Insufficient responses for TCP sequencing (3), OS detection may be less accurate Insufficient responses for TCP sequencing (3), OS detection may be less accurate Insufficient responses for TCP sequencing (2), OS detection may be less accurate Interesting ports on ns.wmit.com.au (203.59.138.129): (The 1519 ports scanned but not shown below are in state: closed) Port State Service 9/tcp open discard 13/tcp open daytime 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 37/tcp open time 53/tcp open domain 79/tcp open finger 80/tcp open http 110/tcp open pop-3 111/tcp filtered sunrpc 113/tcp open auth 139/tcp filtered netbios-ssn 143/tcp open imap2 443/tcp open https 865/tcp open unknown 1080/tcp filtered socks 2003/tcp filtered cfingerd 2049/tcp filtered nfs 9090/tcp open zeus-admin 12345/tcp filtered NetBus 12346/tcp filtered NetBus No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=6/1%Time=3B175129%O=9%C=1) T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T2(Resp=N) T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=Y%DF=Y%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E) Uptime 6.297 days (since Fri May 25 21:16:15 2001) # Nmap run completed at Fri Jun 1 04:24:09 2001 -- 1 IP address (1 host up) scanned in 37 seconds