21 /
tcp
-370734890 | 2025-04-11T07:27:55.307473
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST
MDTM
MIC *
MKD
MODE
NLST
NOOP
OPTS
PASS
PASV
PBSZ
PORT
PROT
PWD
QUIT
REIN
REST
RETR
RMD
RNFR
RNTO
SITE
SIZE
SMNT
STAT
STOR
STOU
STRU
SYST
TYPE
USER
XCUP
XCWD
XMKD
XPWD
XRMD
214 HELP command successful.
211-Extended features supported:
LANG EN*
UTF8
AUTH TLS;TLS-C;SSL;TLS-P;
PBSZ
PROT C;P;
CCC
HOST
SIZE
MDTM
REST STREAM
211 END
25 /
tcp
-1664657536 | 2025-04-11T01:36:58.475149
220 HOST4.134.119.204.70 ESMTP MailEnable Service, Version: 10.37-- ready at 04/10/25 18:37:00
250-134.119.204.70 [224.234.76.252], this server offers 4 extensions
250-AUTH LOGIN
250-SIZE 40960000
250-HELP
250 AUTH=LOGIN
53 /
tcp
-553166942 | 2025-03-28T01:50:05.417760
53 /
udp
-553166942 | 2025-04-07T08:14:32.943370
1138219898 | 2025-04-06T05:20:06.013850
HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Wed, 27 Oct 2021 14:44:11 GMT
Accept-Ranges: bytes
ETag: "57c7be1a41cbd71:0"
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Date: Sun, 06 Apr 2025 05:20:07 GMT
Content-Length: 701
Vulnerabilities
110 /
tcp
-471102630 | 2025-03-26T16:03:12.496698
+OK Welcome to MailEnable POP3 Server
+OK Capability list follows
TOP
USER
UIDL
.
135 /
tcp
-2137325966 | 2025-04-11T13:33:48.008241
Microsoft RPC Endpoint Mapper
d95afe70-a6d5-4259-822e-2c84da1ddb0d
version: v1.0
protocol: [MS-RSP]: Remote Shutdown Protocol
provider: wininit.exe
ncacn_ip_tcp: 134.119.204.70:49152
ncalrpc: WindowsShutdown
ncacn_np: \\HOST4\PIPE\InitShutdown
ncalrpc: WMsgKRpc058D70
76f226c3-ec14-4325-8a99-6a46348418af
version: v1.0
provider: winlogon.exe
ncalrpc: WindowsShutdown
ncacn_np: \\HOST4\PIPE\InitShutdown
ncalrpc: WMsgKRpc058D70
ncalrpc: WMsgKRpc059641
ncalrpc: WMsgKRpc03517A02
b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86
version: v2.0
annotation: KeyIso
ncacn_ip_tcp: 134.119.204.70:49153
ncalrpc: samss lpc
ncalrpc: SidKey Local End Point
ncalrpc: protected_storage
ncalrpc: lsasspirpc
ncalrpc: lsapolicylookup
ncalrpc: LSA_EAS_ENDPOINT
ncalrpc: lsacap
ncalrpc: LSARPC_ENDPOINT
ncalrpc: securityevent
ncalrpc: audit
ncacn_np: \\HOST4\pipe\lsass
12345778-1234-abcd-ef00-0123456789ac
version: v1.0
protocol: [MS-SAMR]: Security Account Manager (SAM) Remote Protocol
provider: samsrv.dll
ncacn_ip_tcp: 134.119.204.70:49153
ncalrpc: samss lpc
ncalrpc: SidKey Local End Point
ncalrpc: protected_storage
ncalrpc: lsasspirpc
ncalrpc: lsapolicylookup
ncalrpc: LSA_EAS_ENDPOINT
ncalrpc: lsacap
ncalrpc: LSARPC_ENDPOINT
ncalrpc: securityevent
ncalrpc: audit
ncacn_np: \\HOST4\pipe\lsass
9b008953-f195-4bf9-bde0-4471971e58ed
version: v1.0
ncalrpc: LRPC-53e030d2a05b2bb6a0
ncacn_np: \\HOST4\pipe\LSM_API_service
ncalrpc: LSMApi
ncalrpc: LRPC-77bf3a0e007e50cf7f
ncalrpc: actkernel
ncalrpc: umpo
697dcda9-3ba9-4eb2-9247-e11f1901b0d2
version: v1.0
ncalrpc: LRPC-53e030d2a05b2bb6a0
ncacn_np: \\HOST4\pipe\LSM_API_service
ncalrpc: LSMApi
ncalrpc: LRPC-77bf3a0e007e50cf7f
ncalrpc: actkernel
ncalrpc: umpo
c9ac6db5-82b7-4e55-ae8a-e464ed7b4277
version: v1.0
annotation: Impl friendly name
provider: sysntfy.dll
ncalrpc: LRPC-77bf3a0e007e50cf7f
ncalrpc: actkernel
ncalrpc: umpo
ncacn_np: \\HOST4\PIPE\srvsvc
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
ncalrpc: IUserProfile2
0d3e2735-cea0-4ecc-a9e2-41a2d81aed4e
version: v1.0
ncalrpc: actkernel
ncalrpc: umpo
c605f9fb-f0a3-4e2a-a073-73560f8d9e3e
version: v1.0
ncalrpc: actkernel
ncalrpc: umpo
1b37ca91-76b1-4f5e-a3c7-2abfc61f2bb0
version: v1.0
ncalrpc: actkernel
ncalrpc: umpo
8bfc3be1-6def-4e2d-af74-7c47cd0ade4a
version: v1.0
ncalrpc: actkernel
ncalrpc: umpo
2d98a740-581d-41b9-aa0d-a88b9d5ce938
version: v1.0
ncalrpc: actkernel
ncalrpc: umpo
bdaa0970-413b-4a3e-9e5d-f6dc9d7e0760
version: v1.0
ncalrpc: actkernel
ncalrpc: umpo
3b338d89-6cfa-44b8-847e-531531bc9992
version: v1.0
ncalrpc: actkernel
ncalrpc: umpo
8782d3b9-ebbd-4644-a3d8-e8725381919b
version: v1.0
ncalrpc: actkernel
ncalrpc: umpo
085b0334-e454-4d91-9b8c-4134f9e793f3
version: v1.0
ncalrpc: actkernel
ncalrpc: umpo
4bec6bb8-b5c2-4b6f-b2c1-5da5cf92d0d9
version: v1.0
ncalrpc: actkernel
ncalrpc: umpo
3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5
version: v1.0
annotation: DHCP Client LRPC Endpoint
provider: dhcpcsvc.dll
ncalrpc: dhcpcsvc
ncalrpc: dhcpcsvc6
ncalrpc: LRPC-21780184f5c7f2b2f9
ncacn_ip_tcp: 134.119.204.70:49154
ncacn_np: \\HOST4\pipe\eventlog
ncalrpc: eventlog
3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6
version: v1.0
annotation: DHCPv6 Client LRPC Endpoint
provider: dhcpcsvc6.dll
ncalrpc: dhcpcsvc6
ncalrpc: LRPC-21780184f5c7f2b2f9
ncacn_ip_tcp: 134.119.204.70:49154
ncacn_np: \\HOST4\pipe\eventlog
ncalrpc: eventlog
abfb6ca3-0c5e-4734-9285-0aee72fe8d1c
version: v1.0
annotation: Wcm Service
ncalrpc: LRPC-21780184f5c7f2b2f9
ncacn_ip_tcp: 134.119.204.70:49154
ncacn_np: \\HOST4\pipe\eventlog
ncalrpc: eventlog
30adc50c-5cbc-46ce-9a0e-91914789e23c
version: v1.0
annotation: NRP server endpoint
provider: nrpsrv.dll
ncalrpc: LRPC-21780184f5c7f2b2f9
ncacn_ip_tcp: 134.119.204.70:49154
ncacn_np: \\HOST4\pipe\eventlog
ncalrpc: eventlog
f6beaff7-1e19-4fbb-9f8f-b89e2018337c
version: v1.0
annotation: Event log TCPIP
protocol: [MS-EVEN6]: EventLog Remoting Protocol
provider: wevtsvc.dll
ncacn_ip_tcp: 134.119.204.70:49154
ncacn_np: \\HOST4\pipe\eventlog
ncalrpc: eventlog
30b044a5-a225-43f0-b3a4-e060df91f9c1
version: v1.0
provider: certprop.dll
ncalrpc: LRPC-fb39a6ad58242f8aea
ncacn_np: \\HOST4\pipe\SessEnvPublicRpc
ncalrpc: SessEnvPrivateRpc
ncacn_np: \\HOST4\PIPE\srvsvc
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
1a0d010f-1c33-432c-b0f5-8cf4e8053099
version: v1.0
annotation: IdSegSrv service
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
98716d03-89ac-44c7-bb8c-285824e51c4a
version: v1.0
annotation: XactSrv service
provider: srvsvc.dll
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1
version: v1.0
annotation: Adh APIs
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
c36be077-e14b-4fe9-8abc-e856ef4f048b
version: v1.0
annotation: Proxy Manager client server endpoint
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
2e6035b2-e8f1-41a7-a044-656b439c4c34
version: v1.0
annotation: Proxy Manager provider server endpoint
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
552d076a-cb29-4e44-8b6a-d15e59e2c0af
version: v1.0
annotation: IP Transition Configuration endpoint
provider: iphlpsvc.dll
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
a398e520-d59a-4bdd-aa7a-3c1e0303a511
version: v1.0
annotation: IKE/Authip API
provider: IKEEXT.DLL
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
3a9ef155-691d-4449-8d05-09ad57031823
version: v1.0
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
86d35949-83c9-4044-b424-db363231fd0c
version: v1.0
protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol
provider: schedsvc.dll
ncacn_ip_tcp: 134.119.204.70:49155
ncalrpc: ubpmtaskhostchannel
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
378e52b0-c0a9-11cf-822d-00aa0051e40f
version: v1.0
protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol
provider: taskcomp.dll
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
1ff70682-0a51-30e8-076d-740be8cee98b
version: v1.0
protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol
provider: taskcomp.dll
ncacn_np: \\HOST4\PIPE\atsvc
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53
version: v1.0
provider: schedsvc.dll
ncalrpc: senssvc
ncalrpc: OLE44517600AF08544FC6302DEDF5BD
ncalrpc: IUserProfile2
2eb08e3e-639f-4fba-97b1-14f878961076
version: v1.0
annotation: Group Policy RPC Interface
provider: gpsvc.dll
ncalrpc: LRPC-8aa05b2dc53967e81d
3473dd4d-2e88-4006-9cba-22570909dd10
version: v5.256
annotation: WinHttp Auto-Proxy Service
ncacn_np: \\HOST4\PIPE\W32TIME_ALT
ncalrpc: W32TIME_ALT
ncalrpc: LRPC-c9af4058a387159863
ncalrpc: OLE795C8B1AB51D6146889B75262FBF
7ea70bcf-48af-4f6a-8968-6a440754d5fa
version: v1.0
annotation: NSI server endpoint
provider: nsisvc.dll
ncalrpc: LRPC-c9af4058a387159863
ncalrpc: OLE795C8B1AB51D6146889B75262FBF
b2507c30-b126-494a-92ac-ee32b6eeb039
version: v1.0
ncalrpc: LRPC-b21c8013bdd6914ede
2fb92682-6599-42dc-ae13-bd2ca89bd11c
version: v1.0
annotation: Fw APIs
provider: MPSSVC.dll
ncalrpc: LRPC-1e620486cb49e1d88f
ncalrpc: LRPC-aab7bc7eb13697fc85
f47433c3-3e9d-4157-aad4-83aa1f5c2d4c
version: v1.0
annotation: Fw APIs
ncalrpc: LRPC-1e620486cb49e1d88f
ncalrpc: LRPC-aab7bc7eb13697fc85
7f9d11bf-7fb9-436b-a812-b2d50c5d4c03
version: v1.0
annotation: Fw APIs
provider: MPSSVC.dll
ncalrpc: LRPC-1e620486cb49e1d88f
ncalrpc: LRPC-aab7bc7eb13697fc85
dd490425-5325-4565-b774-7e27d6c09c24
version: v1.0
annotation: Base Firewall Engine API
provider: BFE.DLL
ncalrpc: LRPC-aab7bc7eb13697fc85
7f1343fe-50a9-4927-a778-0c5859517bac
version: v1.0
annotation: DfsDs service
ncacn_np: \\HOST4\PIPE\wkssvc
ncalrpc: LRPC-3b60f51cae31eeaf5f
ncalrpc: DNSResolver
eb081a0d-10ee-478a-a1dd-50995283e7a8
version: v3.0
annotation: Witness Client Test Interface
ncalrpc: LRPC-3b60f51cae31eeaf5f
ncalrpc: DNSResolver
f2c9b409-c1c9-4100-8639-d8ab1486694a
version: v1.0
annotation: Witness Client Upcall Server
ncalrpc: LRPC-3b60f51cae31eeaf5f
ncalrpc: DNSResolver
76f03f96-cdfd-44fc-a22c-64950a001209
version: v1.0
protocol: [MS-PAR]: Print System Asynchronous Remote Protocol
provider: spoolsv.exe
ncacn_ip_tcp: 134.119.204.70:49156
ncalrpc: LRPC-2992e89fcdd9e32c47
4a452661-8290-4b36-8fbe-7f4093a94978
version: v1.0
provider: spoolsv.exe
ncacn_ip_tcp: 134.119.204.70:49156
ncalrpc: LRPC-2992e89fcdd9e32c47
ae33069b-a2a8-46ee-a235-ddfd339be281
version: v1.0
protocol: [MS-PAN]: Print System Asynchronous Notification Protocol
provider: spoolsv.exe
ncacn_ip_tcp: 134.119.204.70:49156
ncalrpc: LRPC-2992e89fcdd9e32c47
0b6edbfa-4a24-4fc6-8a23-942b1eca65d1
version: v1.0
protocol: [MS-PAN]: Print System Asynchronous Notification Protocol
provider: spoolsv.exe
ncacn_ip_tcp: 134.119.204.70:49156
ncalrpc: LRPC-2992e89fcdd9e32c47
12345678-1234-abcd-ef00-0123456789ab
version: v1.0
protocol: [MS-RPRN]: Print System Remote Protocol
provider: spoolsv.exe
ncacn_ip_tcp: 134.119.204.70:49156
ncalrpc: LRPC-2992e89fcdd9e32c47
50abc2a4-574d-40b3-9d66-ee4fd5fba076
version: v5.0
protocol: [MS-DNSP]: Domain Name Service (DNS) Server Management
provider: dns.exe
ncacn_ip_tcp: 134.119.204.70:49157
367abb81-9844-35f1-ad32-98f038001003
version: v2.0
protocol: [MS-SCMR]: Service Control Manager Remote Protocol
provider: services.exe
ncacn_ip_tcp: 134.119.204.70:49160
6b5bdd1e-528c-422c-af8c-a4079be4fe48
version: v1.0
annotation: Remote Fw APIs
protocol: [MS-FASP]: Firewall and Advanced Security Protocol
provider: FwRemoteSvr.dll
ncacn_ip_tcp: 134.119.204.70:49161
f763c91c-2ab1-47fa-868f-7de7efd42194
version: v1.0
annotation: VM Allow-List Provider RPC
ncalrpc: RdvVmAllowListRpc
ncalrpc: OLE3D32B687EAC81FD45A8DCDE72B92
76209fe5-9049-4336-ba84-632d907cb154
version: v1.0
annotation: Interprocess Logon Service
ncalrpc: ReportingServices$MSRS11.SQL
ncalrpc: OLED03DBD48B1E9CF49B692BCD8F189
906b0ce0-c70b-1067-b317-00dd010662da
version: v1.0
protocol: [MS-CMPO]: MSDTC Connection Manager:
provider: msdtcprx.dll
ncalrpc: LRPC-7d9c2eb8fc34d0bcf8
ncalrpc: LRPC-7d9c2eb8fc34d0bcf8
ncalrpc: LRPC-7d9c2eb8fc34d0bcf8
12e65dd8-887f-41ef-91bf-8d816c42c2e7
version: v1.0
annotation: Secure Desktop LRPC interface
provider: winlogon.exe
ncalrpc: WMsgKRpc03517A02
143 /
tcp
-782772411 | 2025-04-02T19:56:07.787271
* OK IMAP4rev1 server ready at 04/02/25 12:56:11
* CAPABILITY IMAP4rev1 IMAP4 AUTH=LOGIN AUTH=CRAM-MD5 IDLE CHILDREN XLIST UIDPLUS SPECIAL-USE
A001 OK CAPABILITY completed
A002 BAD UNKNOWN Command
A003 BAD UNKNOWN Command
* BYE IMAP4rev1 server terminating connection
A004 OK LOGOUT Initiated
445 /
tcp
-1242801143 | 2025-04-03T14:30:56.441673
SMB Status:
Authentication: enabled
SMB Version: 1
OS: Windows Server 2012 R2 Datacenter 9600
Software: Windows Server 2012 R2 Datacenter 6.3
Capabilities: extended-security, infolevel-passthru, large-files, large-readx, large-writex, level2-oplocks, lock-and-read, lwio, nt-find, nt-smb, nt-status, rpc-remote-api, unicode
587 /
tcp
891076011 | 2025-04-12T18:06:33.680618
220 HOST4.134.119.204.70 ESMTP MailEnable Service, Version: 10.37-- ready at 04/12/25 11:06:33
250-134.119.204.70 [224.45.195.231], this server offers 4 extensions
250-AUTH LOGIN
250-SIZE 40960000
250-HELP
250 AUTH=LOGIN
3389 /
tcp
842869854 | 2025-04-08T05:16:05.517812
Remote Desktop Protocol
\x03\x00\x00\x13\x0e\xd0\x00\x00\x124\x00\x02\x0f\x08\x00\x02\x00\x00\x00
Remote Desktop Protocol NTLM Info:
OS: Windows 8.1/Windows Server 2012 R2
OS Build: 6.3.9600
Target Name: HOST4
NetBIOS Domain Name: HOST4
NetBIOS Computer Name: HOST4
DNS Domain Name: host4
FQDN: host4
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1e:f6:07:17:d6:3e:87:bf:4d:8d:77:e5:f3:10:cc:f1
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=host4
Validity
Not Before: Feb 17 13:40:05 2025 GMT
Not After : Aug 19 13:40:05 2025 GMT
Subject: CN=host4
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:ce:23:bf:36:44:80:0d:7a:aa:a6:9e:1a:04:c4:
01:91:b4:d8:28:c6:3c:31:a5:60:e4:c0:a7:36:12:
28:bc:9b:ee:ce:0f:60:4f:fe:1e:22:df:82:e3:ca:
5c:ca:09:00:a3:4c:43:c4:69:6d:e9:f6:e3:33:3e:
ee:75:02:75:b0:c1:05:d2:e8:4d:fe:cd:85:0e:0b:
80:b0:f6:b7:38:45:76:60:0a:37:d4:40:16:4a:dd:
e9:e2:ee:c6:8b:82:6a:45:51:da:f7:e5:ed:7f:72:
1f:50:e9:1f:27:46:fc:1b:01:ec:23:ae:c0:05:be:
db:ea:3b:a2:14:5c:31:d5:ea:4c:d6:e9:7e:99:ad:
65:ae:a3:60:b3:c3:a0:4c:bd:f5:ee:62:22:0d:5c:
9a:af:cf:7e:70:fe:37:dc:f1:9a:8d:c0:af:43:b6:
79:0a:1b:e9:72:ba:42:d2:dd:0a:0c:4d:8f:78:c1:
de:31:a0:39:80:b8:15:c4:bf:cc:83:48:b1:96:88:
73:bb:6c:0e:5f:7c:3e:7c:74:40:e1:0a:ec:c2:d8:
60:75:cf:43:37:ea:98:21:f1:76:7c:93:60:f3:7a:
fc:b2:b7:3e:3b:bc:65:d0:ce:92:cd:02:92:3f:9d:
b2:4c:65:7e:e2:e1:2a:12:c6:b8:40:bb:0d:33:1c:
74:77
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Extended Key Usage:
TLS Web Server Authentication
X509v3 Key Usage:
Key Encipherment, Data Encipherment
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
46:9d:c5:c2:59:2d:a0:3b:d7:f0:70:a9:db:b6:30:2a:2f:5d:
8e:06:b9:7c:a9:44:b6:8d:b7:53:ea:8d:df:3f:ff:dc:7d:49:
b3:2f:6c:3f:f8:f2:eb:5f:b4:47:35:22:de:12:a9:c8:ed:6a:
eb:b6:92:77:a7:b1:e7:34:58:8b:04:c6:4b:9a:47:eb:52:af:
47:b1:e4:2a:0f:82:ec:a6:96:f8:4d:0a:d9:05:c2:81:24:c7:
f5:86:3e:24:0b:54:c2:d1:6e:bc:05:a3:66:2b:12:80:b7:82:
81:bb:13:9d:d8:b9:07:59:a8:1e:7d:5c:65:4b:f0:28:51:63:
02:6c:1a:fe:b6:48:16:68:15:a0:96:0d:c6:f9:eb:62:f3:cf:
3c:8c:2f:17:7f:e6:a4:13:cc:22:ac:20:4c:cd:ae:6b:54:e7:
16:67:c0:86:db:dc:4b:55:74:93:17:2d:7a:89:e0:2c:a2:83:
dc:9f:bd:98:f3:38:8c:b6:2c:ed:55:79:b0:a8:02:fa:a7:61:
b0:c2:26:0e:be:19:fa:97:83:aa:d5:39:3b:7d:da:a7:4e:cd:
4e:aa:19:ad:05:2d:00:c6:be:32:21:7e:3a:82:9f:6d:2f:bc:
92:71:f3:44:97:33:b5:c1:fd:9b:8b:c9:16:00:1f:25:18:37:
08:0a:f7:e8
1489525118 | 2025-04-04T09:11:10.599965
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Fri, 04 Apr 2025 09:11:14 GMT
Connection: close
Content-Length: 315
WinRM NTLM Info:
OS: Windows Server 2012 R2
OS Build: 6.3.9600
Target Name: HOST4
NetBIOS Domain Name: HOST4
NetBIOS Computer Name: HOST4
DNS Domain Name: host4
FQDN: host4
2116250677 | 2025-03-27T18:10:34.279035
HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Location: /Default.aspx?pid=Login&ReturnUrl=%2f
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Date: Thu, 27 Mar 2025 18:10:38 GMT
Content-Length: 158
<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="/Default.aspx?pid=Login&ReturnUrl=%2f">here</a>.</h2>
</body></html>
Vulnerabilities
728920884 | 2025-03-24T22:48:51.719365
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Mon, 24 Mar 2025 22:48:54 GMT
Content-Length: 2331
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
SolidCP Enterprise Server
</title>
<style>
BODY
{
margin:0px;
padding: 10px;
font-family: Tahoma, Arial;
font-size: 10pt;
}
.Content
{
width: 400px;
margin-top: 30px;
margin-left: auto;
margin-right: auto;
text-align: center;
}
H1
{
font-family: Arial, Tahoma;
font-size: 18pt;
margin-top: 40px;
margin-bottom: 5px;
font-weight: bold;
padding: 4px;
}
TABLE
{
background-color: #e0e0e0;
padding: 4px;
}
TD
{
padding: 8px;
background-color: #ffffff;
}
.FieldName
{
width: 100px;
font-weight: bold;
}
</style>
</head>
<body>
<form method="post" action="./" id="AspForm">
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUJODgyNzkyMTU3D2QWAgIDD2QWBmYPDxYCHghJbWFnZVVybAXUAS9XZWJSZXNvdXJjZS5heGQ/ZD15bVI3QjZLamhrYnNrY29fQURTdTVCc1lCMmlONU5QZ3hCMnEtdEp2eWlkSDhBMGtvNjREd0t4aFBhTzR4V3AxTUJ0YURDV1NkQkdfT3FCUm9VeHlhSjRjUFZPcUJtWHB3RlRHdzhTOHAwSlZ5OWY0blRvQ0JQU253ellWOGozWF9sMGtpakI2QXpfaWxLelBfVklrcjBXOEEyVVQ3VW5nbDJwVnZRSkVLUmMxJnQ9NjM3NjE3NzExMTIzNzc5MDgwZGQCAQ8WAh4EVGV4dAUFMS40LjhkAgIPFgIfAQUaaHR0cDovLzEzNC4xMTkuMjA0LjcwOjkwMDJkZOztOQjsricVAsuwNUqfxZ41lu4C75YZqvp+bZKP7in6" />
<input type="hidden" name="__VIEWSTATEGENERATOR" id="__VIEWSTATEGENERATOR" value="CA0B0334" />
<div class="Content">
<div>
<img id="imgLogo" src="/WebResource.axd?d=ymR7B6Kjhkbskco_ADSu5BsYB2iN5NPgxB2q-tJvyidH8A0ko64DwKxhPaO4xWp1MBtaDCWSdBG_OqBRoUxyaJ4cPVOqBmXpwFTGw8S8p0JVy9f4nToCBPSnwzYV8j3X_l0kijB6Az_ilKzP_VIkr0W8A2UT7Ungl2pVvQJEKRc1&t=637617711123779080" />
</div>
<h1>Enterprise Server</h1>
<table cellpadding="0" cellspacing="1" align="center">
<tr>
<td class="FieldName">Status:</td>
<td>Running</td>
</tr>
<tr>
<td class="FieldName">Version:</td>
<td>1.4.8</td>
</tr>
<tr>
<td class="FieldName">URL:</td>
<td>http://134.119.204.70:9002</td>
</tr>
</table>
<br /><br />
<a href="https://solidcp.com">SolidCP</a> © Copyright 2025 All Rights Reserved.
</div>
</form>
</body>
</html>
Vulnerabilities
1201310636 | 2025-04-11T21:32:21.023300
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/8.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Fri, 11 Apr 2025 21:32:25 GMT
Content-Length: 2455
Vulnerabilities
1298793639 | 2025-04-07T11:21:11.733580
HTTP/1.1 400 Bad Request
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Mon, 07 Apr 2025 11:21:45 GMT
Connection: close
Content-Length: 334