Hostnames |
qmzstech.com www.qmzstech.com |
Domains | qmzstech.com |
Country | China |
City | Nanjing |
Organization | Tencent cloud computing (Beijing) Co., Ltd. |
ISP | Shenzhen Tencent Computer Systems Company Limited |
ASN | AS45090 |
HTTP/1.1 301 Moved Permanently Server: nginx/1.22.0 Date: Tue, 14 Jan 2025 17:16:49 GMT Content-Type: text/html Content-Length: 169 Connection: keep-alive Location: https://www.qmzstech.com/
HTTP/1.1 200 OK Server: nginx/1.22.0 Date: Sun, 02 Feb 2025 22:34:28 GMT Content-Type: text/html Content-Length: 726 Last-Modified: Mon, 24 Oct 2022 08:58:45 GMT Connection: keep-alive ETag: "635653c5-2d6" Accept-Ranges: bytes
Certificate: Data: Version: 3 (0x2) Serial Number: 02:89:6a:af:eb:c2:82:2a:43:8c:7d:b5:89:5f:7c:71 Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=Encryption Everywhere DV TLS CA - G1 Validity Not Before: Apr 22 00:00:00 2022 GMT Not After : Apr 22 23:59:59 2023 GMT Subject: CN=www.qmzstech.com Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:df:6e:bd:23:d5:59:a2:dc:5b:f4:2a:a4:a8:d3: 3b:26:07:bd:14:f7:81:d9:c6:de:29:a0:d6:e2:d5: 70:b5:52:72:67:f3:b7:a3:72:cc:be:00:cb:ac:e6: 82:16:25:b4:ca:ea:6c:bc:b4:e0:6e:58:9d:bc:58: a3:cc:cf:ff:14:f5:e4:c5:98:64:6a:1c:8e:92:bb: d4:54:8a:42:cc:78:30:1f:a9:ec:c0:bd:66:44:1d: d1:24:b3:81:52:da:e3:79:93:c4:b0:3c:47:50:42: 88:b6:9c:d6:ec:d2:2e:25:f7:2a:38:6b:87:15:39: 6b:bf:9f:ec:81:94:5a:38:ca:dd:d8:87:8f:91:83: b0:13:9c:5d:cc:e8:ed:93:60:2b:5b:59:75:42:25: e2:54:38:4d:ac:2b:f3:70:5f:9d:7f:84:4a:e5:79: 5d:e6:42:28:81:4a:01:72:73:cf:4e:9a:4c:c4:13: bf:1b:c3:23:7a:bd:62:9c:43:75:23:a7:b9:9e:c4: e6:df:1f:9f:25:84:45:cb:89:da:0b:7f:cf:b4:74: a3:25:5f:63:10:d7:40:6d:fe:62:2a:86:b9:f5:b8: c3:ab:83:7d:90:f6:54:0c:17:13:32:c5:f2:8d:46: 92:7c:66:a2:dd:4e:85:b1:87:68:0a:43:a1:43:d0: b0:61 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 55:74:4F:B2:72:4F:F5:60:BA:50:D1:D7:E6:51:5C:9A:01:87:1A:D7 X509v3 Subject Key Identifier: C3:06:05:E2:A9:4B:F6:8C:B1:E2:0D:10:7D:06:47:69:C6:BF:EE:F9 X509v3 Subject Alternative Name: DNS:www.qmzstech.com, DNS:qmzstech.com X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 2.23.140.1.2.1 CPS: http://www.digicert.com/CPS Authority Information Access: OCSP - URI:http://ocsp.digicert.com CA Issuers - URI:http://cacerts.digicert.com/EncryptionEverywhereDVTLSCA-G1.crt X509v3 Basic Constraints: CA:FALSE CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : E8:3E:D0:DA:3E:F5:06:35:32:E7:57:28:BC:89:6B:C9: 03:D3:CB:D1:11:6B:EC:EB:69:E1:77:7D:6D:06:BD:6E Timestamp : Apr 22 07:34:06.531 2022 GMT Extensions: none Signature : ecdsa-with-SHA256 30:46:02:21:00:EF:DA:83:F8:F4:5F:8E:80:A0:C1:BA: 75:C7:29:EE:9C:E1:E7:47:AD:C8:83:B0:40:55:30:4A: 1F:C9:75:06:25:02:21:00:96:EE:71:22:4D:55:47:A9: 67:0F:71:C7:31:AB:37:D5:1A:9C:1B:69:CD:7D:4C:E3: B1:05:0B:47:52:44:73:7F Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 35:CF:19:1B:BF:B1:6C:57:BF:0F:AD:4C:6D:42:CB:BB: B6:27:20:26:51:EA:3F:E1:2A:EF:A8:03:C3:3B:D6:4C Timestamp : Apr 22 07:34:06.476 2022 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:B9:6C:CF:47:60:7F:B5:E4:AC:37:DE: 4B:D9:4B:48:CD:36:32:3E:DA:99:4A:B9:AC:73:7D:9B: B8:5C:74:B4:90:02:20:27:BA:3C:72:B1:2C:33:84:EC: 9F:D5:46:14:8E:E1:62:56:77:99:6E:C2:C1:50:86:2B: 23:29:4F:9D:15:D0:FD Signed Certificate Timestamp: Version : v1 (0x0) Log ID : B3:73:77:07:E1:84:50:F8:63:86:D6:05:A9:DC:11:09: 4A:79:2D:B1:67:0C:0B:87:DC:F0:03:0E:79:36:A5:9A Timestamp : Apr 22 07:34:06.508 2022 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:88:6B:47:55:D1:ED:DA:FE:CC:80:AC: 9B:8A:CD:7A:B4:B2:43:37:35:22:E3:91:0F:42:E3:35: 82:81:14:7B:38:02:20:46:21:29:41:23:8F:B1:CB:FF: 16:D9:FE:F5:C2:19:EB:5B:78:A0:4A:BA:14:D4:49:66: 4D:4C:74:7C:36:AC:3E Signature Algorithm: sha256WithRSAEncryption Signature Value: 9e:5e:59:c8:e9:f7:ad:06:b6:f5:e3:b0:02:ef:5b:d9:24:e4: bf:67:23:9c:f1:31:bd:2d:fe:4f:ea:08:a4:48:0a:67:52:94: bf:c7:93:54:6e:ec:1e:5f:9d:a7:c5:a2:e0:e2:39:9f:e4:70: 1f:3a:02:c6:e9:07:45:ff:69:d0:3d:83:40:0d:4d:8b:8d:5a: 83:01:48:63:4c:85:62:6b:cc:22:a4:a5:ea:f6:48:9d:25:ab: ac:05:69:54:90:cd:ea:9d:e8:95:8a:95:d1:62:8d:28:eb:94: 4b:d9:e6:78:96:6b:45:6d:17:3a:e2:94:d6:8d:49:9b:5d:cd: d4:dd:8a:94:7f:4c:c1:5a:7c:ff:94:ec:11:2b:c8:4c:e0:b7: 94:ff:88:da:3e:2f:3d:3a:34:4e:2e:1f:dc:05:f8:ab:f7:2d: 69:ce:05:64:47:50:b1:50:df:cd:df:23:57:03:85:11:99:0b: 63:e7:24:73:19:1b:6a:3d:10:0f:a4:6a:b3:dd:52:8f:dc:df: 69:a1:e1:28:48:1e:ca:15:5d:e6:eb:97:db:3c:70:db:11:79: 70:9f:b8:16:04:e0:27:9b:07:00:91:0b:67:86:2d:b3:4d:62: 2f:cf:df:cb:8d:2e:1d:98:08:da:50:70:24:f6:7a:9e:9f:b6: 7f:66:2c:04
Remote Desktop Protocol \x03\x00\x00\x13\x0e\xd0\x00\x00\x124\x00\x02\x0f\x08\x00\x02\x00\x00\x00
Certificate: Data: Version: 3 (0x2) Serial Number: 19:32:98:2c:ac:50:1d:98:44:59:19:6a:df:e0:21:5a Signature Algorithm: sha256WithRSAEncryption Issuer: CN=\x001\x000\x00_\x002\x000\x006\x00_\x001\x006\x00_\x001\x000 Validity Not Before: Sep 27 16:04:26 2024 GMT Not After : Mar 29 16:04:26 2025 GMT Subject: CN=\x001\x000\x00_\x002\x000\x006\x00_\x001\x006\x00_\x001\x000 Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:a7:65:ee:9a:cf:e7:83:e9:97:de:a5:22:3c:17: e2:12:49:72:10:b9:a1:43:17:6c:e7:a6:e0:fe:c7: b3:45:e5:ff:ef:eb:a4:08:e3:16:4f:33:b4:2c:98: 85:fd:76:07:1d:a8:13:e4:3d:46:cc:5d:42:68:8b: 47:d4:9a:14:26:93:06:c1:4b:89:ed:01:18:17:65: 8b:fa:08:41:72:cb:07:4f:7c:fd:28:76:d9:e8:69: 07:df:ee:c2:f8:4e:98:f1:c2:fb:84:b8:83:5d:64: 0d:a0:7a:2e:b0:15:a7:2d:f0:df:28:c9:ae:3b:aa: ef:7d:9d:f3:e5:93:99:98:80:a4:4c:1b:0a:14:19: 3d:4e:25:f3:f7:21:20:5b:da:87:c2:68:0b:66:36: d1:27:25:e6:16:d6:8f:90:f3:14:c7:80:94:34:30: 81:e4:5e:1d:9f:8a:ec:79:5e:1a:54:8d:e8:51:7b: a8:0b:1c:38:9b:75:65:86:57:09:73:96:c9:11:33: 21:15:12:d1:6d:32:01:4e:2c:45:15:c2:a2:a7:7e: 9c:d7:34:17:02:cf:13:9d:0e:e1:e4:39:93:95:1f: f3:3d:b4:13:5a:bb:42:0c:24:38:32:17:51:b3:a4: 2b:d4:69:6e:8d:7a:0e:16:56:d9:e1:7f:3c:71:bf: 0b:0f Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Extended Key Usage: TLS Web Server Authentication X509v3 Key Usage: Key Encipherment, Data Encipherment Signature Algorithm: sha256WithRSAEncryption Signature Value: 92:9c:c7:b4:96:2d:96:ad:96:19:d0:dc:be:c9:98:3b:e6:7d: ff:02:f5:40:2d:63:fd:b2:49:12:1b:1e:5e:25:2b:dc:69:33: fc:e6:8f:b0:fa:a2:18:5d:4e:4f:f1:f7:92:7c:9e:05:f2:4c: cf:8d:35:5f:12:43:f1:60:42:30:5b:03:6a:ef:34:a6:03:3e: 91:f5:d3:dd:62:fd:68:3d:4e:ab:3b:c7:b8:e7:99:ce:c7:3f: 23:52:9f:5c:b5:3b:d4:6c:fb:86:06:00:b8:77:32:d6:8d:b5: fe:c8:44:63:27:90:e3:75:2b:2f:7e:44:5b:eb:2e:e3:b0:cf: b7:f5:53:f3:44:c5:8e:bc:da:8b:f9:86:07:0e:05:20:36:16: ab:0d:3a:3f:17:2b:54:17:bb:44:8e:63:95:d8:dd:f7:65:2e: 9e:c0:2a:8c:ea:31:d0:d0:c6:34:c0:ce:bc:1b:a9:30:2c:76: 0e:d6:2c:05:d9:14:7e:6e:29:70:46:19:aa:8a:8a:13:e7:dc: fc:bc:c6:4a:73:a3:c6:d5:ad:12:27:cf:f8:ea:03:cc:df:0e: 91:4e:96:6e:8a:84:b9:c0:92:ab:2b:6f:c0:2e:d0:b3:95:d3: 27:5a:f2:27:41:5a:77:46:97:8b:96:57:75:0b:46:fd:bc:6e: 11:81:df:68
HTTP/1.1 404 Not Found Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Sat, 25 Jan 2025 10:06:53 GMT Connection: close Content-Length: 315 WinRM NTLM Info: OS: Windows Server 2012 R2 OS Build: 6.3.9600 Target Name: 10_206_16_10 NetBIOS Domain Name: 10_206_16_10 NetBIOS Computer Name: 10_206_16_10 DNS Domain Name: 10_206_16_10 FQDN: 10_206_16_10
-DENIED Redis is running in protected mode because protected mode is enabled, no bind address was specified, no authentication password is requested to clients. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Setup a bind address or an authentication password. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.
HTTP/1.1 404 Content-Type: text/html;charset=utf-8 Content-Language: en Content-Length: 431 Date: Wed, 29 Jan 2025 06:57:16 GMT <!doctype html><html lang="en"><head><title>HTTP Status 404 – Not Found</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 404 – Not Found</h1></body></html>