Starting Nmap 5.21 (
http://nmap.org ) at 2011-09-24 12:13 MSK
Nmap scan report for 192.168.1.100
Host is up (0.016s latency).
Not shown: 995 closed ports
PORT STATE SERVICE VERSION
427/tcp open svrloc?
515/tcp open printer?
631/tcp open tcpwrapped
5200/tcp open tcpwrapped
9100/tcp open jetdirect?
Service detection performed. Please report any incorrect results at
http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 142.65 seconds
memfis@IBM:~$ sudo nmap -O -v 192.168.1.100
[sudo] password for memfis:
Starting Nmap 5.21 (
http://nmap.org ) at 2011-09-24 12:28 MSK
Initiating ARP Ping Scan at 12:28
Scanning 192.168.1.100 [1 port]
Completed ARP Ping Scan at 12:28, 0.07s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 12:28
Completed Parallel DNS resolution of 1 host. at 12:28, 0.00s elapsed
Initiating SYN Stealth Scan at 12:28
Scanning 192.168.1.100 [1000 ports]
Discovered open port 80/tcp on 192.168.1.100
Discovered open port 443/tcp on 192.168.1.100
Discovered open port 515/tcp on 192.168.1.100
Discovered open port 631/tcp on 192.168.1.100
Discovered open port 5200/tcp on 192.168.1.100
Discovered open port 427/tcp on 192.168.1.100
Discovered open port 9100/tcp on 192.168.1.100
Completed SYN Stealth Scan at 12:28, 1.35s elapsed (1000 total ports)
Initiating OS detection (try #1) against 192.168.1.100
Retrying OS detection (try #2) against 192.168.1.100
Retrying OS detection (try #3) against 192.168.1.100
Retrying OS detection (try #4) against 192.168.1.100
Retrying OS detection (try #5) against 192.168.1.100
Nmap scan report for 192.168.1.100
Host is up (0.0030s latency).
Not shown: 993 closed ports
PORT STATE SERVICE
80/tcp open http
427/tcp open svrloc
443/tcp open https
515/tcp open printer
631/tcp open ipp
5200/tcp open unknown
9100/tcp open jetdirect
MAC Address: 00:15:99:7E:02:EF (Samsung Electronics Co.)
No OS matches for host (If you know what OS is running on it, see
http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=5.21%D=9/24%OT=80%CT=1%CU=38455%PV=Y%DS=1%DC=D%G=Y%M=001599%TM=4E
OS:7D94B7%P=i686-pc-linux-gnu)SEQ(SP=96%GCD=1%ISR=9D%TI=BI%CI=BI%II=BI%SS=S
OS:%TS=U)SEQ(SP=94%GCD=1%ISR=9A%TI=BI%CI=BI%II=BI%SS=S%TS=U)SEQ(SP=A3%GCD=1
OS:%ISR=A1%TI=BI%CI=BI%II=BI%SS=S%TS=U)SEQ(SP=AC%GCD=1%ISR=A7%TI=BI%CI=BI%I
OS:I=BI%SS=S%TS=U)OPS(O1=NNM5B4SNW0%O2=NNM5B4SNW0%O3=M5B4NW0%O4=NNM5B4SNW0%
OS:O5=NNM5B4SNW0%O6=NNM5B4S)WIN(W1=1000%W2=1000%W3=1000%W4=1000%W5=1000%W6=
OS:1000)ECN(R=Y%DF=Y%T=40%W=1000%O=NNM5B4SNW0%CC=N%Q=)T1(R=Y%DF=Y%T=40%S=O%
OS:A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=N)T4(R=Y%DF=N%T=FF%W=0%S=A%A=Z%F=R%O=%RD=0
OS:%Q=)T5(R=Y%DF=N%T=FF%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=N%T=FF%W=0%S
OS:=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%DF=N%T=FF%W=0%S=Z%A=Z%F=R%O=%RD=0%Q=)U1(R=Y
OS:%DF=N%T=40%IPL=138%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=S%T
OS:=40%CD=Z)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=163 (Good luck!)
IP ID Sequence Generation: Broken little-endian incremental
Read data files from: /usr/share/nmap
OS detection performed. Please report any incorrect results at
http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.86 seconds
Raw packets sent: 1122 (53.416KB) | Rcvd: 1071 (45.840KB)