Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Bill Weiss (houdini+postfixclanspum.net)
Date: Wed Apr 30 2008 - 16:51:24 CDT
aziz knina(azizkninayahoo.fr)Wed, Apr 30, 2008 at 06:21:20PM +0200:
> here the response of nmap:
> Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2008-04-30 16:14 WET
> DNS resolution of 1 IPs took 0.18s.
> Initiating SYN Stealth Scan against 126.96.36.199 [1 port] at 16:14
> The SYN Stealth Scan took 2.01s to scan 1 total ports.
> Host 188.8.131.52 appears to be up ... good.
> Interesting ports on 184.108.40.206:
> PORT STATE SERVICE
> 25/tcp filtered smtp
> Nmap finished: 1 IP address (1 host up) scanned in 2.205 seconds
> Raw packets sent: 2 (88B) | Rcvd: 0 (0B)
That says that your port 25 is filtered from the network. Talk to your
ISP and/or check your iptables rules.
Also, if your machine is on a public-facing IP, it's probably worth it to
stop changing it in your output. People here are pretty good at finding
problems if you just let them.
We are not mentally unsound [...] We just want a quiet place to finish
working while God eats our brains.
-- Bruce Sterling, Twenty Evocations