Insufficient responses for TCP sequencing (1), OS detection may be less accurate Insufficient responses for TCP sequencing (1), OS detection may be less accurate Insufficient responses for TCP sequencing (1), OS detection may be less accurate Interesting ports on www.korac.cz (193.179.148.241): (The 1541 ports scanned but not shown below are in state: closed) Port State Service 80/tcp open http No OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=7/30%Time=3B65B5B7%O=80%C=1) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=WNMETL) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=WNMETL) T7(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=WNMETL) PU(Resp=N) # Nmap run completed at Mon Jul 30 15:29:59 2001 -- 1 IP address (1 host up) scanned in 54 seconds