Nmap scan report for 64.4.45.200 [host down] Nmap scan report for 64.4.45.201 [host down] Nmap scan report for 64.4.45.202 [host down] Nmap scan report for 64.4.45.203 [host down] Nmap scan report for 64.4.45.204 [host down] Nmap scan report for 64.4.45.205 [host down] Nmap scan report for 64.4.45.206 [host down] Nmap scan report for 64.4.45.207 [host down] Nmap scan report for 64.4.45.208 [host down] Nmap scan report for 64.4.45.210 [host down] Nmap scan report for 64.4.45.212 [host down] Nmap scan report for 64.4.45.213 [host down] Nmap scan report for 64.4.45.214 [host down] Nmap scan report for 64.4.45.215 [host down] Nmap scan report for 64.4.45.216 [host down] Nmap scan report for 64.4.45.217 [host down] Nmap scan report for 64.4.45.218 [host down] Nmap scan report for 64.4.45.221 [host down] Nmap scan report for 64.4.45.225 [host down] Nmap scan report for 64.4.45.226 [host down] Nmap scan report for 64.4.45.227 [host down] Nmap scan report for 64.4.45.228 [host down] Nmap scan report for 64.4.45.229 [host down] Nmap scan report for 64.4.45.230 [host down] Nmap scan report for 64.4.45.231 [host down] Nmap scan report for 64.4.45.232 [host down] Nmap scan report for 64.4.45.233 [host down] Nmap scan report for 64.4.45.234 [host down] Nmap scan report for 64.4.45.235 [host down] Nmap scan report for 64.4.45.236 [host down] Nmap scan report for 64.4.45.237 [host down] Nmap scan report for 64.4.45.238 [host down] Nmap scan report for 64.4.45.239 [host down] Nmap scan report for 64.4.45.240 [host down] Nmap scan report for 64.4.45.241 [host down] Nmap scan report for 64.4.45.242 [host down] Nmap scan report for 64.4.45.243 [host down] Nmap scan report for 64.4.45.244 [host down] Nmap scan report for 64.4.45.245 [host down] Nmap scan report for 64.4.45.246 [host down] Nmap scan report for 64.4.45.247 [host down] Nmap scan report for 64.4.45.248 [host down] Nmap scan report for 64.4.45.249 [host down] Nmap scan report for 64.4.45.250 [host down] Nmap scan report for 64.4.45.251 [host down] Nmap scan report for 64.4.45.252 [host down] Nmap scan report for 64.4.45.253 [host down] Nmap scan report for 64.4.45.254 [host down] Nmap scan report for 64.4.45.255 [host down] Initiating Connect Scan at 08:52 Scanning 34 hosts [2 ports/host] Discovered open port 443/tcp on 64.4.45.24 Discovered open port 443/tcp on 64.4.45.13 Discovered open port 443/tcp on 64.4.45.25 Discovered open port 443/tcp on 64.4.45.31 Discovered open port 443/tcp on 64.4.45.23 Discovered open port 443/tcp on 64.4.45.22 Discovered open port 443/tcp on 64.4.45.34 Discovered open port 443/tcp on 64.4.45.43 Discovered open port 443/tcp on 64.4.45.47 Discovered open port 443/tcp on 64.4.45.58 Discovered open port 443/tcp on 64.4.45.62 Discovered open port 443/tcp on 64.4.45.219 Discovered open port 443/tcp on 64.4.45.220 Discovered open port 443/tcp on 64.4.45.42 Discovered open port 443/tcp on 64.4.45.45 Discovered open port 443/tcp on 64.4.45.209 Discovered open port 443/tcp on 64.4.45.222 Completed Connect Scan at 08:52, 4.35s elapsed (68 total ports) Initiating Service scan at 08:52 Scanning 17 services on 34 hosts Service scan Timing: About 23.53% done; ETC: 08:56 (0:02:39 remaining) Completed Service scan at 08:54, 121.38s elapsed (17 services on 34 hosts) NSE: Script scanning 34 hosts. Initiating NSE at 08:54 Completed NSE at 08:55, 59.65s elapsed Nmap scan report for 64.4.45.2 Host is up (0.24s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp closed msnp Nmap scan report for 64.4.45.3 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp closed msnp Nmap scan report for 64.4.45.13 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-cors: GET POST PUT DELETE OPTIONS |_http-methods: No Allow or Public header in OPTIONS response (status code 200) | http-server-header: Software version grabbed from Server header. | Consider submitting a service fingerprint. |_Run with --script-args http-server-header.skip |_http-title: Site doesn't have a title. | ssl-cert: Subject: commonName=api.chat.skype.net | Issuer: commonName=MSIT Machine Auth CA 2 | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2013-10-22T22:49:27+00:00 | Not valid after: 2015-10-22T22:49:27+00:00 | MD5: edcd bfc2 54a6 f308 86b6 2251 b1ff 462a |_SHA-1: d837 edb4 177f 15af ba4e f36e 0d9f 280a cb01 8752 |_ssl-date: 2014-12-02T11:54:57+00:00; 0s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.21 Host is up (0.22s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp filtered msnp Nmap scan report for 64.4.45.22 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open https? 1863/tcp closed msnp Nmap scan report for 64.4.45.23 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https? | ssl-cert: Subject: commonName=relay.data.edge.messenger.live.com | Issuer: commonName=MSIT Machine Auth CA 2 | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2012-11-13T22:48:25+00:00 | Not valid after: 2014-11-13T22:48:25+00:00 | MD5: 8824 db4c b7b0 62b9 c2f4 2213 ed61 f52d |_SHA-1: a2d7 ff94 49db a39d cfcd 6612 17c8 d577 57bf 48ae |_ssl-date: 2014-12-02T11:54:46+00:00; 0s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.24 Host is up (0.22s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https? | ssl-cert: Subject: commonName=relay.data.edge.messenger.live.com | Issuer: commonName=MSIT Machine Auth CA 2 | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2012-11-13T22:48:25+00:00 | Not valid after: 2014-11-13T22:48:25+00:00 | MD5: 8824 db4c b7b0 62b9 c2f4 2213 ed61 f52d |_SHA-1: a2d7 ff94 49db a39d cfcd 6612 17c8 d577 57bf 48ae |_ssl-date: 2014-12-02T11:54:51+00:00; 0s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.25 Host is up (0.22s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-methods: No Allow or Public header in OPTIONS response (status code 403) | http-server-header: Software version grabbed from Server header. | Consider submitting a service fingerprint. |_Run with --script-args http-server-header.skip |_http-title: Site doesn't have a title. | ssl-cert: Subject: commonName=api.chat.skype.net | Issuer: commonName=MSIT Machine Auth CA 2 | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2013-10-22T22:49:27+00:00 | Not valid after: 2015-10-22T22:49:27+00:00 | MD5: edcd bfc2 54a6 f308 86b6 2251 b1ff 462a |_SHA-1: d837 edb4 177f 15af ba4e f36e 0d9f 280a cb01 8752 |_ssl-date: 2014-12-02T11:54:53+00:00; 0s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.31 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-methods: No Allow or Public header in OPTIONS response (status code 404) |_http-title: Not Found | ssl-cert: Subject: commonName=apis.live.net | Issuer: commonName=MSIT Machine Auth CA 2 | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2012-12-03T21:16:58+00:00 | Not valid after: 2014-12-03T21:16:58+00:00 | MD5: 4037 c242 4c02 c57c 6ba5 446d 8156 f7ac |_SHA-1: a40e 4c8e 80d3 b4b8 08ef 672f 7086 242c 02ab 67e6 |_ssl-date: 2014-12-02T11:55:09+00:00; 0s from local time. 1863/tcp filtered msnp Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Nmap scan report for 64.4.45.33 Host is up (0.24s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp filtered msnp Nmap scan report for 64.4.45.34 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-methods: No Allow or Public header in OPTIONS response (status code 404) | http-server-header: Software version grabbed from Server header. | Consider submitting a service fingerprint. |_Run with --script-args http-server-header.skip |_http-title: Not Found | ssl-cert: Subject: commonName=rtlc.live.com | Issuer: commonName=Microsoft IT SSL SHA2/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2014-10-21T20:40:39+00:00 | Not valid after: 2016-10-20T20:40:39+00:00 | MD5: f967 c2a5 4cc0 801b b248 bcd0 d653 4782 |_SHA-1: 5ca8 f076 4329 87b4 3945 357e 0ff5 a3e5 230d 78c0 |_ssl-date: 2014-12-02T11:55:05+00:00; 0s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.41 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp filtered https 1863/tcp filtered msnp Nmap scan report for 64.4.45.42 Host is up (0.22s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-methods: No Allow or Public header in OPTIONS response (status code 400) | http-server-header: Software version grabbed from Server header. | Consider submitting a service fingerprint. |_Run with --script-args http-server-header.skip |_http-title: Bad Request | ssl-cert: Subject: commonName=storage.live.com/organizationName=Microsoft/stateOrProvinceName=WA/countryName=US | Issuer: commonName=MSIT Machine Auth CA 2 | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2013-05-07T16:09:03+00:00 | Not valid after: 2015-05-07T16:09:03+00:00 | MD5: 45f4 58cb 2a84 5052 67f4 c2ef 9ffe 8de8 |_SHA-1: 87e3 a516 071b c838 5895 cff2 1b80 7511 cc8d 7160 |_ssl-date: 2014-12-02T11:54:50+00:00; -1s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.43 Host is up (0.22s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-methods: No Allow or Public header in OPTIONS response (status code 400) | http-server-header: Software version grabbed from Server header. | Consider submitting a service fingerprint. |_Run with --script-args http-server-header.skip |_http-title: Bad Request | ssl-cert: Subject: commonName=manage.dev.live.com | Issuer: commonName=Microsoft Secure Server Authority | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2012-09-12T00:31:04+00:00 | Not valid after: 2013-07-31T21:26:57+00:00 | MD5: 8544 c238 be26 8d92 f4f5 c41e d217 a364 |_SHA-1: 9b52 1adf 2f4b f569 da40 32bc a2ac d409 5325 1cc7 |_ssl-date: 2014-12-02T11:55:08+00:00; 0s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.44 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp filtered https 1863/tcp filtered msnp Nmap scan report for 64.4.45.45 Host is up (0.33s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-methods: No Allow or Public header in OPTIONS response (status code 400) | http-server-header: Software version grabbed from Server header. | Consider submitting a service fingerprint. |_Run with --script-args http-server-header.skip |_http-title: Bad Request | ssl-cert: Subject: commonName=apps.live.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US | Issuer: commonName=Microsoft Secure Server Authority | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2012-01-09T21:34:14+00:00 | Not valid after: 2014-01-08T21:34:14+00:00 | MD5: a98b 557c a4c1 e2f6 ca34 f370 f632 4e9c |_SHA-1: 709c cdb0 0b91 462e 426a e659 7a33 4feb ab6d 11ee |_ssl-date: 2014-12-02T11:55:06+00:00; 0s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.46 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp filtered https 1863/tcp filtered msnp Nmap scan report for 64.4.45.47 Host is up (0.24s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-methods: No Allow or Public header in OPTIONS response (status code 400) | http-server-header: Software version grabbed from Server header. | Consider submitting a service fingerprint. |_Run with --script-args http-server-header.skip |_http-title: Bad Request | ssl-cert: Subject: commonName=dev.live.com | Issuer: commonName=Microsoft Secure Server Authority | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2012-07-12T21:44:12+00:00 | Not valid after: 2014-05-19T22:23:30+00:00 | MD5: b9e0 9d23 f733 a8a9 b812 339b 3f06 5019 |_SHA-1: 8608 d572 0c13 0c22 1c1a cbc1 0968 333e 3c9f 6e35 |_ssl-date: 2014-12-02T11:55:13+00:00; 0s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.57 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp filtered msnp Nmap scan report for 64.4.45.58 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https? | ssl-cert: Subject: commonName=*.gateway.messenger.live.com | Issuer: commonName=Microsoft IT SSL SHA2/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2014-10-27T22:51:07+00:00 | Not valid after: 2016-10-26T22:51:07+00:00 | MD5: 1275 fa1c ae9c 0ea8 1ee3 a698 2840 06cb |_SHA-1: 95c4 0741 85d4 efaa d91f 0f1f 3c08 bf8e 8bd0 9051 |_ssl-date: 2014-12-02T11:54:49+00:00; -1s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.62 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-methods: No Allow or Public header in OPTIONS response (status code 405) | http-server-header: Software version grabbed from Server header. | Consider submitting a service fingerprint. |_Run with --script-args http-server-header.skip |_http-title: Site doesn't have a title (text/plain). | ssl-cert: Subject: commonName=*.gateway.messenger.live.com | Issuer: commonName=Microsoft IT SSL SHA2/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2014-10-27T22:51:07+00:00 | Not valid after: 2016-10-26T22:51:07+00:00 | MD5: 1275 fa1c ae9c 0ea8 1ee3 a698 2840 06cb |_SHA-1: 95c4 0741 85d4 efaa d91f 0f1f 3c08 bf8e 8bd0 9051 |_ssl-date: 2014-12-02T11:54:50+00:00; 0s from local time. 1863/tcp closed msnp Nmap scan report for 64.4.45.193 Host is up (0.22s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp closed msnp Nmap scan report for 64.4.45.194 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp closed msnp Nmap scan report for 64.4.45.195 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp closed msnp Nmap scan report for 64.4.45.196 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp closed msnp Nmap scan report for 64.4.45.197 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp closed msnp Nmap scan report for 64.4.45.198 Host is up (0.24s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp closed msnp Nmap scan report for 64.4.45.209 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https |_http-methods: No Allow or Public header in OPTIONS response (status code 405) | http-server-header: Software version grabbed from Server header. | Consider submitting a service fingerprint. |_Run with --script-args http-server-header.skip |_http-title: Site doesn't have a title (text/plain). | ssl-cert: Subject: commonName=*.gateway.messenger.live.com | Issuer: commonName=Microsoft IT SSL SHA2/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2014-10-27T22:51:07+00:00 | Not valid after: 2016-10-26T22:51:07+00:00 | MD5: 1275 fa1c ae9c 0ea8 1ee3 a698 2840 06cb |_SHA-1: 95c4 0741 85d4 efaa d91f 0f1f 3c08 bf8e 8bd0 9051 |_ssl-date: 2014-12-02T11:54:58+00:00; 0s from local time. 1863/tcp closed msnp Nmap scan report for 64.4.45.211 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp filtered msnp Nmap scan report for 64.4.45.219 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https? | ssl-cert: Subject: commonName=relay.data.edge.messenger.live.com | Issuer: commonName=MSIT Machine Auth CA 2 | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2012-11-13T22:48:25+00:00 | Not valid after: 2014-11-13T22:48:25+00:00 | MD5: 8824 db4c b7b0 62b9 c2f4 2213 ed61 f52d |_SHA-1: a2d7 ff94 49db a39d cfcd 6612 17c8 d577 57bf 48ae |_ssl-date: 2014-12-02T11:54:52+00:00; 0s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.220 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/https? | ssl-cert: Subject: commonName=relay.data.edge.messenger.live.com | Issuer: commonName=MSIT Machine Auth CA 2 | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2012-11-13T22:48:25+00:00 | Not valid after: 2014-11-13T22:48:25+00:00 | MD5: 8824 db4c b7b0 62b9 c2f4 2213 ed61 f52d |_SHA-1: a2d7 ff94 49db a39d cfcd 6612 17c8 d577 57bf 48ae |_ssl-date: 2014-12-02T11:55:01+00:00; -1s from local time. 1863/tcp filtered msnp Nmap scan report for 64.4.45.222 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-methods: No Allow or Public header in OPTIONS response (status code 404) |_http-title: Not Found | ssl-cert: Subject: commonName=apis.live.net | Issuer: commonName=MSIT Machine Auth CA 2 | Public Key type: rsa | Public Key bits: 2048 | Not valid before: 2012-12-03T21:16:58+00:00 | Not valid after: 2014-12-03T21:16:58+00:00 | MD5: 4037 c242 4c02 c57c 6ba5 446d 8156 f7ac |_SHA-1: a40e 4c8e 80d3 b4b8 08ef 672f 7086 242c 02ab 67e6 |_ssl-date: 2014-12-02T11:55:00+00:00; 0s from local time. 1863/tcp filtered msnp Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows Nmap scan report for 64.4.45.223 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp filtered https 1863/tcp filtered msnp Nmap scan report for 64.4.45.224 Host is up (0.23s latency). PORT STATE SERVICE VERSION 443/tcp closed https 1863/tcp filtered msnp NSE: Script Post-scanning. Read data files from: /usr/bin/../share/nmap Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 256 IP addresses (34 hosts up) scanned in 203.50 seconds