[root@kylie kotek]# nmap -v -O -sS -p1-65535 84.195.53.101 Starting Nmap 4.20 ( http://insecure.org ) at 2008-04-02 18:25 CEST Initiating Parallel DNS resolution of 1 host. at 18:25 Completed Parallel DNS resolution of 1 host. at 18:25, 1.06s elapsed Initiating SYN Stealth Scan at 18:25 Scanning d54C33565.access.telenet.be (84.195.53.101) [65535 ports] Discovered open port 23990/tcp on 84.195.53.101 SYN Stealth Scan Timing: About 3.29% done; ETC: 18:40 (0:14:42 remaining) SYN Stealth Scan Timing: About 8.79% done; ETC: 18:37 (0:10:22 remaining) SYN Stealth Scan Timing: About 21.65% done; ETC: 18:33 (0:06:31 remaining) Increasing send delay for 84.195.53.101 from 0 to 5 due to max_successful_tryno increase to 4 Discovered open port 1025/tcp on 84.195.53.101 SYN Stealth Scan Timing: About 72.73% done; ETC: 18:37 (0:03:07 remaining) Increasing send delay for 84.195.53.101 from 5 to 10 due to max_successful_tryno increase to 5 Discovered open port 2020/tcp on 84.195.53.101 SYN Stealth Scan Timing: About 91.68% done; ETC: 18:38 (0:01:02 remaining) Completed SYN Stealth Scan at 18:38, 786.79s elapsed (65535 total ports) Initiating OS detection (try #1) against d54C33565.access.telenet.be (84.195.53.101) Retrying OS detection (try #2) against d54C33565.access.telenet.be (84.195.53.101) Initiating gen1 OS Detection against 84.195.53.101 at 792.206s For OSScan assuming port 1025 is open, 113 is closed, and neither are firewalled For OSScan assuming port 1025 is open, 113 is closed, and neither are firewalled For OSScan assuming port 1025 is open, 113 is closed, and neither are firewalled Host d54C33565.access.telenet.be (84.195.53.101) appears to be up ... good. Interesting ports on d54C33565.access.telenet.be (84.195.53.101): Not shown: 64500 closed ports, 1032 filtered ports PORT STATE SERVICE 1025/tcp open NFS-or-IIS 2020/tcp open xinupageserver 23990/tcp open unknown Device type: general purpose|broadband router|VoIP gateway Running (JUST GUESSING) : Microsoft Windows 2000|XP|2003 (92%), SMC embedded (88%), Vegastream embedded (86%) Aggressive OS guesses: Microsoft Windows 2000 Server SP4 (92%), Microsoft Windows 2000 AS SP4 (92%), Microsoft Windows 2000, SP0, SP1, or SP2 (91%), Microsoft Windows 2000 SP4 (90%), Microsoft Windows 2000 SP3 (89%), Microsoft Windows 2000 Server SP4 (89%), SMC SMC2804WBRP-G broadband router / WAP (88%), Microsoft Windows XP SP2 (86%), Vegastream Vega 400 VoIP Gateway (86%), Microsoft Windows 2003 Server SP1 (85%) No exact OS matches for host (test conditions non-ideal). Network Distance: 17 hops TCP Sequence Prediction: Difficulty=0 (Trivial joke) IPID Sequence Generation: Incremental OS detection performed. Please report any incorrect results at http://insecure.org/nmap/submit/ . Nmap finished: 1 IP address (1 host up) scanned in 801.462 seconds Raw packets sent: 75456 (3.324MB) | Rcvd: 67623 (3.113MB) [root@kylie kotek]# [root@kylie kotek]# nmap -A -p1025,2020,23990 -v 84.195.53.101 ... PORT STATE SERVICE VERSION 1025/tcp open msrpc Microsoft Windows RPC 2020/tcp open xinupageserver? 23990/tcp open unknown