21 /
tcp
74639521 | 2025-02-24T09:09:36.357585
220 ProFTPD 1.3.1 Server (ftp.tb1.ch) [::ffff:62.2.156.68]
530 Login incorrect.
214-The following commands are recognized (* =>'s unimplemented):
214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV
214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD
214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP
214-NOOP FEAT OPTS AUTH CCC* CONF* ENC* MIC*
214-PBSZ PROT TYPE STRU MODE RETR STOR STOU
214-APPE REST ABOR USER PASS ACCT* REIN* LIST
214-NLST STAT SITE
214 Direct comments to root@ns1.tb1.ch
211-Features:
LANG en
MDTM
UTF8
REST STREAM
SIZE
211 End
Vulnerabilities
53 /
tcp
-2100706004 | 2025-03-23T04:18:09.588548
9.5.1-P2
Resolver name: ns1.tb1.ch
53 /
udp
-2100706004 | 2025-03-12T11:33:41.837500
9.5.1-P2
Resolver name: ns1.tb1.ch
-706639242 | 2025-03-08T13:28:50.168576
HTTP/1.1 200 OK
Date: Sat, 08 Mar 2025 15:22:00 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny3 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Last-Modified: Wed, 11 Jul 2012 08:58:12 GMT
ETag: "c600a-12b03-4c48a0bf55100"
Accept-Ranges: bytes
Content-Length: 76547
Vary: Accept-Encoding
Content-Type: text/html
Vulnerabilities
110 /
tcp
1217434271 | 2025-03-23T11:47:58.219333
+OK Hello there.
+OK Here's what I can do:
TOP
USER
LOGIN-DELAY 10
PIPELINING
UIDL
IMPLEMENTATION Courier Mail Server
.
111 /
tcp
76935974 | 2025-03-19T00:52:31.629734
Portmap
Program Version Protocol Port
portmapper 2 tcp 111
portmapper 2 udp 111
status 1 udp 54557
status 1 tcp 58551
sgi_fam 2 tcp 677
111 /
udp
76935974 | 2025-03-18T15:28:09.872255
Portmap
Program Version Protocol Port
portmapper 2 tcp 111
portmapper 2 udp 111
status 1 udp 54557
status 1 tcp 58551
sgi_fam 2 tcp 677
143 /
tcp
-698092998 | 2025-03-18T21:52:06.589653
* OK [CAPABILITY IMAP4rev1 CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA IDLE AUTH=LOGIN] Courier-IMAP ready. Copyright 1998-2008 Double Precision, Inc. See COPYING for distribution information.
* CAPABILITY IMAP4rev1 CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA IDLE AUTH=LOGIN
A001 OK CAPABILITY completed
A002 NO Error in IMAP command received by server.
A003 NO Error in IMAP command received by server.
* BYE Courier-IMAP server shutting down
A004 OK LOGOUT completed
-706639242 | 2025-03-20T04:32:48.950158
HTTP/1.1 200 OK
Server: nginx/1.18.0
Date: Thu, 20 Mar 2025 06:25:43 GMT
Content-Type: text/html
Content-Length: 76547
Connection: keep-alive
Last-Modified: Wed, 11 Jul 2012 08:58:12 GMT
ETag: "c600a-12b03-4c48a0bf55100"
Accept-Ranges: bytes
Vary: Accept-Encoding
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
d4:cb:e7:83:66:96:3d:e9:b4:a5:7e:ac:dd:50:da:35
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
Validity
Not Before: Mar 4 00:00:00 2025 GMT
Not After : Apr 4 23:59:59 2026 GMT
Subject: CN=www.loewengruppe.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:e9:d0:27:47:72:b1:02:65:3f:6b:2d:0c:08:b3:
b5:1c:07:47:af:d7:6d:65:ba:2f:a6:77:dd:91:d7:
15:e8:7f:02:31:03:73:84:d2:1d:89:19:9e:d8:0c:
a4:ee:82:66:ab:eb:52:b5:a9:9b:c0:82:9a:19:f5:
20:04:5f:a8:6c:5f:a7:5d:4f:9d:e9:2f:09:7f:2e:
11:33:b0:f2:2d:da:01:32:88:97:f3:fc:ca:55:d1:
12:00:13:a8:cb:6b:e6:22:d1:74:68:06:87:5e:78:
e0:f4:10:3f:3c:d5:83:be:10:56:ca:3b:73:51:dc:
f3:12:0d:5f:c8:aa:75:20:38:d1:fb:b0:98:66:05:
18:92:a0:4c:a5:e0:b6:a2:b3:7b:f0:1f:c6:0d:5b:
09:22:51:5a:ca:6f:05:24:76:f2:68:a9:d0:48:36:
43:2e:48:b3:a9:1a:1b:ab:5f:59:c6:1f:02:10:df:
cd:46:93:9c:e9:dd:39:60:da:bf:1e:03:cb:5d:eb:
88:ec:7e:32:d2:51:27:84:31:ee:f1:a7:39:1b:c5:
44:53:f9:43:0c:be:e4:a5:d2:d1:f5:5d:25:19:14:
71:da:0b:8a:1b:aa:0b:63:5a:a6:9a:43:ec:30:21:
63:0f:8c:f3:8c:13:33:ee:b0:52:58:f5:c8:ae:f2:
3a:3b
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Authority Key Identifier:
8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1
X509v3 Subject Key Identifier:
F2:D1:62:87:83:5F:02:E0:12:EA:E2:72:25:46:FC:AB:63:44:90:B1
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Certificate Policies:
Policy: 1.3.6.1.4.1.6449.1.2.2.7
CPS: https://sectigo.com/CPS
Policy: 2.23.140.1.2.1
Authority Information Access:
CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
OCSP - URI:http://ocsp.sectigo.com
X509v3 Subject Alternative Name:
DNS:www.loewengruppe.com, DNS:loewengruppe.com
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:
E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6
Timestamp : Mar 4 13:56:20.357 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:94:36:F4:0F:68:7B:19:1B:C0:FD:78:
1A:8B:17:61:99:63:5B:80:26:13:7A:23:31:67:42:AA:
B1:52:7B:BE:A7:02:20:7F:DF:DA:DA:B4:00:FC:C3:F7:
58:8B:21:C4:5C:1F:55:9B:7B:1E:C6:7B:3F:1C:06:B0:
53:F3:98:A5:79:02:CA
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 19:86:D4:C7:28:AA:6F:FE:BA:03:6F:78:2A:4D:01:91:
AA:CE:2D:72:31:0F:AE:CE:5D:70:41:2D:25:4C:C7:D4
Timestamp : Mar 4 13:56:20.251 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:26:6C:C2:E9:C2:50:03:43:35:09:A5:BD:
20:5B:94:DB:E8:EB:4F:66:66:07:56:2B:F3:84:16:B1:
D1:F2:E6:59:02:21:00:83:8C:C8:67:F6:96:D2:2B:2D:
D6:75:0D:44:E6:15:A2:9E:F8:2B:59:31:BD:EE:47:99:
62:B8:F2:F4:21:79:B1
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : CB:38:F7:15:89:7C:84:A1:44:5F:5B:C1:DD:FB:C9:6E:
F2:9A:59:CD:47:0A:69:05:85:B0:CB:14:C3:14:58:E7
Timestamp : Mar 4 13:56:20.297 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:4E:DD:36:E2:D6:40:D0:A0:D8:67:02:29:
B4:B1:2C:72:86:A1:98:EE:74:25:39:26:48:40:EA:A6:
14:17:54:E3:02:21:00:C7:2F:00:E6:10:B0:26:F3:61:
8D:FB:6E:93:F3:32:C6:7B:92:EC:4D:EE:ED:58:65:C9:
61:CD:DD:61:EB:AC:F1
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
68:28:5a:8d:85:a6:c3:fc:bd:ff:69:78:07:49:1c:7a:81:ba:
81:05:0e:e1:6b:78:54:9c:83:be:13:a4:dd:87:82:a9:d4:a9:
7e:02:4e:aa:37:0a:ba:9f:70:41:9e:d4:51:07:ee:cb:38:4c:
b2:23:7e:e3:9e:f0:85:5d:de:c1:2f:84:e3:e3:6a:5c:f0:86:
ad:15:bb:e1:52:32:3e:33:98:20:e3:9b:b6:24:3a:b6:55:5c:
76:1f:0f:94:e4:4c:bf:a0:4e:ef:ed:c6:cc:e1:78:b3:d8:d8:
46:9c:5a:6b:3e:7a:57:be:6b:99:44:a0:fc:1e:fc:f6:eb:ee:
58:9b:f7:86:31:cd:6f:52:6c:8a:01:a2:98:c9:79:ed:f6:1d:
30:cb:29:1d:b9:62:ca:e9:0d:ba:58:90:9c:a1:ec:d5:f7:c5:
2b:b8:35:6c:8c:60:fc:eb:94:22:15:9c:21:ec:9c:6e:1d:76:
52:a9:38:d1:e7:be:6f:83:4d:db:9a:8d:0c:82:ea:76:29:f7:
c0:ff:6f:eb:74:64:bf:75:c2:60:cc:d6:81:e3:81:a8:64:bf:
02:22:05:e0:42:0c:de:10:49:ee:74:2e:c7:be:af:f2:01:35:
16:b0:d4:74:75:29:64:21:f4:50:b1:11:38:ee:53:a8:85:bf:
32:a5:f8:3c
Vulnerabilities
46022 /
tcp
134116252 | 2025-02-25T07:47:24.255369
SSH-2.0-OpenSSH_5.1p1 Debian-5
Key type: ssh-rsa
Key: AAAAB3NzaC1yc2EAAAABIwAAAQEApCIOUB7Ddw7o5ScEwYheTG+a0obMJPuUBKvU3H+JQe24mRLN
uMyYNSb9amnFMX4afLi8/gtZAIqw+LZoMij7AGU/I8GP5l5V4bQvMA/8LWDt6gsHcik7Clhg4L/W
N25E6UpSda+dW67Ib3AFL5C5N+JQG034qnIj0tB92PyJWbqMNLia9vb58ATI/bThZtF/BWfj39Di
7fJBEPyyjvBjGtox8WgoQ04O584JTXp+Yhg+z0B85pazyDXsHfH5DbtZ8a3QY++d3UPDR++whiOH
Myx/FJW2NAGfi45iqOmztvPUWJLVIR2ZatMlVSGOqyThhtNMyBtxPIhBESJlR46nxw==
Fingerprint: 9c:3b:9b:74:43:2f:6c:33:70:c0:66:0b:ce:fe:d0:32
Kex Algorithms:
diffie-hellman-group-exchange-sha256
diffie-hellman-group-exchange-sha1
diffie-hellman-group14-sha1
diffie-hellman-group1-sha1
Server Host Key Algorithms:
ssh-rsa
ssh-dss
Encryption Algorithms:
aes128-cbc
3des-cbc
blowfish-cbc
cast128-cbc
arcfour128
arcfour256
arcfour
aes192-cbc
aes256-cbc
rijndael-cbc@lysator.liu.se
aes128-ctr
aes192-ctr
aes256-ctr
MAC Algorithms:
hmac-md5
hmac-sha1
umac-64@openssh.com
hmac-ripemd160
hmac-ripemd160@openssh.com
hmac-sha1-96
hmac-md5-96
Compression Algorithms:
none
zlib@openssh.com