Probably a TCP RST. An excerpt from the nmap manual (v 5.00):
The -sP option sends an ICMP echo request, TCP SYN to port 443, TCP
ACK to port 80, and an ICMP timestamp request by default. When
executed by an unprivileged user, only SYN packets are sent (using a
connect call) to ports 80 and 443 on the target. When a privileged
user tries to scan targets on a local ethernet network, ARP requests
are used unless --send-ip was specified. The -sP option can be
combined with any of the discovery probe types (the -P* options,
excluding -PN) for greater flexibility. If any of those probe type and
port number options are used, the default probes are overridden. When
strict firewalls are in place between the source host running Nmap and
the target network, using those advanced techniques is recommended.
Otherwise hosts could be missed when the firewall drops probes or
their responses.
As shown here:
# nmap -sP 10.99.10.19
Host 10.99.10.19 is up (0.0015s latency).
21:31:13.338418 IP (tos 0x0, ttl 51, id 28548, offset 0, flags [none], proto ICMP (1), length 28)
10.0.0.20 > 10.99.10.19: ICMP echo request, id 57832, seq 0, length 8
21:31:13.338625 IP (tos 0x0, ttl 50, id 7277, offset 0, flags [none], proto TCP (6), length 44)
10.0.0.20.63105 > 10.99.10.19.443: Flags [S], cksum 0xe71d (correct), seq 4106918263, win 3072, options [mss 1460], length 0
21:31:13.338780 IP (tos 0x0, ttl 52, id 11356, offset 0, flags [none], proto TCP (6), length 40)
10.0.0.20.63105 > 10.99.10.19.80: Flags [.], cksum 0x3276 (correct), seq 4106918263, ack 774547350, win 1024, length 0
21:31:13.339771 IP (tos 0x0, ttl 55, id 35529, offset 0, flags [none], proto ICMP (1), length 40)
10.0.0.20 > 10.99.10.19: ICMP time stamp query id 23697 seq 0, length 20
21:31:13.340590 IP (tos 0x0, ttl 255, id 63189, offset 0, flags [none], proto TCP (6), length 40)
10.99.10.19.80 > 10.0.0.20.63105: Flags [R.], cksum 0x3272 (correct), seq 1, ack 0, win 1024, length 0
In my case I have a pair of Cisco ASAs locally and run Linux and strongswan on the remote side. It's likely the remote side since the rtt over the tunnel is roughly 7-9ms in average. I see that the other side sends out arp who-has, but that's as far i get without decrypting the remote ipsec peers packets.