# nmap (V. 2.54BETA3) scan initiated Tue Aug 15 02:23:11 2000 as: /usr/home/zillion/nmap/nmap -O -P0 -oN /usr/local/apache/htdocs/mirror/2000/08/15/www.800shoes.com/nmap.txt www.800shoes.com Insufficient responses for TCP sequencing (0), OS detection may be less accurate Interesting ports on 800shoes.com (209.208.246.141): (The 1517 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 25/tcp open smtp 80/tcp open http 105/tcp open csnet-ns 106/tcp open pop3pw 110/tcp open pop-3 135/tcp open loc-srv 143/tcp open imap2 389/tcp open ldap 443/tcp open https 465/tcp open smtps 674/tcp open unknown 8888/tcp open sun-answerbook TCP Sequence Prediction: Class=trivial time dependency Difficulty=5 (Trivial joke) No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: TSeq(Class=TD%gcd=1%SI=5) T1(Resp=Y%DF=Y%W=2017%ACK=O%Flags=A%Ops=) TSeq(Class=TD%gcd=1%SI=5) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T2(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=2017%ACK=O%Flags=A%Ops=) T2(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T4(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T4(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) T7(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N # Nmap run completed at Tue Aug 15 02:23:36 2000 -- 1 IP address (1 host up) scanned in 25 seconds