Website Theft!

That would be kinda funny.

For the script kiddies:

$ sudo nmap -P0 -sS -T2 -O -p0-65535 -sV vfonex.com
Interesting ports on ns1.siteground121.com (207.218.208.8):
Not shown: 65294 filtered ports, 225 closed ports
PORT STATE SERVICE VERSION
1/tcp open tcpwrapped
21/tcp open ftp PureFTPd
25/tcp open smtp Exim smtpd 4.52
53/tcp open domain
80/tcp open http Apache httpd
110/tcp open pop3 cppop pop3d 20.0
111/tcp open tcpwrapped
143/tcp open imap UW Imapd 2004.357-cpanel
443/tcp open ssl/http Apache httpd
993/tcp open ssl/imap UW Imapd 2004.357-cpanel
2082/tcp open http Control Panel httpd 10.9.6
2083/tcp open ssl/http Control Panel httpd 10.9.6
2095/tcp open http Control Panel httpd 10.9.6
2096/tcp open ssl/http Control Panel httpd 10.9.6
2525/tcp open smtp Exim smtpd 4.52
3306/tcp open mysql MySQL 4.1.21-standard-log
5432/tcp open postgresql PostgreSQL
Device type: general purpose|media device
Running: Linux 2.4.X|2.6.X, Pace embedded
OS details: Linux 2.4.18 - 2.4.27, Linux 2.4.21 (Suse, X86), Linux 2.4.22, Linux 2.4.6 - 2.4.26 or 2.6.9, Linux 2.6.10, Linux 2.6.7, Linux 2.6.8 (Debian), Pace digital cable TV receiver
OS Fingerprint:
TSeq(Class=RI%gcd=1%SI=2B6402%IPID=Z%TS=100HZ)
T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)
T2(Resp=N)
T3(Resp=N)
T4(Resp=N)
T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=N)
T7(Resp=N)
PU(Resp=N)

Uptime 134.904 days (since Sun Sep 10 11:57:44 2006)
TCP Sequence Prediction: Class=random positive increments
Difficulty=2843650 (Good luck!)
IPID Sequence Generation: All zeros
Service Info: Host: serv01.siteground121.com; OS: Unix

Nmap finished: 1 IP address (1 host up) scanned in 85765.673 seconds
Raw packets sent: 212390 (9.346MB) | Rcvd: 16631 (667.585KB)