Starting Nmap 5.21 (
http://nmap.org ) at 2011-03-27 04:19 CEST
Initiating Ping Scan at 04:19
Scanning 85.236.100.98 [4 ports]
Completed Ping Scan at 04:19, 0.06s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 04:19
Completed Parallel DNS resolution of 1 host. at 04:19, 0.06s elapsed
Initiating SYN Stealth Scan at 04:19
Scanning dedicated28.multiplay.co.uk (85.236.100.98) [1000 ports]
Discovered open port 25/tcp on 85.236.100.98
Discovered open port 8082/tcp on 85.236.100.98
Increasing send delay for 85.236.100.98 from 0 to 5 due to 115 out of 383 dropped probes since last increase.
Completed SYN Stealth Scan at 04:19, 14.69s elapsed (1000 total ports)
Initiating OS detection (try #1) against dedicated28.multiplay.co.uk (85.236.100.98)
Retrying OS detection (try #2) against dedicated28.multiplay.co.uk (85.236.100.98)
Nmap scan report for dedicated28.multiplay.co.uk (85.236.100.98)
Host is up (0.035s latency).
Not shown: 989 closed ports
PORT STATE SERVICE
22/tcp filtered ssh
23/tcp filtered telnet
25/tcp open smtp
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
3389/tcp filtered ms-term-serv
4444/tcp filtered krb524
8081/tcp filtered blackice-icecap
8082/tcp open blackice-alerts
Device type: general purpose|firewall|proxy server|router|phone|storage-misc
Running (JUST GUESSING) : FreeBSD 6.X|7.X (93%), m0n0wall FreeBSD 4.X|5.X (91%), Netasq embedded (89%), Blue Coat SGOS 5.X (89%), Juniper JUNOS 9.X (88%), Apple iPhone OS 2.X (87%), Isilon OneFS (87%)
Aggressive OS guesses: FreeBSD 6.2-RELEASE (93%), m0n0wall 1.3b11 - 1.3b15 FreeBSD-based firewall (91%), Netasq U70 firewall (89%), Blue Coat SG200 proxy server (SGOS 5.1.4.4) (89%), Juniper Networks JUNOS 9.0R2.10 (88%), FreeBSD 7.0-RELEASE (88%), Apple iPhone mobile phone (iPhone OS 2.2.1) (87%), Isilon IQ 200 NAS device (87%), FreeBSD 7.1-PRERELEASE 7.2-STABLE (87%), m0n0wall FreeBSD-based embedded firewall version 1.22 - 1.23b1 (87%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 16.897 days (since Thu Mar 10 05:48:19 2011)
Network Distance: 12 hops
TCP Sequence Prediction: Difficulty=265 (Good luck!)
IP ID Sequence Generation: Incremental
Read data files from: /usr/share/nmap
OS detection performed. Please report any incorrect results at
http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 19.32 seconds
Raw packets sent: 1665 (75.144KB) | Rcvd: 1018 (41.584KB)