128.199.150.161 -
22
tcp
ssh
OpenSSH7.4protocol 2.0
ssh-auth-methods
Supported authentication methods: publickey gssapi-keyex gssapi-with-mic password
ssh-hostkey
2048 7f:75:fe:7d:96:1c:34:1a:a4:6d:a4:de:1c:bc:c1:73 (RSA) 256 6a:2a:d4:c5:f3:10:2e:73:3e:c0:7a:90:b6:06:55:8f (ECDSA) 256 ee:78:49:fd:9a:17:dc:15:52:90:3d:6e:6e:6d:d5:8f (EdDSA)
nginx1.12.2
http-server-header
nginx/1.12.2
http-title
Did not follow redirect to https://mavenrepo.compathnion.com/
111
tcp
rpcbind
2-4RPC #100000
rpcinfo
program version port/proto service 100000 2,3,4 111/tcp rpcbind 100000 2,3,4 111/udp rpcbind
nginx1.12.2
http-methods
Potentially risky methods: PUT DELETE
http-server-header
nginx/1.12.2
http-title
Site doesn't have a title (text/html).
ssl-cert
Subject: commonName=compathnion.com/organizationName=Compathnion Technology Limited/stateOrProvinceName=Hong Kong/countryName=HK Subject Alternative Name: DNS:compathnion.com, DNS:gitpub.compathnion.com, DNS:hkl-dev.compathnion.com, DNS:hkl.compathnion.com, DNS:k11.compathnion.com, DNS:mavenrepo.compathnion.com, DNS:melcomacau.compathnion.com, DNS:moko.compathnion.com, DNS:musea.compathnion.com, DNS:nova.compathnion.com, DNS:www.compathnion.com, DNS:yoho.compathnion.com Not valid before: 2020-06-23T00:00:00 Not valid after: 2022-06-15T23:59:59
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
TLSv1.0: ciphers: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: server TLSv1.1: ciphers: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: server TLSv1.2: ciphers: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: server least strength: A
tls-nextprotoneg
http/1.1
8045
tcp
unknown
fingerprint-strings
DNSStatusRequest: HTTP/2 client preface string missing or corrupt. Hex dump for received bytes: 000c000010000000000000000000 DNSVersionBindReq: HTTP/2 client preface string missing or corrupt. Hex dump for received bytes: 001e0006010000010000000000000776657273696f6e0462 GenericLines: HTTP/2 client preface string missing or corrupt. Hex dump for received bytes: 0d0a0d0a GetRequest: Unexpected HTTP/1.x request: GET / HTTPOptions: Unexpected HTTP/1.x request: OPTIONS / RPCCheck: HTTP/2 client preface string missing or corrupt. Hex dump for received bytes: 8000002872fe1d130000000000000002000186a00001977c RTSPRequest: HTTP/2 client preface string missing or corrupt. Hex dump for received bytes: 4f5054494f4e53202f20525453502f312e300d0a0d0a