

What you are probably seeing is a network security device like a firewall or IPS. When such a large number of ports are shown as tcpwrapped, it is unlikely that they represent real services, so the behavior probably means something else. This means that a valid (not false-positive) tcpwrapped response indicates a real network service is available, but you are not on the list of hosts allowed to talk with it. It is important to note that tcpwrapper protects programs, not ports. Specifically, it means that a full TCP handshake was completed, but the remote host closed the connection without receiving any data. When Nmap labels something tcpwrapped, it means that the behavior of the port is consistent with one that is protected by tcpwrapper. " tcpwrapped" refers to tcpwrapper, a host-based network access control program on Unix and Linux.
