Insufficient responses for TCP sequencing (2), OS detection may be less accurate Insufficient responses for TCP sequencing (2), OS detection may be less accurate Insufficient responses for TCP sequencing (2), OS detection may be less accurate Interesting ports on (202.56.159.83): (The 1530 ports scanned but not shown below are in state: filtered) Port State Service 20/tcp closed ftp-data 21/tcp open ftp 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 109/tcp closed pop-2 110/tcp closed pop-3 143/tcp closed imap2 161/tcp closed snmp 443/tcp open https 3306/tcp open mysql No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=6/1%Time=3B174D1C%O=21%C=20) T1(Resp=Y%DF=Y%W=7F53%ACK=S++%Flags=AS%Ops=MENNT) T2(Resp=N) T3(Resp=N) T4(Resp=N) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=N) T7(Resp=N) PU(Resp=N) Uptime 5.675 days (since Sat May 26 11:55:17 2001) # Nmap run completed at Fri Jun 1 04:06:52 2001 -- 1 IP address (1 host up) scanned in 468 seconds