On Sun, 24 Aug 2003 07:10, Lee Wiggers wrote: > On Sat, 23 Aug 2003 14:20:38 -0400 > yankl <[EMAIL PROTECTED]> wrote: > > Some one need to run nmap against your IP address and then diff it with > > nmap aginst 127.0.0.1. > > > > Yankl > > Any volunteers? 66.176.44.125 > > I show this on 127.0.0.1 > > Port State Service > 21/tcp open ftp > 22/tcp open ssh > 25/tcp open smtp > 37/tcp open time > 53/tcp open domain > 80/tcp open http > 111/tcp open sunrpc > 139/tcp open netbios-ssn > 443/tcp open https > 621/tcp open unknown > 631/tcp open ipp > 720/tcp open unknown > 783/tcp open hp-alarm-mgr > 953/tcp open rndc > 2049/tcp open nfs > 6000/tcp open X11 > 10000/tcp open snet-sensor-mgmt > 32770/tcp open sometimes-rpc3 > 32771/tcp open sometimes-rpc5
Output from: # nmap -sS -O 66.176.44.125 ------------------------------------- Starting nmap V. 3.00 ( www.insecure.org/nmap/ ) sendto in send_tcp_raw: sendto(3, packet, 40, 0, 66.176.44.125, 16) => Operation not permitted Interesting ports on c-66-176-44-125.se.client2.attbi.com (66.176.44.125): (The 1599 ports scanned but not shown below are in state: filtered) Port State Service 80/tcp open http 5050/tcp closed mmcc Nmap run completed -- 1 IP address (1 host up) scanned in 786 seconds ------------------------------------- BTW, my dynamic IP address (203.173.202.78) will likely show up in logs whilst scanning your IP address. Sharrea -- Help Microsoft stamp out piracy - give Linux to a friend today
Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com