Open Ports
22, 999
Hostname
li582-45.members.linode.com
Tags
Linode AS63949
22
tcp
ssh
OpenSSH7.4protocol 2.0

product: OpenSSH version: 7.4 extrainfo: protocol 2.0

ssh-auth-methods
  Supported authentication methods: 
    publickey
    gssapi-keyex
    gssapi-with-mic
    password
ssh-hostkey
  2048 f9:81:43:95:e1:5a:91:c9:c4:16:7b:cd:4c:88:ce:f7 (RSA)
  256 04:07:1f:f7:a1:6d:4c:2d:99:6c:68:6c:6d:87:78:05 (ECDSA)
  256 53:71:ae:29:fa:3c:70:c5:40:8a:9e:1b:44:af:a6:6d (EdDSA)
999
tcp
garcon
fingerprint-strings
  FourOhFourRequest, HTTPOptions: 
    HTTP/1.0 404 Not found
    Content-length: 50
    Connection: close
    <html><body><h1>404 Not Found</h1></body></html>
  GetRequest: 
    HTTP/1.0 200 OK
    Set-Cookie: webvpncontext=; expires=Thu, 01 Jan 1970 22:00:00 GMT; path=/; Secure
    Content-Type: text/xml
    Content-Length: 306
    X-Transcend-Version: 1
    <?xml version="1.0" encoding="UTF-8"?>
    <config-auth client="vpn" type="auth-request">
    <version who="sg">0.1(1)</version>
    <auth id="main">
    <message>Please enter your username.</message>
    <form method="post" action="/auth">
    <input type="text" name="username" label="Username:" />
    </form></auth>
    </config-auth>
ssl-cert
Subject: commonName=*.bilai.me
Subject Alternative Name: DNS:*.bilai.me, DNS:bilai.me
Not valid before: 2021-01-01T11:22:02
Not valid after:  2022-01-22T11:51:22
ssl-date
2021-01-14T00:59:26+00:00; -1m52s from scanner time.
ssl-enum-ciphers
  TLSv1.0: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
  TLSv1.1: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
  TLSv1.2: 
    ciphers: 
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
      TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
      TLS_ECDHE_RSA_WITH_RC4_128_SHA (secp256r1) - C
      TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
      TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C
      TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C
    compressors: 
      NULL
    cipher preference: server
    warnings: 
      64-bit block cipher 3DES vulnerable to SWEET32 attack
      Broken cipher RC4 is deprecated by RFC 7465
      Ciphersuite uses MD5 for message integrity
  least strength: C
Back to top