Subj : Network ID. To : JEAN PARROT From : mark lewis Date : Tue Nov 05 2002 08:25 pm ml> pinging 24.200.243.234 gets me nothing... 100% packet loss... ml> however, i was able to do a traceroute to it... about 20 ml> hops... i see that its a videotron.ca feed <> forgot to scan you before saving that message... am currently (~19:45EST 5Nov2002) running a scan against 24.200.243.234... i'm using SuperScan v2.06... its a windows program and i'm coming at you via two NAT gateways... NAT is Network Address Translation... this box is in my xxx.xxx.30.* network and talks to the outside via my xxx.xxx.20.* network similar to what i described in my other message... i'm doing it this way right now, just beacause <> i've currently got superscan configured to scan all the ports i have in a list of known ports... several thousand of them... the scan takes about 10 minutes or so (at least)... so far, i only see port 53 (the DNS port) open... i'd guess that its about 1/4th of the way thru... i could also scan you with one of the linux boxes... they're on another network and only get NAT'd once... that scan would be with NMap and could likely even tell me the OS of the machine that i'm scanning... [time passes] i did decide to scan you with NMap as well... from what i can tell, you do seem to be closed up pretty tightly... that could be due entirely to your box or it could also be that your ISP blocks/filters some stuff... some of them can also drop packets if they detect a "storm" like my scans might cause... if they do something like this to protect you, then my packets won't even make it to your box... superscan completed and only found the DNS port (53) open... this was a connect() scan... in otherwords, ss tried to connect to something on each port in the traditional method of establishing a connection... NMap is still running the SYN Stealth scan on you... IIRC, this one is where it fakes that the first part of a connection has been established... NMap is (probably) =the= scan tool of choice for most... ok! it's ~20:24 now and NMap just finished... it, too, shows only the DNS port being open... it also gave me the fingerprint data for the OS running on that box... it doesn't know what it is but ask that if i know that i take that data and the info on the OS and let them know about it so that they can update their data tables... i think i'll pass <> )\/(ark * Origin: (1:3634/12) .