Hrmm.. I'm starting to get insensetive cause I got bashed so much so quickly, but .. I get it.. I see where it's coming from.
People are anxious about it.. and some people are actually probably quite terrified.. and I didn't stop to think about that first, cause I live in Canada, and quite frankly, I'm not scared of being attacked by any country or terrorist group.
But I didn't really mean any harm.
Now, I'm trying to figure out what to do with this:
[root@www logs]# nmap -O -p 1-65535 -v 218.227.121.147
Starting nmap V. 2.54BETA36 (
www.insecure.org/nmap/ )
No tcp,udp, or ICMP scantype specified, assuming vanilla tcp connect() scan. Use -sP if you really don't want to portscan (and just want to see what hosts are up).
Host FLA1Aag147.sig.mesh.ad.jp (218.227.121.147) appears to be up ... good.
Initiating Connect() Scan against FLA1Aag147.sig.mesh.ad.jp (218.227.121.147)
Adding open port 139/tcp
Adding open port 5000/tcp
The Connect() Scan took 660 seconds to scan 65535 ports.
For OSScan assuming that port 139 is open and port 1 is closed and neither are firewalled
Interesting ports on FLA1Aag147.sig.mesh.ad.jp (218.227.121.147):
(The 65533 ports scanned but not shown below are in state: closed)
Port State Service
139/tcp open netbios-ssn
5000/tcp open fics
Remote operating system guess: Windows Millennium Edition (Me), Win 2000, or WinXP
TCP Sequence Prediction: Class=random positive increments
Difficulty=10000 (Worthy challenge)
IPID Sequence Generation: Incremental
Nmap run completed -- 1 IP address (1 host up) scanned in 663 seconds