What are the Hosts Responding To? nmap -sP -PS22,25,53,80,113,31338 -PA80,113,21000 -PU53,19000 -PE -PM -g 53 --packet_trace 216.163.140.226 Starting nmap 3.21 ( www.insecure.org/nmap/ ) SENT (0.0130s) ICMP 0.0.0.0 > 216.163.140.226 Echo request (type=8/code=0) ttl=44 id=55447 iplen=28 SENT (0.0140s) ICMP 0.0.0.0 > 216.163.140.226 Address mask request (type=17/code=0) ttl=41 id=35344 iplen=32 SENT (0.0150s) UDP 64.71.184.55:53 > 216.163.140.226:53 ttl=38 id=0 iplen=28 SENT (0.0150s) UDP 64.71.184.55:53 > 216.163.140.226:19000 ttl=40 id=0 iplen=28 SENT (0.0150s) TCP 64.71.184.55:53 > 216.163.140.226:80 A ttl=51 id=51861 iplen=40 seq=2443182083 win=4096 ack=2443182083 SENT (0.0190s) TCP 64.71.184.55:53 > 216.163.140.226:113 A ttl=43 id=24275 iplen=40 seq=3476553731 win=4096 ack=3476553731 SENT (0.0190s) TCP 64.71.184.55:53 > 216.163.140.226:21000 A ttl=51 id=53772 iplen=40 seq=4066902019 win=4096 ack=4066902019 SENT (0.0240s) TCP 64.71.184.55:53 > 216.163.140.226:22 S ttl=47 id=14381 iplen=40 seq=2107113475 win=4096 SENT (0.0290s) TCP 64.71.184.55:53 > 216.163.140.226:25 S ttl=49 id=37975 iplen=40 seq=310378499 win=2048 SENT (0.0330s) TCP 64.71.184.55:53 > 216.163.140.226:53 S ttl=39 id=20252 iplen=40 seq=2434269187 win=4096 SENT (0.0330s) TCP 64.71.184.55:53 > 216.163.140.226:80 S ttl=59 id=7756 iplen=40 seq=1702363139 win=4096 SENT (0.0330s) TCP 64.71.184.55:53 > 216.163.140.226:113 S ttl=54 id=11084 iplen=40 seq=2351955971 win=3072 SENT (0.0380s) TCP 64.71.184.55:53 > 216.163.140.226:31338 S ttl=58 id=5166 iplen=40 seq=3077570563 win=3072 RCVD (0.0940s) TCP 216.163.140.226:113 > 64.71.184.55:53 R ttl=48 id=24275 iplen=40 seq=2327314382 win=0 Host 216.163.140.226 appears to be up. Nmap run completed -- 1 IP address (1 host up) scanned in 0.437 seconds