Insufficient responses for TCP sequencing (1), OS detection may be less accurate Insufficient responses for TCP sequencing (1), OS detection may be less accurate Insufficient responses for TCP sequencing (1), OS detection may be less accurate Interesting ports on (195.94.172.67): (The 1532 ports scanned but not shown below are in state: closed) Port State Service 1/tcp filtered tcpmux 21/tcp open ftp 25/tcp open smtp 42/tcp open nameserver 80/tcp open http 135/tcp open loc-srv 139/tcp open netbios-ssn 443/tcp open https 465/tcp open smtps 1433/tcp open ms-sql-s No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=7/20%Time=3B57DEB9%O=21%C=2) T1(Resp=N) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T1(Resp=N) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T3(Resp=N) T3(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=Y%DF=N%TOS=0%IPLEN=38%RIPTL=148%RID=E%RIPCK=E%UCK=F%ULEN=134%DAT=E) # Nmap run completed at Fri Jul 20 03:33:13 2001 -- 1 IP address (1 host up) scanned in 123 seconds