On Sun, 24 Aug 2003 07:10, Lee Wiggers wrote:
> On Sat, 23 Aug 2003 14:20:38 -0400
> yankl <[EMAIL PROTECTED]> wrote:
> > Some one need to run nmap against your IP address and then diff it with
> > nmap aginst 127.0.0.1.
> >
> > Yankl
>
> Any volunteers?  66.176.44.125
>
> I show this on 127.0.0.1
>
> Port       State       Service
> 21/tcp     open        ftp
> 22/tcp     open        ssh
> 25/tcp     open        smtp
> 37/tcp     open        time
> 53/tcp     open        domain
> 80/tcp     open        http
> 111/tcp    open        sunrpc
> 139/tcp    open        netbios-ssn
> 443/tcp    open        https
> 621/tcp    open        unknown
> 631/tcp    open        ipp
> 720/tcp    open        unknown
> 783/tcp    open        hp-alarm-mgr
> 953/tcp    open        rndc
> 2049/tcp   open        nfs
> 6000/tcp   open        X11
> 10000/tcp  open        snet-sensor-mgmt
> 32770/tcp  open        sometimes-rpc3
> 32771/tcp  open        sometimes-rpc5

Output from:
#  nmap -sS -O 66.176.44.125
-------------------------------------
Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 66.176.44.125, 16) => 
Operation not permitted
 Interesting ports on c-66-176-44-125.se.client2.attbi.com (66.176.44.125):
(The 1599 ports scanned but not shown below are in state: filtered)
Port       State       Service
80/tcp     open        http
5050/tcp   closed      mmcc

Nmap run completed -- 1 IP address (1 host up) scanned in 786 seconds
-------------------------------------

BTW, my dynamic IP address (203.173.202.78) will likely show up in logs 
whilst scanning your IP address.

Sharrea
-- 
Help Microsoft stamp out piracy - give Linux to a friend today

Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to