128.140.2.36

Regular View Raw Data Timeline
Last Seen: 2025-02-28

GeneralInformation

Hostnames kozyon.com
www.kozyon.com
static.36.2.140.128.clients.your-server.de
Domains kozyon.com your-server.de 
Country Germany
City Nürnberg
Organization Hetzner Online GmbH
ISP Hetzner Online GmbH
ASN AS24940
Operating System Ubuntu

WebTechnologies

JavaScript libraries
Tag managers
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2023
CVE-2023-51766
5.3Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
2022
CVE-2022-37451
7.5Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
2021
CVE-2021-23017
7.7A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2021-3618
7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
21 / tcp
1387189571 | 2025-02-18T18:47:58.202928
22 / tcp
1361074665 | 2025-02-15T06:27:49.275863
25 / tcp
625818859 | 2025-02-04T13:23:24.290288
53 / tcp
1212828958 | 2025-02-14T12:53:37.694707
53 / udp
1212828958 | 2025-02-19T14:33:38.289403
80 / tcp
0 | 2025-02-28T11:26:32.906474
110 / tcp
-542153081 | 2025-02-20T09:28:18.837003
123 / udp
-2037328890 | 2025-02-16T12:04:36.147327
143 / tcp
284488918 | 2025-02-26T03:41:13.005250
443 / tcp
-553649291 | 2025-02-21T18:58:23.913953
465 / tcp
-493293946 | 2025-02-14T05:40:58.008668
587 / tcp
-663198253 | 2025-02-12T17:25:44.041109
995 / tcp
958054138 | 2025-02-01T12:00:57.061519



Contact Us

Shodan ® - All rights reserved