178.128.30.103 -
Open Ports
21, 22, 25, 53, 80, 110, 143, 443, 465, 587, 993, 995, 3306, 8080, 8081Tags
Digital Ocean AS14061
21
tcp
ftp
Pure-FTPd
ssl-cert
Subject: commonName=immortal.vn/organizationName=Immortal.vn/stateOrProvinceName=Vietnam/countryName=VN Not valid before: 2018-11-08T13:11:09 Not valid after: 2038-11-03T13:11:09
22
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.7Ubuntu Linux; protocol 2.0
ssh-auth-methods
Supported authentication methods: publickey password
ssh-hostkey
2048 97:e9:08:95:94:de:06:ba:0a:9c:a1:36:d5:b9:b7:18 (RSA) 256 9b:97:a7:ec:d9:a8:79:b0:e0:b7:60:90:01:45:b0:ec (ECDSA) 256 df:9f:98:80:7c:d4:79:58:63:e6:3f:34:ed:99:8b:d6 (EdDSA)
25
tcp
smtp
Postfix smtpd
smtp-commands
immortal-droplet.immortal.vn, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
ssl-cert
Subject: commonName=immortal.vn/organizationName=Immortal.vn/stateOrProvinceName=Vietnam/countryName=VN Not valid before: 2018-11-08T13:19:49 Not valid after: 2028-11-05T13:19:49
ssl-date
TLS randomness does not represent time
53
tcp
domain
ISC BIND9.10.3-P4-Ubuntu
dns-nsid
bind.version: 9.10.3-P4-Ubuntu
Apache httpd2.4.18(Ubuntu)
http-server-header
Apache/2.4.18 (Ubuntu)
http-title
Apache2 Ubuntu Default Page: It works
110
tcp
pop3
Dovecot pop3d
pop3-capabilities
CAPA PIPELINING UIDL SASL(PLAIN LOGIN) RESP-CODES AUTH-RESP-CODE STLS TOP USER
ssl-cert
Subject: commonName=immortal.vn/organizationName=Immortal.vn/stateOrProvinceName=Vietnam/countryName=VN Not valid before: 2018-11-08T13:19:49 Not valid after: 2028-11-05T13:19:49
ssl-date
TLS randomness does not represent time
143
tcp
imap
Dovecot imapd
imap-capabilities
LITERAL+ listed SASL-IR IDLE Pre-login post-login IMAP4rev1 OK AUTH=PLAIN LOGIN-REFERRALS STARTTLS ID AUTH=LOGINA0001 more ENABLE have capabilities
ssl-cert
Subject: commonName=immortal.vn/organizationName=Immortal.vn/stateOrProvinceName=Vietnam/countryName=VN Not valid before: 2018-11-08T13:19:49 Not valid after: 2028-11-05T13:19:49
ssl-date
TLS randomness does not represent time
Apache httpd2.4.18(Ubuntu)
http-server-header
Apache/2.4.18 (Ubuntu)
http-title
Welcome!
ssl-cert
Subject: commonName=demo.immortal.vn Subject Alternative Name: DNS:demo.immortal.vn Not valid before: 2020-03-06T02:00:35 Not valid after: 2020-06-04T02:00:35
ssl-date
TLS randomness does not represent time
465
tcp
smtp
Postfix smtpd
smtp-commands
immortal-droplet.immortal.vn, PIPELINING, SIZE 10240000, VRFY, ETRN, AUTH PLAIN LOGIN, AUTH=PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
ssl-cert
Subject: commonName=immortal.vn/organizationName=Immortal.vn/stateOrProvinceName=Vietnam/countryName=VN Not valid before: 2018-11-08T13:19:49 Not valid after: 2028-11-05T13:19:49
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
TLSv1.0: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Key exchange (dh 2048) of lower strength than certificate key Key exchange (secp256r1) of lower strength than certificate key TLSv1.1: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Key exchange (dh 2048) of lower strength than certificate key Key exchange (secp256r1) of lower strength than certificate key TLSv1.2: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 2048) - C TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Key exchange (dh 2048) of lower strength than certificate key Key exchange (secp256r1) of lower strength than certificate key least strength: C
587
tcp
smtp
Postfix smtpd
smtp-commands
immortal-droplet.immortal.vn, PIPELINING, SIZE 10240000, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
ssl-cert
Subject: commonName=immortal.vn/organizationName=Immortal.vn/stateOrProvinceName=Vietnam/countryName=VN Not valid before: 2018-11-08T13:19:49 Not valid after: 2028-11-05T13:19:49
ssl-date
TLS randomness does not represent time
993
tcp
imap
Dovecot imapd
imap-capabilities
LOGIN-REFERRALS ENABLE more have AUTH=LOGINA0001 capabilities listed ID SASL-IR IDLE LITERAL+ Pre-login post-login IMAP4rev1 OK AUTH=PLAIN
ssl-cert
Subject: commonName=immortal.vn/organizationName=Immortal.vn/stateOrProvinceName=Vietnam/countryName=VN Not valid before: 2018-11-08T13:19:49 Not valid after: 2028-11-05T13:19:49
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
TLSv1.0: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (brainpoolP256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (brainpoolP256r1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (brainpoolP256r1) of lower strength than certificate key Key exchange (dh 1024) of lower strength than certificate key TLSv1.1: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (brainpoolP256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (brainpoolP256r1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (brainpoolP256r1) of lower strength than certificate key Key exchange (dh 1024) of lower strength than certificate key TLSv1.2: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (brainpoolP256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (brainpoolP256r1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (brainpoolP256r1) of lower strength than certificate key Key exchange (dh 1024) of lower strength than certificate key least strength: D
995
tcp
pop3
Dovecot pop3d
pop3-capabilities
SASL(PLAIN LOGIN) USER TOP AUTH-RESP-CODE CAPA RESP-CODES PIPELINING UIDL
ssl-cert
Subject: commonName=immortal.vn/organizationName=Immortal.vn/stateOrProvinceName=Vietnam/countryName=VN Not valid before: 2018-11-08T13:19:49 Not valid after: 2028-11-05T13:19:49
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
TLSv1.0: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (brainpoolP256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (brainpoolP256r1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (brainpoolP256r1) of lower strength than certificate key Key exchange (dh 1024) of lower strength than certificate key TLSv1.1: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (brainpoolP256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (brainpoolP256r1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (brainpoolP256r1) of lower strength than certificate key Key exchange (dh 1024) of lower strength than certificate key TLSv1.2: ciphers: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (brainpoolP256r1) - C TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (brainpoolP256r1) - A TLS_ECDHE_RSA_WITH_RC4_128_SHA (brainpoolP256r1) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 4096) - C TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A TLS_RSA_WITH_RC4_128_MD5 (rsa 4096) - C TLS_RSA_WITH_RC4_128_SHA (rsa 4096) - C TLS_RSA_WITH_SEED_CBC_SHA (rsa 4096) - A compressors: NULL cipher preference: client warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity Key exchange (brainpoolP256r1) of lower strength than certificate key Key exchange (dh 1024) of lower strength than certificate key least strength: D
3306
tcp
mysql
MariaDBunauthorized
Apache httpd2.4.18(Ubuntu)
http-robots.txt
1 disallowed entry /
http-server-header
Apache/2.4.18 (Ubuntu)
http-title
400 Bad Request Requested resource was /login/
ssl-cert
Subject: commonName=immortal.vn/organizationName=Immortal.vn/stateOrProvinceName=Vietnam/countryName=VN Not valid before: 2018-11-08T13:20:57 Not valid after: 2028-11-05T13:20:57
ssl-date
TLS randomness does not represent time