# nmap (V. 2.54BETA22) scan initiated Mon Apr 9 02:19:14 2001. Interesting ports on host230.teachersroom.com (63.79.231.230): (The 1534 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 80/tcp open http 135/tcp open loc-srv 139/tcp open netbios-ssn 443/tcp open https 1031/tcp open iad2 2021/tcp open servexec 2027/tcp open shadowserver No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=4/9%Time=3AD1549E%O=21%C=1) TSeq(Class=TD%gcd=2%SI=3%IPID=RPI%TS=U) TSeq(Class=TD%gcd=1%SI=6%IPID=BI%TS=U) TSeq(Class=TD%gcd=1%SI=4%IPID=RD%TS=U) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=400%ACK=S++%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=400%ACK=S++%Flags=AR%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=400%ACK=S++%Flags=AR%Ops=) T7(Resp=Y%DF=N%W=400%ACK=S++%Flags=AR%Ops=) PU(Resp=N) # Nmap run completed at Mon Apr 9 02:20:14 2001 -- 1 IP address (1 host up) scanned in 60 seconds