# nmap (V. 2.54BETA22) scan initiated Sun Apr 15 17:44:45 2001. Interesting ports on (202.188.17.31): (The 1540 ports scanned but not shown below are in state: filtered) Port State Service 80/tcp open http 8080/tcp closed http-proxy No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=4/15%Time=3ADA1D58%O=80%C=8080) TSeq(Class=TD%gcd=1%SI=2B%IPID=RPI%TS=U) TSeq(Class=TD%gcd=1%SI=21%IPID=RPI%TS=U) TSeq(Class=TD%gcd=1%SI=12%IPID=RD%TS=U) T1(Resp=N) T2(Resp=N) T3(Resp=N) T4(Resp=N) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=N) # Nmap run completed at Sun Apr 15 18:14:48 2001 -- 1 IP address (1 host up) scanned in 1803 seconds