Nmap scan report for www.interior.gov.kh (198.23.48.150) Host is up (0.11s latency). rDNS record for 198.23.48.150: hosted.by.liquidnetlimited.com Scanned at 2013-10-19 12:04:46 W. Europe Daylight Time for 21s Not shown: 987 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 25/tcp filtered smtp 37/tcp filtered time 80/tcp open http 111/tcp open rpcbind 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 443/tcp filtered https 445/tcp filtered microsoft-ds 2222/tcp open EtherNet/IP-1 5566/tcp open westec-connect 5666/tcp open nrpe Device type: general purpose|firewall Running (JUST GUESSING): Linux 3.X|2.6.X (96%), IPFire Linux 2.6.X (88%) OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6 cpe:/o:ipfire:linux:2.6.32 OS fingerprint not ideal because: Host distance (18 network hops) is greater than five Aggressive OS guesses: Linux 3.2 - 3.6 (96%), Linux 2.6.32 - 3.0 (92%), Linux 2.6.32 - 2.6.39 (90%), Linux 3.0 - 3.2 (89%), Linux 3.0 - 3.9 (88%), IPFire firewall 2.11 (Linux 2.6.32) (88%), Linux 3.5 (88%), Linux 3.8 (88%), Linux 3.4 (87%), Linux 2.6.32 (87%) No exact OS matches for host (test conditions non-ideal). TCP/IP fingerprint: SCAN(V=6.40%E=4%D=10/19%OT=21%CT=1%CU=36801%PV=N%DS=18%DC=I%G=N%TM=52625953%P=i686-pc-windows-windows) SEQ(SP=106%GCD=1%ISR=109%TI=Z%II=I%TS=8) SEQ(SP=106%GCD=1%ISR=109%TI=Z%TS=A) OPS(O1=M5B4ST11NW9%O2=M5B4ST11NW9%O3=M5B4NNT11NW9%O4=M5B4ST11NW9%O5=M5B4ST11NW9%O6=M5B4ST11) WIN(W1=3890%W2=3890%W3=3890%W4=3890%W5=3890%W6=3890) ECN(R=Y%DF=Y%T=40%W=3908%O=M5B4NNSNW9%CC=Y%Q=) T1(R=Y%DF=Y%T=40%S=O%A=S+%F=AS%RD=0%Q=) T2(R=N) T3(R=N) T4(R=N) T5(R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=) T6(R=N) T7(R=N) U1(R=Y%DF=N%T=40%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=4535%RUD=G) IE(R=Y%DFI=N%T=40%CD=S) Uptime guess: 5.366 days (since Mon Oct 14 03:18:29 2013) Network Distance: 18 hops TCP Sequence Prediction: Difficulty=262 (Good luck!) IP ID Sequence Generation: All zeros Read data files from: D:\Programs\Nmap OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .