Insufficient responses for TCP sequencing (3), OS detection may be less accurate Insufficient responses for TCP sequencing (3), OS detection may be less accurate Insufficient responses for TCP sequencing (3), OS detection may be less accurate Interesting ports on www.ebst.taipei.gov.tw (163.29.37.134): (The 1533 ports scanned but not shown below are in state: filtered) Port State Service 25/tcp open smtp 53/tcp closed domain 80/tcp open http 110/tcp closed pop-3 113/tcp closed auth 123/tcp closed ntp 211/tcp closed 914c-g 212/tcp closed anet 8080/tcp closed http-proxy No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=6/7%Time=3B1F5571%O=25%C=53) T1(Resp=Y%DF=Y%W=B68%ACK=S++%Flags=AS%Ops=MNNT) T2(Resp=N) T3(Resp=Y%DF=Y%W=B68%ACK=S++%Flags=AS%Ops=MNNT) T4(Resp=N) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T7(Resp=N) PU(Resp=Y%DF=N%TOS=0%IPLEN=38%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E) # Nmap run completed at Thu Jun 7 06:20:33 2001 -- 1 IP address (1 host up) scanned in 422 seconds