Insufficient responses for TCP sequencing (3), OS detection may be less accurate Interesting ports on cust.64-52-9.218.ip.eurekawest.net (64.52.9.218): (The 1534 ports scanned but not shown below are in state: filtered) Port State Service 20/tcp closed ftp-data 21/tcp open ftp 23/tcp closed telnet 25/tcp open smtp 80/tcp open http 110/tcp open pop-3 1723/tcp open pptp 5631/tcp open pcanywheredata No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=6/11%Time=3B249E12%O=21%C=20) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=A%Ops=) TSeq(Class=TD%gcd=1%SI=24%IPID=BI%TS=U) TSeq(Class=TD%gcd=1%SI=25%IPID=BI%TS=U) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T1(Resp=Y%DF=Y%W=5B4%ACK=S++%Flags=AS%Ops=M) T3(Resp=Y%DF=Y%W=5B4%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T3(Resp=Y%DF=Y%W=5B4%ACK=S++%Flags=AS%Ops=M) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=N) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) PU(Resp=N) T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=N) # Nmap run completed at Mon Jun 11 06:31:46 2001 -- 1 IP address (1 host up) scanned in 225 seconds