Starting Nmap 5.00 ( http://nmap.org ) at 2010-03-27 14:04 CET NSE: Loaded 0 scripts for scanning. Initiating ARP Ping Scan at 14:04 Scanning 3 hosts [1 port/host] Completed ARP Ping Scan at 14:04, 0.21s elapsed (3 total hosts) Initiating SYN Stealth Scan at 14:04 Scanning 192.168.1.1 [1000 ports] Discovered open port 443/tcp on 192.168.1.1 Discovered open port 21/tcp on 192.168.1.1 Discovered open port 80/tcp on 192.168.1.1 Discovered open port 23/tcp on 192.168.1.1 Discovered open port 22/tcp on 192.168.1.1 Discovered open port 1050/tcp on 192.168.1.1 Completed SYN Stealth Scan at 14:04, 0.44s elapsed (1000 total ports) Host 192.168.1.1 is up (0.0097s latency). Interesting ports on 192.168.1.1: Not shown: 994 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 80/tcp open http 443/tcp open https 1050/tcp open java-or-OTGfileshare MAC Address: 00:13:64:41:FA:21 (Paradigm Technology.) Initiating ARP Ping Scan at 14:04 Scanning 250 hosts [1 port/host] Completed ARP Ping Scan at 14:04, 5.06s elapsed (250 total hosts) Initiating SYN Stealth Scan at 14:04 Scanning 192.168.1.4 [1000 ports] Discovered open port 5432/tcp on 192.168.1.4 Increasing send delay for 192.168.1.4 from 0 to 5 due to 215 out of 715 dropped probes since last increase. Completed SYN Stealth Scan at 14:04, 7.87s elapsed (1000 total ports) Host 192.168.1.4 is up (0.000030s latency). Interesting ports on 192.168.1.4: Not shown: 999 closed ports PORT STATE SERVICE 5432/tcp open postgresql Read data files from: /opt/local/share/nmap Nmap done: 254 IP addresses (2 hosts up) scanned in 13.70 seconds Raw packets sent: 3397 (148.458KB) | Rcvd: 3894 (163.358KB)