alice# nmap -P0 -O -v -v 81.15.216.243 Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2006-03-22 20:44 CET DNS resolution of 1 IPs took 0.05s. Mode: Async [#: 1, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0] Initiating SYN Stealth Scan against foryou.pl (81.15.216.243) [1672 ports] at 20:44 Discovered open port 21/tcp on 81.15.216.243 Discovered open port 80/tcp on 81.15.216.243 Discovered open port 443/tcp on 81.15.216.243 Discovered open port 113/tcp on 81.15.216.243 Discovered open port 22/tcp on 81.15.216.243 Discovered open port 3306/tcp on 81.15.216.243 Discovered open port 111/tcp on 81.15.216.243 The SYN Stealth Scan took 33.03s to scan 1672 total ports. For OSScan assuming port 21 is open, 1 is closed, and neither are firewalled Host foryou.pl (81.15.216.243) appears to be up ... good. Interesting ports on foryou.pl (81.15.216.243): (The 1657 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 69/tcp filtered tftp 80/tcp open http 111/tcp open rpcbind 113/tcp open auth 135/tcp filtered msrpc 136/tcp filtered profile 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 443/tcp open https 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 3306/tcp open mysql Device type: general purpose Running: Linux 2.4.X|2.5.X OS details: Linux 2.4.0 - 2.5.20 OS Fingerprint: TSeq(Class=RI%gcd=1%SI=1DC838%IPID=Z) T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T2(Resp=N) T3(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=F%UCK=F%ULEN=134%DAT=E) TCP Sequence Prediction: Class=random positive increments Difficulty=1951800 (Good luck!) IPID Sequence Generation: All zeros Nmap finished: 1 IP address (1 host up) scanned in 40.184 seconds Raw packets sent: 1776 (78.7KB) | Rcvd: 1721 (79.6KB)