Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
220 (vsFTPd 2.3.5) 530 Login incorrect. 530 Please login with USER and PASS. 211-Features: EPRT EPSV MDTM PASV REST STREAM SIZE TVFS UTF8 211 End
SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1.10 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAABIwAAAQEAkHUyslQ9bbgwHIO75bqA8gsyLIt+AX5U9aGi74jOc+mUWaeU 0aD7Nujp4VzUfJG2zfd8qn07/kjPA5poN3wjW+qyEttxr30PzxFNGEhN7bGsCLSf2TAo3TtpqLZo GxsAj84rBMNVYwWy7JxdDubAdg/fbo/BRZOf+BLfFhcAGjGUDYMM23nAII0JKEniqNFbAd8NwXrS Uvuwx618DmKBmrwKGCRaJcHDtRqdN36VwkmIA+2yP9B29a6Hmfa4AUW4NfaDkWyoJaA8xObjlPMf hDjmpgLQsjfJUP2i03lAXta3htuDYbVTAJVfkav1mKDEijG3b4y8pcEM3DMoYidQhw== Fingerprint: b7:6a:8f:5e:fc:9d:a1:cc:8e:ce:b5:e9:b3:6d:5b:1a Kex Algorithms: ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group-exchange-sha1 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1 Server Host Key Algorithms: ssh-rsa ssh-dss ecdsa-sha2-nistp256 Encryption Algorithms: aes128-ctr aes192-ctr aes256-ctr arcfour256 arcfour128 aes128-cbc 3des-cbc blowfish-cbc cast128-cbc aes192-cbc aes256-cbc arcfour rijndael-cbc@lysator.liu.se MAC Algorithms: hmac-md5 hmac-sha1 umac-64@openssh.com hmac-sha2-256 hmac-sha2-256-96 hmac-sha2-512 hmac-sha2-512-96 hmac-ripemd160 hmac-ripemd160@openssh.com hmac-sha1-96 hmac-md5-96 Compression Algorithms: none zlib@openssh.com
220 chiko ESMTP Postfix (Ubuntu) 250-chiko 250-PIPELINING 250-SIZE 10240000 250-VRFY 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250 DSN
Certificate: Data: Version: 1 (0x0) Serial Number: b1:b9:db:4c:0e:16:8b:26 Signature Algorithm: sha1WithRSAEncryption Issuer: CN=chiko Validity Not Before: Oct 17 12:22:42 2015 GMT Not After : Oct 14 12:22:42 2025 GMT Subject: CN=chiko Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:9b:ff:85:15:2a:bf:cd:16:43:b7:ed:36:fc:36: a4:23:13:5f:ba:49:64:81:09:80:52:46:5e:a5:9e: 9d:b4:20:34:c6:e0:6a:4f:9b:68:80:bd:b9:5b:36: a6:96:87:61:c0:47:cd:25:bd:a4:39:03:7e:08:ae: d6:99:e0:fa:45:b3:9c:04:b9:90:45:20:df:90:ea: 37:b3:7e:b0:8f:d3:4d:8a:24:9c:30:2c:37:fa:c2: 3c:2f:71:5e:e8:46:8d:53:19:9a:e7:9b:c7:9c:ef: 53:97:88:87:08:b9:da:c3:57:76:be:04:ee:df:4e: bb:25:22:2c:cb:13:01:26:3b:b9:49:08:95:38:17: ab:a9:c5:2b:9e:f3:78:bf:7e:b0:59:64:13:8f:38: 81:51:53:f6:a8:85:71:04:83:1f:72:d0:ee:10:0d: 7b:6b:b4:a7:75:5f:ad:8b:30:4b:a3:f4:ea:19:95: 06:ec:e0:5a:d3:16:6f:02:e2:aa:e4:57:bd:e2:6c: bc:0d:e2:91:c9:66:c0:da:6e:51:fe:ed:11:49:6a: 85:d3:15:c1:cc:b0:a0:64:d0:0a:a5:4a:d8:5c:4f: d0:9d:5c:8f:6a:57:ec:07:69:d0:14:cd:bd:cc:87: 41:fd:2c:8b:86:d1:63:b4:23:7b:4e:fe:90:55:04: d7:1f Exponent: 65537 (0x10001) Signature Algorithm: sha1WithRSAEncryption Signature Value: 85:f0:36:63:f0:05:b1:e6:13:f0:1f:14:4e:8f:53:28:a3:61: e0:15:d7:8c:73:df:28:48:43:ef:99:c5:8b:9b:b7:4d:d3:d6: 62:66:dd:8c:4f:5d:14:43:f3:3d:73:aa:f9:46:a2:dd:8a:f8: 45:0f:a6:79:5b:56:d2:24:d3:ac:42:fd:1f:ca:c3:38:55:12: 6e:f1:ea:06:a1:50:51:23:1d:b9:1c:bc:82:02:6b:74:82:e7: e8:a9:b8:c5:cf:08:12:b4:7e:85:22:c6:7e:1d:ef:e2:54:fe: 80:4e:61:03:5f:63:45:3d:ab:5c:a4:8c:48:0c:83:a5:9d:67: 41:3c:81:bd:68:a5:4a:75:bd:ac:c7:05:de:92:53:e9:23:d4: 69:65:c2:75:df:01:b3:64:3c:7a:11:2a:8b:31:7f:74:9e:de: 78:ae:a3:9a:3f:31:81:52:fe:6f:de:c2:33:98:d5:92:d7:59: ba:10:c1:f6:2d:48:d4:10:55:1d:9e:2d:02:41:42:22:e2:07: a0:03:f8:dd:5d:3e:52:b2:f4:8e:ba:86:30:65:16:02:f2:cd: 7b:b5:d7:ea:77:cd:3f:b1:e5:a1:30:4a:3c:a6:99:19:e5:1a: c0:0e:93:8d:02:d3:a7:5d:f0:bb:d4:17:7d:ef:67:ab:8d:86: ae:e2:27:74
HTTP/1.1 200 OK Date: Tue, 07 Jan 2025 11:31:13 GMT Server: Apache/2.2.22 (Ubuntu) X-Powered-By: PHP/5.3.10-1ubuntu3.26 Vary: Accept-Encoding Content-Length: 6275 Content-Type: text/html
NTP protocolversion: 3 stratum: 3 leap: 0 precision: -20 rootdelay: 0.00164794921875 rootdisp: 0.0215148925781 refid: 718985982 reftime: 3946512842.82 poll: 3
HTTP/1.1 400 Bad Request Content-Type: text/html; charset=utf-8 Server: Mono-HTTPAPI/1.0 Date: Wed, 22 Jan 2025 20:24:04 GMT Content-Length: 35 Connection: close <h1>Bad Request (Invalid host)</h1>
HTTP/1.0 400 Bad Request Server: squid/3.1.19 Mime-Version: 1.0 Date: Thu, 23 Jan 2025 15:54:35 GMT Content-Type: text/html Content-Length: 3149 X-Squid-Error: ERR_INVALID_URL 0 Vary: Accept-Language Content-Language: en X-Cache: MISS from localhost X-Cache-Lookup: NONE from localhost:3128 Via: 1.0 localhost (squid/3.1.19) Connection: close
Shodan ® - All rights reserved