Insufficient responses for TCP sequencing (1), OS detection may be less accurate Insufficient responses for TCP sequencing (1), OS detection may be less accurate Insufficient responses for TCP sequencing (1), OS detection may be less accurate Interesting ports on vinohrady-108-112-206.ab.breeznet.anet.cz (194.108.112.206): (The 1538 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 25/tcp open smtp 80/tcp open http 110/tcp open pop-3 No OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=7/22%Time=3B5A5BED%O=21%C=1) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=WNMETL) T3(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=WNMETL) T5(Resp=Y%DF=N%W=1000%ACK=S++%Flags=AR%Ops=WNMETL) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=WNMETL) T7(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=WNMETL) PU(Resp=N) # Nmap run completed at Sun Jul 22 00:51:57 2001 -- 1 IP address (1 host up) scanned in 55 seconds