Outro comando:
nmap -sS -O -v meuserver.no-ip.org
Starting Nmap 5.00 (
http://nmap.org ) at 2012-08-14 17:13 BRT
NSE: Loaded 0 scripts for scanning.
Initiating SYN Stealth Scan at 17:13
Scanning NERV-01.ESCRITORIO (192.168.1.100) [1000 ports]
Discovered open port 111/tcp on 192.168.1.100
Discovered open port 139/tcp on 192.168.1.100
Discovered open port 445/tcp on 192.168.1.100
Discovered open port 21/tcp on 192.168.1.100
Discovered open port 22/tcp on 192.168.1.100
Discovered open port 901/tcp on 192.168.1.100
Discovered open port 2049/tcp on 192.168.1.100
Discovered open port 45100/tcp on 192.168.1.100
Completed SYN Stealth Scan at 17:13, 0.05s elapsed (1000 total ports)
Initiating OS detection (try #1) against NERV-01.ESCRITORIO (192.168.1.100)
Retrying OS detection (try #2) against NERV-01.ESCRITORIO (192.168.1.100)
Retrying OS detection (try #3) against NERV-01.ESCRITORIO (192.168.1.100)
Retrying OS detection (try #4) against NERV-01.ESCRITORIO (192.168.1.100)
Retrying OS detection (try #5) against NERV-01.ESCRITORIO (192.168.1.100)
Host NERV-01.ESCRITORIO (192.168.1.100) is up (0.000058s latency).
Interesting ports on NERV-01.ESCRITORIO (192.168.1.100):
Not shown: 992 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
901/tcp open samba-swat
2049/tcp open nfs
45100/tcp open unknown
No exact OS matches for host (If you know what OS is running on it, see
http://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=5.00%D=8/14%OT=21%CT=1%
[*****]=39475%PV=Y%DS=0%G=Y%TM=502AB16C%P=i686-
OS:pc-linux-gnu)SEQ(SP=100%GCD=1%ISR=10D%TI=Z%CI=Z%II=I%TS=8)OPS(O1=M400CST
OS:11NW6%O2=M400CST11NW6%O3=M400CNNT11NW6%O4=M400CST11NW6%O5=M400CST11NW6%O
OS:6=M400CST11)WIN(W1=8000%W2=8000%W3=8000%W4=8000%W5=8000%W6=8000)ECN(R=Y%
OS:DF=Y%T=40%W=8018%O=M400CNNSNW6%CC=Y%Q=)T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD
OS:=0%Q=)T2(R=N)T3(R=Y%DF=Y%T=40%W=8000%S=O%A=S+%F=AS%O=M400CST11NW6%RD=0%Q
OS:=)T4(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A
OS:=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T7(R=Y%D
OS:F=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL
OS:=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=40%CD=S)
Uptime guess: 0.971 days (since Mon Aug 13 17:54:49 2012)
Network Distance: 0 hops
TCP Sequence Prediction: Difficulty=256 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: /usr/share/nmap
OS detection performed. Please report any incorrect results at
http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.04 seconds
Raw packets sent: 1095 (51.990KB) | Rcvd: 2213 (98.852KB)
Isso ajuda?