Insufficient responses for TCP sequencing (2), OS detection may be less accurate Insufficient responses for TCP sequencing (3), OS detection may be less accurate Insufficient responses for TCP sequencing (2), OS detection may be less accurate Interesting ports on tbm.acer.com.tw (210.63.96.77): (The 1537 ports scanned but not shown below are in state: filtered) Port State Service 21/tcp open ftp 80/tcp open http 81/tcp closed hosts2-ns 443/tcp open https 1433/tcp open ms-sql-s No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=7/31%Time=3B666265%O=21%C=81) T1(Resp=Y%DF=Y%W=5B4%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=5B4%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=N) # Nmap run completed at Tue Jul 31 03:46:45 2001 -- 1 IP address (1 host up) scanned in 699 seconds