Starting nmap V. 2.3BETA14 by  ( www.insecure.org/nmap/ )
Host kitt.knightindustries.com (64.84.42.240) appears to be up ... good.
Initiating SYN half-open stealth scan against kitt.knightindustries.com (64.84.42.240)
Adding TCP port 389 (state Open).
Adding TCP port 80 (state Open).
Adding TCP port 22 (state Open).
Adding TCP port 587 (state Open).
Adding TCP port 21 (state Open).
Adding TCP port 1024 (state Open).
Adding TCP port 900 (state Open).
Adding TCP port 25 (state Open).
Adding TCP port 111 (state Open).
Adding TCP port 113 (state Open).
Adding TCP port 3306 (state Open).
The SYN scan took 43 seconds to scan 1511 ports.
For OSScan assuming that port 21 is open and port 769 is closed and neither are firewalled
Interesting ports on 240-42.84.64.master-link.com (64.84.42.240):
Port    State       Protocol  Service
21      open        tcp       ftp                     
22      open        tcp       ssh                     
25      open        tcp       smtp                    
80      open        tcp       http                    
111     open        tcp       sunrpc                  
113     open        tcp       auth                    
389     open        tcp       ldap                    
587     open        tcp       submission              
900     open        tcp       unknown                 
1024    open        tcp       unknown                 
3306    open        tcp       mysql                   
TCP Sequence Prediction: Class=random positive increments
                         Difficulty=7580817 (Good luck!)
Sequence numbers: 217AE9B0 21894D13 22225A24 236D7312 23494FB2 227EA4CD
Remote operating system guess: Linux kernel 2.2.13

Nmap run completed -- 1 IP address (1 host up) scanned in 48 seconds