Ok, after my jest I was feeling a little bad so I did some digging from my home IP (http://nesser.org) so I port scanned you. [root@woman root]# nmap -P0 -sV -v linux4me.dyndns.org Starting nmap 3.48 ( http://www.insecure.org/nmap/ ) at 2004-02-24 22:29 EST Host 6532158hfc193.tampabay.rr.com (65.32.158.193) appears to be up ... good. Initiating SYN Stealth Scan against 6532158hfc193.tampabay.rr.com (65.32.158.193) at 22:29 Adding open port 22/tcp Adding open port 80/tcp The SYN Stealth Scan took 174 seconds to scan 1657 ports. Initiating service scan against 2 services on 1 host at 22:32 The service scan took 8 seconds to scan 2 services on 1 host. Interesting ports on 6532158hfc193.tampabay.rr.com (65.32.158.193): (The 1651 ports scanned but not shown below are in state: filtered) PORT STATE SERVICE VERSION 20/tcp closed ftp-data 21/tcp closed ftp 22/tcp open ssh OpenSSH 3.6.1p2 (protocol 1.99) 80/tcp open http Apache httpd 2.0.48 ((Fedora)) 113/tcp closed auth 500/tcp closed isakmp Nmap run completed -- 1 IP address (1 host up) scanned in 182.417 seconds ====================================================== And you are receiving connections quite well. [nesscg@woman nesscg]$ telnet linux4me.dyndns.org 22 Trying 65.32.158.193... Connected to linux4me.dyndns.org (65.32.158.193). Escape character is '^]'. SSH-1.99-OpenSSH_3.6.1p2 ^] Cheers, Chris On Tue, 2004-02-24 at 22:27, Christopher Ness wrote: > If that wasn't a pickup line, I don't know what is. :) lol > Ness > > On Tue, 2004-02-24 at 22:06, James Drabb wrote: > > Patrick, > > > > If I send you a username/password off-list, would you try to SSH into my > > box? -- Software Engineering IV, McMaster University PGP Public Key: http://nesser.org/pgp-key/ 22:39:11 up 1:46, 2 users, load average: 0.06, 0.19, 0.13
Attachment:
signature.asc
Description: This is a digitally signed message part