45.139.11.97

Regular View Raw Data Timeline
Last Seen: 2025-04-12

GeneralInformation

Hostnames s273.bitcommand.com
s273.roodaki.com
cpanel.s273.roodaki.com
cpcalendars.s273.roodaki.com
cpcontacts.s273.roodaki.com
mail.s273.roodaki.com
webdisk.s273.roodaki.com
webmail.s273.roodaki.com
www.s273.roodaki.com
Domains bitcommand.com roodaki.com 
Country Iran, Islamic Republic of
City Shiraz
Organization Pars Parva System LTD
ISP Pars Parva System LLC
ASN AS60631

WebTechnologies

Miscellaneous

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2023(1)
CVE-2023-51766
5.3Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.
21 / tcp
-1856345354 | 2025-03-27T10:48:37.042960
80 / tcp
-1084070093 | 2025-04-12T00:22:47.367770
110 / tcp
1952082069 | 2025-04-08T20:33:24.326303
143 / tcp
1559185454 | 2025-03-25T21:52:37.278925
443 / tcp
-329286613 | 2025-04-11T23:21:08.610230
465 / tcp
-637003471 | 2025-04-12T21:54:13.972952
993 / tcp
-1132241830 | 2025-03-18T03:38:38.335097
995 / tcp
-1001764030 | 2025-03-29T13:30:53.981215
2083 / tcp
1680772090 | 2025-04-04T03:05:50.943842
2096 / tcp
1702273168 | 2025-04-11T23:21:06.273665
3306 / tcp
-869584067 | 2025-04-07T03:05:53.276108



Contact Us

Shodan ® - All rights reserved