21 /
tcp
-731446038 | 2025-03-27T13:53:52.721713
220 NASFTPD Turbo station 1.3.5a Server (ProFTPD) [192.168.0.232]
530 Login incorrect.
214-The following commands are recognized (* =>'s unimplemented):
CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV
EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD
XRMD MKD XMKD PWD XPWD SIZE SYST HELP
NOOP FEAT OPTS AUTH CCC* CONF* ENC* MIC*
PBSZ PROT TYPE STRU MODE RETR STOR STOU
APPE REST ABOR USER PASS ACCT* REIN* LIST
NLST STAT SITE MLSD MLST
214 Direct comments to root@192.168.0.232
211-Features:
UTF8
LANG en-US*
EPRT
EPSV
MDTM
SSCN
TVFS
MFMT
SIZE
PROT
CCC
PBSZ
AUTH TLS
MFF modify;UNIX.group;UNIX.mode;
REST STREAM
MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.mode*;UNIX.owner*;
211 End
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
bc:e6:53:d0:d4:3e:bd:a6
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=DE, O=Fujitsu Technology Solutions GmbH., CN=Fujitsu CELVIN(R) NAS Server
Validity
Not Before: Mar 11 10:51:53 2016 GMT
Not After : Mar 9 10:51:53 2026 GMT
Subject: C=DE, O=Fujitsu Technology Solutions GmbH., CN=Fujitsu CELVIN(R) NAS Server
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:c0:cd:54:d9:68:8b:ff:6f:c9:da:97:9a:64:1d:
0b:d9:1b:e2:5f:75:20:bc:ae:c1:02:56:25:c1:6a:
7c:22:d8:80:84:e8:62:77:d0:1c:1e:a1:a9:4e:1d:
52:b3:59:c2:90:e3:64:d6:27:8f:79:14:cb:0f:fa:
ea:85:9b:6b:3a:dc:04:98:58:f6:29:cf:85:f8:84:
61:1f:fe:59:14:1a:e8:2d:13:e1:d0:d6:46:fc:72:
15:36:b6:92:0d:fd:3d:df:38:fd:7b:b8:2d:45:50:
18:06:a8:c8:6f:0c:0e:b9:06:d3:f8:7c:27:a5:6e:
93:3f:2a:ff:df:b9:78:54:05:d9:6e:4a:de:54:d2:
64:7f:ec:3b:f1:8f:06:b2:b7:ad:c8:72:34:fd:b0:
6d:13:46:45:9c:e6:03:70:9d:56:69:e3:27:de:67:
4a:1c:60:16:5b:dc:32:fb:e3:d1:11:ea:56:1f:3d:
8b:68:a4:ce:30:09:27:22:38:4c:f9:69:81:d2:03:
0f:dc:db:0f:2e:9a:43:40:ba:75:7a:00:46:0d:ff:
e4:01:b9:29:87:97:ed:03:28:dc:b9:01:02:77:98:
2f:16:75:8e:ca:2c:ed:ce:1d:c8:b5:b6:2e:33:6c:
5f:73:e4:27:fa:5d:5b:04:93:b7:5e:1e:91:e4:c5:
df:e1
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
FF:06:30:64:81:B8:90:AA:32:C5:0E:EF:1F:AF:07:02:AF:02:2D:10
X509v3 Authority Key Identifier:
keyid:FF:06:30:64:81:B8:90:AA:32:C5:0E:EF:1F:AF:07:02:AF:02:2D:10
DirName:/C=DE/O=Fujitsu Technology Solutions GmbH./CN=Fujitsu CELVIN(R) NAS Server
serial:BC:E6:53:D0:D4:3E:BD:A6
X509v3 Basic Constraints:
CA:TRUE
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
7c:d3:d9:a4:be:45:15:58:6e:ed:ce:7e:4a:d9:d4:74:37:ba:
22:13:ab:94:fb:b2:e5:32:b0:50:4d:ab:b1:e9:d5:6b:2a:bd:
d9:6f:2a:63:7b:d9:07:39:fc:b5:63:98:ec:20:39:85:35:58:
ec:73:35:5c:06:80:bf:6f:7c:94:1c:2d:42:d1:ea:b4:73:94:
33:7a:2a:ca:e4:37:5e:d9:63:25:e2:0d:11:b3:9c:f0:99:ff:
7b:34:d4:fe:09:6d:8f:3a:ce:b8:e3:b6:bd:72:9d:04:c3:a3:
a6:b0:bb:61:69:d3:71:15:9f:8f:1d:c9:e1:0d:26:57:c6:d4:
27:87:59:cd:43:3c:a5:39:5f:07:aa:85:20:e4:51:ee:a2:bc:
2d:cf:b6:87:9b:94:68:d3:9f:56:72:31:47:8b:f1:de:99:ac:
0c:1c:85:60:52:d6:5d:50:07:ae:21:0a:4d:66:51:9f:e6:8d:
b9:d1:8d:c6:e9:dd:9d:3f:bb:17:f1:79:62:8e:f0:3b:b5:72:
67:b0:1c:dd:e0:d7:26:be:ed:dd:8d:ab:72:33:65:35:ae:be:
49:3b:56:f6:43:50:88:0f:bc:7f:ef:3c:f5:28:dd:c0:a3:b8:
f9:ca:7f:e6:9f:c5:d1:ea:c2:eb:63:0d:de:97:bd:80:d5:8f:
2f:12:36:51
22 /
tcp
-2114737926 | 2025-03-21T20:37:44.759309
SSH-2.0-OpenSSH_7.9
Key type: ssh-rsa
Key: AAAAB3NzaC1yc2EAAAADAQABAAABAQDMEkNScm5o2mXO+pemoKtN5+41nJIfKWrFIpxdJ4ZzKIDI
/e+MN/GbuXNeeJVzFrG+0/OakXTz1woQctqT5sKb42zmnz1JV4GBk/JzS1s651dhIu4a77+RZW1z
YCFgLG47ohgVIy10WnwUiJNc5cbjLyoWHGlrfNfXeavoPPbv7W3UXA96L929kCxGWX4kZ+5wMFcJ
XgvLE55nxraLbRMWHNe8C0clDzSdlm1I1HiOPXBxOwZVi7wsD7ygakkOJFS9wSpLT1/ivowGg0s4
kbREquq+uIVJEssboCxBm6vDtpTNu7wxxCkI+drF+jfy/OQeCScMhR13P6e7h2JK3pVZ
Fingerprint: 83:81:4e:42:b0:a5:49:e4:e3:78:11:e4:ef:74:4f:92
Kex Algorithms:
curve25519-sha256
curve25519-sha256@libssh.org
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-exchange-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
diffie-hellman-group14-sha256
diffie-hellman-group14-sha1
Server Host Key Algorithms:
rsa-sha2-512
rsa-sha2-256
ssh-rsa
ecdsa-sha2-nistp256
ssh-ed25519
Encryption Algorithms:
chacha20-poly1305@openssh.com
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
MAC Algorithms:
umac-64-etm@openssh.com
umac-128-etm@openssh.com
hmac-sha2-256-etm@openssh.com
hmac-sha2-512-etm@openssh.com
hmac-sha1-etm@openssh.com
umac-64@openssh.com
umac-128@openssh.com
hmac-sha2-256
hmac-sha2-512
hmac-sha1
Compression Algorithms:
none
zlib@openssh.com
Vulnerabilities
-1936278512 | 2025-03-19T10:54:23.031931
HTTP/1.1 590
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/8.5
Set-Cookie: ASP.NET_SessionId=altcpziawdezmwdped3hek5f; path=/; HttpOnly; SameSite=Lax
X-Powered-By: ASP.NET
Date: Wed, 19 Mar 2025 10:54:06 GMT
Content-Length: 7366
Vulnerabilities
88 /
udp
1933922257 | 2025-03-26T15:31:01.998285
MIT Kerberos
Version: 1.3 - 1.8
Server Time: 2025-03-26 15:03:17Z
1489525118 | 2025-03-31T20:54:28.029936
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Date: Mon, 31 Mar 2025 20:54:28 GMT
Connection: close
Content-Length: 315
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
03:a3:a3:2e:84:68:d7:25:38:a2:9f:f8:5b:18:31:cc:bf:9a
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, O=Let's Encrypt, CN=R11
Validity
Not Before: Feb 15 07:42:20 2025 GMT
Not After : May 16 07:42:19 2025 GMT
Subject: CN=www.amesspoke.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (3072 bit)
Modulus:
00:bb:b5:16:a2:b0:8f:86:b9:6e:ef:cd:1e:b1:21:
aa:5c:1d:3c:b1:21:58:32:df:e8:ad:8f:29:63:42:
ac:9b:b0:7a:73:73:11:02:96:25:48:a0:b6:f3:aa:
81:7e:ff:4a:59:8c:c0:e7:05:09:00:c3:ac:89:c8:
f5:32:3c:90:3e:b3:9b:9d:ab:0f:1e:6a:29:9b:57:
80:86:54:db:d8:4b:35:0a:83:a4:f9:6a:08:91:7b:
a1:fb:44:32:92:09:8e:c0:78:0d:4d:eb:32:80:22:
bc:e8:08:51:37:b1:f6:2a:92:78:8a:89:d0:16:5b:
ae:cf:99:82:39:2c:b8:03:e4:20:8b:95:d7:d4:15:
c9:6f:b3:11:df:e3:ed:16:38:a6:ff:24:43:d8:50:
1a:43:eb:2f:66:d4:54:db:5e:82:53:25:4f:a2:93:
98:b0:88:51:b6:43:c5:19:30:00:e6:0f:b8:23:f6:
3c:00:21:91:f7:8c:04:bc:5a:28:59:85:1b:4e:1a:
04:71:4b:fb:8e:e0:b3:af:42:b5:66:d1:2a:13:b3:
22:33:1e:e7:29:4f:65:80:7a:7c:01:9a:81:d4:a5:
5a:50:5f:7a:39:c9:96:0e:12:b8:b2:c1:59:b6:7e:
f3:32:fc:14:ba:a3:cb:12:49:77:de:90:b5:4c:33:
f2:7b:ab:d7:b0:ce:7d:01:09:d5:7f:ef:1c:b6:62:
3b:3e:9e:a1:a9:f7:72:fd:f2:d8:12:99:09:75:2c:
73:21:2c:ab:4d:f3:e7:65:0a:2c:61:14:0c:d7:68:
b2:4b:98:85:47:96:05:d5:fc:07:67:a5:91:84:f3:
2a:08:76:ea:01:92:84:2a:30:6a:b1:60:55:61:04:
58:58:97:82:ec:07:eb:b0:a5:0e:42:9e:6d:c3:c8:
27:f3:7c:15:e0:38:ee:5e:31:18:07:77:f7:60:8a:
c4:a8:a8:1b:b8:77:a9:98:c5:2f:66:7e:7f:3f:5d:
a5:fc:e6:62:a8:b9:47:8e:6f:f9
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
31:59:83:14:A0:26:44:0F:EF:1E:63:14:82:E2:4D:DC:2D:A2:5B:AD
X509v3 Authority Key Identifier:
C5:CF:46:A4:EA:F4:C3:C0:7A:6C:95:C4:2D:B0:5E:92:2F:26:E3:B9
Authority Information Access:
OCSP - URI:http://r11.o.lencr.org
CA Issuers - URI:http://r11.i.lencr.org/
X509v3 Subject Alternative Name:
DNS:amesspoke.com, DNS:helpdesk.amesspoke.com, DNS:www.amesspoke.com
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 7D:59:1E:12:E1:78:2A:7B:1C:61:67:7C:5E:FD:F8:D0:
87:5C:14:A0:4E:95:9E:B9:03:2F:D9:0E:8C:2E:79:B8
Timestamp : Feb 15 08:40:51.038 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:55:DF:95:FD:D4:DF:4A:E0:D9:49:EB:B3:
54:B9:EA:37:C8:AC:B4:82:18:68:FE:A4:6C:BF:28:D7:
F0:30:F5:8C:02:21:00:E8:F9:17:8D:5A:17:29:F1:7B:
C6:59:FB:82:F5:68:73:B4:5F:8E:3B:24:D4:AC:D3:DF:
BD:FE:60:7A:7E:F6:5B
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:
D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7
Timestamp : Feb 15 08:40:51.045 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:28:7D:4A:B7:32:02:33:10:77:DD:DD:AA:
59:9F:68:50:B3:20:35:A2:B7:72:15:84:E2:9B:EE:6B:
9C:CA:F4:CD:02:21:00:B9:32:9C:CA:FE:A6:F7:3F:74:
F3:02:2C:6D:5A:38:59:CD:E7:C8:23:C7:0A:0F:ED:59:
76:A2:5F:C2:BA:0B:E8
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
a7:4e:57:e8:cb:4e:05:bd:84:e3:1c:31:c6:7d:98:ea:69:13:
fb:0d:99:13:37:3b:0b:07:1c:1f:14:b3:8c:9c:83:8a:f6:4d:
49:3e:bb:c0:d7:1d:3d:b2:d1:df:95:8d:8c:bf:69:9a:f2:5d:
29:7a:34:b7:7f:40:7c:30:d5:bf:38:f0:b4:9b:27:39:d5:ee:
a2:c7:91:35:a6:c6:1e:18:be:fa:79:76:b2:54:88:e3:1d:77:
e3:c3:71:30:0d:b7:ea:0e:36:4d:7b:19:cc:eb:24:46:41:90:
44:1b:ec:2d:6b:fb:5b:a0:1d:ae:c7:c9:97:14:36:10:0b:d7:
f1:66:1d:51:39:1c:a1:f4:67:f8:f6:a1:9f:87:5d:f4:18:49:
9c:17:16:8f:9f:f6:8a:17:1b:4f:0a:58:ff:a6:eb:c0:c2:d9:
45:60:f4:63:36:91:c8:fe:2b:69:a1:12:91:fb:0c:6c:2c:95:
53:59:f7:c9:60:6e:f8:8a:38:37:75:bf:ee:06:c8:98:59:4d:
fa:99:6f:85:19:b5:0e:dd:7d:90:db:18:6c:56:54:f4:97:b6:
f0:60:35:4e:5b:15:94:ee:74:a7:25:b0:d1:98:04:7c:80:9a:
06:ae:1f:cd:c1:3f:76:70:f0:57:44:51:bc:e2:68:f8:a3:ce:
30:48:09:b9
1723 /
tcp
261189147 | 2025-03-26T23:03:38.322686
PPTP:
Firmware: 1
Hostname: local
Vendor: linux
6379 /
tcp
-77649157 | 2025-03-27T14:43:34.078452
-DENIED Redis is running in protected mode because protected mode is enabled, no bind address was specified, no authentication password is requested to clients. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Setup a bind address or an authentication password. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.
1138219898 | 2025-03-31T13:39:25.789391
HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sat, 15 Nov 2014 18:47:38 GMT
Accept-Ranges: bytes
ETag: "91c4aca041d01:0"
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Date: Mon, 31 Mar 2025 13:39:12 GMT
Content-Length: 701
Vulnerabilities
0 | 2025-03-31T09:48:39.740488
HTTP/1.1 404 Not Found
Transfer-Encoding: chunked
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
Date: Mon, 31 Mar 2025 09:48:47 GMT
Vulnerabilities