173.255.194.67 -
Open Ports
25, 80, 110, 143, 443, 993, 995, 3306, 8088, 8089Hostname
li204-67.members.linode.comTags
Linode AS63949
25
tcp
smtp
Postfix smtpd
smtp-commands
vozti.com, PIPELINING, SIZE 10240000, VRFY, ETRN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
Apache httpd2.4.6(CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
http-server-header
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
http-title
Did not follow redirect to https://vozti.com
110
tcp
pop3
Cyrus pop3d2.4.17-Fedora-RPM-2.4.17-15.el7
pop3-capabilities
TOP PIPELINING UIDL STLS USER APOP EXPIRE(NEVER) RESP-CODES LOGIN-DELAY(0) IMPLEMENTATION(Cyrus POP3 v2) SASL(PLAIN) AUTH-RESP-CODE
ssl-cert
Subject: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=-- Not valid before: 2017-04-08T05:53:01 Not valid after: 2018-04-08T05:53:01
ssl-date
TLS randomness does not represent time
143
tcp
imap
Cyrus imapd2.4.17-Fedora-RPM-2.4.17-15.el7
imap-capabilities
THREAD=REFERENCES SORT=MODSEQ ATOMIC COMPRESS=DEFLATE ENABLE UIDPLUS MAILBOX-REFERRALS QUOTA X-NETSCAPE ID LIST-EXTENDED SORT=DISPLAY QRESYNC IDLEA0001 SASL-IR WITHIN UNSELECT Completed CATENATE ANNOTATEMORE URLAUTH=BINARY ACL OK URLAUTH STARTTLS AUTH=PLAIN XLIST CONDSTORE NAMESPACE SCAN IMAP4rev1 MULTIAPPEND BINARY NO LITERAL+ SORT ESEARCH THREAD=ORDEREDSUBJECT CHILDREN RENAME RIGHTS=kxte
ssl-cert
Subject: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=-- Not valid before: 2017-04-08T05:53:01 Not valid after: 2018-04-08T05:53:01
ssl-date
TLS randomness does not represent time
Apache httpd2.4.6(CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
http-methods
Potentially risky methods: TRACE
http-robots.txt
1 disallowed entry /
http-server-header
Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16
http-title
Vozty callcenter online
ssl-cert
Subject: commonName=vozti.com Subject Alternative Name: DNS:vozti.com Not valid before: 2020-07-05T00:00:00 Not valid after: 2021-05-17T23:59:59
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
SSLv3: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 CBC-mode cipher in SSLv3 (CVE-2014-3566) TLSv1.0: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 TLSv1.1: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 TLSv1.2: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256k1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 least strength: C
993
tcp
imap
Cyrus imapd2.4.17-Fedora-RPM-2.4.17-15.el7
imap-capabilities
THREAD=REFERENCES SORT=MODSEQ ATOMIC COMPRESS=DEFLATE ENABLE UIDPLUS MAILBOX-REFERRALS QUOTA X-NETSCAPE ID LIST-EXTENDED SORT=DISPLAY QRESYNC IDLEA0001 SASL-IR WITHIN UNSELECT CATENATE ANNOTATEMORE Completed ACL OK URLAUTH URLAUTH=BINARY AUTH=PLAIN XLIST CONDSTORE NAMESPACE SCAN IMAP4rev1 MULTIAPPEND BINARY NO LITERAL+ SORT ESEARCH THREAD=ORDEREDSUBJECT CHILDREN RENAME RIGHTS=kxte
ssl-cert
Subject: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=-- Not valid before: 2017-04-08T05:53:01 Not valid after: 2018-04-08T05:53:01
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
SSLv3: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack 64-bit block cipher IDEA vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 CBC-mode cipher in SSLv3 (CVE-2014-3566) Ciphersuite uses MD5 for message integrity Key exchange (dh 1024) of lower strength than certificate key TLSv1.0: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack 64-bit block cipher IDEA vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (dh 1024) of lower strength than certificate key TLSv1.1: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack 64-bit block cipher IDEA vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (dh 1024) of lower strength than certificate key TLSv1.2: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256k1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack 64-bit block cipher IDEA vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (dh 1024) of lower strength than certificate key least strength: D
995
tcp
pop3
Cyrus pop3d2.4.17-Fedora-RPM-2.4.17-15.el7
pop3-capabilities
TOP PIPELINING UIDL USER APOP EXPIRE(NEVER) RESP-CODES LOGIN-DELAY(0) IMPLEMENTATION(Cyrus POP3 v2) SASL(PLAIN) AUTH-RESP-CODE
ssl-cert
Subject: commonName=localhost.localdomain/organizationName=SomeOrganization/stateOrProvinceName=SomeState/countryName=-- Not valid before: 2017-04-08T05:53:01 Not valid after: 2018-04-08T05:53:01
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
SSLv3: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack 64-bit block cipher IDEA vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 CBC-mode cipher in SSLv3 (CVE-2014-3566) Ciphersuite uses MD5 for message integrity Key exchange (dh 1024) of lower strength than certificate key TLSv1.0: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack 64-bit block cipher IDEA vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (dh 1024) of lower strength than certificate key TLSv1.1: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack 64-bit block cipher IDEA vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (dh 1024) of lower strength than certificate key TLSv1.2: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256k1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256k1) - A TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256k1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256k1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_IDEA_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack 64-bit block cipher IDEA vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (dh 1024) of lower strength than certificate key least strength: D
3306
tcp
mysql
MySQL5.5.65-MariaDB
mysql-info
Protocol: 10 Version: 5.5.65-MariaDB Thread ID: 614630 Capabilities flags: 63487 Some Capabilities: Speaks41ProtocolOld, Support41Auth, FoundRows, SupportsTransactions, ODBCClient, LongPassword, IgnoreSpaceBeforeParenthesis, InteractiveClient, IgnoreSigpipes, SupportsLoadDataLocal, SupportsCompression, Speaks41ProtocolNew, ConnectWithDatabase, DontAllowDatabaseTableColumn, LongColumnFlag, SupportsMultipleStatments, SupportsAuthPlugins, SupportsMultipleResults Status: Autocommit Salt: <BvMZ`R[Rh5mFWclu%Wg Auth Plugin Name: 87
Asterisk11.25.3
http-server-header
Asterisk/11.25.3
http-title
404 Not Found
ssl-cert
Subject: commonName=vozti.com Subject Alternative Name: DNS:vozti.com Not valid before: 2020-05-17T00:00:00 Not valid after: 2021-05-17T23:59:59
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
TLSv1.1: ciphers: TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C compressors: NULL cipher preference: server warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack TLSv1.2: ciphers: TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C compressors: NULL cipher preference: server warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack least strength: C