Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
1614027039 | 2025-01-11T22:45:48.570737
220 ProFTPD 1.3.1 Server (Debian) [::ffff:192.168.100.134] 530 Login incorrect. 214-The following commands are recognized (* =>'s unimplemented): 214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV 214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD 214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP 214-NOOP FEAT OPTS AUTH CCC* CONF* ENC* MIC* 214-PBSZ PROT TYPE STRU MODE RETR STOR STOU 214-APPE REST ABOR USER PASS ACCT* REIN* LIST 214-NLST STAT SITE 214 Direct comments to root@217.25.247.132 211-Features: MDTM REST STREAM SIZE 211 End
631859102 | 2025-01-14T04:02:51.505740
HTTP/1.1 200 OK Date: Tue, 14 Jan 2025 03:58:29 GMT Server: Apache/2.2.9 (Ubuntu) PHP/5.2.6-2ubuntu4.6 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g Last-Modified: Wed, 22 Aug 2012 11:04:15 GMT ETag: "8c637d-3-4c7d8b41549c0" Accept-Ranges: bytes Content-Length: 3 Vary: Accept-Encoding Content-Type: text/html
Shodan ® - All rights reserved