1821699 results across 2776579 hosts

22
tcp
ssh
OpenSSH8.2p1 Ubuntu 4ubuntu0.1Ubuntu Linux; protocol 2.0

product: OpenSSH version: 8.2p1 Ubuntu 4ubuntu0.1 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
80
tcp
http
Node.js Express framework

product: Node.js Express framework

http-title
Live | STEAM for Vietnam

206.189.162.96

Open Ports
22, 80, 111, 4001, 4002, 4004, 8080, 8500, 8600
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.4protocol 2.0

product: OpenSSH version: 7.4 extrainfo: protocol 2.0

ssh-auth-methods
  Supported authentication methods: 
    publickey
    gssapi-keyex
    gssapi-with-mic
    password
ssh-hostkey
  2048 8d:0f:ac:dd:4c:34:47:4a:fd:a0:74:61:a0:32:a9:3b (RSA)
  256 bb:00:96:90:2c:b5:7b:19:f5:55:cc:a2:6f:ec:d8:8a (ECDSA)
  256 f4:e0:13:19:99:66:c0:8e:40:d5:6f:34:8f:b9:2e:f3 (EdDSA)
80
tcp
http
nginx1.19.3

product: nginx version: 1.19.3

http-server-header
nginx/1.19.3
http-title
Site doesn't have a title (text/html;charset=utf-8).
111
tcp
rpcbind
2-4RPC #100000

version: 2-4 extrainfo: RPC #100000

rpcinfo
  program version   port/proto  service
  100000  2,3,4        111/tcp  rpcbind
  100000  2,3,4        111/udp  rpcbind
4001
tcp
http
nginx1.19.3

product: nginx version: 1.19.3

http-server-header
nginx/1.19.3
http-title
SecurityModule
4002
tcp
http
nginx1.19.3

product: nginx version: 1.19.3

http-server-header
nginx/1.19.3
http-title
WebMerchantAcquirerModule
4004
tcp
http
nginx1.19.3

product: nginx version: 1.19.3

http-server-header
nginx/1.19.3
http-title
Menu Module
8080
tcp
rtsp
fingerprint-strings
  GetRequest: 
    HTTP/1.0 503 Service Unavailable
    Content-Type: application/json;charset=UTF-8
    Content-Length: 156
    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
    Pragma: no-cache
    Expires: 0
    X-Content-Type-Options: nosniff
    X-Frame-Options: DENY
    X-XSS-Protection: 1 ; mode=block
    Referrer-Policy: no-referrer
    set-cookie: XSRF-TOKEN=f8ee0b41-d620-409a-94d2-f379f1df2402; Path=/
    {"timestamp":"2021-01-27T17:33:47.141+0000","path":"/","status":503,"error":"Service Unavailable","message":"Unable to find instance for ms-service-portal"}
  HTTPOptions: 
    HTTP/1.0 503 Service Unavailable
    Content-Type: application/json;charset=UTF-8
    Content-Length: 156
    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
    Pragma: no-cache
    Expires: 0
    X-Content-Type-Options: nosniff
    X-Frame-Options: DENY
    X-XSS-Protection: 1 ; mode=block
    Referrer-Policy: no-referrer
    set-cookie: XSRF-TOKEN=451400a9-5e03-4647-9ecf-dcce3d972b85; Path=/
    {"timestamp":"2021-01-27T17:33:47.284+0000","path":"/","status":503,"error":"Service Unavailable","message":"Unable to find instance for ms-service-portal"}
  RTSPRequest: 
    RTSP/1.0 503 Service Unavailable
    Content-Type: application/json;charset=UTF-8
    Content-Length: 156
    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
    Pragma: no-cache
    Expires: 0
    X-Content-Type-Options: nosniff
    X-Frame-Options: DENY
    X-XSS-Protection: 1 ; mode=block
    Referrer-Policy: no-referrer
    set-cookie: XSRF-TOKEN=3e5923af-a715-46e4-b9be-ee94e27e294f; Path=/
    {"timestamp":"2021-01-27T17:33:47.426+0000","path":"/","status":503,"error":"Service Unavailable","message":"Unable to find instance for ms-service-portal"}
http-title
Site doesn't have a title (application/json;charset=UTF-8).
rtsp-methods
ERROR: Script execution failed (use -d to debug)
8500
tcp
daap
mt-daapd DAAP

product: mt-daapd DAAP

8600
tcp
tcpwrapped

159.65.91.74

Open Ports
22, 80, 443
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.4protocol 2.0

product: OpenSSH version: 7.4 extrainfo: protocol 2.0

ssh-auth-methods
  Supported authentication methods: 
    publickey
    gssapi-keyex
    gssapi-with-mic
ssh-hostkey
  2048 46:93:c9:e6:45:3d:71:cc:e8:66:8b:5c:a5:08:2a:13 (RSA)
  256 fe:79:36:b0:65:b6:90:bc:36:47:6d:b2:64:f5:5c:2d (ECDSA)
  256 b0:61:66:24:7b:be:88:a3:bf:27:69:92:34:0b:a3:0b (EdDSA)
80
tcp
http
Apache httpd2.4.6(CentOS) OpenSSL/1.0.2k-fips PHP/7.1.14

product: Apache httpd version: 2.4.6 extrainfo: (CentOS) OpenSSL/1.0.2k-fips PHP/7.1.14

http-server-header
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.1.14
http-title
Did not follow redirect to https://159.65.91.74/
443
tcp
http
Apache httpd2.4.6(CentOS) OpenSSL/1.0.2k-fips PHP/7.1.14

product: Apache httpd version: 2.4.6 extrainfo: (CentOS) OpenSSL/1.0.2k-fips PHP/7.1.14

http-server-header
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.1.14
http-title
LemuriaHR
ssl-cert
Subject: commonName=lemuriahq.com
Subject Alternative Name: DNS:app.lemuriahq.com, DNS:lemuriahq.com
Not valid before: 2020-11-16T13:21:12
Not valid after:  2021-02-14T13:21:12
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  least strength: C

159.65.240.33

Open Ports
80, 443
Tags
Digital Ocean AS14061
80
tcp
http
Flywheel/4.1.0

product: Flywheel/4.1.0

fingerprint-strings
  FourOhFourRequest: 
    HTTP/1.1 479 Unknown HTTP Status
    Date: Wed, 27 Jan 2021 17:32:13 GMT
    Content-Type: text/html
    Content-Length: 48096
    ETag: "5ab948ac-bbe0"
    X-FW-Server: Flywheel/4.1.0
    Server: Flywheel/4.1.0
    X-Cacheable: NO:Not Cacheable
    X-FW-Serve: TRUE
    X-Cache: MISS
    X-FW-Static: NO
    X-FW-Type: FLYWHEEL_BOT
    Connection: close
    <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
    <html>
    <head>
    <title>Flywheel - Unknown Domain</title>
    <meta name="viewport" content="width=device-width, initial-scale=1.0; maximum-scale=1.0, user-scalable=no" />
    <meta name="description" content="Flywheel is managed WordPress hosting built for designers and creative agencies. Build, scale, and managed hundreds of WP sites with ease on Flywheel.">
    <meta http-equiv="content-type" content="text/html; charset=UTF-8" />
    <style>
    html { -moz-osx-font-smoo
  GetRequest: 
    HTTP/1.1 479 Unknown HTTP Status
    Date: Wed, 27 Jan 2021 17:32:08 GMT
    Content-Type: text/html
    Content-Length: 48096
    ETag: "5ab948ac-bbe0"
    X-FW-Server: Flywheel/4.1.0
    Server: Flywheel/4.1.0
    X-Cacheable: NO:Not Cacheable
    X-FW-Serve: TRUE
    X-Cache: MISS
    X-FW-Static: NO
    X-FW-Type: FLYWHEEL_BOT
    Connection: close
    <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
    <html>
    <head>
    <title>Flywheel - Unknown Domain</title>
    <meta name="viewport" content="width=device-width, initial-scale=1.0; maximum-scale=1.0, user-scalable=no" />
    <meta name="description" content="Flywheel is managed WordPress hosting built for designers and creative agencies. Build, scale, and managed hundreds of WP sites with ease on Flywheel.">
    <meta http-equiv="content-type" content="text/html; charset=UTF-8" />
    <style>
    html { -moz-osx-font-smoo
  HTTPOptions: 
    HTTP/1.1 405 Not Allowed
    Date: Wed, 27 Jan 2021 17:32:08 GMT
    Content-Type: text/html
    Content-Length: 150
    X-FW-Server: Flywheel/4.1.0
    Server: Flywheel/4.1.0
    X-Cacheable: NO:Not Cacheable
    X-FW-Serve: TRUE
    X-Cache: MISS
    X-FW-Static: NO
    X-FW-Type: FLYWHEEL_BOT
    Connection: close
    <html>
    <head><title>405 Not Allowed</title></head>
    <body>
    <center><h1>405 Not Allowed</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
  RTSPRequest: 
    HTTP/1.1 400 Bad Request
http-server-header
Flywheel/4.1.0
http-title
Flywheel - Unknown Domain
443
tcp
https
Flywheel/4.1.0

product: Flywheel/4.1.0

fingerprint-strings
  FourOhFourRequest: 
    HTTP/1.1 404 Not Found
    Date: Wed, 27 Jan 2021 17:32:16 GMT
    Content-Type: text/html; charset=UTF-8
    Connection: close
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Link: <https://knhofilm.com/wp-json/>; rel="https://api.w.org/"
    X-FW-Server: Flywheel/4.1.0
    X-FW-Hash: e4my37t97u
    Server: Flywheel/4.1.0
    Cache-Control: no-cache, must-revalidate, max-age=0
    X-Cacheable: NO:Not Cacheable
    X-FW-Serve: TRUE
    X-Cache: MISS
    X-FW-Static: NO
    X-FW-Type: FLYWHEEL_BOT
    <!DOCTYPE html>
    <html lang="en-US"
    prefix="og: https://ogp.me/ns#" >
    <head>
    <meta charset="UTF-8" />
    <meta http-equiv="X-UA-Compatible" content="IE=edge">
    <link rel="pingback" href="https://knhofilm.com/xmlrpc.php" />
    <script type="text/javascript">
    document.documentElement.className = 'js';
    </script>
    <script>var et_site_url='https://knhofilm.com';var et_post_id='0';function et_core_page_resource_fallback(a,b){"undefin
  GetRequest: 
    HTTP/1.1 200 OK
    Date: Wed, 27 Jan 2021 17:32:15 GMT
    Content-Type: text/html; charset=UTF-8
    Content-Length: 68485
    Connection: close
    Vary: Accept-Encoding
    Vary: Accept-Encoding
    Link: <https://knhofilm.com/wp-json/>; rel="https://api.w.org/"
    Link: <https://knhofilm.com/wp-json/wp/v2/pages/173>; rel="alternate"; type="application/json"
    Link: <https://knhofilm.com/>; rel=shortlink
    X-FW-Server: Flywheel/4.1.0
    X-FW-Hash: e4my37t97u
    Server: Flywheel/4.1.0
    X-Cacheable: YES
    X-FW-Serve: TRUE
    X-Cache: HIT
    X-Hits: 1
    X-FW-Static: NO
    X-FW-Type: FLYWHEEL_BOT
    Accept-Ranges: bytes
    <!DOCTYPE html>
    <html lang="en-US"
    prefix="og: https://ogp.me/ns#" >
    <head>
    <meta charset="UTF-8" />
    <meta http-equiv="X-UA-Compatible" content="IE=edge">
    <link rel="pingback" href="https://knhofilm.com/xmlrpc.php" />
    <script type="text/javascript">
    document.documentElement.className = 'js';
    </scrip
  HTTPOptions: 
    HTTP/1.1 405 Not Allowed
    Date: Wed, 27 Jan 2021 17:32:16 GMT
    Content-Type: text/html
    Content-Length: 150
    Connection: close
    X-FW-Server: Flywheel/4.1.0
    X-FW-Hash: e4my37t97u
    Server: Flywheel/4.1.0
    X-Cacheable: NO:Not Cacheable
    X-FW-Serve: TRUE
    X-Cache: MISS
    X-FW-Static: NO
    X-FW-Type: FLYWHEEL_BOT
    <html>
    <head><title>405 Not Allowed</title></head>
    <body>
    <center><h1>405 Not Allowed</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
http-server-header
Flywheel/4.1.0
http-title
Flywheel - Unknown Domain
ssl-cert
Subject: commonName=knhofilm.com
Subject Alternative Name: DNS:knhofilm.com, DNS:www.knhofilm.com
Not valid before: 2020-02-14T21:46:19
Not valid after:  2022-05-12T19:44:26
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A

159.203.25.61

Open Ports
22, 80, 443
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.10Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.10 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 68:8f:03:5b:81:6b:33:bf:98:3f:bb:f2:8a:a0:1c:dc (RSA)
  256 d0:b2:57:91:ae:8e:4a:d6:60:58:a5:3a:c5:00:c3:25 (ECDSA)
  256 ae:5d:04:a1:a7:a5:1f:87:81:a8:f7:19:f1:03:73:63 (EdDSA)
80
tcp
http
nginx

product: nginx

443
tcp
http
nginx

product: nginx

http-server-header
nginx
http-title
400 The plain HTTP request was sent to HTTPS port
ssl-cert
Subject: commonName=default
Not valid before: 2018-03-04T18:49:44
Not valid after:  2028-03-01T18:49:44
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A

68.183.38.38

Open Ports
22, 80, 443
Hostname
www.urbopublica.com
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH8.2p1 Ubuntu 4ubuntu0.1Ubuntu Linux; protocol 2.0

product: OpenSSH version: 8.2p1 Ubuntu 4ubuntu0.1 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
80
tcp
http
Apache httpd2.4.41

product: Apache httpd version: 2.4.41 hostname: urbopublica.com

http-server-header
Apache/2.4.41 (Ubuntu)
http-title
Did not follow redirect to https://urbopublica.com/
443
tcp
http
Apache httpd2.4.41(Ubuntu)

product: Apache httpd version: 2.4.41 extrainfo: (Ubuntu)

http-generator
WordPress 5.5.3
http-server-header
Apache/2.4.41 (Ubuntu)
http-title
Luxury Apartments Faro - Urbopublica
ssl-cert
Subject: commonName=urbopublica.com
Subject Alternative Name: DNS:urbopublica.com, DNS:www.urbopublica.com
Not valid before: 2021-01-05T22:27:38
Not valid after:  2021-04-05T22:27:38
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A

128.199.242.69

Open Ports
22, 80, 443, 9001
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.8Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.8 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 47:da:2d:29:05:b7:a2:d5:a4:c2:f4:8a:cf:0d:a7:05 (RSA)
  256 04:54:02:f4:2b:a3:e7:5d:b0:1f:38:89:1b:4c:71:4c (ECDSA)
  256 03:c6:6a:73:f8:27:aa:07:2c:7d:32:6d:3f:b9:ed:80 (EdDSA)
80
tcp
http
Apache httpd2.4.18(Ubuntu)

product: Apache httpd version: 2.4.18 extrainfo: (Ubuntu)

http-server-header
Apache/2.4.18 (Ubuntu)
http-title
Site doesn't have a title (text/html).
443
tcp
http
Apache httpd2.4.18(Ubuntu)

product: Apache httpd version: 2.4.18 extrainfo: (Ubuntu)

http-server-header
Apache/2.4.18 (Ubuntu)
http-title
JMeze Pty Ltd
ssl-cert
Subject: commonName=www.jmeze.com
Subject Alternative Name: DNS:www.jmeze.com
Not valid before: 2021-01-17T16:45:01
Not valid after:  2021-04-17T16:45:01
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  least strength: C
9001
tcp
http
nginx1.10.3

product: nginx version: 1.10.3

http-server-header
nginx/1.10.3 (Ubuntu)
http-title
400 The plain HTTP request was sent to HTTPS port
ssl-cert
Subject: commonName=mqtt.jmeze.com
Subject Alternative Name: DNS:mqtt.jmeze.com
Not valid before: 2020-05-01T18:26:34
Not valid after:  2020-07-30T18:26:34
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  least strength: A
tls-nextprotoneg
  http/1.1

178.62.163.117

Open Ports
22, 80
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH6.6.1p1 Ubuntu 2ubuntu2.10Ubuntu Linux; protocol 2.0

product: OpenSSH version: 6.6.1p1 Ubuntu 2ubuntu2.10 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  1024 3f:d3:31:3e:37:81:e1:c5:d3:51:57:3a:bd:ad:de:34 (DSA)
  2048 c8:52:92:eb:1d:26:ac:76:11:e4:36:c1:ad:69:2a:14 (RSA)
  256 62:d5:a6:ea:26:9a:2a:f2:21:50:74:39:93:c4:3f:e3 (ECDSA)
  256 70:56:68:4c:36:8a:a2:a7:fe:65:b4:77:42:c1:5a:e7 (EdDSA)
80
tcp
http
nginx1.4.6Ubuntu

product: nginx version: 1.4.6 extrainfo: Ubuntu ostype: Linux

http-server-header
nginx/1.4.6 (Ubuntu)
http-title
CSGO Compare

134.209.242.26

Open Ports
21, 22, 25, 53, 80, 106, 110, 143, 443, 465, 993, 995, 8443
Tags
Digital Ocean AS14061
21
tcp
ftp
ProFTPDrequires SSL

product: ProFTPD extrainfo: requires SSL

ssl-cert
Subject: commonName=loving-keldysh.134-209-242-26.plesk.page
Subject Alternative Name: DNS:loving-keldysh.134-209-242-26.plesk.page
Not valid before: 2021-01-23T11:59:39
Not valid after:  2021-04-23T11:59:39
tls-nextprotoneg
  ftp
22
tcp
ssh
OpenSSH8.2p1 Ubuntu 4ubuntu0.1Ubuntu Linux; protocol 2.0

product: OpenSSH version: 8.2p1 Ubuntu 4ubuntu0.1 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
25
tcp
smtp
Postfix smtpd

product: Postfix smtpd hostname: loving-keldysh.134-209-242-26.plesk.page

smtp-commands
loving-keldysh.134-209-242-26.plesk.page, PIPELINING, SIZE 10240000, ETRN, STARTTLS, AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING, 
ssl-cert
Subject: commonName=loving-keldysh.134-209-242-26.plesk.page
Subject Alternative Name: DNS:loving-keldysh.134-209-242-26.plesk.page
Not valid before: 2021-01-23T11:59:39
Not valid after:  2021-04-23T11:59:39
ssl-date
TLS randomness does not represent time
53
tcp
domain
ISC BINDnone

product: ISC BIND version: none

dns-nsid
  bind.version: none
80
tcp
http
nginx

product: nginx

http-server-header
nginx
http-title
Web Server's Default Page
106
tcp
tcpwrapped
110
tcp
pop3
Dovecot pop3d

product: Dovecot pop3d hostname: loving-keldysh.134-209-242-26.plesk.page

pop3-capabilities
CAPA UIDL TOP USER PIPELINING SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) STLS RESP-CODES AUTH-RESP-CODE APOP
ssl-cert
Subject: commonName=loving-keldysh.134-209-242-26.plesk.page
Subject Alternative Name: DNS:loving-keldysh.134-209-242-26.plesk.page
Not valid before: 2021-01-23T11:59:39
Not valid after:  2021-04-23T11:59:39
143
tcp
imap
Dovecot imapd

product: Dovecot imapd

imap-capabilities
IMAP4rev1 LOGIN-REFERRALS capabilities IDLE SASL-IR listed AUTH=PLAIN more ENABLE AUTH=CRAM-MD5A0001 Pre-login have post-login OK STARTTLS AUTH=LOGIN AUTH=DIGEST-MD5 LITERAL+ ID
ssl-cert
Subject: commonName=loving-keldysh.134-209-242-26.plesk.page
Subject Alternative Name: DNS:loving-keldysh.134-209-242-26.plesk.page
Not valid before: 2021-01-23T11:59:39
Not valid after:  2021-04-23T11:59:39
443
tcp
http
nginx

product: nginx

http-robots.txt
1 disallowed entry 
/
http-server-header
nginx
http-title
Plesk Obsidian 18.0.32
Requested resource was https://134.209.242.26/login_up.php?success_redirect_url=%2F
ssl-cert
Subject: commonName=loving-keldysh.134-209-242-26.plesk.page
Subject Alternative Name: DNS:loving-keldysh.134-209-242-26.plesk.page
Not valid before: 2021-01-23T11:59:39
Not valid after:  2021-04-23T11:59:39
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  h2
  http/1.1
465
tcp
smtp
Postfix smtpd

product: Postfix smtpd hostname: loving-keldysh.134-209-242-26.plesk.page

smtp-commands
loving-keldysh.134-209-242-26.plesk.page, PIPELINING, SIZE 10240000, ETRN, AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING, 
ssl-cert
Subject: commonName=loving-keldysh.134-209-242-26.plesk.page
Subject Alternative Name: DNS:loving-keldysh.134-209-242-26.plesk.page
Not valid before: 2021-01-23T11:59:39
Not valid after:  2021-04-23T11:59:39
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
993
tcp
imap
Dovecot imapd

product: Dovecot imapd

imap-capabilities
IMAP4rev1 LOGIN-REFERRALS capabilities IDLE AUTH=DIGEST-MD5 listed AUTH=PLAIN ENABLE AUTH=CRAM-MD5A0001 Pre-login more have OK post-login AUTH=LOGIN ID LITERAL+ SASL-IR
ssl-cert
Subject: commonName=loving-keldysh.134-209-242-26.plesk.page
Subject Alternative Name: DNS:loving-keldysh.134-209-242-26.plesk.page
Not valid before: 2021-01-23T11:59:39
Not valid after:  2021-04-23T11:59:39
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
995
tcp
pop3
Dovecot pop3d

product: Dovecot pop3d hostname: loving-keldysh.134-209-242-26.plesk.page

pop3-capabilities
CAPA UIDL TOP USER PIPELINING SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) RESP-CODES AUTH-RESP-CODE APOP
ssl-cert
Subject: commonName=loving-keldysh.134-209-242-26.plesk.page
Subject Alternative Name: DNS:loving-keldysh.134-209-242-26.plesk.page
Not valid before: 2021-01-23T11:59:39
Not valid after:  2021-04-23T11:59:39
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
8443
tcp
https-alt
sw-cp-server

product: sw-cp-server

fingerprint-strings
  FourOhFourRequest: 
    HTTP/1.1 404 Not Found
    Server: sw-cp-server
    Date: Wed, 27 Jan 2021 17:32:24 GMT
    Content-Type: text/html
    Content-Length: 921
    Connection: close
    ETag: "5fe04575-399"
    <!DOCTYPE html>
    <html lang="en" dir="ltr">
    <head>
    <meta charset="utf-8">
    <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
    <title>404 Page Not Found</title>
    <link rel="shortcut icon" href="/favicon.ico">
    <link rel="stylesheet" href="/ui-library/plesk-ui-library.css?3.8.1">
    <script type="text/javascript" src="/ui-library/plesk-ui-library.min.js?3.8.1"></script>
    <script type="text/javascript" src="/cp/javascript/vendors.js"></script>
    <script type="text/javascript" src="/cp/javascript/main.js"></script>
    <script type="text/javascript" src="/error_docs/uat.js?v1"></script>
    <link href="/error_docs/app.css" rel="stylesheet"></head>
    <body>
    <div id="app"><
  GetRequest: 
    HTTP/1.1 303 See Other
    Server: sw-cp-server
    Date: Wed, 27 Jan 2021 17:32:24 GMT
    Content-Type: text/html; charset=UTF-8
    Connection: close
    Expires: Fri, 28 May 1999 00:00:00 GMT
    Last-Modified: Wed, 27 Jan 2021 17:32:24 GMT
    Cache-Control: no-store, no-cache, must-revalidate
    Cache-Control: post-check=0, pre-check=0
    Pragma: no-cache
    P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
    X-Frame-Options: SAMEORIGIN
    X-XSS-Protection: 1; mode=block
    Location: /login.php?success_redirect_url=%2F
  HTTPOptions: 
    HTTP/1.1 405 Not Allowed
    Server: sw-cp-server
    Date: Wed, 27 Jan 2021 17:32:24 GMT
    Content-Type: text/html
    Content-Length: 929
    Connection: close
    ETag: "5fe04575-3a1"
    <!DOCTYPE html>
    <html lang="en" dir="ltr">
    <head>
    <meta charset="utf-8">
    <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
    <title>405 Method Not Allowed</title>
    <link rel="shortcut icon" href="/favicon.ico">
    <link rel="stylesheet" href="/ui-library/plesk-ui-library.css?3.8.1">
    <script type="text/javascript" src="/ui-library/plesk-ui-library.min.js?3.8.1"></script>
    <script type="text/javascript" src="/cp/javascript/vendors.js"></script>
    <script type="text/javascript" src="/cp/javascript/main.js"></script>
    <script type="text/javascript" src="/error_docs/uat.js?v1"></script>
    <link href="/error_docs/app.css" rel="stylesheet"></head>
    <body>
    <div id="
http-robots.txt
1 disallowed entry 
/
http-server-header
sw-cp-server
http-title
Plesk Obsidian 18.0.32
Requested resource was https://134.209.242.26:8443/login_up.php?success_redirect_url=%2F
ssl-cert
Subject: commonName=loving-keldysh.134-209-242-26.plesk.page
Subject Alternative Name: DNS:loving-keldysh.134-209-242-26.plesk.page
Not valid before: 2021-01-23T11:59:39
Not valid after:  2021-04-23T11:59:39
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  http/1.1

45.79.151.35

Open Ports
22
Hostname
li1250-35.members.linode.com
Tags
Linode AS63949
22
tcp
ssh
OpenSSH7.4protocol 2.0

product: OpenSSH version: 7.4 extrainfo: protocol 2.0

ssh-auth-methods
  Supported authentication methods: 
    publickey
    gssapi-keyex
    gssapi-with-mic
    password
ssh-hostkey
  2048 75:4b:10:b5:9c:12:89:ab:eb:90:10:2e:b0:fa:6d:61 (RSA)
  256 b7:b8:f2:54:27:ad:26:42:79:28:65:24:26:dd:eb:5e (ECDSA)
  256 4f:af:62:a0:3d:c7:48:8a:74:9b:b4:b5:a4:a4:de:eb (EdDSA)
22
tcp
ssh
OpenSSH8.1protocol 2.0

product: OpenSSH version: 8.1 extrainfo: protocol 2.0

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  3072 fc:ae:a5:7f:96:61:3e:b3:06:9f:49:9e:b0:7b:3d:d5 (RSA)
  256 3b:a2:6a:b0:56:43:59:4c:06:48:1b:a3:54:48:96:fb (ECDSA)
  256 a2:2e:66:a1:41:a1:c0:a6:5d:66:6a:b5:9f:96:40:b9 (EdDSA)

212.111.43.214

Open Ports
22
Hostname
li782-214.members.linode.com
Tags
Linode AS63949
22
tcp
ssh
OpenSSH8.0protocol 2.0

product: OpenSSH version: 8.0 extrainfo: protocol 2.0

ssh-auth-methods
  Supported authentication methods: 
    publickey
    gssapi-keyex
    gssapi-with-mic
    password
ssh-hostkey
  3072 d1:3c:d9:3c:79:ca:b3:ac:7d:29:d2:af:7e:4d:b7:1f (RSA)
  256 8f:7e:75:92:93:be:a8:20:f8:e1:fc:ff:e1:44:4e:d6 (ECDSA)
  256 de:65:ed:86:3a:55:d4:62:72:99:2c:83:e2:a6:39:5a (EdDSA)

134.209.171.86

Open Ports
22, 80, 443
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 4f:83:91:37:9d:72:eb:48:d2:6b:5b:ff:90:75:7f:89 (RSA)
  256 de:e8:b3:3b:53:09:07:3d:22:20:13:6c:80:74:a5:72 (ECDSA)
  256 22:c1:0b:23:50:3a:11:ae:74:57:46:a7:31:b3:3c:1d (EdDSA)
80
tcp
http
Apache httpd2.4.29(Ubuntu)

product: Apache httpd version: 2.4.29 extrainfo: (Ubuntu)

http-server-header
Apache/2.4.29 (Ubuntu)
http-title
Apache2 Ubuntu Default Page: It works
443
tcp
http
Apache httpd2.4.29(Ubuntu)

product: Apache httpd version: 2.4.29 extrainfo: (Ubuntu)

http-robots.txt
1 disallowed entry 
/
http-server-header
Apache/2.4.29 (Ubuntu)
http-title
Dial A Med \xC2\xB7 Login
ssl-cert
Subject: commonName=dap.graccasoft.com
Subject Alternative Name: DNS:dap.graccasoft.com
Not valid before: 2021-01-22T04:10:17
Not valid after:  2021-04-22T04:10:17
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A

96.126.117.248

Open Ports
21, 80, 443, 5000, 8080, 8181
Hostname
li342-248.members.linode.com
Tags
Linode AS63949
21
tcp
ftp
vsftpd3.0.2

product: vsftpd version: 3.0.2 ostype: Unix

80
tcp
http
Apache httpd2.4.7

product: Apache httpd version: 2.4.7 hostname: wikimedia.org.ar

http-robots.txt
1 disallowed entry 
/wp-admin/
http-server-header
Apache/2.4.7 (Ubuntu)
http-title
Did not follow redirect to https://li342-248.members.linode.com/
443
tcp
http
Apache httpd2.4.7(Ubuntu)

product: Apache httpd version: 2.4.7 extrainfo: (Ubuntu)

http-robots.txt
1 disallowed entry 
/wp-admin/
http-server-header
Apache/2.4.7 (Ubuntu)
http-title
Did not follow redirect to https://www.wikimedia.org.ar/
ssl-cert
Subject: commonName=wikimedia.org.ar
Subject Alternative Name: DNS:wikimedia.org.ar, DNS:www.wikimedia.org.ar
Not valid before: 2020-12-13T14:05:49
Not valid after:  2021-03-13T14:05:49
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  least strength: C
5000
tcp
ssh
OpenSSH6.6.1p1 Ubuntu 2ubuntu2.13Ubuntu Linux; protocol 2.0

product: OpenSSH version: 6.6.1p1 Ubuntu 2ubuntu2.13 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  1024 7c:eb:76:95:12:86:6f:45:17:4e:46:fe:72:d4:20:58 (DSA)
  2048 8f:e1:e5:57:56:35:3e:5e:18:80:01:e3:3b:a2:18:be (RSA)
  256 3e:02:16:9a:78:c0:12:0e:c9:f0:30:54:cc:06:b6:be (ECDSA)
  256 a2:1b:c4:41:78:6a:e4:40:d6:2e:aa:97:20:8a:57:3b (EdDSA)
8080
tcp
http
Apache httpd2.4.7

product: Apache httpd version: 2.4.7 hostname: li342-248.members.linode.com

http-ls
Volume /
SIZE  TIME              FILENAME
-     2020-06-11 19:55  html/

http-server-header
Apache/2.4.7 (Ubuntu)
http-title
Index of /
8181
tcp
http
Apache httpd2.4.7

product: Apache httpd version: 2.4.7 hostname: li342-248.members.linode.com

http-ls
Volume /
SIZE  TIME              FILENAME
-     2020-06-11 19:55  html/

http-server-header
Apache/2.4.7 (Ubuntu)
http-title
Index of /

173.255.201.164

Open Ports
22, 80, 3306
Hostname
li211-164.members.linode.com
Tags
Linode AS63949
22
tcp
ssh
OpenSSH5.9p1 Debian 5ubuntu1.1Ubuntu Linux; protocol 2.0

product: OpenSSH version: 5.9p1 Debian 5ubuntu1.1 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  1024 84:cc:61:2d:9a:b5:29:26:27:23:11:16:f3:05:cb:e0 (DSA)
  2048 0f:fd:b0:df:e4:a9:e0:1b:1e:10:92:6f:c6:9c:1f:7a (RSA)
  256 89:fa:46:dd:15:5c:22:00:ed:35:8f:9c:af:40:fe:75 (ECDSA)
80
tcp
http
nginx1.1.19

product: nginx version: 1.1.19

http-server-header
nginx/1.1.19
http-title
Benefits - Modulo de Beneficiarios y Reembolsos
Requested resource was http://li211-164.members.linode.com/login
3306
tcp
mysql
MySQL5.5.22-0ubuntu1

product: MySQL version: 5.5.22-0ubuntu1

mysql-info
  Protocol: 10
  Version: 5.5.22-0ubuntu1
  Thread ID: 148345
  Capabilities flags: 63487
  Some Capabilities: DontAllowDatabaseTableColumn, Support41Auth, Speaks41ProtocolOld, FoundRows, InteractiveClient, LongPassword, IgnoreSigpipes, SupportsCompression, ConnectWithDatabase, ODBCClient, LongColumnFlag, Speaks41ProtocolNew, SupportsTransactions, IgnoreSpaceBeforeParenthesis, SupportsLoadDataLocal, SupportsAuthPlugins, SupportsMultipleResults, SupportsMultipleStatments
  Status: Autocommit
  Salt: ?=UpV=n5ZE*AG!n*!geE
  Auth Plugin Name: 88

178.128.35.38

Open Ports
22, 80, 443
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  2048 1f:14:cd:1e:9f:9d:98:14:a2:93:ef:d6:90:25:23:90 (RSA)
  256 94:0d:61:28:65:88:55:8d:be:62:3f:c6:40:26:ff:2b (ECDSA)
  256 24:93:d1:4c:7f:f4:e6:bb:70:48:ab:df:ce:c6:93:fb (EdDSA)
80
tcp
http
nginx1.17.3

product: nginx version: 1.17.3

http-server-header
nginx/1.17.3
http-title
404 Not Found
443
tcp
http
nginx1.17.3

product: nginx version: 1.17.3

http-server-header
nginx/1.17.3
http-title
Did not follow redirect to https://mplcontact.com/
ssl-cert
Subject: commonName=mplcontact.com
Subject Alternative Name: DNS:mplcontact.com, DNS:www.mplcontact.com
Not valid before: 2020-12-31T14:48:19
Not valid after:  2021-03-31T14:48:19
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
      TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
      TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
      TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp384r1) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 4c:71:5d:15:04:e1:8a:40:fb:14:d7:d3:5e:6b:52:9a (RSA)
  256 cc:3c:d9:43:b1:d4:d1:21:ff:d2:71:4f:b2:fb:a4:fc (ECDSA)
  256 fd:ac:a2:c6:78:67:5a:0b:a0:58:3b:be:d2:8c:54:a6 (EdDSA)
80
tcp
http
nginx1.10.3

product: nginx version: 1.10.3

http-server-header
nginx/1.10.3
http-title
Site doesn't have a title (application/octet-stream, text/plain).
22
tcp
ssh
OpenSSH8.0protocol 2.0

product: OpenSSH version: 8.0 extrainfo: protocol 2.0

ssh-auth-methods
  Supported authentication methods: 
    publickey
    gssapi-keyex
    gssapi-with-mic
ssh-hostkey
  3072 1e:47:18:c2:0c:88:92:e6:22:ac:3c:96:87:30:1b:d2 (RSA)
  256 0b:a4:25:bd:db:a8:11:45:5c:64:94:7b:45:05:a4:86 (ECDSA)
  256 28:24:d0:90:4a:05:12:cc:9b:cd:fd:c9:f8:1b:cd:55 (EdDSA)

188.166.102.79

Open Ports
80, 443, 444
Hostname
www2.fander.tv
Tags
Digital Ocean AS14061
80
tcp
http
nginx

product: nginx

http-server-header
nginx
http-title
403 Forbidden
443
tcp
http
nginx

product: nginx

http-server-header
nginx
http-title
403 Forbidden
ssl-cert
Subject: commonName=www2.fander.tv
Subject Alternative Name: DNS:www2.fander.tv
Not valid before: 2018-10-04T21:03:38
Not valid after:  2028-10-01T21:03:38
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  http/1.1
444
tcp
ssh
OpenSSH7.4p1 Debian 10+deb9u6protocol 2.0

product: OpenSSH version: 7.4p1 Debian 10+deb9u6 extrainfo: protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  2048 eb:a1:4b:f0:d2:2b:b5:87:ca:1c:cb:4b:60:c8:db:17 (RSA)
  256 52:ca:42:76:a6:50:31:ca:9a:47:78:1b:62:57:14:f9 (ECDSA)
  256 46:fa:ba:79:d9:8d:bb:0a:7c:6e:36:3d:c8:36:66:47 (EdDSA)

45.56.99.221

Open Ports
21, 22, 25, 53, 80, 443, 465, 587, 2525, 3306, 8083
Hostname
li901-221.members.linode.com
Tags
Linode AS63949
21
tcp
ftp
vsftpd3.0.3

product: vsftpd version: 3.0.3 ostype: Unix

ssl-cert
Subject: commonName=easyrentals.io/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-06-30T13:42:12
Not valid after:  2021-06-30T13:42:12
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      Key exchange (secp256r1) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      Key exchange (secp256r1) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      Key exchange (secp256r1) of lower strength than certificate key
  least strength: A
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 07:3c:2a:ce:c5:7a:06:e1:93:bc:ed:95:c7:ec:2b:87 (RSA)
  256 b2:03:22:88:89:12:0f:12:56:80:06:38:54:22:b9:88 (ECDSA)
  256 17:08:66:60:3c:9e:10:5f:d0:91:8c:65:bd:6e:b7:5e (EdDSA)
25
tcp
smtp
Exim smtpd4.90_1

product: Exim smtpd version: 4.90_1 hostname: easyrentals.io

smtp-commands
easyrentals.io Hello natlas.io [51.81.64.17], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP, 
 Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 
ssl-cert
Subject: commonName=easyrentals.io/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-06-30T13:42:12
Not valid after:  2021-06-30T13:42:12
ssl-date
2021-01-27T17:30:10+00:00; -1m40s from scanner time.
53
tcp
domain
dns-nsid
  bind.version: 9.11.3-1ubuntu1.12-Ubuntu
80
tcp
http
Apache httpd2.4.29(Ubuntu) mod_fcgid/2.3.9 OpenSSL/1.1.1g

product: Apache httpd version: 2.4.29 extrainfo: (Ubuntu) mod_fcgid/2.3.9 OpenSSL/1.1.1g

http-server-header
Apache/2.4.29 (Ubuntu) mod_fcgid/2.3.9 OpenSSL/1.1.1g
http-title
Did not follow redirect to https://li901-221.members.linode.com/
443
tcp
http
Apache httpd2.4.29(Ubuntu) mod_fcgid/2.3.9 OpenSSL/1.1.1g

product: Apache httpd version: 2.4.29 extrainfo: (Ubuntu) mod_fcgid/2.3.9 OpenSSL/1.1.1g

http-server-header
Apache/2.4.29 (Ubuntu) mod_fcgid/2.3.9 OpenSSL/1.1.1g
http-title
Easy Rentals
ssl-cert
Subject: commonName=easyrentals.io
Subject Alternative Name: DNS:easyrentals.io, DNS:www.easyrentals.io
Not valid before: 2020-07-06T00:00:00
Not valid after:  2021-07-06T23:59:59
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.1: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.2: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A
465
tcp
smtp
Exim smtpd4.90_1

product: Exim smtpd version: 4.90_1 hostname: easyrentals.io

smtp-commands
easyrentals.io Hello natlas.io [51.81.64.17], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, CHUNKING, HELP, 
 Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 
ssl-cert
Subject: commonName=easyrentals.io/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-06-30T13:42:12
Not valid after:  2021-06-30T13:42:12
ssl-date
2021-01-27T17:33:01+00:00; +1m26s from scanner time.
587
tcp
smtp
Exim smtpd4.90_1

product: Exim smtpd version: 4.90_1 hostname: easyrentals.io

smtp-commands
easyrentals.io Hello natlas.io [51.81.64.17], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP, 
 Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 
ssl-cert
Subject: commonName=easyrentals.io/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-06-30T13:42:12
Not valid after:  2021-06-30T13:42:12
ssl-date
2021-01-27T17:30:23+00:00; -1m10s from scanner time.
2525
tcp
smtp
Exim smtpd4.90_1

product: Exim smtpd version: 4.90_1 hostname: easyrentals.io

smtp-commands
easyrentals.io Hello natlas.io [51.81.64.17], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP, 
 Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 
ssl-cert
Subject: commonName=easyrentals.io/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-06-30T13:42:12
Not valid after:  2021-06-30T13:42:12
ssl-date
2021-01-27T17:32:05+00:00; +26s from scanner time.
3306
tcp
mysql
MySQL5.7.30-0ubuntu0.18.04.1

product: MySQL version: 5.7.30-0ubuntu0.18.04.1

mysql-info
  Protocol: 10
  Version: 5.7.30-0ubuntu0.18.04.1
  Thread ID: 1017892
  Capabilities flags: 65535
  Some Capabilities: Support41Auth, LongColumnFlag, SupportsTransactions, ConnectWithDatabase, IgnoreSigpipes, Speaks41ProtocolOld, SupportsCompression, SupportsLoadDataLocal, Speaks41ProtocolNew, LongPassword, FoundRows, IgnoreSpaceBeforeParenthesis, InteractiveClient, SwitchToSSLAfterHandshake, DontAllowDatabaseTableColumn, ODBCClient, SupportsMultipleResults, SupportsAuthPlugins, SupportsMultipleStatments
  Status: Autocommit
  Salt: !M*2j'c}
j~\x05>	\x07T6\x0B!*
  Auth Plugin Name: 96
8083
tcp
http
nginx

product: nginx

http-server-header
nginx
http-title
Did not follow redirect to https://li901-221.members.linode.com:8083/

174.138.107.211

Open Ports
22, 80, 443
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  2048 d0:82:2d:2b:10:f4:71:9a:25:a3:8e:18:a2:6b:81:6e (RSA)
  256 9b:c2:e4:8d:1d:6b:23:c4:16:f8:88:93:26:17:58:a5 (ECDSA)
  256 6f:4b:65:c7:bd:3f:e2:aa:e6:f7:c1:d4:9b:c0:6a:70 (EdDSA)
80
tcp
http
nginx

product: nginx

http-server-header
nginx
http-title
Did not follow redirect to http://www.playguiden.se/
443
tcp
http
nginx

product: nginx

http-robots.txt
1 disallowed entry 
/
http-server-header
nginx
http-title
Site doesn't have a title (text/html; charset=UTF-8).
ssl-cert
Subject: commonName=swe.tv24.co
Subject Alternative Name: DNS:swe.tv24.co
Not valid before: 2021-01-08T02:18:50
Not valid after:  2021-04-08T02:18:50
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  h2
  http/1.1

167.172.216.218

Open Ports
21, 22, 25, 53, 80, 106, 110, 143, 443, 465, 993, 995, 8443
Tags
Digital Ocean AS14061
21
tcp
ftp
ProFTPD

product: ProFTPD

ssl-cert
Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
Not valid before: 2019-11-14T02:59:25
Not valid after:  2020-11-13T02:59:25
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  ftp
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 b8:ce:3a:66:6a:6c:7f:ab:ee:51:73:e2:cc:fe:ab:2e (RSA)
  256 da:64:b4:27:ae:de:a9:f8:d0:ca:9c:03:d1:11:b2:45 (ECDSA)
  256 b2:e9:a0:b9:13:83:d7:a0:5a:2e:75:9a:0d:a3:bb:a8 (EdDSA)
25
tcp
smtp
Postfix smtpd

product: Postfix smtpd hostname: masterdo.co.nz

smtp-commands
masterdo.co.nz, PIPELINING, SIZE 10240000, ETRN, STARTTLS, AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING, 
ssl-cert
Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
Not valid before: 2019-11-14T02:59:25
Not valid after:  2020-11-13T02:59:25
ssl-date
TLS randomness does not represent time
53
tcp
domain
ISC BINDnone

product: ISC BIND version: none

dns-nsid
  bind.version: none
80
tcp
http
nginx

product: nginx

http-server-header
nginx
http-title
Web Server's Default Page
106
tcp
tcpwrapped
110
tcp
pop3
Dovecot pop3d

product: Dovecot pop3d hostname: masterdo.co.nz

pop3-capabilities
PIPELINING SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) USER TOP RESP-CODES CAPA STLS AUTH-RESP-CODE UIDL APOP
ssl-cert
Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
Not valid before: 2019-11-14T02:59:25
Not valid after:  2020-11-13T02:59:25
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  least strength: A
143
tcp
imap
Dovecot imapd

product: Dovecot imapd

imap-capabilities
capabilities IMAP4rev1 AUTH=DIGEST-MD5 listed IDLE ID more AUTH=PLAIN Pre-login LITERAL+ LOGIN-REFERRALS AUTH=LOGIN AUTH=CRAM-MD5A0001 STARTTLS ENABLE have post-login SASL-IR OK
ssl-cert
Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
Not valid before: 2019-11-14T02:59:25
Not valid after:  2020-11-13T02:59:25
ssl-date
TLS randomness does not represent time
443
tcp
http
nginx

product: nginx

http-robots.txt
1 disallowed entry 
/
http-server-header
nginx
http-title
Plesk Obsidian 18.0.32
Requested resource was https://167.172.216.218/login_up.php?success_redirect_url=%2F
ssl-cert
Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
Not valid before: 2019-11-14T02:59:25
Not valid after:  2020-11-13T02:59:25
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  h2
  http/1.1
465
tcp
smtp
Postfix smtpd

product: Postfix smtpd hostname: masterdo.co.nz

smtp-commands
masterdo.co.nz, PIPELINING, SIZE 10240000, ETRN, AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING, 
ssl-cert
Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
Not valid before: 2019-11-14T02:59:25
Not valid after:  2020-11-13T02:59:25
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
993
tcp
imap
Dovecot imapd

product: Dovecot imapd

imap-capabilities
capabilities IMAP4rev1 AUTH=DIGEST-MD5 listed IDLE ID more AUTH=PLAIN Pre-login LITERAL+ LOGIN-REFERRALS AUTH=LOGIN AUTH=CRAM-MD5A0001 ENABLE have SASL-IR post-login OK
ssl-cert
Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
Not valid before: 2019-11-14T02:59:25
Not valid after:  2020-11-13T02:59:25
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  least strength: A
995
tcp
pop3
Dovecot pop3d

product: Dovecot pop3d hostname: masterdo.co.nz

pop3-capabilities
PIPELINING SASL(PLAIN LOGIN DIGEST-MD5 CRAM-MD5) USER TOP CAPA RESP-CODES AUTH-RESP-CODE UIDL APOP
ssl-cert
Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
Not valid before: 2019-11-14T02:59:25
Not valid after:  2020-11-13T02:59:25
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 1024) of lower strength than certificate key
  least strength: A
8443
tcp
https-alt
sw-cp-server

product: sw-cp-server

fingerprint-strings
  FourOhFourRequest: 
    HTTP/1.1 404 Not Found
    Server: sw-cp-server
    Date: Wed, 27 Jan 2021 17:30:56 GMT
    Content-Type: text/html
    Content-Length: 921
    Connection: close
    ETag: "5fe04575-399"
    <!DOCTYPE html>
    <html lang="en" dir="ltr">
    <head>
    <meta charset="utf-8">
    <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
    <title>404 Page Not Found</title>
    <link rel="shortcut icon" href="/favicon.ico">
    <link rel="stylesheet" href="/ui-library/plesk-ui-library.css?3.8.1">
    <script type="text/javascript" src="/ui-library/plesk-ui-library.min.js?3.8.1"></script>
    <script type="text/javascript" src="/cp/javascript/vendors.js"></script>
    <script type="text/javascript" src="/cp/javascript/main.js"></script>
    <script type="text/javascript" src="/error_docs/uat.js?v1"></script>
    <link href="/error_docs/app.css" rel="stylesheet"></head>
    <body>
    <div id="app"><
  GetRequest: 
    HTTP/1.1 303 See Other
    Server: sw-cp-server
    Date: Wed, 27 Jan 2021 17:30:56 GMT
    Content-Type: text/html; charset=UTF-8
    Connection: close
    Expires: Fri, 28 May 1999 00:00:00 GMT
    Last-Modified: Wed, 27 Jan 2021 17:30:56 GMT
    Cache-Control: no-store, no-cache, must-revalidate
    Cache-Control: post-check=0, pre-check=0
    Pragma: no-cache
    P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
    X-Frame-Options: SAMEORIGIN
    X-XSS-Protection: 1; mode=block
    Location: /login.php?success_redirect_url=%2F
  HTTPOptions: 
    HTTP/1.1 405 Not Allowed
    Server: sw-cp-server
    Date: Wed, 27 Jan 2021 17:30:56 GMT
    Content-Type: text/html
    Content-Length: 929
    Connection: close
    ETag: "5fe04575-3a1"
    <!DOCTYPE html>
    <html lang="en" dir="ltr">
    <head>
    <meta charset="utf-8">
    <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
    <title>405 Method Not Allowed</title>
    <link rel="shortcut icon" href="/favicon.ico">
    <link rel="stylesheet" href="/ui-library/plesk-ui-library.css?3.8.1">
    <script type="text/javascript" src="/ui-library/plesk-ui-library.min.js?3.8.1"></script>
    <script type="text/javascript" src="/cp/javascript/vendors.js"></script>
    <script type="text/javascript" src="/cp/javascript/main.js"></script>
    <script type="text/javascript" src="/error_docs/uat.js?v1"></script>
    <link href="/error_docs/app.css" rel="stylesheet"></head>
    <body>
    <div id="
http-robots.txt
1 disallowed entry 
/
http-server-header
sw-cp-server
http-title
Plesk Obsidian 18.0.32
Requested resource was https://167.172.216.218:8443/login_up.php?success_redirect_url=%2F
ssl-cert
Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
Not valid before: 2019-11-14T02:59:25
Not valid after:  2020-11-13T02:59:25
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  http/1.1

68.183.223.243

Open Ports
443, 5060, 5061
Tags
Digital Ocean AS14061
443
tcp
http
nginx

product: nginx

http-robots.txt
1 disallowed entry 
/
http-server-header
nginx
http-title
3CX Phone System Management Console
ssl-cert
Subject: commonName=brmgmbh.my3cx.de
Subject Alternative Name: DNS:brmgmbh.my3cx.de
Not valid before: 2021-01-01T03:00:35
Not valid after:  2021-04-01T03:00:35
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  h2
  http/1.1
5060
tcp
sip
SIP end point; Status: 200 OK

extrainfo: SIP end point; Status: 200 OK

fingerprint-strings
  SIPOptions: 
    SIP/2.0 200 OK
    Via: SIP/2.0/TCP nm;branch=foo;received=51.81.64.17
    Contact: <sip:68.183.223.243:5060;transport=tcp>
    <sip:nm2@nm2>;tag=adc7715f
    From: <sip:nm@nm>;tag=root
    Call-ID: 50000
    CSeq: 42 OPTIONS
    Accept: application/sdp
    Accept-Language: en
    Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REGISTER, SUBSCRIBE, NOTIFY, REFER, INFO, MESSAGE, UPDATE
    Supported: replaces, timer
    Allow-Events: presence, message-summary, dialog, call-info, line-seize
    Content-Length: 0
5061
tcp
sip
SIP end point; Status: 482 Merged Request

extrainfo: SIP end point; Status: 482 Merged Request

fingerprint-strings
  SIPOptions: 
    SIP/2.0 482 Merged Request
    Via: SIP/2.0/TCP nm;branch=foo;received=51.81.64.17
    <sip:nm2@nm2>;tag=62f56b0d
    From: <sip:nm@nm>;tag=root
    Call-ID: 50000
    CSeq: 42 OPTIONS
    Accept-Language: en
    Content-Length: 0
ssl-cert
Subject: commonName=brmgmbh.my3cx.de
Subject Alternative Name: DNS:brmgmbh.my3cx.de
Not valid before: 2021-01-01T03:00:35
Not valid after:  2021-04-01T03:00:35
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A

165.22.169.67

Open Ports
22, 443, 8090
Hostname
company.lucid
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH8.2p1 Ubuntu 4ubuntu0.1Ubuntu Linux; protocol 2.0

product: OpenSSH version: 8.2p1 Ubuntu 4ubuntu0.1 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
443
tcp
https
ssl-cert
Subject: commonName=company.lucid/organizationName=LucidLink Corp/stateOrProvinceName=CA/countryName=US
Not valid before: 2020-12-15T11:20:05
Not valid after:  2023-03-15T11:20:05
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A
8090
tcp
http
Node.js Express framework

product: Node.js Express framework

http-title
Error

165.22.238.196

Open Ports
22, 80, 443, 3011
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH8.2p1 Ubuntu 4ubuntu0.1Ubuntu Linux; protocol 2.0

product: OpenSSH version: 8.2p1 Ubuntu 4ubuntu0.1 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
80
tcp
http
nginx1.18.0Ubuntu

product: nginx version: 1.18.0 extrainfo: Ubuntu ostype: Linux

http-server-header
nginx/1.18.0 (Ubuntu)
http-title
Welcome to nginx!
443
tcp
http
nginx1.18.0Ubuntu

product: nginx version: 1.18.0 extrainfo: Ubuntu ostype: Linux

http-server-header
nginx/1.18.0 (Ubuntu)
http-title
Bitwarden Web Vault
ssl-cert
Subject: commonName=*.capy.tech
Subject Alternative Name: DNS:*.capy.tech
Not valid before: 2020-08-31T15:45:16
Not valid after:  2020-11-29T15:45:16
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  h2
  http/1.1
3011
tcp
trusted-web
fingerprint-strings
  GetRequest: 
    HTTP/1.0 200 OK
    Connection: close
    Content-Type: text/html; charset=utf-8
    Cache-Control: public, max-age=600
    Server: Rocket
    Feature-Policy: accelerometer 'none'; ambient-light-sensor 'none'; autoplay 'none'; camera 'none'; encrypted-media 'none'; fullscreen 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none'; picture-in-picture 'none'; sync-xhr 'self' https://haveibeenpwned.com https://twofactorauth.org; usb 'none'; vr 'none'
    Referrer-Policy: same-origin
    X-Frame-Options: SAMEORIGIN
    X-Content-Type-Options: nosniff
    X-XSS-Protection: 1; mode=block
    Content-Security-Policy: frame-ancestors 'self' chrome-extension://nngceckbapebfimnlniiiahkandclblb moz-extension://* ;
    Access-Control-Allow-Origin: 
    Content-Length: 1373
    Date: Wed, 27 Jan 2021 17:31:27 GMT
    <!DOCTYPE html>
    <html>
    <head>
    <meta charset="utf-8">
  HTTPOptions: 
    HTTP/1.0 200 OK
    Connection: close
    Content-Type: text/plain; charset=utf-8
    Server: Rocket
    Feature-Policy: accelerometer 'none'; ambient-light-sensor 'none'; autoplay 'none'; camera 'none'; encrypted-media 'none'; fullscreen 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none'; picture-in-picture 'none'; sync-xhr 'self' https://haveibeenpwned.com https://twofactorauth.org; usb 'none'; vr 'none'
    Referrer-Policy: same-origin
    X-Frame-Options: SAMEORIGIN
    X-Content-Type-Options: nosniff
    X-XSS-Protection: 1; mode=block
    Content-Security-Policy: frame-ancestors 'self' chrome-extension://nngceckbapebfimnlniiiahkandclblb moz-extension://* ;
    Cache-Control: no-cache, no-store, max-age=0
    Access-Control-Allow-Origin: 
    Access-Control-Allow-Methods: 
    Access-Control-Allow-Headers: 
    Access-Control-Allow-Credentials: true
    Content-Len

159.203.149.191

Open Ports
22, 25, 80, 443, 1022
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.8Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.8 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 f1:90:2f:c4:81:94:ea:45:65:a2:11:c8:2f:cc:f1:db (RSA)
  256 da:f5:5a:40:85:b2:26:dc:8d:e9:9b:5d:54:1a:d1:ac (ECDSA)
  256 80:35:e5:d8:91:c6:f0:22:ab:67:ad:32:77:e7:a0:1f (EdDSA)
25
tcp
smtp
Postfix smtpd

product: Postfix smtpd hostname: meteor.stimhack.com

smtp-commands
meteor.stimhack.com, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, 
ssl-cert
Subject: commonName=ubuntu-512mb-nyc3-01
Not valid before: 2016-03-15T13:38:25
Not valid after:  2026-03-13T13:38:25
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
      TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_DH_anon_WITH_AES_128_CBC_SHA - F
      TLS_DH_anon_WITH_AES_256_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
      TLS_DH_anon_WITH_RC4_128_MD5 - F
      TLS_DH_anon_WITH_SEED_CBC_SHA - F
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
      TLS_ECDH_anon_WITH_RC4_128_SHA - F
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
  TLSv1.1: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
      TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_DH_anon_WITH_AES_128_CBC_SHA - F
      TLS_DH_anon_WITH_AES_256_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
      TLS_DH_anon_WITH_RC4_128_MD5 - F
      TLS_DH_anon_WITH_SEED_CBC_SHA - F
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
      TLS_ECDH_anon_WITH_RC4_128_SHA - F
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
  TLSv1.2: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
      TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_DH_anon_WITH_AES_128_CBC_SHA - F
      TLS_DH_anon_WITH_AES_128_CBC_SHA256 - F
      TLS_DH_anon_WITH_AES_128_GCM_SHA256 - F
      TLS_DH_anon_WITH_AES_256_CBC_SHA - F
      TLS_DH_anon_WITH_AES_256_CBC_SHA256 - F
      TLS_DH_anon_WITH_AES_256_GCM_SHA384 - F
      TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
      TLS_DH_anon_WITH_RC4_128_MD5 - F
      TLS_DH_anon_WITH_SEED_CBC_SHA - F
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
      TLS_ECDH_anon_WITH_RC4_128_SHA - F
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
  least strength: F
80
tcp
http
nginx1.17.9

product: nginx version: 1.17.9

http-server-header
nginx/1.17.9
http-title
503 Service Temporarily Unavailable
443
tcp
http
nginx1.17.9

product: nginx version: 1.17.9

http-server-header
nginx/1.17.9
http-title
503 Service Temporarily Unavailable
ssl-cert
Subject: commonName=letsencrypt-nginx-proxy-companion
Not valid before: 2019-08-31T00:16:20
Not valid after:  2020-08-30T00:16:20
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A
tls-nextprotoneg
  h2
  http/1.1
1022
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.8Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.8 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 f1:90:2f:c4:81:94:ea:45:65:a2:11:c8:2f:cc:f1:db (RSA)
  256 da:f5:5a:40:85:b2:26:dc:8d:e9:9b:5d:54:1a:d1:ac (ECDSA)
  256 80:35:e5:d8:91:c6:f0:22:ab:67:ad:32:77:e7:a0:1f (EdDSA)
22
tcp
ssh
OpenSSH8.2p1 Ubuntu 4ubuntu0.1Ubuntu Linux; protocol 2.0

product: OpenSSH version: 8.2p1 Ubuntu 4ubuntu0.1 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey

74.207.239.103

Open Ports
161, 179
Hostname
router1-atl.linode.com
Tags
Linode AS63949
161
tcp
snmp
179
tcp
tcpwrapped

139.162.179.126

Open Ports
135, 139, 3389
Hostname
li1496-126.members.linode.com
Tags
Linode AS63949
135
tcp
msrpc
Microsoft Windows RPC

product: Microsoft Windows RPC ostype: Windows

139
tcp
netbios-ssn
Microsoft Windows netbios-ssn

product: Microsoft Windows netbios-ssn ostype: Windows

3389
tcp
ms-wbt-server
Microsoft Terminal Services

product: Microsoft Terminal Services ostype: Windows

ssl-cert
Subject: commonName=NAMVPS-ORG
Not valid before: 2020-12-06T14:42:55
Not valid after:  2021-06-07T14:42:55
ssl-date
2021-01-27T16:30:31+00:00; -1h00m01s from scanner time.
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
  least strength: C
22
tcp
ssh
OpenSSH8.1protocol 2.0

product: OpenSSH version: 8.1 extrainfo: protocol 2.0

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  3072 69:2c:64:29:98:97:4f:ef:89:4a:46:de:bb:7f:09:5b (RSA)
  256 2f:1b:32:a0:de:45:7c:02:13:87:d3:a5:90:26:ab:86 (ECDSA)
  256 2d:a0:89:f9:e1:a9:82:67:a6:ec:48:86:cf:d6:b7:22 (EdDSA)

139.162.195.179

Open Ports
22
Hostname
li1358-179.members.linode.com
Tags
Linode AS63949
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 6e:d9:4d:cc:37:3b:84:ae:61:e6:12:92:3f:f3:1e:0c (RSA)
  256 b4:7c:97:47:da:e6:13:40:f2:15:0f:5b:49:bd:4b:28 (ECDSA)
  256 6e:74:72:7f:3f:29:1c:2e:81:91:72:9e:14:3a:c9:84 (EdDSA)

157.230.19.109

Open Ports
22, 80, 443
Tags
Digital Ocean AS14061
22
tcp
tcpwrapped
ssh-auth-methods
ERROR: Script execution failed (use -d to debug)
80
tcp
http
nginx1.15.12

product: nginx version: 1.15.12

http-server-header
nginx/1.15.12
http-title
503 Service Temporarily Unavailable
443
tcp
http
nginx1.15.12

product: nginx version: 1.15.12

http-server-header
nginx/1.15.12
http-title
503 Service Temporarily Unavailable
ssl-cert
Subject: commonName=letsencrypt-nginx-proxy-companion
Not valid before: 2019-05-05T00:55:10
Not valid after:  2020-05-04T00:55:10
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 4096) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A
tls-nextprotoneg
  h2
  http/1.1

157.230.80.72

Open Ports
22, 80, 443
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 53:5b:ed:59:f1:58:2f:ad:73:87:26:00:20:b3:9e:cf (RSA)
  256 03:f7:3e:00:64:5b:7f:1c:e4:a2:42:45:84:bf:b5:b7 (ECDSA)
  256 da:a6:d0:b4:c3:38:c1:cc:4d:02:3f:86:b4:04:83:5e (EdDSA)
80
tcp
http
nginx

product: nginx

443
tcp
http
nginx

product: nginx

http-server-header
nginx
http-title
400 The plain HTTP request was sent to HTTPS port
ssl-cert
Subject: commonName=default
Not valid before: 2019-05-12T06:16:38
Not valid after:  2029-05-09T06:16:38
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A

138.197.2.192

Open Ports
22, 80, 443
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.10Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.10 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
80
tcp
http
Apache httpd2.4.18(Ubuntu)

product: Apache httpd version: 2.4.18 extrainfo: (Ubuntu)

http-server-header
Apache/2.4.18 (Ubuntu)
http-title
Did not follow redirect to https://www.138.197.2.192/
443
tcp
http
Apache httpd2.4.18(Ubuntu)

product: Apache httpd version: 2.4.18 extrainfo: (Ubuntu)

http-server-header
Apache/2.4.18 (Ubuntu)
http-title
Did not follow redirect to https://www.138.197.2.192/
ssl-cert
Subject: commonName=certificadodigital.ssabrasil.com
Subject Alternative Name: DNS:certificadodigital.ssabrasil.com, DNS:www.certificadodigital.ssabrasil.com
Not valid before: 2020-06-17T00:00:00
Not valid after:  2021-06-17T23:59:59
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (brainpoolP256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (brainpoolP256r1) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.1: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (brainpoolP256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (brainpoolP256r1) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.2: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (brainpoolP256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (brainpoolP256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (brainpoolP256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (brainpoolP256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (brainpoolP256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (brainpoolP256r1) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A

37.139.24.147

Open Ports
80, 443, 2222
Hostname
do-ams2-nopob-vnuoh.tep.cloud.db-ops.net
Tags
Digital Ocean AS14061
80
tcp
http-proxy
HAProxy http proxy1.3.1 or later

product: HAProxy http proxy version: 1.3.1 or later devicetype: load balancer

http-title
Site doesn't have a title (text/html).
443
tcp
http-proxy
HAProxy http proxy1.3.1 or later

product: HAProxy http proxy version: 1.3.1 or later devicetype: load balancer

http-title
Site doesn't have a title (text/html).
ssl-cert
Subject: commonName=flexer.be
Subject Alternative Name: DNS:flexer.be
Not valid before: 2020-11-30T23:21:28
Not valid after:  2021-02-28T23:21:28
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      Key exchange (dh 2048) of lower strength than certificate key
      Key exchange (secp256r1) of lower strength than certificate key
  least strength: A
2222
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.8Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.8 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  2048 f9:f5:e4:b6:77:5c:1a:df:1b:52:3e:7c:58:5a:1b:3b (RSA)
  256 5c:59:30:0d:e8:41:51:53:cb:7c:b4:1b:04:df:d6:b1 (ECDSA)
  256 29:a5:fb:2b:56:ed:0c:6f:8a:63:57:8c:48:d5:f2:82 (EdDSA)

172.104.77.235

Open Ports
1234
Hostname
li1687-235.members.linode.com
Tags
Linode AS63949
1234
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.8Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.8 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  2048 89:cb:23:f6:ca:41:40:59:dc:f4:10:b5:a9:c5:20:4b (RSA)
  256 90:fb:8c:63:c0:c0:60:7a:ae:5d:11:7c:39:8e:63:e1 (ECDSA)
  256 4b:3c:08:d9:ee:52:f4:92:73:0d:fb:ea:ce:34:fa:fd (EdDSA)

139.162.27.159

Open Ports
21, 22, 25, 53, 80, 110, 143, 443, 465, 587, 993, 995, 2525, 3306, 8080, 8083, 8443
Hostname
li868-159.members.linode.com
Tags
Linode AS63949
21
tcp
ftp
vsftpd3.0.2

product: vsftpd version: 3.0.2 ostype: Unix

22
tcp
ssh
OpenSSH7.4protocol 2.0

product: OpenSSH version: 7.4 extrainfo: protocol 2.0

ssh-auth-methods
  Supported authentication methods: 
    publickey
    gssapi-keyex
    gssapi-with-mic
    password
ssh-hostkey
  2048 08:d8:d2:58:ad:b4:00:8b:b6:4e:16:cd:68:61:fa:80 (RSA)
  256 b8:d9:74:f4:89:b1:14:4e:98:d2:1f:89:35:66:e4:27 (ECDSA)
  256 6a:64:64:fc:86:19:58:92:e2:74:92:3b:05:72:da:9e (EdDSA)
25
tcp
smtp
Exim smtpd4.94

product: Exim smtpd version: 4.94 hostname: localhost.localdomain

smtp-commands
localhost.localdomain Hello natlas.io [51.81.64.17], SIZE 52428800, 8BITMIME, PIPELINING, X_PIPE_CONNECT, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP, 
 Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 
ssl-cert
Subject: commonName=sv.example.com/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-08-11T05:03:13
Not valid after:  2021-08-11T05:03:13
ssl-date
TLS randomness does not represent time
53
tcp
domain
ISC BINDget lost

product: ISC BIND version: get lost

dns-nsid
  bind.version: get lost
80
tcp
http
nginx

product: nginx

http-methods
  Potentially risky methods: TRACE
http-server-header
nginx
http-title
sv.example.com &mdash; Coming Soon
110
tcp
pop3
Dovecot pop3d

product: Dovecot pop3d

pop3-capabilities
USER TOP PIPELINING AUTH-RESP-CODE STLS UIDL CAPA SASL(PLAIN LOGIN) RESP-CODES
ssl-cert
Subject: commonName=sv.example.com/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-08-11T05:03:13
Not valid after:  2021-08-11T05:03:13
ssl-date
TLS randomness does not represent time
143
tcp
imap
Dovecot imapd

product: Dovecot imapd

imap-capabilities
IDLE more ENABLE AUTH=PLAIN LOGIN-REFERRALS have STARTTLS IMAP4rev1 Pre-login post-login ID OK capabilities SASL-IR listed AUTH=LOGINA0001 LITERAL+
ssl-cert
Subject: commonName=sv.example.com/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-08-11T05:03:13
Not valid after:  2021-08-11T05:03:13
ssl-date
TLS randomness does not represent time
443
tcp
http
nginx

product: nginx

http-generator
WordPress 5.0.11
http-server-header
nginx
http-title
C\xE1\xBA\xADp nh\xE1\xBA\xADt tin t\xE1\xBB\xA9c Vi\xE1\xBB\x87t Nam m\xE1\xBB\x9Bi nh\xE1\xBA\xA5t, nhanh nh\xE1\xBA\xA5t
ssl-cert
Subject: commonName=vntin360.com
Subject Alternative Name: DNS:vntin360.com, DNS:www.vntin360.com
Not valid before: 2020-12-01T16:38:40
Not valid after:  2021-03-01T16:38:40
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Key exchange (secp256r1) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Key exchange (secp256r1) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Key exchange (secp256r1) of lower strength than certificate key
  least strength: C
tls-nextprotoneg
  http/1.1
465
tcp
smtp
Exim smtpd4.94

product: Exim smtpd version: 4.94 hostname: localhost.localdomain

smtp-commands
localhost.localdomain Hello natlas.io [51.81.64.17], SIZE 52428800, 8BITMIME, PIPELINING, X_PIPE_CONNECT, AUTH PLAIN LOGIN, CHUNKING, HELP, 
 Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 
ssl-cert
Subject: commonName=sv.example.com/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-08-11T05:03:13
Not valid after:  2021-08-11T05:03:13
587
tcp
smtp
Exim smtpd4.94

product: Exim smtpd version: 4.94 hostname: localhost.localdomain

smtp-commands
localhost.localdomain Hello natlas.io [51.81.64.17], SIZE 52428800, 8BITMIME, PIPELINING, X_PIPE_CONNECT, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP, 
 Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 
ssl-cert
Subject: commonName=sv.example.com/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-08-11T05:03:13
Not valid after:  2021-08-11T05:03:13
ssl-date
TLS randomness does not represent time
993
tcp
imap
Dovecot imapd

product: Dovecot imapd

imap-capabilities
post-login IDLE have Pre-login more ENABLE AUTH=PLAIN ID listed OK capabilities AUTH=LOGINA0001 SASL-IR LITERAL+ LOGIN-REFERRALS IMAP4rev1
ssl-cert
Subject: commonName=sv.example.com/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-08-11T05:03:13
Not valid after:  2021-08-11T05:03:13
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_IDEA_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher IDEA vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (dh 1024) of lower strength than certificate key
      Key exchange (secp256k1) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_IDEA_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher IDEA vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (dh 1024) of lower strength than certificate key
      Key exchange (secp256k1) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256k1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_IDEA_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher IDEA vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (dh 1024) of lower strength than certificate key
      Key exchange (secp256k1) of lower strength than certificate key
  least strength: D
995
tcp
pop3
Dovecot pop3d

product: Dovecot pop3d

pop3-capabilities
SASL(PLAIN LOGIN) USER UIDL TOP RESP-CODES PIPELINING CAPA AUTH-RESP-CODE
ssl-cert
Subject: commonName=sv.example.com/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-08-11T05:03:13
Not valid after:  2021-08-11T05:03:13
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_IDEA_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher IDEA vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (dh 1024) of lower strength than certificate key
      Key exchange (secp256k1) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_IDEA_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher IDEA vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (dh 1024) of lower strength than certificate key
      Key exchange (secp256k1) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256k1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_IDEA_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher IDEA vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (dh 1024) of lower strength than certificate key
      Key exchange (secp256k1) of lower strength than certificate key
  least strength: D
2525
tcp
smtp
Exim smtpd4.94

product: Exim smtpd version: 4.94 hostname: localhost.localdomain

smtp-commands
localhost.localdomain Hello natlas.io [51.81.64.17], SIZE 52428800, 8BITMIME, PIPELINING, X_PIPE_CONNECT, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP, 
 Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP 
ssl-cert
Subject: commonName=sv.example.com/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
Not valid before: 2020-08-11T05:03:13
Not valid after:  2021-08-11T05:03:13
ssl-date
TLS randomness does not represent time
3306
tcp
mysql
MySQL5.5.65-MariaDB

product: MySQL version: 5.5.65-MariaDB

mysql-info
  Protocol: 10
  Version: 5.5.65-MariaDB
  Thread ID: 196953
  Capabilities flags: 63487
  Some Capabilities: Support41Auth, SupportsCompression, LongColumnFlag, LongPassword, IgnoreSpaceBeforeParenthesis, InteractiveClient, Speaks41ProtocolNew, ConnectWithDatabase, FoundRows, ODBCClient, SupportsLoadDataLocal, IgnoreSigpipes, SupportsTransactions, DontAllowDatabaseTableColumn, Speaks41ProtocolOld, SupportsAuthPlugins, SupportsMultipleResults, SupportsMultipleStatments
  Status: Autocommit
  Salt: BUeyRkEWdp)v:^H1XKL|
  Auth Plugin Name: 87
8080
tcp
http
Apache httpd2.4.6(CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/7.4.9

product: Apache httpd version: 2.4.6 extrainfo: (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/7.4.9

http-methods
  Potentially risky methods: TRACE
http-open-proxy
Proxy might be redirecting requests
http-server-header
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/7.4.9
http-title
sv.example.com &mdash; Coming Soon
8083
tcp
http
nginx

product: nginx

  /: 
    PHPSESSID: 
      httponly flag not set
http-robots.txt
1 disallowed entry 
/
http-server-header
nginx
http-title
Vesta - LOGIN
Requested resource was /login/
8443
tcp
http
Apache httpd2.4.6(CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/7.4.9

product: Apache httpd version: 2.4.6 extrainfo: (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/7.4.9

http-server-header
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/7.4.9
http-title
400 Bad Request
ssl-cert
Subject: commonName=vntin360.com
Subject Alternative Name: DNS:vntin360.com, DNS:www.vntin360.com
Not valid before: 2020-12-01T16:38:40
Not valid after:  2021-03-01T16:38:40
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  SSLv3: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 4096) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_IDEA_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher IDEA vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      CBC-mode cipher in SSLv3 (CVE-2014-3566)
      Ciphersuite uses MD5 for message integrity
      Key exchange (secp256r1) of lower strength than certificate key
  TLSv1.0: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 4096) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_IDEA_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher IDEA vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (secp256r1) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 4096) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_IDEA_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher IDEA vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (secp256r1) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 4096) - C
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 4096) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_IDEA_CBC_SHA (rsa 4096) - A
      TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher IDEA vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (secp256r1) of lower strength than certificate key
  least strength: C
tls-nextprotoneg
<empty>

139.59.136.45

Open Ports
22, 80, 443
Hostname
proso.do.playscape.co.il
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.8Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.8 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 71:9d:20:f8:90:1c:a2:d6:ec:c3:3d:05:9c:bc:f0:6e (RSA)
  256 93:27:e1:0c:49:46:67:08:03:33:db:93:af:f8:c5:64 (ECDSA)
  256 d1:d2:9e:ae:11:1d:ff:50:c3:68:9c:d4:ea:ba:aa:4f (EdDSA)
80
tcp
http
nginx1.10.3Ubuntu

product: nginx version: 1.10.3 extrainfo: Ubuntu ostype: Linux

http-server-header
nginx/1.10.3 (Ubuntu)
http-title
Site doesn't have a title (text/html; charset=UTF-8).
443
tcp
http
nginx1.10.3Ubuntu

product: nginx version: 1.10.3 extrainfo: Ubuntu ostype: Linux

http-server-header
nginx/1.10.3 (Ubuntu)
http-title
400 Bad Request
Requested resource was https://proso.do.playscape.co.il/login
ssl-cert
Subject: commonName=proso.co.il
Subject Alternative Name: DNS:dev.proso.co.il, DNS:get.proso.co.il, DNS:l5.proso.co.il, DNS:lc.proso.co.il, DNS:lcdev.proso.co.il, DNS:manpower.proso.co.il, DNS:menaheldb.proso.co.il, DNS:mpdev.proso.co.il, DNS:playscape.proso.co.il, DNS:proso.co.il, DNS:wbt.proso.co.il, DNS:www.proso.co.il
Not valid before: 2020-11-29T08:49:20
Not valid after:  2021-02-27T08:49:20
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  http/1.1

157.245.83.218

Open Ports
22, 3000
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  2048 1d:a9:b8:a4:63:01:55:3c:0b:dc:d2:be:4f:7b:ae:a6 (RSA)
  256 b2:aa:ee:4c:b4:ed:65:c2:81:c5:cb:1d:b4:3a:55:75 (ECDSA)
  256 56:1e:f0:0c:e4:ae:32:99:c8:37:1b:c1:dc:a2:8d:a3 (EdDSA)
3000
tcp
ppp
fingerprint-strings
  GenericLines, Help, RTSPRequest: 
    HTTP/1.1 400 Bad Request
    Content-Type: text/plain; charset=utf-8
    Connection: close
    Request
  GetRequest: 
    HTTP/1.0 302 Found
    Cache-Control: no-cache
    Content-Type: text/html; charset=utf-8
    Expires: -1
    Location: /login
    Pragma: no-cache
    Set-Cookie: redirect_to=%252F; Path=/; HttpOnly
    X-Frame-Options: deny
    Date: Wed, 27 Jan 2021 17:28:13 GMT
    Content-Length: 29
    href="/login">Found</a>.
  HTTPOptions: 
    HTTP/1.0 404 Not Found
    Cache-Control: no-cache
    Content-Type: text/html; charset=UTF-8
    Expires: -1
    Pragma: no-cache
    X-Frame-Options: deny
    Date: Wed, 27 Jan 2021 17:28:18 GMT
    <!DOCTYPE html>
    <html lang="en">
    <head>
    <meta charset="utf-8">
    <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
    <meta name="viewport" content="width=device-width">
    <meta name="theme-color" content="#000">
    <title>Grafana</title>
    <base href="/" />
    <link rel="preload" href="public/fonts/roboto/RxZJdnzeo3R5zSexge8UUVtXRa8TVwTICgirnJhmVJw.woff2" as="font" crossorigin />
    <link rel="icon" type="image/png" href="public/img/fav32.png">
    <link rel="mask-icon" href="public/img/grafana_mask_icon.svg" color="#F05A28">
    <link rel="apple-touch-icon" sizes="180x180" href="public/img/apple-touch-icon.png">
    <link rel="stylesheet" href="public/build/grafana.dark.d9f582b9b538bf193c78.css">

159.65.208.160

Open Ports
22, 80, 443, 3306
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.10Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.10 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  2048 c5:c1:dc:ac:dd:fd:d7:fd:ef:7a:da:bf:17:a0:8c:c0 (RSA)
  256 07:b2:3d:c3:7c:bf:94:04:d9:66:4f:e1:ac:54:eb:d5 (ECDSA)
  256 b7:47:77:f8:a9:06:57:66:54:db:68:ad:1d:76:62:cd (EdDSA)
80
tcp
http
Apache httpd2.4.18

product: Apache httpd version: 2.4.18 hostname: 127.0.1.1

http-server-header
Apache/2.4.18 (Ubuntu)
http-title
404 Not Found
443
tcp
http
Apache httpd2.4.18(Ubuntu)

product: Apache httpd version: 2.4.18 extrainfo: (Ubuntu)

  /: 
    PHPSESSID: 
      httponly flag not set
http-server-header
Apache/2.4.18 (Ubuntu)
http-title
Home | Yourlist
ssl-cert
Subject: commonName=dashboard.yourlist.co.uk
Subject Alternative Name: DNS:dashboard.yourlist.co.uk
Not valid before: 2020-12-12T15:40:57
Not valid after:  2021-03-12T15:40:57
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  least strength: C
3306
tcp
mysql
MySQL5.7.31

product: MySQL version: 5.7.31

mysql-info
  Protocol: 10
  Version: 5.7.31
  Thread ID: 52770
  Capabilities flags: 65535
  Some Capabilities: Support41Auth, IgnoreSpaceBeforeParenthesis, SwitchToSSLAfterHandshake, SupportsCompression, ODBCClient, SupportsTransactions, IgnoreSigpipes, InteractiveClient, Speaks41ProtocolNew, DontAllowDatabaseTableColumn, FoundRows, LongPassword, LongColumnFlag, Speaks41ProtocolOld, SupportsLoadDataLocal, ConnectWithDatabase, SupportsAuthPlugins, SupportsMultipleResults, SupportsMultipleStatments
  Status: Autocommit
  Salt: Eh\x05G\x01fU\x14<7W1*ah%yq\x13n
  Auth Plugin Name: 79

164.90.216.45

Open Ports
22, 80, 443
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  2048 47:11:27:fd:04:7e:dd:cf:f7:ee:55:be:57:b6:be:cc (RSA)
  256 df:15:ca:8b:82:bd:a3:34:b8:b7:e7:9d:f1:38:c9:dc (ECDSA)
  256 3b:cc:dd:81:52:fd:b7:9c:df:68:f1:3e:ef:ff:42:b7 (EdDSA)
80
tcp
http
nginx

product: nginx

http-robots.txt
36 disallowed entries (15 shown)
/*? /checkout /app/ /lib/ /bin/ /setup/ /update/ /vendor/ 
/*.php$ /pkginfo/ /report/ /var/ /catalog/ /customer/ 
/customize/
http-server-header
nginx
http-title
Did not follow redirect to http://eva.ua/
443
tcp
http
nginx

product: nginx

http-robots.txt
36 disallowed entries (15 shown)
/*? /checkout /app/ /lib/ /bin/ /setup/ /update/ /vendor/ 
/*.php$ /pkginfo/ /report/ /var/ /catalog/ /customer/ 
/customize/
http-server-header
nginx
http-title
\xE2\x89\xA1 EVA.UA - \xD0\xBC\xD0\xB0\xD0\xB3\xD0\xB0\xD0\xB7\xD0\xB8\xD0\xBD\xD0\xB8 \xD1\x82\xD0\xBE\xD0\xB2\xD0\xB0\xD1\x80\xD1\x96\xD0\xB2 \xD0\xB4\xD0\xBB\xD1\x8F \xD0\xBA\xD1\x80\xD0\xB0\xD1\x81\xD0\xB8...
ssl-cert
Subject: commonName=*.eva.ua
Subject Alternative Name: DNS:*.eva.ua, DNS:eva.ua
Not valid before: 2020-05-28T00:00:00
Not valid after:  2021-05-28T23:59:59
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  h2
  http/1.1

167.99.19.112

Open Ports
80, 443
Tags
Digital Ocean AS14061
80
tcp
http
Apache httpd2.4.38

product: Apache httpd version: 2.4.38 hostname: xps-www-test.localdomain

http-server-header
Apache/2.4.38 (Debian)
http-title
Apache2 Debian Default Page: It works
443
tcp
http
Apache httpd2.4.38

product: Apache httpd version: 2.4.38 hostname: secure.xpslogic.com

http-robots.txt
1 disallowed entry 
/
http-server-header
Apache/2.4.38 (Debian)
http-title
Did not follow redirect to https://www.xpslogic.com
ssl-cert
Subject: commonName=*.xpslogic.com
Subject Alternative Name: DNS:*.xpslogic.com, DNS:xpslogic.com
Not valid before: 2019-10-07T00:00:00
Not valid after:  2021-10-06T23:59:59
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.1: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.2: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A

159.65.132.33

Open Ports
22, 80, 443
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH8.2p1 Ubuntu 4ubuntu0.1Ubuntu Linux; protocol 2.0

product: OpenSSH version: 8.2p1 Ubuntu 4ubuntu0.1 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
80
tcp
http
Apache httpd2.4.41

product: Apache httpd version: 2.4.41 hostname: api.parliament.pk

http-server-header
Apache/2.4.41 (Ubuntu)
http-title
Did not follow redirect to https://api.parliament.pk/
443
tcp
http
Apache httpd2.4.41(Ubuntu)

product: Apache httpd version: 2.4.41 extrainfo: (Ubuntu)

http-robots.txt
1 disallowed entry 
/wp-admin/
http-server-header
Apache/2.4.41 (Ubuntu)
http-title
Did not follow redirect to https://parliament.pk
ssl-cert
Subject: commonName=api.parliament.pk
Subject Alternative Name: DNS:api.parliament.pk
Not valid before: 2020-12-26T22:11:12
Not valid after:  2021-03-26T22:11:12
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A

165.227.41.239

Open Ports
22, 80
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.8Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.8 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  2048 5c:b2:97:01:8b:25:d2:3a:1a:52:d3:c0:d3:27:f4:89 (RSA)
  256 02:81:da:8b:5b:88:28:8b:c1:0b:a6:c7:90:a2:57:67 (ECDSA)
  256 d7:e0:2b:71:59:16:c8:44:23:3c:96:6f:bf:53:2d:fc (EdDSA)
80
tcp
http
nginx1.10.3Ubuntu

product: nginx version: 1.10.3 extrainfo: Ubuntu ostype: Linux

http-server-header
nginx/1.10.3 (Ubuntu)
http-title
Welcome to nginx!

68.183.82.249

Open Ports
21, 22, 25, 53, 80, 110, 143, 443, 465, 587, 993, 8090
Tags
Digital Ocean AS14061
21
tcp
ftp
Pure-FTPd

product: Pure-FTPd

ssl-date
TLS randomness does not represent time
22
tcp
ssh
OpenSSH7.6p1 Ubuntu 4ubuntu0.3Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.6p1 Ubuntu 4ubuntu0.3 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  2048 7b:dc:f0:80:c9:29:ba:a1:e5:64:fe:22:92:6a:7a:7c (RSA)
  256 21:cd:f3:23:a2:49:fd:71:e9:e3:d3:8f:28:ad:ad:39 (ECDSA)
  256 a9:a0:17:26:d5:42:5d:f9:3d:6d:f3:5d:bf:af:21:b6 (EdDSA)
25
tcp
smtp
Postfix smtpd

product: Postfix smtpd hostname: server.example.com

smtp-commands
server.example.com, PIPELINING, SIZE 30720000, VRFY, ETRN, STARTTLS, AUTH PLAIN, AUTH=PLAIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, 
53
tcp
domain
PowerDNS4.1.1

product: PowerDNS version: 4.1.1

dns-nsid
  NSID: magicsquare (6d61676963737175617265)
  id.server: magicsquare
  bind.version: PowerDNS Authoritative Server 4.1.1
80
tcp
http
LiteSpeed httpd

product: LiteSpeed httpd

http-server-header
LiteSpeed
http-title
 404 Not Found
110
tcp
pop3
Dovecot pop3d

product: Dovecot pop3d

pop3-capabilities
CAPA SASL UIDL TOP RESP-CODES STLS AUTH-RESP-CODE PIPELINING
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A
143
tcp
imap
Dovecot imapd

product: Dovecot imapd

imap-capabilities
more Pre-login ID IDLE IMAP4rev1 OK STARTTLS LOGINDISABLEDA0001 LITERAL+ post-login ENABLE listed capabilities SASL-IR have LOGIN-REFERRALS
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A
443
tcp
http
LiteSpeed httpd

product: LiteSpeed httpd

http-server-header
LiteSpeed
http-title
 404 Not Found
ssl-date
2021-01-27T17:28:01+00:00; -1s from scanner time.
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
  least strength: C
465
tcp
tcpwrapped
smtp-commands
Couldn't establish connection on port 465
587
tcp
smtp
Postfix smtpd

product: Postfix smtpd hostname: server.example.com

smtp-commands
server.example.com, PIPELINING, SIZE 30720000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, 
993
tcp
imaps
imap-capabilities
AUTH=PLAINA0001 Pre-login ID SASL-IR OK more IMAP4rev1 LITERAL+ post-login ENABLE listed capabilities IDLE have LOGIN-REFERRALS
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: client
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 1024) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 1024) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A
8090
tcp
http
LiteSpeed httpd

product: LiteSpeed httpd

http-server-header
LiteSpeed
http-title
 Login - CyberPanel 
ssl-date
2021-01-27T17:27:53+00:00; -1s from scanner time.
ssl-enum-ciphers
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
5000
tcp
tcpwrapped

161.35.104.218

Open Ports
22, 80, 443, 3128, 8080, 8081, 8888
Tags
Digital Ocean AS14061
22
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.10Ubuntu Linux; protocol 2.0

product: OpenSSH version: 7.2p2 Ubuntu 4ubuntu2.10 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
ssh-hostkey
  2048 3f:11:b5:2b:15:08:5e:3e:01:e7:c4:65:d6:a2:dc:e6 (RSA)
  256 86:a0:3d:f6:e2:61:4c:c4:5c:d2:14:3f:25:fa:f2:69 (ECDSA)
  256 7c:3e:99:ca:cd:a1:b3:d7:f9:68:06:9e:0c:a1:d8:4d (EdDSA)
80
tcp
http
http-title
Site doesn't have a title.
ssl-cert
Subject: commonName=HA Tunnel/organizationName=HA Tunnel/stateOrProvinceName=HA Tunnel/countryName=HA
Not valid before: 2020-08-29T17:34:46
Not valid after:  2025-08-03T17:34:46
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
sstp-discover
SSTP is supported.
443
tcp
https
http-title
Site doesn't have a title.
ssl-cert
Subject: commonName=HA Tunnel/organizationName=HA Tunnel/stateOrProvinceName=HA Tunnel/countryName=HA
Not valid before: 2020-08-29T17:34:46
Not valid after:  2025-08-03T17:34:46
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
sstp-discover
SSTP is supported.
3128
tcp
squid-http
http-open-proxy
Proxy might be redirecting requests
ssl-cert
Subject: commonName=HA Tunnel/organizationName=HA Tunnel/stateOrProvinceName=HA Tunnel/countryName=HA
Not valid before: 2020-08-29T17:34:46
Not valid after:  2025-08-03T17:34:46
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
8080
tcp
http-proxy
http-open-proxy
Proxy might be redirecting requests
http-title
Site doesn't have a title.
ssl-cert
Subject: commonName=HA Tunnel/organizationName=HA Tunnel/stateOrProvinceName=HA Tunnel/countryName=HA
Not valid before: 2020-08-29T17:34:46
Not valid after:  2025-08-03T17:34:46
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
sstp-discover
SSTP is supported.
8081
tcp
blackice-icecap
ssl-cert
Subject: commonName=HA Tunnel/organizationName=HA Tunnel/stateOrProvinceName=HA Tunnel/countryName=HA
Not valid before: 2020-08-29T17:34:46
Not valid after:  2025-08-03T17:34:46
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
8888
tcp
sun-answerbook
ssl-cert
Subject: commonName=HA Tunnel/organizationName=HA Tunnel/stateOrProvinceName=HA Tunnel/countryName=HA
Not valid before: 2020-08-29T17:34:46
Not valid after:  2025-08-03T17:34:46
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A

134.122.98.189

Open Ports
80, 443
Tags
Digital Ocean AS14061
80
tcp
http
Apache httpd2.4.6(CentOS) OpenSSL/1.0.2k-fips

product: Apache httpd version: 2.4.6 extrainfo: (CentOS) OpenSSL/1.0.2k-fips

http-generator
WordPress 5.5.3
http-robots.txt
1 disallowed entry 
/wp-admin/
http-server-header
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips
http-title
UpdraftClone 211577484 &#8211; Just another WordPress site
443
tcp
http
Apache httpd2.4.6(CentOS) OpenSSL/1.0.2k-fips

product: Apache httpd version: 2.4.6 extrainfo: (CentOS) OpenSSL/1.0.2k-fips

http-generator
WordPress 5.5.3
http-robots.txt
1 disallowed entry 
/wp-admin/
http-server-header
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips
http-title
UpdraftClone 211577484 &#8211; Just another WordPress site
ssl-cert
Subject: commonName=vq819mzx5gm.c.updraftclone.com
Subject Alternative Name: DNS:vq819mzx5gm.c.updraftclone.com
Not valid before: 2020-12-09T20:12:35
Not valid after:  2021-03-09T20:12:35
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256k1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256k1) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A

188.166.160.244

Open Ports
443, 5060, 5061
Tags
Digital Ocean AS14061
443
tcp
http
nginx

product: nginx

http-robots.txt
1 disallowed entry 
/
http-server-header
nginx
http-title
3CX Phone System Management Console
ssl-cert
Subject: commonName=jcblangenois.my3cx.fr
Subject Alternative Name: DNS:jcblangenois.my3cx.fr
Not valid before: 2021-01-06T12:56:11
Not valid after:  2021-04-06T12:56:11
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
      TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
      TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (rsa 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: server
  least strength: A
tls-nextprotoneg
  h2
  http/1.1
5060
tcp
sip
SIP end point; Status: 200 OK

extrainfo: SIP end point; Status: 200 OK

fingerprint-strings
  SIPOptions: 
    SIP/2.0 200 OK
    Via: SIP/2.0/TCP nm;branch=foo;received=51.81.64.17
    Contact: <sip:188.166.160.244:5060;transport=tcp>
    <sip:nm2@nm2>;tag=8bd1eb0d
    From: <sip:nm@nm>;tag=root
    Call-ID: 50000
    CSeq: 42 OPTIONS
    Accept: application/sdp
    Accept-Language: en
    Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REGISTER, SUBSCRIBE, NOTIFY, REFER, INFO, MESSAGE, UPDATE
    Supported: replaces, timer
    Allow-Events: presence, message-summary, dialog, call-info, line-seize
    Content-Length: 0
5061
tcp
sip
SIP end point; Status: 482 Merged Request

extrainfo: SIP end point; Status: 482 Merged Request

fingerprint-strings
  SIPOptions: 
    SIP/2.0 482 Merged Request
    Via: SIP/2.0/TCP nm;branch=foo;received=51.81.64.17
    <sip:nm2@nm2>;tag=21e11d1b
    From: <sip:nm@nm>;tag=root
    Call-ID: 50000
    CSeq: 42 OPTIONS
    Accept-Language: en
    Content-Length: 0
ssl-cert
Subject: commonName=jcblangenois.my3cx.fr
Subject Alternative Name: DNS:jcblangenois.my3cx.fr
Not valid before: 2021-01-06T12:56:11
Not valid after:  2021-04-06T12:56:11
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
  least strength: A
Back to top