Hostnames |
ip1b7b1921.ipv4.syd02.ds.network cpanel.jmdr.net cpcalendars.jmdr.net cpcontacts.jmdr.net mail.jmdr.net webdisk.jmdr.net webmail.jmdr.net |
Domains | ds.network jmdr.net |
Country | Australia |
City | Sydney |
Organization | Dreamscape Networks Inc Australia |
ISP | Dreamscape Networks Limited |
ASN | AS38719 |
-532168570 | 2024-12-19T15:08:13.56736721 / tcp
220 BitNinja FTP CAPTCHA server 230 User anonymous logged in from 224.36.180.201. 214-BitNinja FTP CAPTCHA server 214-Commands available: 214-APPE 214-CDUP 214-CWD 214-DELE 214-HELP 214-LIST 214-MKD 214-NOOP 214-PASS 214-PASV 214-PORT 214-PWD 214-QUIT 214-RETR 214-RMD 214-RNFR 214-RNTO 214-SIZE 214-STOR 214-SYST 214-TYPE 214-USER 214 HELP command successful. 502 Command not implemented.
84310443 | 2024-12-19T13:35:03.68833225 / tcp
220 ESMTP Postfix (Debian/GNU) 550 5.7.1 Your IP (224.81.19.123) is on the BitNinja server security greylist. This means that we experienced malicious attacks coming from your IP and placed it on our greylist due to security reasons. If you have taken the necessary steps to eliminate its source, you can delist this IP on (http://185.184.155.18:60412/spam_delist?hash=92fc49b2285d6398c88dc6ccf5309100) You can only delist this IP a couple of times. It is good idea to warn your service provider about this incident.
-1408874828 | 2024-12-24T12:24:15.70053580 / tcp
HTTP/1.1 403 Forbidden Content-Type: text/html Cache-Control: no-cache, no-store, must-revalidate Pragma: no-cache Expires: 0 Server: BitNinja Captcha Server Date: Tue, 24 Dec 2024 12:19:32 GMT Content-Length: 13673 Connection: close
105676185 | 2024-12-27T11:23:40.430816443 / tcp
HTTP/1.1 403 Forbidden Content-Type: text/html Cache-Control: no-cache, no-store, must-revalidate Pragma: no-cache Expires: 0 Server: BitNinja Captcha Server Date: Fri, 27 Dec 2024 11:18:54 GMT Content-Length: 13673
Certificate: Data: Version: 3 (0x2) Serial Number: 04:0f:f2:fe:ca:36:1f:30:2d:b5:4b:5a:9d:65:b0:19:5e:62 Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, O=Let's Encrypt, CN=R11 Validity Not Before: Nov 22 23:51:38 2024 GMT Not After : Feb 20 23:51:37 2025 GMT Subject: CN=cpcalendars.jmdr.net Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:d7:0b:4d:25:9c:95:b8:cc:03:a6:43:e3:4b:85: 84:67:f6:4e:49:4c:0b:38:1b:2d:32:20:4d:3d:27: c4:33:7a:d8:5c:34:0a:a6:a8:be:aa:42:f6:00:f7: a0:7b:dc:8b:bc:32:bb:38:09:0a:e0:68:d6:70:df: 31:92:5a:41:92:40:a3:f0:b0:90:cb:1d:ef:a8:94: 44:39:99:0c:c6:41:e2:e7:21:0b:4e:0a:3c:82:f2: 77:73:72:9c:7c:8e:34:15:39:a9:5d:20:65:4d:81: f8:65:c5:0b:53:64:ea:ea:a2:ee:9c:33:7d:ed:4e: 4a:da:9e:d0:42:3c:dd:79:09:6c:f6:bf:c5:10:59: 59:66:f0:8a:81:c8:d8:b4:03:09:60:55:00:fc:56: b2:a6:fe:a8:89:8c:34:9b:6c:02:86:73:5d:63:31: 98:47:84:b1:c1:da:d3:fb:ae:54:04:a3:5d:e2:fa: 6c:8a:74:1f:e9:fe:44:e8:d8:9b:ba:ea:0e:95:18: d6:2d:15:78:b1:bf:09:26:48:2e:16:bb:20:88:90: 61:c4:aa:01:a0:b2:36:3a:2b:c7:29:03:76:6a:04: 1e:30:91:18:32:c4:52:a3:a0:e6:14:bb:78:d1:74: 4e:bb:71:e6:ff:c2:f4:81:84:61:87:9c:52:bc:ca: 41:25 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Basic Constraints: critical CA:FALSE X509v3 Subject Key Identifier: 77:74:37:D4:5A:59:6C:96:1A:CF:A7:D6:32:90:F9:0C:16:95:35:D9 X509v3 Authority Key Identifier: C5:CF:46:A4:EA:F4:C3:C0:7A:6C:95:C4:2D:B0:5E:92:2F:26:E3:B9 Authority Information Access: OCSP - URI:http://r11.o.lencr.org CA Issuers - URI:http://r11.i.lencr.org/ X509v3 Subject Alternative Name: DNS:cpanel.jmdr.net, DNS:cpcalendars.jmdr.net, DNS:cpcontacts.jmdr.net, DNS:mail.jmdr.net, DNS:webdisk.jmdr.net, DNS:webmail.jmdr.net X509v3 Certificate Policies: Policy: 2.23.140.1.2.1 CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9: 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08 Timestamp : Nov 23 00:50:08.608 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:E1:3B:D8:AA:62:BF:26:C4:A5:B9:C0: 50:9D:BC:F2:57:41:AB:47:03:17:64:18:88:AF:F1:69: 83:AF:43:79:21:02:20:28:84:DB:41:7C:4C:DD:34:6F: 37:1A:3C:31:B2:5A:5B:D0:D9:11:67:C0:C8:6D:76:0F: 9B:54:27:CE:10:AF:2E Signed Certificate Timestamp: Version : v1 (0x0) Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53: D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7 Timestamp : Nov 23 00:50:10.549 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:FF:E2:03:66:8E:FE:CD:25:5D:32:36: C7:C8:3C:47:E8:D7:65:DE:30:B5:17:3F:A8:56:8C:15: 0C:50:72:A8:71:02:20:58:E5:15:83:EC:2A:6D:EF:1E: A0:B4:2E:54:8D:64:F4:BB:45:1C:28:C0:B5:90:83:61: CA:0B:C5:D5:17:C7:04 Signature Algorithm: sha256WithRSAEncryption Signature Value: 24:53:de:c9:f1:19:32:94:74:e1:56:cf:d1:0e:e6:00:ec:f2: 94:79:3f:47:61:02:96:38:d7:c3:9a:17:ff:d2:c7:ca:a7:6b: 63:64:20:14:c7:01:0a:34:23:66:1d:e8:9d:3e:1a:77:35:fb: e4:6c:f3:88:e7:51:ba:21:47:25:f6:8e:b2:22:6f:1a:f5:0e: 0b:40:2a:7a:8a:99:2f:b6:1d:52:cf:b3:40:40:1a:c9:9e:c5: 23:3d:53:85:61:6b:f8:34:7d:1d:a0:24:2e:ec:4a:4e:44:b3: 32:5c:ba:2d:4b:cd:1c:3b:34:0b:12:32:83:b3:d4:46:df:40: 6a:05:0e:26:a2:f0:64:9e:a0:60:75:46:13:9a:af:49:42:b1: 0f:cd:52:bd:91:31:21:49:c0:bd:4d:d2:0a:3d:51:98:10:f2: af:7a:30:62:8b:c7:53:ac:79:1c:ec:97:b7:e9:d3:76:11:0a: 37:52:ea:80:ff:74:f4:b6:aa:ee:18:b3:0e:7e:8e:88:d4:6e: 53:b5:51:22:60:4f:2f:fb:35:c1:26:5d:62:8a:6f:dc:28:64: 4e:82:4a:67:bb:4e:5f:6a:74:cc:a8:c3:e4:92:47:da:1e:16: a9:32:80:43:65:a0:a8:93:3b:d9:aa:50:be:2a:43:9f:43:e2: 84:ad:4d:8e
1964355650 | 2024-12-19T17:30:20.4797412222 / tcp
OK [CAPABILITY LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN] Dovecot ready.
887219762 | 2024-12-19T12:47:49.7855205432 / tcp
220 ESMTP Postfix (Debian/GNU)\r\n
1400219888 | 2024-12-21T00:53:52.9094796667 / tcp