Open Ports
21, 22, 25, 80, 443
Tags
Digital Ocean AS14061
21
tcp
ftp
vsftpd3.0.2

product: vsftpd version: 3.0.2 ostype: Unix

22
tcp
ssh
OpenSSH6.6.1p1 Ubuntu 2ubuntu2Ubuntu Linux; protocol 2.0

product: OpenSSH version: 6.6.1p1 Ubuntu 2ubuntu2 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux

ssh-auth-methods
  Supported authentication methods: 
    publickey
    password
ssh-hostkey
  1024 6b:58:44:43:cf:f1:5f:9c:2f:10:41:9e:75:8c:69:93 (DSA)
  2048 e8:07:3c:44:28:23:2c:73:04:79:f8:4b:fe:c5:be:74 (RSA)
  256 06:a1:ce:04:cb:37:e9:4c:e5:dd:2e:ef:50:d1:92:ec (ECDSA)
25
tcp
smtp
Postfix smtpd

product: Postfix smtpd hostname: Staging

smtp-commands
Staging, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, 
ssl-cert
Subject: commonName=Staging
Not valid before: 2015-09-05T02:22:12
Not valid after:  2025-09-02T02:22:12
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  SSLv3: 
    ciphers: 
      TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA - E
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_DES_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
      TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA - F
      TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 - F
      TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_DH_anon_WITH_AES_128_CBC_SHA - F
      TLS_DH_anon_WITH_AES_256_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
      TLS_DH_anon_WITH_DES_CBC_SHA - F
      TLS_DH_anon_WITH_RC4_128_MD5 - F
      TLS_DH_anon_WITH_SEED_CBC_SHA - F
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
      TLS_ECDH_anon_WITH_RC4_128_SHA - F
      TLS_RSA_EXPORT_WITH_DES40_CBC_SHA - E
      TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 - E
      TLS_RSA_EXPORT_WITH_RC4_40_MD5 - E
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_DES_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher DES vulnerable to SWEET32 attack
      64-bit block cipher DES40 vulnerable to SWEET32 attack
      64-bit block cipher RC2 vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      CBC-mode cipher in SSLv3 (CVE-2014-3566)
      Ciphersuite uses MD5 for message integrity
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.0: 
    ciphers: 
      TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA - E
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_DES_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
      TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA - F
      TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 - F
      TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_DH_anon_WITH_AES_128_CBC_SHA - F
      TLS_DH_anon_WITH_AES_256_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
      TLS_DH_anon_WITH_DES_CBC_SHA - F
      TLS_DH_anon_WITH_RC4_128_MD5 - F
      TLS_DH_anon_WITH_SEED_CBC_SHA - F
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
      TLS_ECDH_anon_WITH_RC4_128_SHA - F
      TLS_RSA_EXPORT_WITH_DES40_CBC_SHA - E
      TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 - E
      TLS_RSA_EXPORT_WITH_RC4_40_MD5 - E
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_DES_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher DES vulnerable to SWEET32 attack
      64-bit block cipher DES40 vulnerable to SWEET32 attack
      64-bit block cipher RC2 vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA - E
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_DES_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
      TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA - F
      TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 - F
      TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_DH_anon_WITH_AES_128_CBC_SHA - F
      TLS_DH_anon_WITH_AES_256_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
      TLS_DH_anon_WITH_DES_CBC_SHA - F
      TLS_DH_anon_WITH_RC4_128_MD5 - F
      TLS_DH_anon_WITH_SEED_CBC_SHA - F
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
      TLS_ECDH_anon_WITH_RC4_128_SHA - F
      TLS_RSA_EXPORT_WITH_DES40_CBC_SHA - E
      TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 - E
      TLS_RSA_EXPORT_WITH_RC4_40_MD5 - E
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_DES_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher DES vulnerable to SWEET32 attack
      64-bit block cipher DES40 vulnerable to SWEET32 attack
      64-bit block cipher RC2 vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA - E
      TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_DES_CBC_SHA (dh 1024) - D
      TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
      TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA - F
      TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 - F
      TLS_DH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_DH_anon_WITH_AES_128_CBC_SHA - F
      TLS_DH_anon_WITH_AES_128_CBC_SHA256 - F
      TLS_DH_anon_WITH_AES_128_GCM_SHA256 - F
      TLS_DH_anon_WITH_AES_256_CBC_SHA - F
      TLS_DH_anon_WITH_AES_256_CBC_SHA256 - F
      TLS_DH_anon_WITH_AES_256_GCM_SHA384 - F
      TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA - F
      TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA - F
      TLS_DH_anon_WITH_DES_CBC_SHA - F
      TLS_DH_anon_WITH_RC4_128_MD5 - F
      TLS_DH_anon_WITH_SEED_CBC_SHA - F
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_128_CBC_SHA - F
      TLS_ECDH_anon_WITH_AES_256_CBC_SHA - F
      TLS_ECDH_anon_WITH_RC4_128_SHA - F
      TLS_RSA_EXPORT_WITH_DES40_CBC_SHA - E
      TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 - E
      TLS_RSA_EXPORT_WITH_RC4_40_MD5 - E
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_DES_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
    compressors: 
      NULL
    cipher preference: client
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      64-bit block cipher DES vulnerable to SWEET32 attack
      64-bit block cipher DES40 vulnerable to SWEET32 attack
      64-bit block cipher RC2 vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
      Key exchange (dh 1024) of lower strength than certificate key
  least strength: F
80
tcp
http
nginx

product: nginx

http-server-header
nginx
http-title
Welcome to nginx!
443
tcp
http
nginx

product: nginx

http-robots.txt
1 disallowed entry 
/wp-admin/
http-server-header
nginx
http-title
Did not follow redirect to https://exoticbrasil.com.br/
ssl-cert
Subject: commonName=exoticbrasil.com.br
Subject Alternative Name: DNS:exoticbrasil.com.br
Not valid before: 2018-07-03T15:58:44
Not valid after:  2018-10-01T15:58:44
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Key exchange (dh 1024) of lower strength than certificate key
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
      TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Key exchange (dh 1024) of lower strength than certificate key
  least strength: C
tls-nextprotoneg
  h2
  http/1.1
Back to top