Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
HTTP/1.1 200 OK Date: Wed, 22 Jan 2025 09:57:27 GMT Server: Apache/2.4.41 (Ubuntu) Last-Modified: Tue, 06 Dec 2022 10:52:35 GMT ETag: "88-5ef2699ff62c0" Accept-Ranges: bytes Content-Length: 136 Vary: Accept-Encoding Content-Type: text/html
HTTP/1.1 400 Bad Request Content-Type: text/plain; charset=utf-8 Connection: close 400 Bad Request Prometheus Node Exporter: node_exporter_build_info: branch: HEAD goversion: go1.17.3 revision: a2321e7b940ddcff26873612bccdf7cd4c42b6b6 version: 1.3.1 node_os_info: id: ubuntu id_like: debian name: Ubuntu pretty_name: Ubuntu 20.04.3 LTS version: 20.04.3 LTS (Focal Fossa) version_codename: focal version_id: 20.04 node_uname_info: domainname: (none) machine: x86_64 nodename: Agent-Memberarea-12S1 release: 5.4.0-107-generic sysname: Linux version: #121-Ubuntu SMP Thu Mar 24 16:04:27 UTC 2022 node_dmi_info: bios_date: 12/12/2017 bios_vendor: DigitalOcean bios_version: 20171212 chassis_vendor: Bochs product_family: DigitalOcean_Droplet product_name: Droplet product_serial: 294820000 product_uuid: 3a4ceb94-6347-4977-8f81-f7ffcaf51e9a product_version: 20171212 system_vendor: DigitalOcean node_network_info: lo: address: 00:00:00:00:00:00 broadcast: 00:00:00:00:00:00 device: lo operstate: unknown eth1: address: 4e:9f:3b:c5:21:62 broadcast: ff:ff:ff:ff:ff:ff device: eth1 duplex: unknown operstate: up eth0: address: a6:2d:7f:09:1d:9e broadcast: ff:ff:ff:ff:ff:ff device: eth0 duplex: unknown operstate: up
4E:9F:3B:C5:21:62 Unknown A6:2D:7F:09:1D:9E Unknown
Shodan ® - All rights reserved