Country | Hong Kong |
City | Hong Kong |
Organization | hk |
ISP | UCLOUD INFORMATION TECHNOLOGY (HK) LIMITED |
ASN | AS135377 |
HTTP/1.1 200 OK Content-Type: text/html Last-Modified: Tue, 15 Dec 2020 08:27:59 GMT Accept-Ranges: bytes ETag: "70739932bcd2d61:0" Server: Apache Set-Cookie: _d_id=0d151e65c90e1b3d72092bc044f303; Path=/; HttpOnly Date: Tue, 11 Feb 2025 12:55:48 GMT Content-Length: 283
Microsoft RPC Endpoint Mapper d95afe70-a6d5-4259-822e-2c84da1ddb0d version: v1.0 protocol: [MS-RSP]: Remote Shutdown Protocol provider: wininit.exe ncacn_ip_tcp: 10.61.119.237:49152 ncalrpc: WindowsShutdown ncacn_np: \\WNWH-015\PIPE\InitShutdown ncalrpc: WMsgKRpc065EB0 76f226c3-ec14-4325-8a99-6a46348418af version: v1.0 provider: winlogon.exe ncalrpc: WindowsShutdown ncacn_np: \\WNWH-015\PIPE\InitShutdown ncalrpc: WMsgKRpc065EB0 ncalrpc: WMsgKRpc0679F1 ncalrpc: WMsgKRpc04FEE62 c9ac6db5-82b7-4e55-ae8a-e464ed7b4277 version: v1.0 annotation: Impl friendly name provider: sysntfy.dll ncalrpc: LRPC-2da554e1cfc94febd7 ncalrpc: actkernel ncalrpc: umpo ncacn_np: \\WNWH-015\PIPE\srvsvc ncacn_ip_tcp: 10.61.119.237:49154 ncacn_np: \\WNWH-015\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 ncalrpc: senssvc ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 ncalrpc: IUserProfile2 0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e version: v1.0 ncalrpc: actkernel ncalrpc: umpo c605f9fb-f0a3-4e2a-a073-73560f8d9e3e version: v1.0 ncalrpc: actkernel ncalrpc: umpo 1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0 version: v1.0 ncalrpc: actkernel ncalrpc: umpo 8bfc3be1-6def-4e2d-af74-7c47cd0ade4a version: v1.0 ncalrpc: actkernel ncalrpc: umpo 2d98a740-581d-41b9-aa0d-a88b9d5ce938 version: v1.0 ncalrpc: actkernel ncalrpc: umpo 3b338d89-6cfa-44b8-847e-531531bc9992 version: v1.0 ncalrpc: actkernel ncalrpc: umpo 8782d3b9-ebbd-4644-a3d8-e8725381919b version: v1.0 ncalrpc: actkernel ncalrpc: umpo 085b0334-e454-4d91-9b8c-4134f9e793f3 version: v1.0 ncalrpc: actkernel ncalrpc: umpo 4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9 version: v1.0 ncalrpc: actkernel ncalrpc: umpo 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6 version: v1.0 annotation: DHCPv6 Client LRPC Endpoint provider: dhcpcsvc6.dll ncalrpc: dhcpcsvc6 ncalrpc: dhcpcsvc ncalrpc: LRPC-10f7ab7eb9a986996c ncacn_ip_tcp: 10.61.119.237:49153 ncacn_np: \\WNWH-015\pipe\eventlog ncalrpc: eventlog 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5 version: v1.0 annotation: DHCP Client LRPC Endpoint provider: dhcpcsvc.dll ncalrpc: dhcpcsvc ncalrpc: LRPC-10f7ab7eb9a986996c ncacn_ip_tcp: 10.61.119.237:49153 ncacn_np: \\WNWH-015\pipe\eventlog ncalrpc: eventlog 30adc50c-5cbc-46ce-9a0e-91914789e23c version: v1.0 annotation: NRP server endpoint provider: nrpsrv.dll ncalrpc: LRPC-10f7ab7eb9a986996c ncacn_ip_tcp: 10.61.119.237:49153 ncacn_np: \\WNWH-015\pipe\eventlog ncalrpc: eventlog f6beaff7-1e19-4fbb-9f8f-b89e2018337c version: v1.0 annotation: Event log TCPIP protocol: [MS-EVEN6]: EventLog Remoting Protocol provider: wevtsvc.dll ncacn_ip_tcp: 10.61.119.237:49153 ncacn_np: \\WNWH-015\pipe\eventlog ncalrpc: eventlog 9b008953-f195-4bf9-bde0-4471971e58ed version: v1.0 ncalrpc: LRPC-4746f9282419502a8e ncalrpc: SessEnvPrivateRpc ncalrpc: LRPC-75858cd77021d00c1d ncacn_np: \\WNWH-015\PIPE\srvsvc ncacn_ip_tcp: 10.61.119.237:49154 ncacn_np: \\WNWH-015\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 30b044a5-a225-43f0-b3a4-e060df91f9c1 version: v1.0 provider: certprop.dll ncalrpc: LRPC-75858cd77021d00c1d ncacn_np: \\WNWH-015\PIPE\srvsvc ncacn_ip_tcp: 10.61.119.237:49154 ncacn_np: \\WNWH-015\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 a398e520-d59a-4bdd-aa7a-3c1e0303a511 version: v1.0 annotation: IKE/Authip API provider: IKEEXT.DLL ncacn_ip_tcp: 10.61.119.237:49154 ncacn_np: \\WNWH-015\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 3a9ef155-691d-4449-8d05-09ad57031823 version: v1.0 ncacn_ip_tcp: 10.61.119.237:49154 ncacn_np: \\WNWH-015\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 86d35949-83c9-4044-b424-db363231fd0c version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: schedsvc.dll ncacn_ip_tcp: 10.61.119.237:49154 ncacn_np: \\WNWH-015\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 378e52b0-c0a9-11cf-822d-00aa0051e40f version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: taskcomp.dll ncacn_np: \\WNWH-015\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 1ff70682-0a51-30e8-076d-740be8cee98b version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: taskcomp.dll ncacn_np: \\WNWH-015\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53 version: v1.0 provider: schedsvc.dll ncalrpc: senssvc ncalrpc: OLED0C8DE195C26B18E63683972C928 ncalrpc: IUserProfile2 2eb08e3e-639f-4fba-97b1-14f878961076 version: v1.0 annotation: Group Policy RPC Interface provider: gpsvc.dll ncalrpc: LRPC-5151267c5c75c94192 3473dd4d-2e88-4006-9cba-22570909dd10 version: v5.256 annotation: WinHttp Auto-Proxy Service ncacn_np: \\WNWH-015\PIPE\W32TIME_ALT ncalrpc: W32TIME_ALT ncalrpc: LRPC-28401d4b65eec8459b ncalrpc: OLE9A750B3A1F7DCB6E14E393958B20 7ea70bcf-48af-4f6a-8968-6a440754d5fa version: v1.0 annotation: NSI server endpoint provider: nsisvc.dll ncalrpc: LRPC-28401d4b65eec8459b ncalrpc: OLE9A750B3A1F7DCB6E14E393958B20 b2507c30-b126-494a-92ac-ee32b6eeb039 version: v1.0 ncalrpc: LRPC-892aa4be15f3533304 ncalrpc: OLED3D4986E31A8114461D175111DFF dd490425-5325-4565-b774-7e27d6c09c24 version: v1.0 annotation: Base Firewall Engine API provider: BFE.DLL ncalrpc: LRPC-07992cbd74d0c4c40c 7f1343fe-50a9-4927-a778-0c5859517bac version: v1.0 annotation: DfsDs service ncacn_np: \\WNWH-015\PIPE\wkssvc ncalrpc: LRPC-e4a7552485b7f053f9 ncalrpc: DNSResolver eb081a0d-10ee-478a-a1dd-50995283e7a8 version: v3.0 annotation: Witness Client Test Interface ncalrpc: LRPC-e4a7552485b7f053f9 ncalrpc: DNSResolver f2c9b409-c1c9-4100-8639-d8ab1486694a version: v1.0 annotation: Witness Client Upcall Server ncalrpc: LRPC-e4a7552485b7f053f9 ncalrpc: DNSResolver 367abb81-9844-35f1-ad32-98f038001003 version: v2.0 protocol: [MS-SCMR]: Service Control Manager Remote Protocol provider: services.exe ncacn_ip_tcp: 10.61.119.237:49168 12345678-1234-abcd-ef00-0123456789ab version: v1.0 annotation: IPSec Policy agent endpoint protocol: [MS-RPRN]: Print System Remote Protocol provider: spoolsv.exe ncalrpc: LRPC-990854190371d1ac1a b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86 version: v2.0 annotation: KeyIso ncacn_ip_tcp: 10.61.119.237:49193 ncalrpc: efslrpc ncacn_np: \\WNWH-015\pipe\efsrpc ncalrpc: samss lpc ncalrpc: SidKey Local End Point ncalrpc: protected_storage ncalrpc: lsasspirpc ncalrpc: lsapolicylookup ncalrpc: LSA_EAS_ENDPOINT ncalrpc: lsacap ncalrpc: LSARPC_ENDPOINT ncalrpc: securityevent ncalrpc: audit ncacn_np: \\WNWH-015\pipe\lsass 12345778-1234-abcd-ef00-0123456789ac version: v1.0 protocol: [MS-SAMR]: Security Account Manager (SAM) Remote Protocol provider: samsrv.dll ncacn_ip_tcp: 10.61.119.237:49193 ncalrpc: efslrpc ncacn_np: \\WNWH-015\pipe\efsrpc ncalrpc: samss lpc ncalrpc: SidKey Local End Point ncalrpc: protected_storage ncalrpc: lsasspirpc ncalrpc: lsapolicylookup ncalrpc: LSA_EAS_ENDPOINT ncalrpc: lsacap ncalrpc: LSARPC_ENDPOINT ncalrpc: securityevent ncalrpc: audit ncacn_np: \\WNWH-015\pipe\lsass 12e65dd8-887f-41ef-91bf-8d816c42c2e7 version: v1.0 annotation: Secure Desktop LRPC interface provider: winlogon.exe ncalrpc: WMsgKRpc04FEE62 a500d4c6-0dd1-4543-bc0c-d5f93486eaf8 version: v1.0 ncalrpc: LRPC-e1cbcea968d3087eaf 906b0ce0-c70b-1067-b317-00dd010662da version: v1.0 protocol: [MS-CMPO]: MSDTC Connection Manager: provider: msdtcprx.dll ncalrpc: LRPC-d677c26836c38f6798 ncalrpc: LRPC-d677c26836c38f6798 ncalrpc: LRPC-d677c26836c38f6798
NetBIOS Response: Server Name: WNWH-015 MAC Address: 52:54:00:C5:CF:A4 Names: WNWH-015 <0x0> WORKGROUP <0x0> WNWH-015 <0x20> Additional Interfaces: 32.61.119.237
52:54:00:C5:CF:A4 Unknown
220 Microsoft FTP Service 530 User cannot log in. 214-The following commands are recognized (* ==>'s unimplemented). ABOR ACCT ADAT * ALLO APPE AUTH CCC CDUP CWD DELE ENC * EPRT EPSV FEAT HELP HOST LANG LIST MDTM MIC * MKD MODE NLST NOOP OPTS PASS PASV PBSZ PORT PROT PWD QUIT REIN REST RETR RMD RNFR RNTO SITE SIZE SMNT STAT STOR STOU STRU SYST TYPE USER XCUP XCWD XMKD XPWD XRMD 214 HELP command successful. 211-Extended features supported: LANG EN* UTF8 AUTH TLS;TLS-C;SSL;TLS-P; PBSZ PROT C;P; CCC HOST SIZE MDTM REST STREAM 211 END
HTTP/1.1 404 Not Found Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Fri, 31 Jan 2025 00:27:05 GMT Connection: close Content-Length: 315 WinRM NTLM Info: OS: Windows Server 2012 OS Build: 6.2.9200 Target Name: WNWH-015 NetBIOS Domain Name: WNWH-015 NetBIOS Computer Name: WNWH-015 DNS Domain Name: WNWH-015 FQDN: WNWH-015
HTTP/1.1 400 Bad Request Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Mon, 10 Feb 2025 23:58:35 GMT Connection: close Content-Length: 334