220 BitNinja FTP CAPTCHA server
230 User anonymous logged in from 224.201.164.7.
214-BitNinja FTP CAPTCHA server
214-Commands available:
214-APPE
214-CDUP
214-CWD
214-DELE
214-HELP
214-LIST
214-MKD
214-NOOP
214-PASS
214-PASV
214-PORT
214-PWD
214-QUIT
214-RETR
214-RMD
214-RNFR
214-RNTO
214-SIZE
214-STOR
214-SYST
214-TYPE
214-USER
214 HELP command successful.
502 Command not implemented.
220 ESMTP Postfix (Debian/GNU)
550 5.7.1 Your IP (224.153.26.191) is on the BitNinja server security greylist. This means that we experienced malicious attacks coming from your IP and placed it on our greylist due to security reasons. If you have taken the necessary steps to eliminate its source, you can delist this IP on (http://109.169.83.162:60412/spam_delist?hash=abe5e6932bd7bc73603fb899e1190296) You can only delist this IP a couple of times. It is good idea to warn your service provider about this incident.
HTTP/1.1 403 Forbidden
Content-Type: text/html
Cache-Control: no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: 0
Server: BitNinja Captcha Server
Date: Tue, 18 Mar 2025 12:28:59 GMT
Content-Length: 13673
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 8446948475 (0x1f77a347b)
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=abc.com
Validity
Not Before: Jan 17 02:16:43 2024 GMT
Not After : Jan 16 02:16:43 2025 GMT
Subject: CN=abc.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:af:47:e4:4a:06:e2:ef:91:7b:4e:76:6a:a7:41:
57:49:67:38:be:c2:53:92:5e:9e:76:ad:aa:1a:90:
b4:91:8e:30:bb:d5:0d:21:e4:53:56:b9:25:aa:f2:
a5:a8:c9:3a:8a:ff:37:38:3a:7d:e2:cc:1f:8c:04:
08:d2:87:52:cc:90:74:12:4d:47:0d:1e:50:fb:f7:
e7:05:c8:f0:41:66:03:cd:be:a3:25:50:27:69:47:
0e:a3:cd:2b:3a:9a:6b:49:38:62:2f:a8:a5:e1:fb:
ba:b7:57:1d:6c:fb:18:72:84:c0:82:ca:5e:53:38:
fe:27:a6:b7:54:6e:3a:b8:e6:f8:2c:3e:a4:c3:1f:
cc:c3:f2:87:d0:68:f8:3d:20:bf:34:84:b8:df:d2:
38:c9:a1:8b:e0:6a:1b:e4:62:99:9e:65:36:46:61:
36:cf:c4:a1:f7:e4:91:8d:9b:de:72:b7:cb:78:4a:
d4:22:35:d3:50:68:50:56:10:e8:00:d4:93:da:d7:
c0:27:66:66:7b:0b:27:9f:ec:80:f2:dd:2f:67:43:
a3:e2:ec:04:7d:8d:48:09:0d:73:db:44:dd:c5:36:
af:a1:73:2b:08:66:27:ae:6d:57:6d:22:cd:57:c4:
0c:06:c3:bc:22:47:e8:48:c6:28:2d:57:53:1e:a6:
dd:ed
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
EB:97:A1:BF:4A:9E:97:F6:F0:58:45:30:D7:65:F3:77:83:AB:AA:56
X509v3 Basic Constraints:
CA:FALSE
X509v3 Authority Key Identifier:
keyid:EB:97:A1:BF:4A:9E:97:F6:F0:58:45:30:D7:65:F3:77:83:AB:AA:56
DirName:/CN=abc.com
serial:01:F7:7A:34:7B
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Subject Alternative Name:
DNS:abc.com, DNS:mail.abc.com, DNS:www.abc.com, DNS:cpanel.abc.com, DNS:webmail.abc.com, DNS:webdisk.abc.com, DNS:cpcontacts.abc.com, DNS:cpcalendars.abc.com
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
62:a6:0c:3c:74:6a:aa:ac:d3:85:84:49:16:eb:9d:7c:9a:78:
54:a9:a5:8c:a4:1a:a7:70:cb:4c:61:0b:64:7f:02:dc:a5:3d:
d9:5c:19:1b:c8:ca:10:d5:b8:f3:08:21:d1:7e:5e:64:8e:00:
21:bc:3e:16:91:dd:cf:69:ec:30:eb:6b:18:a2:7a:47:52:13:
31:5f:18:33:65:84:f6:fe:51:6b:8e:9d:18:54:e8:d9:3f:68:
f3:a1:7b:66:97:70:21:f7:f9:20:29:00:c2:03:0c:c6:24:04:
93:28:33:e2:78:57:c5:4b:4f:06:91:e8:b9:a0:0f:6a:a4:bf:
98:49:de:16:a9:c3:36:b2:57:c4:29:0a:d6:42:b8:18:d3:f2:
3e:f8:42:fe:10:dc:43:cd:be:0d:e4:81:e8:60:c4:de:18:28:
71:81:74:df:68:86:8e:61:f6:ac:ac:12:05:c6:e8:66:bf:43:
73:fb:11:8b:9c:30:1a:bc:e4:eb:a4:c9:da:d9:2b:ab:a8:a3:
4f:85:d7:aa:7e:97:ea:7d:bd:38:98:04:de:aa:b3:c0:77:ed:
4b:5c:51:4c:e9:ff:a4:e9:75:4f:a7:1d:d2:57:eb:5e:f6:1d:
0f:d8:95:79:f1:ab:c2:73:20:9c:9f:60:c5:0f:38:be:ed:2c:
db:b9:45:6a
Vulnerabilities