Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
HTTP/1.1 200 OK Date: Sun, 23 Mar 2025 19:05:27 GMT Server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.2.18 mod_fcgid/2.3.10-dev Last-Modified: Mon, 20 Jan 2020 14:39:07 GMT ETag: "139f1-59c9340edb8c0" Accept-Ranges: bytes Content-Length: 80369 Vary: Accept-Encoding Content-Type: text/html
HTTP/1.1 403 Forbidden Date: Wed, 02 Apr 2025 06:39:15 GMT Server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.2.18 mod_fcgid/2.3.10-dev Content-Length: 333 Content-Type: text/html; charset=iso-8859-1 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>403 Forbidden</title> </head><body> <h1>Forbidden</h1> <p>You don't have permission to access / on this server.<br /> </p> <hr> <address>Apache/2.4.39 (Win64) OpenSSL/1.1.1b PHP/7.2.18 mod_fcgid/2.3.10-dev Server at 38.35.76.227 Port 80</address> </body></html>
SMB Status: Authentication: enabled SMB Version: 1 OS: Windows Server 2012 R2 Datacenter 9600 Software: Windows Server 2012 R2 Datacenter 6.3 Capabilities: extended-security, infolevel-passthru, large-files, large-readx, large-writex, level2-oplocks, lock-and-read, lwio, nt-find, nt-smb, nt-status, rpc-remote-api, unicode
MySQL: Error Message: Host '224.100.3.232' is not allowed to connect to this MySQL server Error Code: 1130
HTTP/1.1 404 Not Found Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Sat, 29 Mar 2025 07:48:09 GMT Connection: close Content-Length: 315 WinRM NTLM Info: OS: Windows Server 2012 R2 OS Build: 6.3.9600 Target Name: WINDOWS-NI5SVA8 NetBIOS Domain Name: WINDOWS-NI5SVA8 NetBIOS Computer Name: WINDOWS-NI5SVA8 DNS Domain Name: WINDOWS-NI5SVA8 FQDN: WINDOWS-NI5SVA8
HTTP/1.1 404 Not Found Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Thu, 20 Mar 2025 03:27:30 GMT Connection: close Content-Length: 315
Shodan ® - All rights reserved