22 /
tcp
285846482 | 2025-03-21T02:56:13.925967
SSH-2.0-OpenSSH_9.0p1 Ubuntu-1ubuntu7.1
Key type: ecdsa-sha2-nistp256
Key: AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMYvOo4cLMx4fj/awzRc2rFN
WjK2LzHHHlnHQ9zoQR+N2CbOw4j+3LqJ/SBrePwMnsD9fYi52Dji21GS2z/xLy8=
Fingerprint: 80:47:c9:39:f3:e0:93:bc:cd:4b:9b:2b:b1:1b:b8:33
Kex Algorithms:
sntrup761x25519-sha512@openssh.com
curve25519-sha256
curve25519-sha256@libssh.org
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-exchange-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
diffie-hellman-group14-sha256
Server Host Key Algorithms:
rsa-sha2-512
rsa-sha2-256
ecdsa-sha2-nistp256
ssh-ed25519
Encryption Algorithms:
chacha20-poly1305@openssh.com
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
MAC Algorithms:
umac-64-etm@openssh.com
umac-128-etm@openssh.com
hmac-sha2-256-etm@openssh.com
hmac-sha2-512-etm@openssh.com
hmac-sha1-etm@openssh.com
umac-64@openssh.com
umac-128@openssh.com
hmac-sha2-256
hmac-sha2-512
hmac-sha1
Compression Algorithms:
none
zlib@openssh.com
-531284579 | 2025-03-06T00:02:16.706899
HTTP/1.1 200 OK
ETag: "afa-wxDzBASWPJIqgKnMtJtppZrmFw0"
Content-Type: text/html; charset=utf-8
Accept-Ranges: none
Content-Length: 2810
Vary: Accept-Encoding
Date: Thu, 06 Mar 2025 00:02:16 GMT
Connection: keep-alive
Keep-Alive: timeout=5
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
03:b0:20:fd:7f:96:12:95:48:ea:ee:13:24:5b:a4:30:d1:c1
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=US, O=Let's Encrypt, CN=E6
Validity
Not Before: Dec 31 15:46:59 2024 GMT
Not After : Mar 31 15:46:58 2025 GMT
Subject: CN=tlvbkk.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:82:92:41:20:2e:ed:2a:4a:a2:7d:b1:75:cd:3d:
91:54:f8:f4:e9:9d:a6:b4:43:b2:26:95:fb:27:db:
16:9c:52:9d:8f:24:fa:41:90:ab:9b:37:aa:45:5a:
98:23:94:09:53:06:15:3a:88:67:d4:fb:e2:86:19:
02:0e:6d:48:43
ASN1 OID: prime256v1
NIST CURVE: P-256
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
17:BC:64:01:27:E3:30:6D:55:D8:9E:81:35:89:41:10:A0:CB:07:41
X509v3 Authority Key Identifier:
93:27:46:98:03:A9:51:68:8E:98:D6:C4:42:48:DB:23:BF:58:94:D2
Authority Information Access:
OCSP - URI:http://e6.o.lencr.org
CA Issuers - URI:http://e6.i.lencr.org/
X509v3 Subject Alternative Name:
DNS:tlvbkk.com
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:
D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50
Timestamp : Dec 31 16:45:29.734 2024 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:35:FF:15:C1:3B:C9:1C:DE:32:54:6C:C4:
11:31:B1:C9:33:01:72:A1:12:97:41:83:0D:95:6C:BC:
1B:B3:1C:37:02:21:00:A4:93:81:5A:3A:A3:FD:56:B4:
DF:3D:FE:65:1D:1A:7F:CC:9B:0E:9D:2E:0D:AC:A4:9F:
73:7D:06:14:74:62:14
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
Timestamp : Dec 31 16:45:29.750 2024 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:44:02:20:23:B8:4A:39:5C:F2:7E:D9:4D:23:81:98:
EB:87:AB:16:82:BA:48:E1:6A:12:71:68:A0:FF:AC:CC:
80:A4:97:1D:02:20:1F:A8:22:0B:25:EF:5E:21:56:09:
00:51:48:A6:59:29:72:B6:C1:ED:51:EB:DC:E1:53:BD:
DD:1F:3C:47:72:3E
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:72:19:23:4d:01:ff:9e:5d:1a:8d:26:07:5f:2a:
63:d8:59:b5:a1:80:f5:7c:d2:91:0e:d3:08:dd:4d:57:5f:0d:
93:1a:1c:32:02:95:3b:7d:4b:94:2c:9f:fc:8d:fe:62:02:31:
00:a0:3c:a5:64:a3:1f:d8:5c:17:45:51:fc:6a:1c:7d:37:bc:
ea:64:98:ce:4a:eb:78:6f:67:9d:0c:67:4e:d4:4c:a9:82:3d:
37:bf:e8:d1:f1:3f:70:c3:7d:26:21:3d:5e
-1457124557 | 2025-03-19T00:02:44.796262
HTTP/1.1 403 Forbidden
Connection: close
Content-Language: en
Content-Length: 371
Content-Type: text/html; charset=utf-8
Date: Wed, 19 Mar 2025 00:02:44 GMT
Accept-Encoding: gzip, deflate, identity
Server: CUPS/2.4 IPP/2.1
X-Frame-Options: DENY
Content-Security-Policy: frame-ancestors 'none'
1825463434 | 2025-03-17T01:46:47.593576
HTTP/1.1 200 OK
X-Powered-By: Express
Access-Control-Allow-Origin: *
Content-Type: text/html; charset=utf-8
Content-Length: 13
ETag: W/"d-GA4a8vWz7rt43TPXzS8bY4UvRJY"
Date: Mon, 17 Mar 2025 01:46:47 GMT
Connection: keep-alive
Keep-Alive: timeout=5
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
03:2e:82:95:21:8f:e9:f8:d0:10:b4:58:f5:57:ff:ec:6d:93
Signature Algorithm: ecdsa-with-SHA384
Issuer: C=US, O=Let's Encrypt, CN=E5
Validity
Not Before: Mar 1 17:01:37 2025 GMT
Not After : May 30 17:01:36 2025 GMT
Subject: CN=tlvbkk.com
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:d0:dc:d2:12:dd:39:f1:b3:b8:39:7d:f1:28:9d:
97:f9:82:42:e0:a7:e9:cf:d2:c7:f7:48:85:e1:c9:
97:2a:45:d7:8d:f7:8f:ed:d0:28:b3:53:6e:11:f5:
f6:dc:05:fb:2d:10:1c:94:26:ff:c4:ea:f2:af:d9:
54:bb:b4:72:4a
ASN1 OID: prime256v1
NIST CURVE: P-256
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
6D:6A:36:C3:6A:76:DB:BE:52:FE:87:20:2E:91:2B:B1:AE:42:93:B0
X509v3 Authority Key Identifier:
9F:2B:5F:CF:3C:21:4F:9D:04:B7:ED:2B:2C:C4:C6:70:8B:D2:D7:0D
Authority Information Access:
OCSP - URI:http://e5.o.lencr.org
CA Issuers - URI:http://e5.i.lencr.org/
X509v3 Subject Alternative Name:
DNS:tlvbkk.com
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 73:20:22:0F:08:16:8A:F9:F3:C4:A6:8B:0A:B2:6A:9A:
4A:00:EE:F5:77:85:8A:08:4D:05:00:D4:A5:42:44:59
Timestamp : Mar 1 18:00:07.523 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:44:02:20:52:F9:8D:C6:81:C9:75:BE:7C:9C:0D:ED:
DA:95:0E:D3:A0:31:CE:BF:80:A1:BB:DB:B1:EC:90:AF:
4B:BE:44:F9:02:20:22:AC:E3:E6:5C:62:B8:B3:82:1B:
16:F9:3B:F1:93:FA:5B:78:CA:D1:F3:69:F1:B4:F0:3C:
2D:FC:A2:C5:1A:3D
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:
D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7
Timestamp : Mar 1 18:00:07.530 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:44:02:20:4B:EC:56:3E:A5:07:41:8F:4B:E2:16:CA:
5F:38:3C:41:18:F1:39:BF:54:90:68:31:90:6D:90:9E:
34:27:52:EF:02:20:44:17:3E:D3:11:D2:A9:33:37:87:
B9:08:65:A0:A2:02:97:21:C4:9A:E7:AF:E6:06:01:4E:
0D:16:BD:30:8F:D0
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d5:03:95:00:b5:3d:e8:7d:5f:cc:32:3d:71:
3c:02:a3:c0:97:9e:0b:74:11:bb:04:96:d6:67:cb:30:1f:bf:
67:80:43:26:4c:20:81:ac:ff:8a:f8:bf:9a:86:2f:5f:e7:02:
30:4a:d6:9d:13:f0:c6:35:59:46:b2:a8:b6:12:69:17:fd:ca:
d6:7c:d9:7d:82:22:df:e1:40:87:ac:95:99:3a:bc:79:8f:de:
66:bb:75:fe:89:10:9d:f9:9d:0f:88:c1:e7
5432 /
tcp
-726790289 | 2025-03-20T08:43:35.756259
PostgreSQL
fe_sendauth: no password supplied
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5a:07:19:aa:89:0b:a4:51:e6:ee:25:79:b2:dd:bd:47:3e:56:57:5b
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=ubuntu-s-2vcpu-2gb-sgp1-01
Validity
Not Before: Jan 21 12:54:29 2023 GMT
Not After : Jan 18 12:54:29 2033 GMT
Subject: CN=ubuntu-s-2vcpu-2gb-sgp1-01
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:aa:ac:7f:d9:74:3c:93:16:28:21:37:b0:c9:5c:
d2:b5:7b:c5:ab:b1:56:63:22:09:02:98:76:a4:1b:
45:93:12:25:2f:29:c2:b6:08:15:70:5c:6e:9c:9c:
6a:c1:0c:61:6d:0f:4d:cc:4b:5f:0f:d4:ec:71:e4:
62:8e:bc:74:b7:1a:fc:75:59:1d:6a:84:de:2e:b6:
d4:57:a7:eb:66:d5:82:17:f2:8e:02:8d:8f:54:65:
be:de:57:23:f2:35:47:fe:45:e9:79:fb:21:e1:9b:
25:24:21:c8:03:68:2d:29:1d:17:70:7f:f7:49:9c:
52:e6:01:55:e6:dc:b2:50:b7:c8:29:e0:84:8e:0f:
a4:30:68:8c:fb:50:c6:a9:5d:5e:81:5e:dd:0b:98:
4e:19:09:6c:2e:29:8a:e7:bc:37:82:f5:43:5f:bd:
22:4a:91:eb:83:43:47:1c:e9:e0:86:67:fe:1b:72:
c8:3f:d4:29:d9:d8:60:1c:f7:39:4f:ff:9d:58:2c:
6c:5d:83:84:4e:10:06:90:84:3f:7b:40:4a:f7:9d:
8b:d8:1d:b4:0a:58:d3:15:e3:6d:1c:5d:03:15:7e:
d5:d3:35:1b:04:ad:21:52:54:d0:fb:45:6e:a1:9d:
1a:96:85:a1:59:68:0f:75:ba:63:16:c2:57:27:d5:
ff:eb
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Subject Alternative Name:
DNS:ubuntu-s-2vcpu-2gb-sgp1-01
X509v3 Subject Key Identifier:
C2:A5:F6:0D:41:1F:19:20:D8:4F:4D:57:E6:DB:A2:E0:F0:B2:1E:F1
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
a7:6a:23:f2:9d:d0:40:cf:61:e9:7f:28:ee:3a:57:cf:80:f5:
68:e2:40:75:a7:17:39:e9:ab:71:72:57:7a:fe:15:38:00:aa:
b3:e0:08:56:10:1c:73:27:9a:27:f3:f2:54:5a:a7:11:86:4d:
80:eb:89:68:ae:d8:c9:d2:78:74:a4:72:35:03:0e:6c:a2:96:
9c:ff:fa:9d:7d:74:78:7f:2c:fd:62:9d:5c:b9:8a:81:e6:96:
ac:b9:35:60:d3:e5:58:95:9e:18:e5:e0:27:d8:46:44:60:33:
50:4e:d1:a2:2a:04:cc:b9:c6:fa:27:f6:f5:86:2c:ea:3a:cf:
d6:92:59:3e:6f:92:f1:0f:96:80:36:f5:7d:ad:87:bd:cc:8c:
4c:db:2a:90:f1:69:54:6f:20:c0:e7:0c:ac:4c:42:ee:92:d6:
90:68:79:7b:2b:c5:76:17:0f:d0:9d:64:42:34:4e:31:58:91:
f8:e0:dd:98:c3:1d:9f:7a:99:58:c1:dc:bd:a4:c1:4f:58:5c:
be:0c:0e:59:0c:fe:3d:52:8f:40:ad:33:4d:ae:b4:be:9d:b1:
41:fd:1d:74:9a:b2:a7:65:b4:05:6b:d8:cd:7e:65:c1:04:0c:
ec:85:fa:08:cd:26:82:f4:e3:eb:6e:b0:b8:1d:65:2d:ce:58:
1d:58:7b:ea
6379 /
tcp
-1545777613 | 2025-03-14T03:51:13.773985
-DENIED Redis is running in protected mode because protected mode is enabled and no password is set for the default user. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Set up an authentication password for the default user. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.