Starting nmap V. 2.54BETA31 ( www.insecure.org/nmap/ )
Interesting ports on (192.168.0.:
(The 1538 ports scanned but not shown below are in state: closed)
Port State Service
25/tcp open smtp
79/tcp open finger
81/tcp open hosts2-ns
110/tcp open pop-3
135/tcp open loc-srv
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1025/tcp open listen
1080/tcp open socks
1433/tcp open ms-sql-s
3001/tcp open nessusd
3005/tcp open deslogin
3006/tcp open deslogind
5050/tcp open mmcc
5631/tcp open pcanywheredata
8080/tcp open http-proxy
Nmap run completed -- 1 IP address (1 host up) scanned in 1 second
Starting nmap V. 2.54BETA31 ( www.insecure.org/nmap/ )
Interesting ports on (192.168.0.:
(The 1539 ports scanned but not shown below are in state: closed)
Port State Service
25/tcp open smtp
79/tcp open finger
81/tcp open hosts2-ns
110/tcp open pop-3
135/tcp open loc-srv
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1025/tcp open listen
1080/tcp open socks
1433/tcp open ms-sql-s
3001/tcp open nessusd
3005/tcp open deslogin
3006/tcp open deslogind
5631/tcp open pcanywheredata
8080/tcp open http-proxy
No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
SInfo(V=2.54BETA31%P=i386-redhat-linux-gnu%D=11/2%Time=4186F9A3%O=25%C=1)
TSeq(Class=RI%gcd=1%SI=56C0%TS=0)
TSeq(Class=RI%gcd=1%SI=25C8%IPID=I%TS=0)
TSeq(Class=RI%gcd=1%SI=227F%IPID=I%TS=0)
T1(Resp=Y%DF=N%W=402E%ACK=S++%Flags=AS%Ops=MNWNNT)
T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=)
T3(Resp=Y%DF=N%W=402E%ACK=S++%Flags=AS%Ops=MNWNNT)
T4(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=)
T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=Y%DF=N%W=0%ACK=O%Flags=R%Ops=)
T7(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=)
PU(Resp=N)
Nmap run completed -- 1 IP address (1 host up) scanned in 7 seconds
[root@IBM3500 /]#