Starting nmap 3.48 (
http://www.insecure.org/nmap ) at 2004-02-14 17:51 ora sola
re Europa occidentale
Host modemcable196.174-201-24.mc.videotron.ca (24.201.174.196) appears to be up
... good.
Initiating SYN Stealth Scan against modemcable196.174-201-24.mc.videotron.ca (24
.201.174.196) at 17:51
Adding open port 8081/tcp
The SYN Stealth Scan took 13 seconds to scan 1657 ports.
Initiating service scan against 1 service on 1 host at 17:51
The service scan took 5 seconds to scan 1 service on 1 host.
For OSScan assuming that port 8081 is open and port 1 is closed and neither are
firewalled
For OSScan assuming that port 8081 is open and port 1 is closed and neither are
firewalled
For OSScan assuming that port 8081 is open and port 1 is closed and neither are
firewalled
Interesting ports on modemcable196.174-201-24.mc.videotron.ca (24.201.174.196):
(The 1648 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE VERSION
25/tcp filtered smtp
80/tcp filtered http
135/tcp filtered msrpc
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
1080/tcp filtered socks
8081/tcp open blackice-icecap?
No exact OS matches for host (If you know what OS is running on it, see
http://www.insecure.org/cgi-bin/nmap-submit.cgi).
TCP/IP fingerprint:
SInfo(V=3.48%P=i686-pc-windows-windows%D=2/14%Time=402E5242%O=8081%C=1)
TSeq(Class=TD%gcd=1%SI=1%IPID=BI%TS=U)
TSeq(Class=TD%gcd=1%SI=2%IPID=BI%TS=U)
T1(Resp=Y%DF=Y%W=2017%ACK=S++%Flags=AS%Ops=M)
T2(Resp=N)
T3(Resp=N)
T4(Resp=N)
T5(Resp=Y%DF=N%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=N)
T7(Resp=N)
PU(Resp=Y%DF=N%TOS=0%IPLEN=38%RIPTL=148%RIPCK=E%UCK=F%ULEN=134%DAT=E)
TCP Sequence Prediction: Class=trivial time dependency
Difficulty=2 (Trivial joke)
IPID Sequence Generation: Broken little-endian incremental
Nmap run completed -- 1 IP address (1 host up) scanned in 37.725 seconds