# nmap (V. 2.54BETA22) scan initiated Sat Apr 7 15:50:04 2001. Interesting ports on jaga.indo.net.id (202.159.32.19): (The 1510 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 25/tcp open smtp 67/tcp filtered bootps 68/tcp filtered bootpc 70/tcp filtered gopher 79/tcp filtered finger 80/tcp open http 87/tcp filtered priv-term-l 111/tcp filtered sunrpc 135/tcp open loc-srv 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 179/tcp filtered bgp 194/tcp filtered irc 372/tcp filtered ulistserv 443/tcp open https 465/tcp open smtps 512/tcp filtered exec 513/tcp filtered login 514/tcp filtered shell 515/tcp filtered printer 520/tcp filtered efs 540/tcp filtered uucp 1524/tcp filtered ingreslock 2000/tcp filtered callbook 5801/tcp open vnc 5901/tcp open vnc-1 6000/tcp filtered X11 12345/tcp filtered NetBus 12346/tcp filtered NetBus 27665/tcp filtered Trinoo_Master No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=4/7%Time=3ACF7042%O=21%C=1) TSeq(Class=RI%gcd=1%SI=154%IPID=BI%TS=U) TSeq(Class=RI%gcd=1%SI=157%IPID=BI%TS=U) TSeq(Class=RI%gcd=1%SI=152%IPID=BI%TS=U) T1(Resp=Y%DF=Y%W=B68%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=B68%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=0%ACK=S++%Flags=R%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=0%ACK=S++%Flags=R%Ops=) T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=N) # Nmap run completed at Sat Apr 7 15:53:38 2001 -- 1 IP address (1 host up) scanned in 214 seconds