Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
HTTP/1.1 401 Unauthorized Content-Length: 1539 Content-Type: text/html Server: Microsoft-IIS/6.0 WWW-Authenticate: Negotiate WWW-Authenticate: NTLM X-Powered-By: ASP.NET Date: Thu, 06 Feb 2025 07:04:04 GMT HTTP NTLM Info: OS: Windows Server 2003 OS Build: 5.2.3790 Target Name: HELM2 NetBIOS Domain Name: HELM2 NetBIOS Computer Name: HELM2 DNS Domain Name: helm2 FQDN: helm2
Microsoft RPC Endpoint Mapper 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5 version: v1.0 annotation: DHCP Client LRPC Endpoint provider: dhcpcsvc.dll ncalrpc: dhcpcsvc d674a233-5829-49dd-90f0-60cf9ceb7129 version: v1.0 annotation: ICF+ FW API provider: ipnathlp.dll ncalrpc: trkwks ncacn_np: \\HELM2\pipe\trkwks ncalrpc: senssvc ncalrpc: SECLOGON ncacn_np: \\HELM2\PIPE\srvsvc ncalrpc: keysvc ncacn_np: \\HELM2\pipe\keysvc ncacn_np: \\HELM2\PIPE\wkssvc ncacn_np: \\HELM2\PIPE\atsvc ncalrpc: LRPC00000374.00000001 ncalrpc: OLECF9CCE5D30264C0EA73FD455306D 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53 version: v1.0 provider: schedsvc.dll ncacn_np: \\HELM2\PIPE\atsvc ncalrpc: LRPC00000374.00000001 ncalrpc: OLECF9CCE5D30264C0EA73FD455306D 378e52b0-c0a9-11cf-822d-00aa0051e40f version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: taskcomp.dll ncacn_np: \\HELM2\PIPE\atsvc ncalrpc: LRPC00000374.00000001 ncalrpc: OLECF9CCE5D30264C0EA73FD455306D 1ff70682-0a51-30e8-076d-740be8cee98b version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: taskcomp.dll ncacn_np: \\HELM2\PIPE\atsvc ncalrpc: LRPC00000374.00000001 ncalrpc: OLECF9CCE5D30264C0EA73FD455306D 906b0ce0-c70b-1067-b317-00dd010662da version: v1.0 protocol: [MS-CMPO]: MSDTC Connection Manager: provider: msdtcprx.dll ncalrpc: LRPC00000444.00000001 ncalrpc: LRPC00000444.00000001 ncalrpc: LRPC00000444.00000001 ncalrpc: LRPC00000444.00000001 12345678-1234-abcd-ef00-0123456789ab version: v1.0 annotation: IPSec Policy agent endpoint protocol: [MS-RPRN]: Print System Remote Protocol provider: spoolsv.exe ncacn_ip_tcp: 217.115.115.34:1025 ncalrpc: dsrole ncacn_np: \\HELM2\PIPE\protected_storage ncalrpc: protected_storage ncalrpc: securityevent ncalrpc: audit ncacn_np: \\HELM2\PIPE\lsass 12345778-1234-abcd-ef00-0123456789ac version: v1.0 protocol: [MS-SAMR]: Security Account Manager (SAM) Remote Protocol provider: samsrv.dll ncacn_ip_tcp: 217.115.115.34:1025 ncalrpc: dsrole ncacn_np: \\HELM2\PIPE\protected_storage ncalrpc: protected_storage ncalrpc: securityevent ncalrpc: audit ncacn_np: \\HELM2\PIPE\lsass bfa951d1-2f0e-11d3-bfd1-00c04fa3490a version: v1.0 provider: aqueue.dll ncacn_ip_tcp: 217.115.115.34:1028 ncacn_np: \\HELM2\PIPE\SMTPSVC ncacn_ip_tcp: 217.115.115.34:1027 ncalrpc: SMTPSVC_LPC ncacn_np: \\HELM2\PIPE\INETINFO ncacn_ip_tcp: 217.115.115.34:1026 ncalrpc: INETINFO_LPC ncalrpc: OLE830A224108094843A4F34325B254 8cfb5d70-31a4-11cf-a7d8-00805f48a135 version: v3.0 provider: smtpsvc.dll ncacn_np: \\HELM2\PIPE\SMTPSVC ncacn_ip_tcp: 217.115.115.34:1027 ncalrpc: SMTPSVC_LPC ncacn_np: \\HELM2\PIPE\INETINFO ncacn_ip_tcp: 217.115.115.34:1026 ncalrpc: INETINFO_LPC ncalrpc: OLE830A224108094843A4F34325B254 82ad4280-036b-11cf-972c-00aa006887b0 version: v2.0 protocol: [MS-IRP]: Internet Information Services (IIS) Inetinfo Remote provider: infocomm.dll ncacn_np: \\HELM2\PIPE\INETINFO ncacn_ip_tcp: 217.115.115.34:1026 ncalrpc: INETINFO_LPC ncalrpc: OLE830A224108094843A4F34325B254 2f5f6521-cb55-1059-b446-00df0bce31db version: v1.0 annotation: Unimodem LRPC Endpoint ncalrpc: unimdmsvc ncalrpc: tapsrvlpc ncacn_np: \\HELM2\pipe\tapsrv 3473dd4d-2e88-4006-9cba-22570909dd10 version: v5.256 annotation: WinHttp Auto-Proxy Service ncacn_np: \\HELM2\PIPE\W32TIME_ALT ncalrpc: W32TIME_ALT
\xe1\xe7\xe6\x07\x00\x01\x00
HTTP/1.1 403 Forbidden Content-Length: 1409 Content-Type: text/html Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Date: Fri, 24 Jan 2025 07:18:59 GMT
Shodan ® - All rights reserved