Pasty.. your UK ISP implements a public Pool and that is the reason David couldn't find anything ... I kept recieving a unresolved address on my first four (4) attempts ...
I used some of my personal programs I have on CD-ROM.. ran the public pool IP and these are my results ...
1 9 9 10.121.240.1
2 14 5 172.30.124.17
3 9 -5 172.30.118.185
4 12 3 172.30.118.174
5 9 -3 172.30.121.122
6 12 3 172.30.118.106
7 10 -2 68.46.144.166
8 13 3 144.232.191.21
9 12 -1 144.232.16.98
10 10 -2 144.232.5.173
11 14 4 144.232.20.117
12 14 0 144.232.20.133
13 83 69 144.232.19.70
14 81 -2 213.206.128.101
15 100 19 213.206.159.38
16 87 -13 213.105.172.150
17 87 0 62.253.185.54
18 86 -1 80.4.225.138
19 91 5 80.5.169.9
20 107 16 80.5.168.10
21 100 -7 80.5.237.105
host reached
// NTL Broadband (United Kingdom)
Official Name: public2-pool3-5-cust105.pool.broadband.ntl.com
IP Address: 80.5.237.105
After I reached your host.. I had to keep the public pool IP active so the connection wouldn't break ...
First I pinged your system :
Your PC responded to a ICMP ping
Respond to a TCP ping
Respond to a UDP ping
I seen a range of NETBIOS protocols on your PC ... (Disks.. Printer.. and IPC's) ... <<>> It wouldn't be to hard to crash.. destabilize or guess passwords on your system ... <<>> Port 139 is wide open.. I strongly suggest a firewall ASAP!
If I really tried.. executing a connection to your disk would not have been to hard either ...
Code:
22/tcp open ssh
25/tcp open smtp
80/tcp open http
111/tcp open sunrpc
515/tcp open printer
587/tcp open submission
6000/tcp open X11
icmp-response bandwidth limit 364/200 pps
icmp-response bandwidth limit 335/200 pps
icmp-response bandwidth limit 380/200 pps
icmp-response bandwidth limit 482/200 pps
icmp-response bandwidth limit 418/200 pps
icmp-response bandwidth limit 246/200 pps
icmp-response bandwidth limit 317/200 pps
root XF86_SVG 15769 0 tcp4 *:6000 *:*
nobody httpd 14592 16 tcp4 *:80 *:*
root sendmail 12873 4 tcp4 *:25 *:*
nobody httpd 12410 16 tcp4 *:80 *:*
nobody httpd 12409 16 tcp4 *:80 *:*
nobody httpd 12408 16 tcp4 *:80 *:*
nobody httpd 12407 16 tcp4 *:80 *:*
nobody httpd 12406 16 tcp4 *:80 *:*
root httpd 12382 16 tcp4 *:80 *:*
root sshd 12336 3 tcp4 *:22 *:*
root dhclient 12269 3 udp4 *:* *:*
root dhclient 12269 6 udp4 *:68 *:*
------------------------------
You are also running your system as a Internet Server ... Did you know that setting could allow anyone to read / write and or delete files on your system ? ...
Your open Port list = :
445
443
5000
139
143
80
113
110
135
25
79
21
23
// You also have six (6) well known trojan ports open as well ... I will not post those ports for obvious reasons ...
Sincerely
Courtney_DS