Starting Nmap 4.65 ( http://nmap.org ) at 2008-06-22 13:49 CST
Initiating Ping Scan at 13:49
Scanning 202.194.64.88 [2 ports]
Completed Ping Scan at 13:49, 0.00s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 13:49
Completed Parallel DNS resolution of 1 host. at 13:49, 0.00s elapsed
Initiating SYN Stealth Scan at 13:49
Scanning 202.194.64.88 [1276 ports]
Discovered open port 22/tcp on 202.194.64.88
Completed SYN Stealth Scan at 13:49, 4.03s elapsed (1276 total ports)
Initiating OS detection (try #1) against 202.194.64.88
Host 202.194.64.88 appears to be up ... good.
Interesting ports on 202.194.64.88:
Not shown: 1273 closed ports
PORT STATE SERVICE
22/tcp open ssh
1080/tcp filtered socks
8000/tcp filtered http-alt
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.13 - 2.6.24
Uptime: 120.017 days (since Sat Feb 23 13:25:32 2008)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=200 (Good luck!)
IP ID Sequence Generation: All zeros
Read data files from: /usr/share/nmap
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 6.508 seconds
Raw packets sent: 1415 (63.002KB) | Rcvd: 1290 (59.984KB)