# nmap (V. 2.54BETA3) scan initiated Tue Aug 15 02:19:54 2000 as: /usr/home/zillion/nmap/nmap -O -P0 -oN /usr/local/apache/htdocs/mirror/2000/08/15/www.honda.co.uk/nmap.txt www.honda.co.uk Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port Insufficient responses for TCP sequencing (0), OS detection may be less accurate Interesting ports on (194.29.64.17): (The 1529 ports scanned but not shown below are in state: filtered) Port State Service 80/tcp open http TCP Sequence Prediction: Class=trivial time dependency Difficulty=4 (Trivial joke) No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: TSeq(Class=TD%gcd=1%SI=4) T1(Resp=Y%DF=Y%W=2017%ACK=O%Flags=A%Ops=) TSeq(Class=TD%gcd=1%SI=4) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T2(Resp=N) T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M) T2(Resp=N) T3(Resp=N) T2(Resp=N) T3(Resp=N) T4(Resp=N) T3(Resp=N) T4(Resp=N) T5(Resp=N) T4(Resp=N) T5(Resp=N) T6(Resp=N) T5(Resp=N) T6(Resp=N) T7(Resp=N) T6(Resp=N) T7(Resp=N) PU(Resp=N) T7(Resp=N) PU(Resp=N) PU(Resp=N) # Nmap run completed at Tue Aug 15 02:37:56 2000 -- 1 IP address (1 host up) scanned in 1082 seconds