Insufficient responses for TCP sequencing (3), OS detection may be less accurate Interesting ports on (216.249.241.68): (The 1537 ports scanned but not shown below are in state: filtered) Port State Service 21/tcp open ftp 80/tcp open http 443/tcp open https 554/tcp closed rtsp 5631/tcp open pcanywheredata No OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=2.54BETA22%P=i386-unknown-freebsd4.0%D=6/1%Time=3B176871%O=21%C=554) TSeq(Class=RI%gcd=1%SI=1062D%IPID=I%TS=0) TSeq(Class=RI%gcd=1%SI=3945%IPID=I%TS=0) T1(Resp=Y%DF=Y%W=402E%ACK=S++%Flags=AS%Ops=MNWNNT) T1(Resp=Y%DF=Y%W=402E%ACK=S++%Flags=AS%Ops=MNWNNT) T2(Resp=Y%DF=N%W=800%ACK=S%Flags=AR%Ops=) T2(Resp=Y%DF=N%W=800%ACK=S%Flags=AR%Ops=) T3(Resp=Y%DF=Y%W=402E%ACK=S++%Flags=AS%Ops=MNWNNT) T3(Resp=Y%DF=Y%W=402E%ACK=S++%Flags=AS%Ops=MNWNNT) T4(Resp=N) T4(Resp=Y%DF=N%W=800%ACK=S%Flags=AR%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=800%ACK=S%Flags=AR%Ops=) T6(Resp=Y%DF=N%W=800%ACK=S%Flags=AR%Ops=) T7(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) T7(Resp=Y%DF=N%W=800%ACK=S++%Flags=AR%Ops=) PU(Resp=N) PU(Resp=N) # Nmap run completed at Fri Jun 1 06:03:30 2001 -- 1 IP address (1 host up) scanned in 1893 seconds