Skip to content
Permalink
main
Switch branches/tags
Go to file
 
 
Cannot retrieve contributors at this time
Starting nmap V. 2.54BETA3 ( www.insecure.org/nmap/ )
Insufficient responses for TCP sequencing (2), OS detection may be less accurate
Insufficient responses for TCP sequencing (0), OS detection may be less accurate
Insufficient responses for TCP sequencing (3), OS detection may be less accurate
Interesting ports on inproxy.mp.gov.br (200.236.68.58):
(The 3 ports scanned but not shown below are in state: closed)
Port State Service
25/tcp open smtp
80/tcp open http
Aggressive OS guesses: Windows NT 5 Beta2 or Beta3 (96%), Windows 2000 RC1 through final release (96%), MS Windows2000 Professional RC1/W2K Advance Server Beta3 (96%), Windows Millenium Edition v4.90.3000 (96%), BSDI BSD/OS 4.0.1 Kernel (92%), Windows NT4 / Win95 / Win98 (92%), FreeBSD 3.2-STABLE (88%), Juniper Router running JUNOS (88%)
No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
T1(Resp=Y%DF=Y%W=402E%ACK=S++%Flags=AS%Ops=MNWNNT)
T2(Resp=N)
T3(Resp=Y%DF=Y%W=402E%ACK=S++%Flags=AS%Ops=MNWNNT)
T4(Resp=N)
T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=N)
T7(Resp=N)
PU(Resp=Y%DF=N%TOS=0%IPLEN=38%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E)
Nmap run completed -- 1 IP address (1 host up) scanned in 70 seconds