# nmap (V. 2.54BETA22) scan initiated Mon Apr 23 04:55:14 2001. Insufficient responses for TCP sequencing (3), OS detection may be less accurate Insufficient responses for TCP sequencing (3), OS detection may be less accurate Insufficient responses for TCP sequencing (3), OS detection may be less accurate Interesting ports on (203.85.183.10): (The 1538 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 25/tcp open smtp 80/tcp open http 110/tcp open pop-3 No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=4/23%Time=3AE3EE67%O=21%C=1) T1(Resp=Y%DF=Y%W=7F53%ACK=S++%Flags=AS%Ops=MENNTNW) T2(Resp=Y%DF=N%W=400%ACK=S++%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=7F53%ACK=S++%Flags=AS%Ops=MENNTNW) T4(Resp=Y%DF=N%W=400%ACK=S++%Flags=AR%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=400%ACK=S++%Flags=AR%Ops=) T7(Resp=Y%DF=N%W=400%ACK=S++%Flags=AR%Ops=) PU(Resp=N) Uptime 9.131 days (since Sat Apr 14 01:49:04 2001) # Nmap run completed at Mon Apr 23 04:57:11 2001 -- 1 IP address (1 host up) scanned in 117 seconds