~ >: ftp 202.68.128.28
Connected to 202.68.128.28.
220 spiderbses Microsoft FTP Service (Version 4.0).
Name (202.68.128.28

rag): anonymous
331 Anonymous access allowed, send identity (e-mail name) as password.
Password:
230 Anonymous user logged in.
Remote system type is Windows_NT.
ftp>
Hmm.... I'd say that he is using NT 4.0 Which could be bad. But it seems like he is running a firewall:
~ >: sudo nmap 202.68.128.28
Starting nmap 3.50 (
http://www.insecure.org/nmap/ ) at 2004-06-20 02:53 CDT
Interesting ports on 202.68.128.28:
(The 1636 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
21/tcp open ftp
25/tcp filtered smtp
53/tcp open domain
80/tcp open http
110/tcp open pop3
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
143/tcp open imap
366/tcp open odmr
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
1027/tcp open IIS
1030/tcp open iad1
1032/tcp open iad3
4444/tcp filtered krb524
5631/tcp open pcanywheredata
5800/tcp open vnc-http
5900/tcp open vnc
27374/tcp filtered subseven
65301/tcp open pcanywhere
hehe.
I would be very carefull with such a system. Don't trust IIS any farther then I can throw it. (which isn't very far considuring it's just abstracted 1's and 0's)