# Nmap (V. nmap) scan initiated 2.53 as: /zillion/nmap/nmap -O -P0 -sV -oN /usr/local/apache/htdocs/mirror/2000/07/07/www.experimental.com.br/nmap.txt www.experimental.com.br Interesting ports on experimental.com.br (216.121.209.122): (The 1507 ports scanned but not shown below are in state: closed) Port State Service Protocol Version 21/tcp open ftp 23/tcp open telnet 25/tcp open smtp 79/tcp open finger 80/tcp open http HTTP Apache/1.2.6 PHP/FI-2.0b11 110/tcp open pop-3 111/tcp open sunrpc 143/tcp open imap2 512/tcp open exec 513/tcp open login 514/tcp open shell 635/tcp open unknown 2003/tcp open cfingerd 2049/tcp open nfs 5432/tcp open postgres PostgreSQL 6667/tcp open irc TCP Sequence Prediction: Class=truly random Difficulty=9999999 (Good luck!) Remote operating system guess: Linux 2.0.35-38 # Nmap run completed at Fri Jul 7 02:19:26 2000 -- 1 IP address (1 host up) scanned in 45 seconds