-195102046 | 2024-12-06T17:29:44.172699
22 /
tcp
SSH-2.0-OpenSSH_8.4p1 Debian-5+deb11u3
Key type: ssh-rsa
Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDPNFoZjVgnv1f9UqrGGzM95LLTb8/qfSsrHacx7gZejDX4
oFYaQk5XrurkbFmQjJqTOYCC7B/5Ckj382gSDkx/K6PD1ZMq3LF/B8TBp/jm+q/5dfFoXh2kxUbv
IerCGcibXf/Z7gVxmBJCD4efepPB3B/XJBnWvP82dbbJ6LrO3tkQjf0MGGiRQA4go04aH0xqlhsl
aNoJNzjdSbh92LflcZCq/Dfe2Muqc8rQCWvenUKaDc/HLd9D31QUPXk99UqacE1OBxKK+Bkx1At0
SfeybnnVMVQQWD+t1PiB2FMmTCBRiAZ+IAXm3zHu8dJtnGhstxhsY4YP+fhx13PjR1TWb07MKd71
gWe+EpKV9mXi5zqHh5UdJPolpM1kPeVSwG6v09iAmzcX+uAzmmurdv32DgYTtrKe1KwgUlyW9dDU
Q1Mp1jdbz3arW/nqb+5Khdj7fACe55lUZLGLiZflxmEQ5FEels+OHy3H4YNo1hMjqrMLAuyQoDB6
VytNQ6x1A8U=
Fingerprint: 5c:9a:e3:36:0e:e9:a0:36:94:ff:75:2e:b6:16:50:5c
Kex Algorithms:
curve25519-sha256
curve25519-sha256@libssh.org
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-exchange-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
diffie-hellman-group14-sha256
kex-strict-s-v00@openssh.com
Server Host Key Algorithms:
rsa-sha2-512
rsa-sha2-256
ssh-rsa
ecdsa-sha2-nistp256
ssh-ed25519
Encryption Algorithms:
chacha20-poly1305@openssh.com
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
MAC Algorithms:
umac-64-etm@openssh.com
umac-128-etm@openssh.com
hmac-sha2-256-etm@openssh.com
hmac-sha2-512-etm@openssh.com
hmac-sha1-etm@openssh.com
umac-64@openssh.com
umac-128@openssh.com
hmac-sha2-256
hmac-sha2-512
hmac-sha1
Compression Algorithms:
none
zlib@openssh.com
-567627901 | 2024-12-19T02:22:47.983152
80 /
tcp
HTTP/1.1 200 OK
Server: nginx/1.18.0
Date: Thu, 19 Dec 2024 02:22:47 GMT
Content-Type: text/html
Content-Length: 10701
Last-Modified: Wed, 20 Apr 2022 19:27:29 GMT
Connection: keep-alive
ETag: "62605ea1-29cd"
Accept-Ranges: bytes
-149459230 | 2024-12-21T13:45:44.816639
443 /
tcp
HTTP/1.1 403 Forbidden
Server: nginx/1.18.0
Date: Sat, 21 Dec 2024 13:45:44 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 278
Connection: keep-alive
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
03:04:50:01:6c:4e:2e:5b:aa:82:cd:e1:73:3b:bd:0e:e4:aa
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, O=Let's Encrypt, CN=R10
Validity
Not Before: Dec 13 15:11:06 2024 GMT
Not After : Mar 13 15:11:05 2025 GMT
Subject: CN=dev.awcn.biz
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:c4:44:ad:8b:df:4e:2a:fb:d2:de:3a:bf:f1:d5:
9a:65:47:b1:bd:6b:cd:c7:c5:6d:77:78:25:5e:55:
9f:3c:7b:a2:aa:6a:06:17:f0:f3:16:22:cf:cb:bb:
1d:32:b9:79:44:88:26:32:05:b2:e9:31:66:7c:30:
1f:da:59:2b:b7:09:e0:ce:a7:4c:59:ac:38:38:f3:
88:a5:1c:83:58:66:ce:4b:49:3c:2b:a1:59:50:e7:
61:b8:c6:f9:be:02:dd:bb:37:19:42:18:a0:e3:65:
25:e6:7e:8e:31:7e:a8:a8:bf:49:af:9a:40:65:97:
28:34:a4:c0:b6:46:34:fd:04:36:d4:e0:8c:55:92:
be:27:85:5a:7c:85:4f:28:00:7e:db:34:4a:99:0e:
1f:d8:aa:46:52:cc:6a:af:74:fd:76:93:fd:82:9b:
c7:55:4e:06:07:2e:0b:35:32:76:53:28:00:2e:c2:
8a:7d:28:96:24:79:15:1d:24:df:ee:5e:43:1f:e9:
d6:30:5b:8e:1a:8b:91:9a:5c:a4:47:c8:8a:a4:66:
9f:cb:41:5f:c5:3c:ca:a4:58:04:5c:8c:c5:c4:ca:
bf:b8:0c:23:a8:52:10:a3:9a:6e:ea:ca:b5:fa:25:
ea:9e:5a:f1:36:98:69:cb:3f:32:13:4c:d5:d7:e1:
96:6d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Subject Key Identifier:
15:FB:6C:9F:AB:89:42:38:6B:A0:D1:CA:30:31:F8:2E:97:BF:F7:D0
X509v3 Authority Key Identifier:
BB:BC:C3:47:A5:E4:BC:A9:C6:C3:A4:72:0C:10:8D:A2:35:E1:C8:E8
Authority Information Access:
OCSP - URI:http://r10.o.lencr.org
CA Issuers - URI:http://r10.i.lencr.org/
X509v3 Subject Alternative Name:
DNS:dev.awcn.biz
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.1
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:
D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7
Timestamp : Dec 13 16:09:36.492 2024 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:F9:07:A1:05:19:A2:DC:A7:A1:37:19:
4F:2C:CC:2D:C8:FF:80:91:1A:2C:AA:AE:B8:58:0D:F5:
19:F1:9F:37:31:02:20:53:CB:95:E5:BC:B1:97:4B:32:
6F:5A:67:1B:1E:B5:55:CD:82:C0:53:F7:07:85:97:DD:
77:42:19:F2:64:05:B8
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
Timestamp : Dec 13 16:09:36.508 2024 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:46:02:21:00:E1:FF:15:7B:9E:4F:59:E5:E3:1F:32:
0E:A4:F6:A1:5B:FB:D3:01:00:81:B4:AD:10:F0:A2:AB:
08:D6:01:AE:2A:02:21:00:A0:6E:1E:07:5B:4F:23:F2:
72:46:7A:75:E8:44:72:FA:D4:14:F7:E6:16:7C:AF:6E:
B6:F2:B6:52:C9:53:4E:1C
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
c4:fd:70:c6:01:65:7f:61:3d:ed:5a:4a:c9:94:b3:18:f8:05:
e8:64:2f:14:bc:af:1f:4b:e8:e2:f2:06:d5:f8:09:43:ef:dd:
99:aa:7c:5d:88:91:c5:4d:7d:30:2f:bb:93:be:ae:a5:dd:4b:
fa:88:45:50:98:8e:c4:8a:8a:10:56:01:88:3e:49:28:af:de:
b9:6f:2e:34:a7:04:83:ba:95:42:18:d5:2c:b3:16:e3:4c:6b:
0e:91:1a:fa:c3:75:71:53:47:3e:ad:ea:a2:46:a1:79:d9:4e:
c4:0f:4d:ae:fb:2b:49:01:85:27:8f:53:1f:9e:3b:4a:92:22:
69:0a:32:4d:1f:2e:ba:0f:66:1e:0b:10:0e:03:6b:8e:7f:1f:
a1:ae:9f:00:d8:70:b5:2e:37:61:30:59:6a:38:d0:57:ae:aa:
64:10:dd:94:d0:72:da:50:8e:2b:13:9c:d3:c2:dc:31:3b:a1:
76:9f:90:2f:d2:7a:38:54:b8:8e:92:ba:42:82:f5:5b:6b:d0:
98:01:61:12:f2:e6:60:45:51:dd:43:53:b6:fb:35:ea:c9:06:
12:c9:51:a0:e1:ff:08:87:ec:ab:a0:64:9c:07:5f:4b:c1:63:
0f:b5:be:8a:ee:30:b4:0f:af:77:64:0b:39:f5:85:43:91:9c:
ac:a9:75:e4
-77649157 | 2024-12-18T20:35:23.451054
6379 /
tcp
-DENIED Redis is running in protected mode because protected mode is enabled, no bind address was specified, no authentication password is requested to clients. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Setup a bind address or an authentication password. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.
-567627901 | 2024-12-20T14:43:27.631556
8000 /
tcp
HTTP/1.1 200 OK
Date: Fri, 20 Dec 2024 14:43:27 GMT
Server: Apache/2.4.62 (Debian)
Last-Modified: Wed, 20 Apr 2022 19:27:29 GMT
ETag: "29cd-5dd1afbf9cc7f"
Accept-Ranges: bytes
Content-Length: 10701
Vary: Accept-Encoding
Content-Type: text/html