Starting nmap V. 2.3BETA14 by ( www.insecure.org/nmap/ ) Host kitt.knightindustries.com (64.84.42.240) appears to be up ... good. Initiating SYN half-open stealth scan against kitt.knightindustries.com (64.84.42.240) Adding TCP port 389 (state Open). Adding TCP port 80 (state Open). Adding TCP port 22 (state Open). Adding TCP port 587 (state Open). Adding TCP port 21 (state Open). Adding TCP port 1024 (state Open). Adding TCP port 900 (state Open). Adding TCP port 25 (state Open). Adding TCP port 111 (state Open). Adding TCP port 113 (state Open). Adding TCP port 3306 (state Open). The SYN scan took 43 seconds to scan 1511 ports. For OSScan assuming that port 21 is open and port 769 is closed and neither are firewalled Interesting ports on 240-42.84.64.master-link.com (64.84.42.240): Port State Protocol Service 21 open tcp ftp 22 open tcp ssh 25 open tcp smtp 80 open tcp http 111 open tcp sunrpc 113 open tcp auth 389 open tcp ldap 587 open tcp submission 900 open tcp unknown 1024 open tcp unknown 3306 open tcp mysql TCP Sequence Prediction: Class=random positive increments Difficulty=7580817 (Good luck!) Sequence numbers: 217AE9B0 21894D13 22225A24 236D7312 23494FB2 227EA4CD Remote operating system guess: Linux kernel 2.2.13 Nmap run completed -- 1 IP address (1 host up) scanned in 48 seconds