Skip to content
Permalink
main
Switch branches/tags
Go to file
 
 
Cannot retrieve contributors at this time
Starting nmap V. 2.54BETA3 ( www.insecure.org/nmap/ )
Insufficient responses for TCP sequencing (0), OS detection may be less accurate
Insufficient responses for TCP sequencing (0), OS detection may be less accurate
Insufficient responses for TCP sequencing (0), OS detection may be less accurate
Interesting ports on (200.212.77.88):
(The 1 port scanned but not shown below is in state: closed)
Port State Service
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
80/tcp open http
Aggressive OS guesses: AXENT Raptor Firewall running on Windows NT (96%), Raptor firewall 5.03 on NT 4 (92%), Windows NT4 / Win95 / Win98 (90%), NT Server 4.0 SP4-SP5 running Checkpoint Firewall-1 (86%), 3Com NetBuilder & NetBuilder II OS v 9.3 (85%)
No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M)
T2(Resp=N)
T3(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M)
T4(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=)
T5(Resp=N)
T6(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=)
T7(Resp=N)
PU(Resp=N)
Nmap run completed -- 1 IP address (1 host up) scanned in 222 seconds