206.189.11.57 -
22
tcp
ssh
OpenSSH7.2p2 Ubuntu 4ubuntu2.8Ubuntu Linux; protocol 2.0
ssh-auth-methods
Supported authentication methods: publickey
ssh-hostkey
2048 09:fc:01:3f:0e:b4:10:a0:c3:61:23:9d:b0:fd:0d:14 (RSA) 256 82:58:18:97:88:e9:3c:e3:7b:8f:92:65:3d:52:f3:ce (ECDSA) 256 d5:72:00:93:d4:a8:fe:b2:13:b1:63:0a:82:65:69:c2 (EdDSA)
Golang net/http serverGo-IPFS json-rpc or InfluxDB API
http-title
Site doesn't have a title (text/plain; charset=utf-8).
Golang net/http serverGo-IPFS json-rpc or InfluxDB API
http-title
Site doesn't have a title (text/plain; charset=utf-8).
ssl-cert
Subject: commonName=TRAEFIK DEFAULT CERT Subject Alternative Name: DNS:02e6d8e59cf960a1387e8afb2430fe47.865d9014445d1fc6b17d54d006948d1d.traefik.default Not valid before: 2020-12-16T12:40:54 Not valid after: 2021-12-16T12:40:54
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
TLSv1.0: ciphers: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C compressors: NULL cipher preference: server warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack TLSv1.1: ciphers: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C compressors: NULL cipher preference: server warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack TLSv1.2: ciphers: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C compressors: NULL cipher preference: server warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack least strength: C
tls-nextprotoneg
h2 http/1.1
2376
tcp
dockerd
ssl-date
TLS randomness does not represent time
ssl-enum-ciphers
TLSv1.0: ciphers: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: server TLSv1.1: ciphers: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: server TLSv1.2: ciphers: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A compressors: NULL cipher preference: server least strength: A
tls-nextprotoneg
http/1.1
fingerprint-strings
FourOhFourRequest, GetRequest, HTTPOptions: HTTP/1.0 401 Unauthorized Content-Type: text/plain Www-Authenticate: Basic realm="traefik" Date: Thu, 14 Jan 2021 16:55:45 GMT Content-Length: 17 Unauthorized GenericLines, Help, Kerberos, LDAPSearchReq, LPDString, RTSPRequest, SSLSessionReq, Socks5, TLSSessionReq: HTTP/1.1 400 Bad Request Content-Type: text/plain; charset=utf-8 Connection: close Request
http-auth
HTTP/1.1 401 Unauthorized\x0D Basic realm=traefik
http-title
Site doesn't have a title (text/plain).