Just in case you are interested:
# nmap -v -P0 62.4.72.36
Starting nmap V. 3.00 (
www.insecure.org/nmap/ )
No tcp,udp, or ICMP scantype specified, assuming vanilla tcp connect() scan. Use -sP if you really don't want to portscan (and just want to see what hosts are up).
Host (62.4.72.36) appears to be up ... good.
Initiating Connect() Scan against (62.4.72.36)
Strange error from connect (13):Permission denied
The Connect() Scan took 4 seconds to scan 1601 ports.
Interesting ports on (62.4.72.36):
(The 1582 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp filtered ftp
22/tcp filtered ssh
23/tcp filtered telnet
25/tcp filtered smtp
37/tcp filtered time
43/tcp filtered whois
53/tcp filtered domain
63/tcp filtered via-ftp
70/tcp filtered gopher
79/tcp filtered finger
80/tcp filtered http
110/tcp filtered pop-3
113/tcp filtered auth
119/tcp filtered nntp
123/tcp filtered ntp
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
443/tcp filtered https
11371/tcp filtered pksd
Nmap run completed -- 1 IP address (1 host up) scanned in 4 seconds
#
It might be wasting time but.. let's say "they are" testing our skills...knowledge skills security computers in positive way