865913883 | 2024-10-15T02:01:08.271743
80 /
tcp
HTTP/1.1 200 OK
Date: Tue, 15 Oct 2024 02:01:08 GMT
Content-Length: 1483
Connection: keep-alive
Content-Type: text/html
Cache-Control: private, no-cache, no-store, must-revalidate, max-age=0
Server: imunify360-webshield/1.21
1291749518 | 2024-11-02T19:18:28.279778
443 /
tcp
HTTP/1.1 200 OK
Connection: Keep-Alive
Keep-Alive: timeout=5, max=100
x-powered-by: PHP/8.3.12
content-type: text/html; charset=UTF-8
content-length: 0
date: Sat, 02 Nov 2024 19:18:28 GMT
server: LiteSpeed
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2622166863 (0x9c4b174f)
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=pehost1.net
Validity
Not Before: Aug 20 08:55:09 2021 GMT
Not After : Aug 20 08:55:09 2022 GMT
Subject: CN=pehost1.net
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:e1:0f:f1:29:be:ef:82:be:e3:9d:6a:37:de:42:
90:be:4e:4f:9c:51:be:59:32:b3:a7:2f:66:16:d4:
d3:49:7a:0e:2d:70:fa:e8:14:46:7c:42:81:f0:b9:
a6:84:81:18:01:7e:c1:f7:ce:41:5a:33:79:e5:58:
92:68:35:bf:1a:7f:d1:65:4f:b0:fe:83:94:10:b3:
b1:aa:d9:d6:62:a6:0a:76:87:dd:ca:69:80:8a:48:
a5:6c:b7:d7:2f:3c:18:a2:72:25:f7:d3:03:bf:7a:
f8:ad:d7:28:a2:8f:45:ea:6f:5b:a2:f7:ea:92:b4:
cd:db:5a:0b:b8:f8:27:a2:36:11:d4:17:e3:64:97:
d7:65:3d:48:0d:85:b8:13:34:b6:89:5c:03:7f:ce:
fd:ab:82:d2:20:4f:72:9c:e4:6b:77:59:7a:3d:9d:
fd:bd:9f:fc:79:50:b3:05:1f:6a:72:bc:bc:6c:e4:
6d:55:40:ac:49:64:42:10:5a:e4:f9:40:ea:b4:0f:
ac:48:95:7c:53:2a:cd:4f:b0:88:ce:73:ab:a4:fb:
03:8c:d7:8f:49:5a:7d:ea:92:6a:da:1e:40:96:8b:
97:7d:83:f7:57:90:ff:fb:2d:b9:14:fb:15:d4:e1:
cf:55:6b:55:7f:9d:62:78:54:20:f9:f8:02:40:88:
05:0f
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
78:21:83:A2:48:BB:D0:8C:E1:4E:10:5D:10:69:F1:DB:EE:C4:AD:E9
X509v3 Basic Constraints:
CA:FALSE
X509v3 Authority Key Identifier:
keyid:78:21:83:A2:48:BB:D0:8C:E1:4E:10:5D:10:69:F1:DB:EE:C4:AD:E9
DirName:/CN=pehost1.net
serial:9C:4B:17:4F
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Subject Alternative Name:
DNS:pehost1.net, DNS:mail.pehost1.net, DNS:www.pehost1.net, DNS:cpanel.pehost1.net, DNS:webmail.pehost1.net, DNS:webdisk.pehost1.net, DNS:cpcontacts.pehost1.net, DNS:cpcalendars.pehost1.net, DNS:autodiscover.pehost1.net
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
74:79:db:de:57:a6:d6:62:96:cd:0d:20:a6:93:7e:f4:98:4d:
70:ba:6f:de:90:16:87:0e:3d:a1:5a:5b:4f:46:f5:a1:dc:56:
aa:31:85:58:e9:aa:a0:cd:9f:f9:cf:19:89:35:b0:97:59:7c:
68:96:63:ee:e0:be:af:00:65:56:9c:bb:e1:54:fc:71:06:9c:
46:52:4b:7c:ed:cd:a5:12:33:3a:21:26:de:13:85:9e:33:4e:
e4:1a:d9:3d:19:01:b1:6c:60:9c:49:27:34:0d:51:39:ec:55:
b9:e2:d2:9f:43:d9:e9:8e:2b:fa:dd:bc:a5:4a:22:d4:44:3a:
86:35:f1:d0:22:80:c1:5a:7a:b4:c5:6f:b6:a5:3e:1f:99:27:
58:ba:ab:32:f1:a3:4f:b3:db:d3:9b:2c:e0:0e:e4:77:b4:00:
6c:a0:fd:9a:d3:98:b0:b7:11:f0:23:4a:74:f6:3d:c4:3c:3b:
af:b2:64:c6:68:42:68:79:64:35:91:15:37:51:c3:75:69:16:
fb:b7:f6:c1:64:36:b5:5c:e8:97:0e:0c:01:b5:fa:1d:25:63:
1f:10:8c:93:32:fb:24:e7:a0:fe:53:70:f6:84:42:0e:09:bd:
98:6b:c8:5a:00:3c:82:e0:81:c7:da:00:e1:20:a6:6a:e7:45:
2e:1f:40:42
-650359108 | 2024-10-12T23:21:12.045848
2079 /
tcp
HTTP/1.1 302 Moved
Date: Sat, 12 Oct 2024 23:21:11 GMT
Server: cPanel
Persistent-Auth: false
Host: 79.98.104.68:2079
Connection: close
Location: https://jump07.jump.bg:2080/
X-Redirect-Reason: requiressl
110553246 | 2024-10-08T15:33:40.941437
2082 /
tcp
HTTP/1.1 403 Forbidden
Date: Tue, 08 Oct 2024 15:33:40 GMT
Content-Type: text/html
Content-Length: 552
Connection: keep-alive
Server: imunify360-webshield/1.21
-642628153 | 2024-10-22T02:34:13.233758
2096 /
tcp
HTTP/1.1 301 Moved
Content-length: 111
Location: https://jump07.jump.bg:2096
Content-type: text/html; charset="utf-8"
Cache-Control: no-cache, no-store, must-revalidate, private
Pragma: no-cache
-77649157 | 2024-10-27T12:24:46.332333
6379 /
tcp
-DENIED Redis is running in protected mode because protected mode is enabled, no bind address was specified, no authentication password is requested to clients. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Setup a bind address or an authentication password. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.