# nmap -A -T4 scanme.nmap.org 207.68.200.30 Starting Nmap 5.00 ( http://nmap.org ) at 2009-07-13 16:22 PDT Interesting ports on scanme.nmap.org (64.13.134.52): Not shown: 994 filtered ports PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 4.3 (protocol 2.0) | ssh-hostkey: 1024 03:5f:d3:9d:95:74:8a:d0:8d:70:17:9a:bf:93:84:13 (DSA) |_ 2048 fa:af:76:4c:b0:f4:4b:83:a4:6e:70:9f:a1:ec:51:0c (RSA) 53/tcp open domain ISC BIND 9.3.4 70/tcp closed gopher 80/tcp open http Apache httpd 2.2.2 ((Fedora)) |_ html-title: Go ahead and ScanMe! 113/tcp closed auth 31337/tcp closed Elite Device type: general purpose Running: Linux 2.6.X OS details: Linux 2.6.20-1 (Fedora Core 5) Interesting ports on 207.68.200.30: Not shown: 991 filtered ports PORT STATE SERVICE VERSION 53/tcp open domain Microsoft DNS 6.0.6001 88/tcp open kerberos-sec Microsoft Windows kerberos-sec 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds Microsoft Windows 2003 microsoft-ds 464/tcp open kpasswd5? 49158/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 49175/tcp open msrpc Microsoft Windows RPC Running: Microsoft Windows 2008|Vista Host script results: | smb-os-discovery: Windows Server (R) 2008 Enterprise 6001 Service Pack 1 | LAN Manager: Windows Server (R) 2008 Enterprise 6.0 | Name: MSAPPLELAB\APPLELAB2K8 |_ System time: 2009-07-13 16:17:07 UTC-7 | nbstat: NetBIOS name: APPLELAB2K8, NetBIOS user: , NetBIOS MAC: 00:1a:a0:9a:a3:96 | Name: APPLELAB2K8<00> Flags: |_ Name: MSAPPLELAB<00> Flags: TRACEROUTE (using port 135/tcp) HOP RTT ADDRESS [Cut first 8 lines for brevity] 9 36.88 ge-10-0.hsa1.Seattle1.Level3.net (4.68.105.6) 10 36.61 unknown.Level3.net (209.245.176.2) 11 41.21 207.68.200.30 Nmap done: 2 IP addresses (2 hosts up) scanned in 120.26 seconds # (Note: some output was modified to fit results on screen)