> [root@herc /home/freedman]# nmap -sT osprey > > Starting nmap V. 2.12 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/) > Interesting ports on osprey (192.168.0.1): > Port State Protocol Service > 22 open tcp ssh > 25 open tcp smtp > 53 open tcp domain > 3086 open tcp sj3 ports > 1024 are automatically allocated by a program for any tcp connection. since 3086 wasn't in use, some program bound to it. it doesn't mean it was actually using the sj3 protocol. this could have been a domain lookup. telnet. even you viewing a webpage. cheers -- Damien <bitwise@repose.cx> 'together alone'
Attachment:
pgplp39w9L1xB.pgp
Description: PGP signature