Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
220 ProFTPD 1.3.5 Server (CW) [::ffff:66.154.68.12] 530 Login incorrect. 214-The following commands are recognized (* =>'s unimplemented): 214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV 214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD 214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP 214-NOOP FEAT OPTS AUTH* CCC* CONF* ENC* MIC* 214-PBSZ* PROT* TYPE STRU MODE RETR STOR STOU 214-APPE REST ABOR USER PASS ACCT* REIN* LIST 214-NLST STAT SITE MLSD MLST 214 Direct comments to root@pup1116.conepuppy.com 211-Features: MFF modify;UNIX.group;UNIX.mode; REST STREAM MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.mode*;UNIX.owner*; UTF8 LANG en-US* EPRT EPSV MDTM TVFS MFMT SIZE 211 End
HTTP/1.1 200 OK Date: Sun, 23 Mar 2025 05:05:48 GMT Server: Apache/2.4.10 (Debian) Vary: Accept-Encoding Transfer-Encoding: chunked Content-Type: text/html; charset=UTF-8
NTP protocolversion: 3 stratum: 3 leap: 0 precision: -23 rootdelay: 0.0442810058594 rootdisp: 0.0414276123047 refid: 395716986 reftime: 3952212487.29 poll: 3
SNMP: Versions: 3 Engine Boots: 272 Engineid Data: 80001f888079f6920b0702e55800000000 Enterprise: 8072 Engine Time: 18 days, 21:46:07
Shodan ® - All rights reserved