On 2/26/2014 16:49, Patrick Dupre wrote:
Starting Nmap 6.01 ( http://nmap.org ) at 2014-02-26 22:47 CET
Initiating SYN Stealth Scan at 22:47
Scanning 193.49.194.19 [4 ports]
Completed SYN Stealth Scan at 22:47, 3.01s elapsed (4 total ports)
Nmap scan report for 193.49.194.19
Host is up.
PORT     STATE    SERVICE
5900/tcp filtered vnc
5901/tcp filtered vnc-1
5902/tcp filtered vnc-2
5903/tcp filtered vnc-3

This means that your firewall is blocking the ports or that your vncserver isn't really running on the target system. You can determin if it is by running nmap on the target system and substituting "localhost" for the target IP like this:

nmap -v -n -P0 -p5900-5910 localhost

By the way, the IP address above appears to be public. You may want to reconsider running a vncserver over the public Internet because the session is not encrypted.


Tom
--
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org

Reply via email to