debian:/# nmap -sP 10.10.10.136

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:29 CST
Host localhost (10.10.10.136) appears to be up.
Nmap done: 1 IP address (1 host up) scanned in 0.038 seconds
debian:/#
debian:/# nmap -sS 10.10.10.136

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:08 CST
Interesting ports on 10.10.10.136:
Not shown: 1712 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
80/tcp  open  http
111/tcp open  rpcbind

Nmap done: 1 IP address ( 1 host up) scanned in 13.134 seconds
debian:/# nmap -sT 10.10.10.136

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:09 CST
Interesting ports on 10.10.10.136:
Not shown: 1712 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
80/tcp  open  http
111/tcp open  rpcbind

Nmap done: 1 IP address (1 host up) scanned in 13.165 seconds
debian:/# nmap -sU 10.10.10.136

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:09 CST
Interesting ports on 10.10.10.136:
Not shown: 1484 closed ports
PORT    STATE         SERVICE
68/udp  open|filtered dhcpc
111/udp open|filtered rpcbind
631/udp open|filtered unknown
883/udp open|filtered unknown

Nmap done: 1 IP address (1 host up) scanned in 14.266 seconds
debian:/# nmap -sF 10.10.10.136

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:10 CST
Interesting ports on 10.10.10.136:
Not shown: 1712 closed ports
PORT    STATE         SERVICE
22/tcp  open|filtered ssh
80/tcp  open|filtered http
111/tcp open|filtered rpcbind

Nmap done: 1 IP address (1 host up) scanned in 14.432 seconds
debian:/# nmap -sX 10.10.10.136

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:11 CST
Interesting ports on 10.10.10.136:
Not shown: 1712 closed ports
PORT    STATE         SERVICE
22/tcp  open|filtered ssh
80/tcp  open|filtered http
111/tcp open|filtered rpcbind

Nmap done: 1 IP address (1 host up) scanned in 14.261 seconds
debian:/# nmap -sN 10.10.10.136

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:11 CST
Interesting ports on 10.10.10.136:
Not shown: 1712 closed ports
PORT    STATE         SERVICE
22/tcp  open|filtered ssh
80/tcp  open|filtered http
111/tcp open|filtered rpcbind

Nmap done: 1 IP address (1 host up) scanned in 14.247 seconds
debian:/# nmap -sI 10.10.10.136
WARNING: Many people use -PN w/Idlescan to prevent pings from their true IP.  On the other hand, timing info Nmap gains from pings can allow for faster, more reliable scans.

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:13 CST
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 2.036 seconds
debian:/# nmap -sI -P0 10.10.10.136
WARNING: Many people use -PN w/Idlescan to prevent pings from their true IP.  On the other hand, timing info Nmap gains from pings can allow for faster, more reliable scans.

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:13 CST
Skipping Idle Scan against 10.10.10.136 -- you can't idle scan your own machine (localhost).
0 ports scanned on 10.10.10.136

Nmap done: 1 IP address (1 host up) scanned in 15.038 seconds
debian:/# nmap -sI -P0 192.168.1.1
WARNING: Many people use -PN w/Idlescan to prevent pings from their true IP.  On the other hand, timing info Nmap gains from pings can allow for faster, more reliable scans.

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:13 CST
Could not resolve idle scan zombie host: -P0
QUITTING!
debian:/# nmap -sA 192.168.1.1

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:14 CST
All 1715 scanned ports on 192.168.1.1 are unfiltered
MAC Address: 00:E0:4C:03:FD:87 (Realtek Semiconductor)

Nmap done: 1 IP address (1 host up) scanned in 14.819 seconds
debian:/# nmap -sS -P0 -O 10.10.10.136

Starting Nmap 4.62 ( http://nmap.org ) at 2009-07-30 14:15 CST
Interesting ports on localhost (10.10.10.136):
Not shown: 1712 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
80/tcp  open  http
111/tcp open  rpcbind
Device type: general purpose
Running: Linux 2.6.X
OS details: Linux 2.6.17 - 2.6.23
Uptime: 0.105 days (since Thu Jul 30 11:44:44 2009)
Network Distance: 0 hops

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1.672 seconds
debian:/#