Interesting ports on www.abwem.wpafb.af.mil (129.48.104.222): (The 1498 ports scanned but not shown below are in state: closed) Port State Service 7/tcp filtered echo 19/tcp filtered chargen 25/tcp open smtp 79/tcp filtered finger 80/tcp open http 109/tcp filtered pop-2 110/tcp filtered pop-3 111/tcp filtered sunrpc 135/tcp filtered loc-srv 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 143/tcp filtered imap2 161/tcp filtered snmp 162/tcp filtered snmptrap 167/tcp filtered namp 220/tcp filtered imap3 465/tcp open smtps 512/tcp filtered exec 513/tcp filtered login 514/tcp filtered shell 515/tcp filtered printer 635/tcp filtered unknown 1524/tcp filtered ingreslock 2049/tcp filtered nfs 6000/tcp filtered X11 6001/tcp filtered X11:1 6002/tcp filtered X11:2 6003/tcp filtered X11:3 6004/tcp filtered X11:4 6005/tcp filtered X11:5 6006/tcp filtered X11:6 6007/tcp filtered X11:7 6008/tcp filtered X11:8 6009/tcp filtered X11:9 6050/tcp filtered arcserve 6666/tcp filtered irc-serv 6667/tcp filtered irc 7000/tcp filtered afs3-fileserver 12345/tcp filtered NetBus 12346/tcp filtered NetBus 27665/tcp filtered Trinoo_Master 44442/tcp open coldfusion-auth 44443/tcp open coldfusion-auth No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=6/7%Time=3B1F3FA6%O=25%C=1) TSeq(Class=RI%gcd=1%SI=9B50%IPID=BI%TS=U) TSeq(Class=RI%gcd=1%SI=13E0%IPID=BI%TS=U) TSeq(Class=RI%gcd=1%SI=2CD6%IPID=BI%TS=U) T1(Resp=Y%DF=N%W=2017%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T3(Resp=Y%DF=N%W=2017%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=N) # Nmap run completed at Thu Jun 7 04:47:34 2001 -- 1 IP address (1 host up) scanned in 33 seconds