QUOTE(robertngo @ Mar 9 2005, 04:49 PM)
the webpage clam that there is no honeypot
anyone have the nmap result already?
Starting nmap 3.50 (
http://www.insecure.org/nmap/ ) at 2005-03-09 17:10 EST
Host 202.88.234.250 appears to be up ... good.
Initiating SYN Stealth Scan against 202.88.234.250 at 17:10
Adding open port 5432/tcp
Adding open port 111/tcp
Adding open port 25/tcp
Adding open port 37/tcp
Adding open port 9/tcp
Adding open port 80/tcp
Adding open port 13/tcp
adjust_timeout: packet supposedly had rtt of 11000145 microseconds. Ignoring time.
Adding open port 22/tcp
Adding open port 19/tcp
Adding open port 7/tcp
The SYN Stealth Scan took 491 seconds to scan 1659 ports.
Interesting ports on 202.88.234.250:
(The 1636 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
7/tcp open echo
9/tcp open discard
13/tcp open daytime
19/tcp open chargen
22/tcp open ssh
25/tcp open smtp
37/tcp open time
80/tcp open http
111/tcp open rpcbind
135/tcp filtered msrpc
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
1080/tcp filtered socks
1214/tcp filtered fasttrack
3128/tcp filtered squid-http
4444/tcp filtered krb524
4480/tcp filtered proxy-plus
5432/tcp open postgres
6588/tcp filtered analogx
17300/tcp filtered kuang2
Nmap run completed -- 1 IP address (1 host up) scanned in 497.618 seconds
Telnet to port 25 seems responding and tcouldnt be honeypot system since the site claime no honeypot installed.