Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
220 ProFTPD 1.3.5 Server (CW) [::ffff:66.154.68.66] 530 Login incorrect. 214-The following commands are recognized (* =>'s unimplemented): 214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV 214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD 214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP 214-NOOP FEAT OPTS AUTH* CCC* CONF* ENC* MIC* 214-PBSZ* PROT* TYPE STRU MODE RETR STOR STOU 214-APPE REST ABOR USER PASS ACCT* REIN* LIST 214-NLST STAT SITE MLSD MLST 214 Direct comments to root@pup1116.conepuppy.com 211-Features: MFF modify;UNIX.group;UNIX.mode; REST STREAM MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.mode*;UNIX.owner*; UTF8 LANG en-US* EPRT EPSV MDTM TVFS MFMT SIZE 211 End
HTTP/1.1 200 OK Date: Wed, 19 Mar 2025 05:33:02 GMT Server: Apache/2.4.10 (Debian) Link: <http://www.livesexonweb.com/wp-json/>; rel="https://api.w.org/" Vary: Accept-Encoding Transfer-Encoding: chunked Content-Type: text/html; charset=UTF-8
NTP protocolversion: 3 stratum: 3 leap: 0 precision: -23 rootdelay: 0.0350494384766 rootdisp: 0.0431976318359 refid: 1120794908 reftime: 3951526839.03 poll: 3
Shodan ® - All rights reserved