Interesting ports on dsl027-189-050.sfo1.dsl.speakeasy.net (216.27.189.50): (The 1522 ports scanned but not shown below are in state: closed) Port State Service 25/tcp open smtp 27/tcp open nsw-fe 53/tcp open domain 80/tcp open http 110/tcp open pop-3 119/tcp open nntp 135/tcp open loc-srv 139/tcp open netbios-ssn 143/tcp open imap2 389/tcp open ldap 443/tcp open https 563/tcp open snews 593/tcp open http-rpc-epmap 636/tcp open ldapssl 993/tcp open imaps 995/tcp open pop3s 1031/tcp open iad2 1067/tcp open instl_boots 1723/tcp open pptp 5631/tcp open pcanywheredata No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=6/2%Time=3B19ADE6%O=25%C=1) TSeq(Class=TD%gcd=3%SI=2%IPID=RPI%TS=U) TSeq(Class=TD%gcd=1%SI=4%IPID=RD%TS=U) TSeq(Class=TD%gcd=1%SI=1%IPID=RPI%TS=U) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=N) # Nmap run completed at Sat Jun 2 23:24:22 2001 -- 1 IP address (1 host up) scanned in 21 seconds