Starting nmap V. 2.54BETA31 ( www.insecure.org/nmap/
) Warning: You are not root -- using TCP pingscan rather than ICMP
Interesting ports on (192.168.0.2): (The 1095 ports scanned but not
shown below are in state: closed) Port State Service 135/tcp open
loc-srv 139/tcp open netbios-ssn 445/tcp open microsoft-ds 1025/tcp
open listen 5000/tcp open fics
Nmap run completed -- 1 IP address (1
host up) scanned in 1 second
[walwal@localhost /]$ ping -c 1 192.168.0.2
PING 192.168.0.2 (192.168.0.2) from 192.168.0.1 : 56(84) bytes of data.
64 bytes from 192.168.0.2: icmp_seq=1 ttl=128 time=0.303 ms
---
192.168.0.2 ping statistics --- 1 packets transmitted, 1 received, 0% loss,
time 0ms rtt min/avg/max/mdev = 0.303/0.303/0.303/0.000 ms
[guta@localhost /]$ netstat -nr Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface 211.215.55.192
0.0.0.0 255.255.255.192 U 40 0 0 eth0 192.168.0.0 0.0.0.0 255.255.255.0 U 40
0 0 eth1 127.0.0.0 0.0.0.0 255.0.0.0 U 40 0 0 lo 0.0.0.0 211.215.55.193
0.0.0.0 UG 40 0 0 eth0 ~~~~~~~~~~~~~~
[guta@localhost /]$ telnet
211.215.55.193 Trying 211.215.55.193... Connected to 211.215.55.193.
Escape character is '^]'.
----------------------------------------------------------------------
RS 3000 System Software, Version 9.1.0.0 Copyright (c) 2000-2002
Riverstone Networks, Inc. System started on 2002-08-12 00:43:17
----------------------------------------------------------------------